diff options
author | Moonchild <moonchild@palemoon.org> | 2021-02-25 01:03:57 +0000 |
---|---|---|
committer | Moonchild <moonchild@palemoon.org> | 2021-02-25 01:03:57 +0000 |
commit | ceadffab6b357723981a429e11222daf6cd6dcfb (patch) | |
tree | 5603053048d6a460f79b22bdf165fb74d32d39b0 /testing/web-platform/tests/referrer-policy | |
parent | 14fb2f966e9b54598c451e3cb35b4aa0480dafed (diff) | |
parent | ad5a13bd501e379517da1a944c104a11d951a3f5 (diff) | |
download | UXP-RC_20210225.tar UXP-RC_20210225.tar.gz UXP-RC_20210225.tar.lz UXP-RC_20210225.tar.xz UXP-RC_20210225.zip |
Merge branch 'master' into releaseRC_20210225
Diffstat (limited to 'testing/web-platform/tests/referrer-policy')
1849 files changed, 0 insertions, 57218 deletions
diff --git a/testing/web-platform/tests/referrer-policy/OWNERS b/testing/web-platform/tests/referrer-policy/OWNERS deleted file mode 100644 index db2d613c2..000000000 --- a/testing/web-platform/tests/referrer-policy/OWNERS +++ /dev/null @@ -1 +0,0 @@ -@kristijanburnik diff --git a/testing/web-platform/tests/referrer-policy/README.md b/testing/web-platform/tests/referrer-policy/README.md deleted file mode 100644 index e8e58e71b..000000000 --- a/testing/web-platform/tests/referrer-policy/README.md +++ /dev/null @@ -1,245 +0,0 @@ -# Referrer-Policy Web Platform Tests - -The Referrer-Policy tests are designed for testing browser implementations and conformance to the [W3 Referrer-Policy Specification](http://w3c.github.io/webappsec/specs/referrer-policy/). - -## Project structure - -The project contains tools, templates and a seed (```spec.src.json```) for generating tests. The main assertion logic resides in JS files in the root of the ```./generic/``` directory. - -This is the overview of the project structure: - -``` -. -└── generic - ├── subresource - documents being served as sub-resources (python scripts) - ├── subresource-test - sanity checking tests for resource invocation - ├── template - the test files template used for generating the tests - └── tools - for generating and maintaining the test suite -└── (genereated_tests_for_a_specification_1) -└── (genereated_tests_for_a_specification_2) -└── ... -└── (genereated_tests_for_a_specification_N) -``` - -## The spec JSON - -The ```spec.src.json``` defines all the test scenarios for the referrer policy. - -Invoking ```./generic/tools/generate.py``` will parse the spec JSON and determine which tests to generate (or skip) while using templates. - - -The spec can be validated by running ```./generic/tools/spec_validator.py```. This is specially important when you're making changes to ```spec.src.json```. Make sure it's a valid JSON (no comments or trailing commas). The validator should be informative and very specific on any issues. - -For details about the spec JSON, see **Overview of the spec JSON** below. - - -## Generating and running the tests - -The repository already contains generated tests, so if you're making changes, -see the **Removing all generated tests** section below, on how to remove them before you start generating tests which include your changes. - -Start from the command line: - -```bash - -# Chdir into the tests directory. -cd ~/web-platform-tests/referrer-policy - -# Generate the test resources. -./generic/tools/generate.py - -# Add all generated tests to the repo. -git add * && git commit -m "Add generated tests" - -# Regenerate the manifest. -../manifest - -``` - -Navigate to [http://web-platform.test:8000/tools/runner/index.html](http://web-platform.test:8000/tools/runner/index.html). - -Run tests under path: ```/referrer-policy```. - -Click start. - - -## Options for generating tests - -The generator script ```./generic/tools/generate.py``` has two targets: ```release``` and ```debug```. - -* Using **release** for the target will produce tests using a template for optimizing size and performance. The release template is intended for the official web-platform-tests and possibly other test suites. No sanity checking is done in release mode. Use this option whenever you're checking into web-platform-tests. - -* When generating for ```debug```, the produced tests will contain more verbosity and sanity checks. Use this target to identify problems with the test suite when making changes locally. Make sure you don't check in tests generated with the debug target. - -Note that **release** is the default target when invoking ```generate.py```. - - -## Removing all generated tests - -```bash -# Chdir into the tests directory. -cd ~/web-platform-tests/referrer-policy - -# Remove all generated tests. -./generic/tools/clean.py - -# Remove all generated tests to the repo. -git add * && git commit -m "Remove generated tests" - -# Regenerate the manifest. -../manifest -``` - -**Important:** -The ```./generic/tools/clean.py``` utility will only work if there is a valid ```spec.src.json``` and previously generated directories match the specification requirement names. So make sure you run ```clean.py``` before you alter the specification section of the spec JSON. - - -## Updating the tests - -The main test logic lives in ```./generic/referrer-policy-test-case.js``` with helper functions defined in ```./generic/common.js``` so you should probably start there. - -For updating the test suite you will most likely do **a subset** of the following: - -* Add a new sub-resource python script to ```./generic/subresource/```, - and update the reference to it in ```spec.src.json```. - -* Add a sanity check test for a sub-resource to ```./generic/subresource-test/```. - -* Implement new or update existing assertions in ```./generic/referrer-policy-test-case.js```. - -* Exclude or add some tests by updating ```spec.src.json``` test expansions. - -* Update the template files living in ```./generic/template/```. - -* Implement a new delivery method via HTTP headers or as part of the test template in ```./generic/tools/generate.py``` - -* Update the spec schema by editing ```spec.src.json``` while updating the - ```./generic/tools/spec_validator.py``` and ```./generic/tools/generate.py``` - and making sure both still work after the change (by running them). - -* Regenerate the tests and MANIFEST.json - - -## Updating the spec and regenerating - -When updating the ```spec.src.json```, e.g. by adding a test expansion pattern to the ```excluded_tests``` section or when removing an expansion in the ```specification``` section, make sure to remove all previously generated files which would still get picked up by ```MANIFEST.json``` in the web-platform-tests root. As long as you don't change the specification requirements' names or remove them, you can easily regenerate the tests via command line: - -```bash - -# Chdir into the tests directory. -cd ~/web-platform-tests/referrer-policy - -# Regenerate the test resources. -./generic/tools/regenerate - -# Add all the tests to the repo. -git add * && git commit -m "Update generated tests" - -# Regenerate the manifest. -../manifest - - -``` - - -## Overview of the spec JSON - -**Main sections:** - -* **specification** - - Top level requirements with description fields and a ```test_expansion``` rule. - This is closely mimicking the [Referrer Policy specification](http://w3c.github.io/webappsec/specs/referrer-policy/) structure. - -* **excluded_tests** - - List of ```test_expansion``` patterns expanding into selections which get skipped when generating the tests (aka. blacklisting/suppressing) - -* **referrer_policy_schema** - - The schema to validate fields which define the ```referrer_policy``` elsewhere in the JSON. - A value for a referrer_policy can only be one specified in the referrer_policy_schema. - -* **test_expansion_schema** - - The schema used to check if a ```test_expansion``` is valid. - Each test expansion can only contain fields defined by this schema. - -* **subresource_path** - - A 1:1 mapping of a **subresource type** to the URL path of the sub-resource. - When adding a new sub-resource, a path to an existing file for it also must be specified. - - -### Test Expansion Patterns - -Each field in a test expansion can be in one of the following formats: - -* Single match: ```"value"``` - -* Match any of: ```["value1", "value2", ...]``` - -* Match all: ```"*"``` - -#### Example: test expansion in a requirement specification - -The following example shows how to restrict the expansion of ```referrer_url``` to ```origin``` and allow rest of the arrangement to expand (permute) to all possible values. The name field will be the prefix of a generated HTML file name for the test. - -```json - { - "name": "origin-only", - "title": "Referrer Policy is set to 'origin-only'", - "description": "Check that all sub-resources in all cases get only the origin portion of the referrer URL.", - "specification_url": "https://w3c.github.io/webappsec/specs/referrer-policy/#referrer-policy-state-origin", - "referrer_policy": "origin", - "test_expansion": [ - { - "name": "generic", - "expansion": "default", - "source_protocol": "*", - "target_protocol": "*", - "delivery_method": "*", - "redirection": "*", - "origin": "*", - "subresource": "*", - "referrer_url": "origin" - } - ] - } -``` - -**NOTE:** An expansion is always constructive (inclusive), there isn't a negation operator for explicit exclusion. Be aware that using an empty list ```[]``` matches (expands into) exactly nothing. Tests which are to be excluded should be defined in the ```excluded_tests``` section instead. - -A single test expansion pattern, be it a requirement or a suppressed pattern, gets expanded into a list of **selections** as follows: - -* Expand each field's pattern (single, any of, or all) to list of allowed values (defined by the ```test_expansion_schema```) - -* Permute - Recursively enumerate all **selections** accross all fields - -Be aware that if there is more than one pattern expanding into a same selection (which also shares the same ```name``` field), the pattern appearing later in the spec JSON will overwrite a previously generated selection. To make sure this is not undetected when generating, set the value of the ```expansion``` field to ```default``` for an expansion appearing earlier and ```override``` for the one appearing later. - -A **selection** is a single **test instance** (scenario) with explicit values, for example: - -```javascript -var scenario = { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" -}; -``` - -Essentially, this is what gets generated and defines a single test. The scenario is then evaluated by the ```ReferrerPolicyTestCase``` in JS. For the rest of the arranging part, see the ```./generic/template/``` directory and examine ```./generic/tools/generate.py``` to see how the values for the templates are produced. - - -Taking the spec JSON, the generator follows this algorithm: - -* Expand all ```excluded_tests``` to create a blacklist of selections - -* For each specification requirement: Expand the ```test_expansion``` pattern into selections and check each against the blacklist, if not marked as suppresed, generate the test resources for the selection - diff --git a/testing/web-platform/tests/referrer-policy/generic/common.js b/testing/web-platform/tests/referrer-policy/generic/common.js deleted file mode 100644 index 492031859..000000000 --- a/testing/web-platform/tests/referrer-policy/generic/common.js +++ /dev/null @@ -1,212 +0,0 @@ -// NOTE: This method only strips the fragment and is not in accordance to the -// recommended draft specification: -// https://w3c.github.io/webappsec/specs/referrer-policy/#null -// TODO(kristijanburnik): Implement this helper as defined by spec once added -// scenarios for URLs containing username/password/etc. -function stripUrlForUseAsReferrer(url) { - return url.replace(/#.*$/, ""); -} - -function parseUrlQueryString(queryString) { - var queries = queryString.replace(/^\?/, "").split("&"); - var params = {}; - - for (var i in queries) { - var kvp = queries[i].split("="); - params[kvp[0]] = kvp[1]; - } - - return params; -}; - -function appendIframeToBody(url, attributes) { - var iframe = document.createElement("iframe"); - iframe.src = url; - // Extend element with attributes. (E.g. "referrerPolicy" or "rel") - if (attributes) { - for (var attr in attributes) { - iframe[attr] = attributes[attr]; - } - } - document.body.appendChild(iframe); - - return iframe; -} - -function loadImage(src, callback, attributes) { - var image = new Image(); - image.crossOrigin = "Anonymous"; - image.onload = function() { - callback(image); - } - image.src = src; - // Extend element with attributes. (E.g. "referrerPolicy" or "rel") - if (attributes) { - for (var attr in attributes) { - image[attr] = attributes[attr]; - } - } - document.body.appendChild(image) -} - -function decodeImageData(rgba) { - var rgb = new Uint8ClampedArray(rgba.length); - - // RGBA -> RGB. - var rgb_length = 0; - for (var i = 0; i < rgba.length; ++i) { - // Skip alpha component. - if (i % 4 == 3) - continue; - - // Zero is the string terminator. - if (rgba[i] == 0) - break; - - rgb[rgb_length++] = rgba[i]; - } - - // Remove trailing nulls from data. - rgb = rgb.subarray(0, rgb_length); - var string_data = (new TextDecoder("ascii")).decode(rgb); - - return JSON.parse(string_data); -} - -function decodeImage(url, callback, referrer_policy) { - loadImage(url, function(img) { - var canvas = document.createElement("canvas"); - var context = canvas.getContext('2d'); - context.drawImage(img, 0, 0); - var imgData = context.getImageData(0, 0, img.clientWidth, img.clientHeight); - callback(decodeImageData(imgData.data)) - }, referrer_policy); -} - -function normalizePort(targetPort) { - var defaultPorts = [80, 443]; - var isDefaultPortForProtocol = (defaultPorts.indexOf(targetPort) >= 0); - - return (targetPort == "" || isDefaultPortForProtocol) ? - "" : ":" + targetPort; -} - -function wrapResult(url, server_data) { - return { - location: url, - referrer: server_data.headers.referer, - headers: server_data.headers - } -} - -function queryIframe(url, callback, referrer_policy) { - var iframe = appendIframeToBody(url, referrer_policy); - var listener = function(event) { - if (event.source != iframe.contentWindow) - return; - - callback(event.data, url); - window.removeEventListener("message", listener); - } - window.addEventListener("message", listener); -} - -function queryImage(url, callback, referrer_policy) { - decodeImage(url, function(server_data) { - callback(wrapResult(url, server_data), url); - }, referrer_policy) -} - -function queryXhr(url, callback) { - var xhr = new XMLHttpRequest(); - xhr.open('GET', url, true); - xhr.onreadystatechange = function(e) { - if (this.readyState == 4 && this.status == 200) { - var server_data = JSON.parse(this.responseText); - callback(wrapResult(url, server_data), url); - } - }; - xhr.send(); -} - -function queryWorker(url, callback) { - var worker = new Worker(url); - worker.onmessage = function(event) { - var server_data = event.data; - callback(wrapResult(url, server_data), url); - }; -} - -function queryFetch(url, callback) { - fetch(url).then(function(response) { - response.json().then(function(server_data) { - callback(wrapResult(url, server_data), url); - }); - } - ); -} - -function queryNavigable(element, url, callback, attributes) { - var navigable = element - navigable.href = url; - navigable.target = "helper-iframe"; - - var helperIframe = document.createElement("iframe") - helperIframe.name = "helper-iframe" - document.body.appendChild(helperIframe) - - // Extend element with attributes. (E.g. "referrer_policy" or "rel") - if (attributes) { - for (var attr in attributes) { - navigable[attr] = attributes[attr]; - } - } - - var listener = function(event) { - if (event.source != helperIframe.contentWindow) - return; - - callback(event.data, url); - window.removeEventListener("message", listener); - } - window.addEventListener("message", listener); - - navigable.click(); -} - -function queryLink(url, callback, referrer_policy) { - var a = document.createElement("a"); - a.innerHTML = "Link to subresource"; - document.body.appendChild(a); - queryNavigable(a, url, callback, referrer_policy) -} - -function queryAreaLink(url, callback, referrer_policy) { - var area = document.createElement("area"); - // TODO(kristijanburnik): Append to map and add image. - document.body.appendChild(area); - queryNavigable(area, url, callback, referrer_policy) -} - -function queryScript(url, callback) { - var script = document.createElement("script"); - script.src = url; - - var listener = function(event) { - var server_data = event.data; - callback(wrapResult(url, server_data), url); - window.removeEventListener("message", listener); - } - window.addEventListener("message", listener); - - document.body.appendChild(script); -} - - // SanityChecker does nothing in release mode. -function SanityChecker() {} -SanityChecker.prototype.checkScenario = function() {}; -SanityChecker.prototype.checkSubresourceResult = function() {}; - -// TODO(kristijanburnik): document.origin is supported since Chrome 41, -// other browsers still don't support it. Remove once they do. -document.origin = document.origin || (location.protocol + "//" + location.host); diff --git a/testing/web-platform/tests/referrer-policy/generic/referrer-policy-test-case.js b/testing/web-platform/tests/referrer-policy/generic/referrer-policy-test-case.js deleted file mode 100644 index c4cf96fb0..000000000 --- a/testing/web-platform/tests/referrer-policy/generic/referrer-policy-test-case.js +++ /dev/null @@ -1,125 +0,0 @@ -function ReferrerPolicyTestCase(scenario, testDescription, sanityChecker) { - // Pass and skip rest of the test if browser does not support fetch. - if (scenario.subresource == "fetch-request" && !window.fetch) { - // TODO(kristijanburnik): This should be refactored. - return { - start: function() { - test(function() { assert_true(true); }, - "[ReferrerPolicyTestCase] Skipping test: Fetch is not supported."); - } - }; - } - - // This check is A NOOP in release. - sanityChecker.checkScenario(scenario); - - var subresourceInvoker = { - "a-tag": queryLink, - "area-tag": queryAreaLink, - "fetch-request": queryFetch, - "iframe-tag": queryIframe, - "img-tag": queryImage, - "script-tag": queryScript, - "worker-request": queryWorker, - "xhr-request": queryXhr - }; - - var referrerUrlResolver = { - "omitted": function() { - return undefined; - }, - "origin": function() { - return document.origin + "/"; - }, - "stripped-referrer": function() { - return stripUrlForUseAsReferrer(location.toString()); - } - }; - - var t = { - _scenario: scenario, - _testDescription: testDescription, - _subresourceUrl: null, - _expectedReferrerUrl: null, - _constructSubresourceUrl: function() { - // TODO(kristijanburnik): We should assert that these two domains are - // different. E.g. If someone runs the tets over www, this would fail. - var domainForOrigin = { - "cross-origin":"{{domains[www1]}}", - "same-origin": location.hostname - }; - - // Values obtained and replaced by the wptserve pipeline: - // http://wptserve.readthedocs.org/en/latest/pipes.html#built-in-pipes - var portForProtocol = { - "http": parseInt("{{ports[http][0]}}"), - "https": parseInt("{{ports[https][0]}}") - } - - var targetPort = portForProtocol[t._scenario.target_protocol]; - - t._subresourceUrl = t._scenario.target_protocol + "://" + - domainForOrigin[t._scenario.origin] + - normalizePort(targetPort) + - t._scenario["subresource_path"] + - "?redirection=" + t._scenario["redirection"] + - "&cache_destroyer=" + (new Date()).getTime(); - }, - - _constructExpectedReferrerUrl: function() { - t._expectedReferrerUrl = referrerUrlResolver[t._scenario.referrer_url](); - }, - - _invokeSubresource: function(callback) { - var invoker = subresourceInvoker[t._scenario.subresource]; - - // Depending on the delivery method, extend the subresource element with - // these attributes. - var elementAttributesForDeliveryMethod = { - "attr-referrer": {referrerPolicy: t._scenario.referrer_policy}, - "rel-noreferrer": {rel: "noreferrer"} - }; - - var delivery_method = t._scenario.delivery_method; - - if (delivery_method in elementAttributesForDeliveryMethod) { - invoker(t._subresourceUrl, - callback, - elementAttributesForDeliveryMethod[delivery_method]); - } else { - invoker(t._subresourceUrl, callback); - } - - }, - - start: function() { - t._constructSubresourceUrl(); - t._constructExpectedReferrerUrl(); - - var test = async_test(t._testDescription); - - t._invokeSubresource(function(result) { - // Check if the result is in valid format. NOOP in release. - sanityChecker.checkSubresourceResult( - test, t._scenario, t._subresourceUrl, result); - - // Check the reported URL. - test.step(function() { - assert_equals(result.referrer, - t._expectedReferrerUrl, - "Reported Referrer URL is '" + - t._scenario.referrer_url + "'."); - assert_equals(result.headers.referer, - t._expectedReferrerUrl, - "Reported Referrer URL from HTTP header is '" + - t._expectedReferrerUrl + "'"); - }, "Reported Referrer URL is as expected: " + t._scenario.referrer_url); - - test.done(); - }) - - } - } - - return t; -} diff --git a/testing/web-platform/tests/referrer-policy/generic/sanity-checker.js b/testing/web-platform/tests/referrer-policy/generic/sanity-checker.js deleted file mode 100644 index e0714885f..000000000 --- a/testing/web-platform/tests/referrer-policy/generic/sanity-checker.js +++ /dev/null @@ -1,52 +0,0 @@ -// The SanityChecker is used in debug mode to identify problems with the -// structure of the testsuite. In release mode it is mocked out to do nothing. - -function SanityChecker() {} - -SanityChecker.prototype.checkScenario = function(scenario) { - // Check if scenario is valid. - // TODO(kristijanburnik): Move to a sanity-checks.js for debug mode only. - test(function() { - - // We extend the exsiting test_expansion_schema not to kill performance by - // copying. - var expectedFields = SPEC_JSON["test_expansion_schema"]; - expectedFields["referrer_policy"] = SPEC_JSON["referrer_policy_schema"]; - - assert_own_property(scenario, "subresource_path", - "Scenario has the path to the subresource."); - - for (var field in expectedFields) { - assert_own_property(scenario, field, - "The scenario contains field " + field) - assert_in_array(scenario[field], expectedFields[field], - "Scenario's " + field + " is one of: " + - expectedFields[field].join(", ")) + "." - } - - // Check if the protocol is matched. - assert_equals(scenario["source_protocol"] + ":", location.protocol, - "Protocol of the test page should match the scenario.") - - }, "[ReferrerPolicyTestCase] The test scenario is valid."); -} - -SanityChecker.prototype.checkSubresourceResult = function(test, - scenario, - subresourceUrl, - result) { - test.step(function() { - assert_equals(Object.keys(result).length, 3); - assert_own_property(result, "location"); - assert_own_property(result, "referrer"); - assert_own_property(result, "headers"); - - // Skip location check for scripts. - if (scenario.subresource == "script-tag") - return; - - // Sanity check: location of sub-resource matches reported location. - assert_equals(result.location, subresourceUrl, - "Subresource reported location."); - }, "Running a valid test scenario."); -}; diff --git a/testing/web-platform/tests/referrer-policy/generic/subresource-test/area-navigate.html b/testing/web-platform/tests/referrer-policy/generic/subresource-test/area-navigate.html deleted file mode 100644 index bca7e479f..000000000 --- a/testing/web-platform/tests/referrer-policy/generic/subresource-test/area-navigate.html +++ /dev/null @@ -1,39 +0,0 @@ -<!DOCTYPE html> -<!-- TODO(kristijanburnik): Remove subres. duplication. Reuse a template. --> -<html> - <head> - <title>Area Link messaging - cross-origin Area Link navigation</title> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- Common global functions for referrer-policy tests. --> - <script src="/referrer-policy/generic/common.js"></script> - </head> - <body> - <h1>Area Link messaging - cross-origin Area Link navigation</h1> - <p>If you can read JSON encoded HTTP request headers of the Area link below, - the messaging works as expected.</p> - - <pre id="received_message">Running...</pre> - - <script> - var messaging_test = async_test("Area is responding with HTTP headers"); - var urlPath = '/referrer-policy/generic/subresource/document.py'; - var url = location.protocol + "//www1." + location.hostname + ":" + location.port + - urlPath; - queryAreaLink(url, function(message) { - var pre = document.getElementById('received_message') - var headers = message.headers; - pre.innerHTML = ""; - pre.innerHTML += url + ":\n\n"; - pre.innerHTML += JSON.stringify(headers, null, 2) + "\n\n" - messaging_test.step(function() { - assert_own_property(headers, "host") - assert_own_property(headers, "connection") - }); - messaging_test.done(); - }); - </script> - - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/generic/subresource-test/attr-referrer-invalid-value.html b/testing/web-platform/tests/referrer-policy/generic/subresource-test/attr-referrer-invalid-value.html deleted file mode 100644 index 9bc74f54a..000000000 --- a/testing/web-platform/tests/referrer-policy/generic/subresource-test/attr-referrer-invalid-value.html +++ /dev/null @@ -1,25 +0,0 @@ -<!DOCTYPE html> -<html> - <head> - <title>Invalid referrerPolicy attribute value</title> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - </head> - <body> - <h1>Invalid referrerPolicy attribute value</h1> - <pre>Running...</pre> - - <script> - test(function () { - var elements = ["iframe", "img", "a", "area", "link"]; - for (var i = 0; i < elements.length; i++) { - var elem = document.createElement(elements[i]); - elem.referrerPolicy = "unsafe-url"; - assert_equals(elem.referrerPolicy, "unsafe-url"); - elem.referrerPolicy = "not-valid-value"; - assert_equals(elem.referrerPolicy, ""); - } - }, "Invalid referrerpolicy values not reflected"); - </script> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/generic/subresource-test/fetch-messaging.html b/testing/web-platform/tests/referrer-policy/generic/subresource-test/fetch-messaging.html deleted file mode 100644 index 046b29e9a..000000000 --- a/testing/web-platform/tests/referrer-policy/generic/subresource-test/fetch-messaging.html +++ /dev/null @@ -1,48 +0,0 @@ -<!DOCTYPE html> -<!-- TODO(kristijanburnik): Remove subres. duplication. Reuse a template. --> -<html> - <head> - <title>Fetch messaging - same-origin Fetch request</title> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- Common global functions for referrer-policy tests. --> - <script src="/referrer-policy/generic/common.js"></script> - </head> - <body> - <h1>Fetch messaging - same-origin Fetch request</h1> - <p>If you can read JSON encoded HTTP request headers of the Fetch below, - the messaging works as expected.</p> - - <pre id="received_message">Running...</pre> - - <script> - test(function() { - assert_true(!!window.fetch, "Fetch is not supported by this browser."); - }, "Fetch is supported by the browser."); - - (function() { - if (!window.fetch) - return; - - var fetch_test = async_test("Fetch is responding with HTTP headers"); - var urlPath = '/referrer-policy/generic/subresource/xhr.py'; - var url = location.protocol + "//" + location.hostname + ":" + - location.port + urlPath; - queryFetch(url, function(message) { - var pre = document.getElementById('received_message') - var headers = message.headers; - pre.innerHTML = ""; - pre.innerHTML += url + ":\n\n"; - pre.innerHTML += JSON.stringify(headers, null, 2) + "\n\n"; - fetch_test.step(function() { - assert_own_property(headers, "host") - assert_own_property(headers, "connection") - }); - fetch_test.done(); - }); - })(); - </script> - - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/generic/subresource-test/iframe-messaging.html b/testing/web-platform/tests/referrer-policy/generic/subresource-test/iframe-messaging.html deleted file mode 100644 index a3e55707c..000000000 --- a/testing/web-platform/tests/referrer-policy/generic/subresource-test/iframe-messaging.html +++ /dev/null @@ -1,39 +0,0 @@ -<!DOCTYPE html> -<!-- TODO(kristijanburnik): Remove subres. duplication. Reuse a template. --> -<html> - <head> - <title>Iframe messaging - cross-origin iframe request</title> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- Common global functions for referrer-policy tests. --> - <script src="/referrer-policy/generic/common.js"></script> - </head> - <body> - <h1>Iframe messaging - cross-origin iframe request</h1> - <p>If you can read JSON encoded HTTP request headers of the iframe below, - the messaging works as expected.</p> - - <pre id="received_message">Running...</pre> - - <script> - var messaging_test = async_test("Iframe is responding with HTTP headers"); - var urlPath = '/referrer-policy/generic/subresource/document.py'; - var url = location.protocol + "//www1." + location.hostname + ":" + location.port + - urlPath; - queryIframe(url, function(message) { - var pre = document.getElementById('received_message') - var headers = message.headers; - pre.innerHTML = ""; - pre.innerHTML += url + ":\n\n"; - pre.innerHTML += JSON.stringify(headers, null, 2) + "\n\n" - messaging_test.step(function() { - assert_own_property(headers, "host") - assert_own_property(headers, "connection") - }); - messaging_test.done(); - }); - </script> - - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/generic/subresource-test/image-decoding.html b/testing/web-platform/tests/referrer-policy/generic/subresource-test/image-decoding.html deleted file mode 100644 index 083fb829a..000000000 --- a/testing/web-platform/tests/referrer-policy/generic/subresource-test/image-decoding.html +++ /dev/null @@ -1,39 +0,0 @@ -<!DOCTYPE html> -<!-- TODO(kristijanburnik): Remove subres. duplication. Reuse a template. --> -<html> - <head> - <title>Image decoding - cross-origin image request</title> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- Common global functions for referrer-policy tests. --> - <script src="/referrer-policy/generic/common.js"></script> - </head> - <body> - <h1>Image decoding - cross-origin image request</h1> - <p>If you can read JSON encoded HTTP headers of the image below, - the decoding works as expected.</p> - - <pre id="received_message">Running...</pre> - - <script> - var messaging_test = async_test("Image is encoding headers as JSON."); - var urlPath = '/referrer-policy/generic/subresource/image.py'; - var url = location.protocol + "//www1." + location.hostname + ":" + location.port + - urlPath; - queryImage(url, function(message) { - var pre = document.getElementById('received_message') - var headers = message.headers; - pre.innerHTML = ""; - pre.innerHTML += url + ":\n\n"; - pre.innerHTML += JSON.stringify(headers, null, 2) + "\n\n" - messaging_test.step(function() { - assert_own_property(headers, "host") - assert_own_property(headers, "connection") - }); - messaging_test.done(); - }); - </script> - - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/generic/subresource-test/link-navigate.html b/testing/web-platform/tests/referrer-policy/generic/subresource-test/link-navigate.html deleted file mode 100644 index 45e502004..000000000 --- a/testing/web-platform/tests/referrer-policy/generic/subresource-test/link-navigate.html +++ /dev/null @@ -1,39 +0,0 @@ -<!DOCTYPE html> -<!-- TODO(kristijanburnik): Remove subres. duplication. Reuse a template. --> -<html> - <head> - <title>Link messaging - cross-origin Link navigation</title> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- Common global functions for referrer-policy tests. --> - <script src="/referrer-policy/generic/common.js"></script> - </head> - <body> - <h1>Link messaging - cross-origin Link navigation</h1> - <p>If you can read JSON encoded HTTP request headers of the Link below, - the messaging works as expected.</p> - - <pre id="received_message">Running...</pre> - - <script> - var messaging_test = async_test("Link is responding with HTTP headers"); - var urlPath = '/referrer-policy/generic/subresource/document.py'; - var url = location.protocol + "//www1." + location.hostname + ":" + location.port + - urlPath; - queryLink(url, function(message) { - var pre = document.getElementById('received_message') - var headers = message.headers; - pre.innerHTML = ""; - pre.innerHTML += url + ":\n\n"; - pre.innerHTML += JSON.stringify(headers, null, 2) + "\n\n" - messaging_test.step(function() { - assert_own_property(headers, "host") - assert_own_property(headers, "connection") - }); - messaging_test.done(); - }); - </script> - - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/generic/subresource-test/script-messaging.html b/testing/web-platform/tests/referrer-policy/generic/subresource-test/script-messaging.html deleted file mode 100644 index 09c5db619..000000000 --- a/testing/web-platform/tests/referrer-policy/generic/subresource-test/script-messaging.html +++ /dev/null @@ -1,39 +0,0 @@ -<!DOCTYPE html> -<!-- TODO(kristijanburnik): Remove subres. duplication. Reuse a template. --> -<html> - <head> - <title>Script messaging - cross-origin Script request</title> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- Common global functions for referrer-policy tests. --> - <script src="/referrer-policy/generic/common.js"></script> - </head> - <body> - <h1>Script messaging - cross-origin Script request</h1> - <p>If you can read JSON encoded HTTP request headers of the Script below, - the messaging works as expected.</p> - - <pre id="received_message">Running...</pre> - - <script> - var messaging_test = async_test("Script is responding with HTTP headers"); - var urlPath = '/referrer-policy/generic/subresource/script.py'; - var url = location.protocol + "//www1." + location.hostname + ":" + location.port + - urlPath; - queryScript(url, function(message) { - var pre = document.getElementById('received_message') - var headers = message.headers; - pre.innerHTML = ""; - pre.innerHTML += url + ":\n\n"; - pre.innerHTML += JSON.stringify(headers, null, 2) + "\n\n" - messaging_test.step(function() { - assert_own_property(headers, "host") - assert_own_property(headers, "connection") - }); - messaging_test.done(); - }); - </script> - - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/generic/subresource-test/worker-messaging.html b/testing/web-platform/tests/referrer-policy/generic/subresource-test/worker-messaging.html deleted file mode 100644 index 6d34366b9..000000000 --- a/testing/web-platform/tests/referrer-policy/generic/subresource-test/worker-messaging.html +++ /dev/null @@ -1,39 +0,0 @@ -<!DOCTYPE html> -<!-- TODO(kristijanburnik): Remove subres. duplication. Reuse a template. --> -<html> - <head> - <title>Worker messaging - same-origin Worker request</title> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- Common global functions for referrer-policy tests. --> - <script src="/referrer-policy/generic/common.js"></script> - </head> - <body> - <h1>Worker messaging - same-origin Worker request</h1> - <p>If you can read JSON encoded HTTP request headers of the Worker below, - the messaging works as expected.</p> - - <pre id="received_message">Running...</pre> - - <script> - var messaging_test = async_test("Worker is responding with HTTP headers"); - var urlPath = '/referrer-policy/generic/subresource/worker.py'; - var url = location.protocol + "//" + location.hostname + ":" + - location.port + urlPath; - queryWorker(url, function(message) { - var pre = document.getElementById('received_message') - var headers = message.headers; - pre.innerHTML = ""; - pre.innerHTML += url + ":\n\n"; - pre.innerHTML += JSON.stringify(headers, null, 2) + "\n\n" - messaging_test.step(function() { - assert_own_property(headers, "host") - assert_own_property(headers, "connection") - }); - messaging_test.done(); - }); - </script> - - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/generic/subresource-test/xhr-messaging.html b/testing/web-platform/tests/referrer-policy/generic/subresource-test/xhr-messaging.html deleted file mode 100644 index 09f691400..000000000 --- a/testing/web-platform/tests/referrer-policy/generic/subresource-test/xhr-messaging.html +++ /dev/null @@ -1,39 +0,0 @@ -<!DOCTYPE html> -<!-- TODO(kristijanburnik): Remove subres. duplication. Reuse a template. --> -<html> - <head> - <title>XHR messaging - cross-origin XHR request</title> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- Common global functions for referrer-policy tests. --> - <script src="/referrer-policy/generic/common.js"></script> - </head> - <body> - <h1>XHR messaging - cross-origin XHR request</h1> - <p>If you can read JSON encoded HTTP request headers of the XHR below, - the messaging works as expected.</p> - - <pre id="received_message">Running...</pre> - - <script> - var messaging_test = async_test("XHR is responding with HTTP headers"); - var urlPath = '/referrer-policy/generic/subresource/xhr.py'; - var url = location.protocol + "//www1." + location.hostname + ":" + location.port + - urlPath; - queryXhr(url, function(message) { - var pre = document.getElementById('received_message') - var headers = message.headers; - pre.innerHTML = ""; - pre.innerHTML += url + ":\n\n"; - pre.innerHTML += JSON.stringify(headers, null, 2) + "\n\n" - messaging_test.step(function() { - assert_own_property(headers, "host") - assert_own_property(headers, "connection") - }); - messaging_test.done(); - }); - </script> - - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/generic/subresource/__init__.py b/testing/web-platform/tests/referrer-policy/generic/subresource/__init__.py deleted file mode 100755 index e69de29bb..000000000 --- a/testing/web-platform/tests/referrer-policy/generic/subresource/__init__.py +++ /dev/null diff --git a/testing/web-platform/tests/referrer-policy/generic/subresource/document.py b/testing/web-platform/tests/referrer-policy/generic/subresource/document.py deleted file mode 100644 index b2d6c4dfa..000000000 --- a/testing/web-platform/tests/referrer-policy/generic/subresource/document.py +++ /dev/null @@ -1,12 +0,0 @@ -import os, json, sys -sys.path.insert(0, os.path.dirname(os.path.abspath(__file__))) - -import subresource - -def generate_payload(server_data): - return subresource.get_template("document.html.template") % server_data - -def main(request, response): - subresource.respond(request, - response, - payload_generator = generate_payload) diff --git a/testing/web-platform/tests/referrer-policy/generic/subresource/image.py b/testing/web-platform/tests/referrer-policy/generic/subresource/image.py deleted file mode 100644 index b6306181e..000000000 --- a/testing/web-platform/tests/referrer-policy/generic/subresource/image.py +++ /dev/null @@ -1,100 +0,0 @@ -import os, sys, array, json, math, StringIO -sys.path.insert(0, os.path.dirname(os.path.abspath(__file__))) -import subresource - -class Image: - """This class partially implements the interface of the PIL.Image.Image. - One day in the future WPT might support the PIL module or another imaging - library, so this hacky BMP implementation will no longer be required. - """ - def __init__(self, width, height): - self.width = width - self.height = height - self.img = bytearray([0 for i in range(3 * width * height)]) - - @staticmethod - def new(mode, size, color=0): - return Image(size[0], size[1]) - - def _int_to_bytes(self, number): - packed_bytes = [0, 0, 0, 0] - for i in range(4): - packed_bytes[i] = number & 0xFF - number >>= 8 - - return packed_bytes - - def putdata(self, color_data): - for y in range(self.height): - for x in range(self.width): - i = x + y * self.width - if i > len(color_data) - 1: - return - - self.img[i * 3: i * 3 + 3] = color_data[i][::-1] - - def save(self, f, type): - assert type == "BMP" - # 54 bytes of preambule + image color data. - filesize = 54 + 3 * self.width * self.height; - # 14 bytes of header. - bmpfileheader = bytearray(['B', 'M'] + self._int_to_bytes(filesize) + - [0, 0, 0, 0, 54, 0, 0, 0]) - # 40 bytes of info. - bmpinfoheader = bytearray([40, 0, 0, 0] + - self._int_to_bytes(self.width) + - self._int_to_bytes(self.height) + - [1, 0, 24] + (25 * [0])) - - padlength = (4 - (self.width * 3) % 4) % 4 - bmppad = bytearray([0, 0, 0]); - padding = bmppad[0 : padlength] - - f.write(bmpfileheader) - f.write(bmpinfoheader) - - for i in range(self.height): - offset = self.width * (self.height - i - 1) * 3 - f.write(self.img[offset : offset + 3 * self.width]) - f.write(padding) - -def encode_string_as_bmp_image(string_data): - data_bytes = array.array("B", string_data) - num_bytes = len(data_bytes) - - # Convert data bytes to color data (RGB). - color_data = [] - num_components = 3 - rgb = [0] * num_components - i = 0 - for byte in data_bytes: - component_index = i % num_components - rgb[component_index] = byte - if component_index == (num_components - 1) or i == (num_bytes - 1): - color_data.append(tuple(rgb)) - rgb = [0] * num_components - i += 1 - - # Render image. - num_pixels = len(color_data) - sqrt = int(math.ceil(math.sqrt(num_pixels))) - img = Image.new("RGB", (sqrt, sqrt), "black") - img.putdata(color_data) - - # Flush image to string. - f = StringIO.StringIO() - img.save(f, "BMP") - f.seek(0) - - return f.read() - -def generate_payload(server_data): - data = ('{"headers": %(headers)s}') % server_data - return encode_string_as_bmp_image(data) - -def main(request, response): - subresource.respond(request, - response, - payload_generator = generate_payload, - content_type = "image/bmp", - access_control_allow_origin = "*") diff --git a/testing/web-platform/tests/referrer-policy/generic/subresource/script.py b/testing/web-platform/tests/referrer-policy/generic/subresource/script.py deleted file mode 100644 index efa1a955d..000000000 --- a/testing/web-platform/tests/referrer-policy/generic/subresource/script.py +++ /dev/null @@ -1,13 +0,0 @@ -import os, sys, json -sys.path.insert(0, os.path.dirname(os.path.abspath(__file__))) -import subresource - -def generate_payload(server_data): - return subresource.get_template("script.js.template") % server_data - -def main(request, response): - subresource.respond(request, - response, - payload_generator = generate_payload, - content_type = "application/javascript") - diff --git a/testing/web-platform/tests/referrer-policy/generic/subresource/subresource.py b/testing/web-platform/tests/referrer-policy/generic/subresource/subresource.py deleted file mode 100644 index 7571b32d0..000000000 --- a/testing/web-platform/tests/referrer-policy/generic/subresource/subresource.py +++ /dev/null @@ -1,94 +0,0 @@ -import os, sys, json, urlparse, urllib - -def get_template(template_basename): - script_directory = os.path.dirname(os.path.abspath(__file__)) - template_directory = os.path.abspath(os.path.join(script_directory, - "..", - "template")) - template_filename = os.path.join(template_directory, template_basename); - - with open(template_filename, "r") as f: - return f.read() - -# TODO(kristijanburnik): subdomain_prefix is a hardcoded value aligned with -# referrer-policy-test-case.js. The prefix should be configured in one place. -def get_swapped_origin_netloc(netloc, subdomain_prefix = "www1."): - if netloc.startswith(subdomain_prefix): - return netloc[len(subdomain_prefix):] - else: - return subdomain_prefix + netloc - -def create_redirect_url(request, cross_origin = False): - parsed = urlparse.urlsplit(request.url) - destination_netloc = parsed.netloc - if cross_origin: - destination_netloc = get_swapped_origin_netloc(parsed.netloc) - - destination_url = urlparse.urlunsplit(urlparse.SplitResult( - scheme = parsed.scheme, - netloc = destination_netloc, - path = parsed.path, - query = None, - fragment = None)) - - return destination_url - - -def redirect(url, response): - response.add_required_headers = False - response.writer.write_status(301) - response.writer.write_header("access-control-allow-origin", "*") - response.writer.write_header("location", url) - response.writer.end_headers() - response.writer.write("") - - -def preprocess_redirection(request, response): - if "redirection" not in request.GET: - return False - - redirection = request.GET["redirection"] - - if redirection == "no-redirect": - return False - elif redirection == "keep-origin-redirect": - redirect_url = create_redirect_url(request, cross_origin = False) - elif redirection == "swap-origin-redirect": - redirect_url = create_redirect_url(request, cross_origin = True) - else: - raise ValueError("Invalid redirection type '%s'" % redirection) - - redirect(redirect_url, response) - return True - - -def __noop(request, response): - return "" - - -def respond(request, - response, - status_code = 200, - content_type = "text/html", - payload_generator = __noop, - cache_control = "no-cache; must-revalidate", - access_control_allow_origin = "*"): - if preprocess_redirection(request, response): - return - - response.add_required_headers = False - response.writer.write_status(status_code) - - if access_control_allow_origin != None: - response.writer.write_header("access-control-allow-origin", - access_control_allow_origin) - response.writer.write_header("content-type", content_type) - response.writer.write_header("cache-control", cache_control) - response.writer.end_headers() - - server_data = {"headers": json.dumps(request.headers, indent = 4)} - - payload = payload_generator(server_data) - response.writer.write(payload) - - diff --git a/testing/web-platform/tests/referrer-policy/generic/subresource/worker.py b/testing/web-platform/tests/referrer-policy/generic/subresource/worker.py deleted file mode 100644 index 895bc0d84..000000000 --- a/testing/web-platform/tests/referrer-policy/generic/subresource/worker.py +++ /dev/null @@ -1,12 +0,0 @@ -import os, sys, json -sys.path.insert(0, os.path.dirname(os.path.abspath(__file__))) -import subresource - -def generate_payload(server_data): - return subresource.get_template("worker.js.template") % server_data - -def main(request, response): - subresource.respond(request, - response, - payload_generator = generate_payload, - content_type = "application/javascript") diff --git a/testing/web-platform/tests/referrer-policy/generic/subresource/xhr.py b/testing/web-platform/tests/referrer-policy/generic/subresource/xhr.py deleted file mode 100755 index 45f38159c..000000000 --- a/testing/web-platform/tests/referrer-policy/generic/subresource/xhr.py +++ /dev/null @@ -1,15 +0,0 @@ -import os, sys, json -sys.path.insert(0, os.path.dirname(os.path.abspath(__file__))) -import subresource - -def generate_payload(server_data): - data = ('{"headers": %(headers)s}') % server_data - return data - -def main(request, response): - subresource.respond(request, - response, - payload_generator = generate_payload, - access_control_allow_origin = "*", - content_type = "application/json") - diff --git a/testing/web-platform/tests/referrer-policy/generic/template/disclaimer.template b/testing/web-platform/tests/referrer-policy/generic/template/disclaimer.template deleted file mode 100644 index 66c43ed6f..000000000 --- a/testing/web-platform/tests/referrer-policy/generic/template/disclaimer.template +++ /dev/null @@ -1 +0,0 @@ -<!-- DO NOT EDIT! Generated by %(generating_script_filename)s using %(html_template_filename)s. --> diff --git a/testing/web-platform/tests/referrer-policy/generic/template/document.html.template b/testing/web-platform/tests/referrer-policy/generic/template/document.html.template deleted file mode 100644 index 141711c14..000000000 --- a/testing/web-platform/tests/referrer-policy/generic/template/document.html.template +++ /dev/null @@ -1,16 +0,0 @@ -<!DOCTYPE html> -<html> - <head> - <title>This page reports back it's request details to the parent frame</title> - </head> - <body> - <script> - var result = { - location: document.location.toString(), - referrer: document.referrer.length > 0 ? document.referrer : undefined, - headers: %(headers)s - }; - parent.postMessage(result, "*"); - </script> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/generic/template/script.js.template b/testing/web-platform/tests/referrer-policy/generic/template/script.js.template deleted file mode 100644 index e2edf2181..000000000 --- a/testing/web-platform/tests/referrer-policy/generic/template/script.js.template +++ /dev/null @@ -1,3 +0,0 @@ -postMessage({ - "headers": %(headers)s -}, "*"); diff --git a/testing/web-platform/tests/referrer-policy/generic/template/spec_json.js.template b/testing/web-platform/tests/referrer-policy/generic/template/spec_json.js.template deleted file mode 100644 index e4cbd0342..000000000 --- a/testing/web-platform/tests/referrer-policy/generic/template/spec_json.js.template +++ /dev/null @@ -1 +0,0 @@ -var SPEC_JSON = %(spec_json)s; diff --git a/testing/web-platform/tests/referrer-policy/generic/template/test.debug.html.template b/testing/web-platform/tests/referrer-policy/generic/template/test.debug.html.template deleted file mode 100644 index 0faf63bdd..000000000 --- a/testing/web-platform/tests/referrer-policy/generic/template/test.debug.html.template +++ /dev/null @@ -1,70 +0,0 @@ -<!DOCTYPE html> -%(generated_disclaimer)s -<html> - <head> - <title>Referrer-Policy: %(spec_title)s</title>%(meta_delivery_method)s - <meta name="description" content="%(spec_description)s"> - <meta name="assert" content="%(test_description)s"> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- Common global functions for referrer-policy tests. --> - <script src="/referrer-policy/generic/common.js"></script> - <!-- The original specification JSON for validating the scenario. --> - <script src="/referrer-policy/spec_json.js"></script> - <!-- Internal checking of the tests --> - <script src="/referrer-policy/generic/sanity-checker.js"></script> - <!-- Simple wrapper API for all referrer-policy test cases. --> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <h1>%(spec_title)s</h1> - <h2>%(spec_description)s</h2> - - <p> - <script> - // Show the detailed assertion description of the test. - document.write(document.querySelector("meta[name=assert]").content); - </script> - </p> - - <p>See <a href="%(spec_specification_url)s" target="_blank">specification</a> - details for this test.</p> - - <h3>Scenario outline</h3> - <table> - <tbody> - <tr> - <th>Delivery method</th> - <td>%(delivery_method)s</td> - </tr> - <tr> - <th>Redirection</th> - <td>%(redirection)s</td> - </tr> - <tr> - <th>Origin transition</th> - <td>%(origin)s</td> - </tr> - <tr> - <th>Protocol transition</th> - <td>from %(source_protocol)s to %(target_protocol)s</td> - </tr> - <tr> - <th>Subresource type</th> - <td>%(subresource)s</td> - </tr> - <tr> - <td colspan="2"><hr></td> - </tr> - <tr> - <th>Expected result</th> - <td>Referrer URL should be <strong>%(referrer_url)s</strong></td> - </tr> - <tbody> - </table> - - <script>%(test_js)s</script> - - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/generic/template/test.js.template b/testing/web-platform/tests/referrer-policy/generic/template/test.js.template deleted file mode 100644 index 4b01d4d11..000000000 --- a/testing/web-platform/tests/referrer-policy/generic/template/test.js.template +++ /dev/null @@ -1,15 +0,0 @@ -ReferrerPolicyTestCase( - { - "referrer_policy": %(referrer_policy_json)s, - "delivery_method": "%(delivery_method)s", - "redirection": "%(redirection)s", - "origin": "%(origin)s", - "source_protocol": "%(source_protocol)s", - "target_protocol": "%(target_protocol)s", - "subresource": "%(subresource)s", - "subresource_path": "%(subresource_path)s", - "referrer_url": "%(referrer_url)s" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() -).start(); diff --git a/testing/web-platform/tests/referrer-policy/generic/template/test.release.html.template b/testing/web-platform/tests/referrer-policy/generic/template/test.release.html.template deleted file mode 100644 index 0d63fd68a..000000000 --- a/testing/web-platform/tests/referrer-policy/generic/template/test.release.html.template +++ /dev/null @@ -1,20 +0,0 @@ -<!DOCTYPE html> -%(generated_disclaimer)s -<html> - <head> - <title>Referrer-Policy: %(spec_title)s</title> - <meta name="description" content="%(spec_description)s">%(meta_delivery_method)s - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="%(spec_specification_url)s"> - <meta name="assert" content="%(test_description)s"> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script>%(test_js)s</script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/generic/template/test_description.template b/testing/web-platform/tests/referrer-policy/generic/template/test_description.template deleted file mode 100644 index fbc80bb25..000000000 --- a/testing/web-platform/tests/referrer-policy/generic/template/test_description.template +++ /dev/null @@ -1,5 +0,0 @@ -The referrer URL is %(referrer_url)s when a -document served over %(source_protocol)s requires an %(target_protocol)s -sub-resource via %(subresource)s using the %(delivery_method)s -delivery method with %(redirection)s and when -the target request is %(origin)s. diff --git a/testing/web-platform/tests/referrer-policy/generic/template/worker.js.template b/testing/web-platform/tests/referrer-policy/generic/template/worker.js.template deleted file mode 100644 index 817dd8c87..000000000 --- a/testing/web-platform/tests/referrer-policy/generic/template/worker.js.template +++ /dev/null @@ -1,3 +0,0 @@ -postMessage({ - "headers": %(headers)s -}); diff --git a/testing/web-platform/tests/referrer-policy/generic/tools/__init__.py b/testing/web-platform/tests/referrer-policy/generic/tools/__init__.py deleted file mode 100644 index e69de29bb..000000000 --- a/testing/web-platform/tests/referrer-policy/generic/tools/__init__.py +++ /dev/null diff --git a/testing/web-platform/tests/referrer-policy/generic/tools/clean.py b/testing/web-platform/tests/referrer-policy/generic/tools/clean.py deleted file mode 100755 index 715e1d6ae..000000000 --- a/testing/web-platform/tests/referrer-policy/generic/tools/clean.py +++ /dev/null @@ -1,35 +0,0 @@ -#!/usr/bin/env python - -import os, json -from common_paths import * -import spec_validator - -def rmtree(top): - top = os.path.abspath(top) - assert top != os.path.expanduser("~") - assert len(top) > len(os.path.expanduser("~")) - assert "web-platform-tests" in top - assert "referrer-policy" in top - - for root, dirs, files in os.walk(top, topdown=False): - for name in files: - os.remove(os.path.join(root, name)) - for name in dirs: - os.rmdir(os.path.join(root, name)) - - os.rmdir(top) - -def main(): - spec_json = load_spec_json(); - spec_validator.assert_valid_spec_json(spec_json) - - for spec in spec_json['specification']: - generated_dir = os.path.join(spec_directory, spec["name"]) - if (os.path.isdir(generated_dir)): - rmtree(generated_dir) - - if (os.path.isfile(generated_spec_json_filename)): - os.remove(generated_spec_json_filename) - -if __name__ == '__main__': - main() diff --git a/testing/web-platform/tests/referrer-policy/generic/tools/common_paths.py b/testing/web-platform/tests/referrer-policy/generic/tools/common_paths.py deleted file mode 100644 index dc303f3c1..000000000 --- a/testing/web-platform/tests/referrer-policy/generic/tools/common_paths.py +++ /dev/null @@ -1,52 +0,0 @@ -import os, sys, json, re - -script_directory = os.path.dirname(os.path.abspath(__file__)) -generic_directory = os.path.abspath(os.path.join(script_directory, '..')) - -template_directory = os.path.abspath(os.path.join(script_directory, - '..', - 'template')) -spec_directory = os.path.abspath(os.path.join(script_directory, '..', '..')) -test_root_directory = os.path.abspath(os.path.join(script_directory, - '..', '..', '..')) - -spec_filename = os.path.join(spec_directory, "spec.src.json") -generated_spec_json_filename = os.path.join(spec_directory, "spec_json.js") - -selection_pattern = '%(delivery_method)s/' + \ - '%(origin)s/' + \ - '%(source_protocol)s-%(target_protocol)s/' + \ - '%(subresource)s/' - -test_file_path_pattern = '%(spec_name)s/' + selection_pattern + \ - '%(name)s.%(redirection)s.%(source_protocol)s.html' - - -def get_template(basename): - with open(os.path.join(template_directory, basename), "r") as f: - return f.read() - - -def read_nth_line(fp, line_number): - fp.seek(0) - for i, line in enumerate(fp): - if (i + 1) == line_number: - return line - - -def load_spec_json(): - re_error_location = re.compile('line ([0-9]+) column ([0-9]+)') - with open(spec_filename, "r") as f: - try: - spec_json = json.load(f) - except ValueError, ex: - print ex.message - match = re_error_location.search(ex.message) - if match: - line_number, column = int(match.group(1)), int(match.group(2)) - print read_nth_line(f, line_number).rstrip() - print " " * (column - 1) + "^" - - sys.exit(1) - - return spec_json diff --git a/testing/web-platform/tests/referrer-policy/generic/tools/generate.py b/testing/web-platform/tests/referrer-policy/generic/tools/generate.py deleted file mode 100755 index 10fc11c4f..000000000 --- a/testing/web-platform/tests/referrer-policy/generic/tools/generate.py +++ /dev/null @@ -1,172 +0,0 @@ -#!/usr/bin/env python - -import os, sys, json -from common_paths import * -import spec_validator -import argparse - - -def expand_test_expansion_pattern(spec_test_expansion, test_expansion_schema): - expansion = {} - for artifact in spec_test_expansion: - artifact_value = spec_test_expansion[artifact] - if artifact_value == '*': - expansion[artifact] = test_expansion_schema[artifact] - elif isinstance(artifact_value, list): - expansion[artifact] = artifact_value - else: - expansion[artifact] = [artifact_value] - - return expansion - - -def permute_expansion(expansion, selection = {}, artifact_index = 0): - artifact_order = ['delivery_method', 'redirection', 'origin', - 'source_protocol', 'target_protocol', 'subresource', - 'referrer_url', 'name'] - - if artifact_index >= len(artifact_order): - yield selection - return - - artifact_key = artifact_order[artifact_index] - - for artifact_value in expansion[artifact_key]: - selection[artifact_key] = artifact_value - for next_selection in permute_expansion(expansion, - selection, - artifact_index + 1): - yield next_selection - - -def generate_selection(selection, spec, subresource_path, - test_html_template_basename): - selection['spec_name'] = spec['name'] - selection['spec_title'] = spec['title'] - selection['spec_description'] = spec['description'] - selection['spec_specification_url'] = spec['specification_url'] - selection['subresource_path'] = subresource_path - # Oddball: it can be None, so in JS it's null. - selection['referrer_policy_json'] = json.dumps(spec['referrer_policy']) - - test_filename = test_file_path_pattern % selection - test_directory = os.path.dirname(test_filename) - full_path = os.path.join(spec_directory, test_directory) - - test_html_template = get_template(test_html_template_basename) - test_js_template = get_template("test.js.template") - disclaimer_template = get_template('disclaimer.template') - test_description_template = get_template("test_description.template") - - html_template_filename = os.path.join(template_directory, - test_html_template_basename) - generated_disclaimer = disclaimer_template \ - % {'generating_script_filename': os.path.relpath(__file__, - test_root_directory), - 'html_template_filename': os.path.relpath(html_template_filename, - test_root_directory)} - - # Adjust the template for the test invoking JS. Indent it to look nice. - selection['generated_disclaimer'] = generated_disclaimer.rstrip() - test_description_template = \ - test_description_template.rstrip().replace("\n", "\n" + " " * 33) - selection['test_description'] = test_description_template % selection - - # Adjust the template for the test invoking JS. Indent it to look nice. - indent = "\n" + " " * 6; - test_js_template = indent + test_js_template.replace("\n", indent); - selection['test_js'] = test_js_template % selection - - # Directory for the test files. - try: - os.makedirs(full_path) - except: - pass - - selection['meta_delivery_method'] = '' - - if spec['referrer_policy'] != None: - if selection['delivery_method'] == 'meta-referrer': - selection['meta_delivery_method'] = \ - '<meta name="referrer" content="%(referrer_policy)s">' % spec - elif selection['delivery_method'] == 'http-rp': - selection['meta_delivery_method'] = \ - "<!-- No meta: Referrer policy delivered via HTTP headers. -->" - test_headers_filename = test_filename + ".headers" - with open(test_headers_filename, "w") as f: - f.write('Referrer-Policy: ' + \ - '%(referrer_policy)s\n' % spec) - # TODO(kristijanburnik): Limit to WPT origins. - f.write('Access-Control-Allow-Origin: *\n') - elif selection['delivery_method'] == 'attr-referrer': - # attr-referrer is supported by the JS test wrapper. - pass - elif selection['delivery_method'] == 'rel-noreferrer': - # rel=noreferrer is supported by the JS test wrapper. - pass - else: - raise ValueError('Not implemented delivery_method: ' \ - + selection['delivery_method']) - - # Obey the lint and pretty format. - if len(selection['meta_delivery_method']) > 0: - selection['meta_delivery_method'] = "\n " + \ - selection['meta_delivery_method'] - - with open(test_filename, 'w') as f: - f.write(test_html_template % selection) - - -def generate_test_source_files(spec_json, target): - test_expansion_schema = spec_json['test_expansion_schema'] - specification = spec_json['specification'] - - spec_json_js_template = get_template('spec_json.js.template') - with open(generated_spec_json_filename, 'w') as f: - f.write(spec_json_js_template - % {'spec_json': json.dumps(spec_json)}) - - # Choose a debug/release template depending on the target. - html_template = "test.%s.html.template" % target - - # Create list of excluded tests. - exclusion_dict = {} - for excluded_pattern in spec_json['excluded_tests']: - excluded_expansion = \ - expand_test_expansion_pattern(excluded_pattern, - test_expansion_schema) - for excluded_selection in permute_expansion(excluded_expansion): - excluded_selection_path = selection_pattern % excluded_selection - exclusion_dict[excluded_selection_path] = True - - for spec in specification: - for spec_test_expansion in spec['test_expansion']: - expansion = expand_test_expansion_pattern(spec_test_expansion, - test_expansion_schema) - for selection in permute_expansion(expansion): - selection_path = selection_pattern % selection - if not selection_path in exclusion_dict: - subresource_path = \ - spec_json["subresource_path"][selection["subresource"]] - generate_selection(selection, - spec, - subresource_path, - html_template) - else: - print 'Excluding selection:', selection_path - - -def main(target): - spec_json = load_spec_json(); - spec_validator.assert_valid_spec_json(spec_json) - generate_test_source_files(spec_json, target) - - -if __name__ == '__main__': - parser = argparse.ArgumentParser(description='Test suite generator utility') - parser.add_argument('-t', '--target', type = str, - choices = ("release", "debug"), default = "release", - help = 'Sets the appropriate template for generating tests') - # TODO(kristijanburnik): Add option for the spec_json file. - args = parser.parse_args() - main(args.target) diff --git a/testing/web-platform/tests/referrer-policy/generic/tools/regenerate b/testing/web-platform/tests/referrer-policy/generic/tools/regenerate deleted file mode 100755 index e6bd63519..000000000 --- a/testing/web-platform/tests/referrer-policy/generic/tools/regenerate +++ /dev/null @@ -1,3 +0,0 @@ -#!/bin/bash -DIR=$( cd "$( dirname "${BASH_SOURCE[0]}" )" && pwd ) -python $DIR/clean.py && python $DIR/generate.py diff --git a/testing/web-platform/tests/referrer-policy/generic/tools/spec_validator.py b/testing/web-platform/tests/referrer-policy/generic/tools/spec_validator.py deleted file mode 100755 index 8641bbc1f..000000000 --- a/testing/web-platform/tests/referrer-policy/generic/tools/spec_validator.py +++ /dev/null @@ -1,166 +0,0 @@ -#!/usr/bin/env python - -import json, sys -from common_paths import * - -def assert_non_empty_string(obj, field): - assert field in obj, 'Missing field "%s"' % field - assert isinstance(obj[field], basestring), \ - 'Field "%s" must be a string' % field - assert len(obj[field]) > 0, 'Field "%s" must not be empty' % field - -def assert_non_empty_list(obj, field): - assert isinstance(obj[field], list), \ - '%s must be a list' % field - assert len(obj[field]) > 0, \ - '%s list must not be empty' % field - -def assert_non_empty_dict(obj, field): - assert isinstance(obj[field], dict), \ - '%s must be a dict' % field - assert len(obj[field]) > 0, \ - '%s dict must not be empty' % field - -def assert_contains(obj, field): - assert field in obj, 'Must contain field "%s"' % field - -def assert_value_from(obj, field, items): - assert obj[field] in items, \ - 'Field "%s" must be from: %s' % (field, str(items)) - -def assert_atom_or_list_items_from(obj, field, items): - if isinstance(obj[field], basestring) or isinstance(obj[field], int): - assert_value_from(obj, field, items) - return - - assert_non_empty_list(obj, field) - for allowed_value in obj[field]: - assert allowed_value != '*', "Wildcard is not supported for lists!" - assert allowed_value in items, \ - 'Field "%s" must be from: %s' % (field, str(items)) - -def assert_contains_only_fields(obj, expected_fields): - for expected_field in expected_fields: - assert_contains(obj, expected_field) - - for actual_field in obj: - assert actual_field in expected_fields, \ - 'Unexpected field "%s".' % actual_field - -def assert_value_unique_in(value, used_values): - assert value not in used_values, 'Duplicate value "%s"!' % str(value) - used_values[value] = True - - -def validate(spec_json, details): - """ Validates the json specification for generating tests. """ - - details['object'] = spec_json - assert_contains_only_fields(spec_json, ["specification", - "referrer_policy_schema", - "test_expansion_schema", - "subresource_path", - "excluded_tests"]) - assert_non_empty_list(spec_json, "specification") - assert_non_empty_list(spec_json, "referrer_policy_schema") - assert_non_empty_dict(spec_json, "test_expansion_schema") - assert_non_empty_list(spec_json, "excluded_tests") - - specification = spec_json['specification'] - referrer_policy_schema = spec_json['referrer_policy_schema'] - test_expansion_schema = spec_json['test_expansion_schema'] - excluded_tests = spec_json['excluded_tests'] - subresource_path = spec_json['subresource_path'] - - valid_test_expansion_fields = ['name'] + test_expansion_schema.keys() - - # Validate each single spec. - for spec in specification: - details['object'] = spec - - # Validate required fields for a single spec. - assert_contains_only_fields(spec, ['name', - 'title', - 'description', - 'referrer_policy', - 'specification_url', - 'test_expansion']) - assert_non_empty_string(spec, 'name') - assert_non_empty_string(spec, 'title') - assert_non_empty_string(spec, 'description') - assert_non_empty_string(spec, 'specification_url') - assert_value_from(spec, 'referrer_policy', referrer_policy_schema) - assert_non_empty_list(spec, 'test_expansion') - - # Validate spec's test expansion. - used_spec_names = {} - - for spec_exp in spec['test_expansion']: - details['object'] = spec_exp - assert_non_empty_string(spec_exp, 'name') - # The name is unique in same expansion group. - assert_value_unique_in((spec_exp['expansion'], spec_exp['name']), - used_spec_names) - assert_contains_only_fields(spec_exp, valid_test_expansion_fields) - - for artifact in test_expansion_schema: - details['test_expansion_field'] = artifact - assert_atom_or_list_items_from( - spec_exp, artifact, ['*'] + test_expansion_schema[artifact]) - del details['test_expansion_field'] - - # Validate the test_expansion schema members. - details['object'] = test_expansion_schema - assert_contains_only_fields(test_expansion_schema, ['expansion', - 'delivery_method', - 'redirection', - 'origin', - 'source_protocol', - 'target_protocol', - 'subresource', - 'referrer_url']) - # Validate excluded tests. - details['object'] = excluded_tests - for excluded_test_expansion in excluded_tests: - assert_contains_only_fields(excluded_test_expansion, - valid_test_expansion_fields) - details['object'] = excluded_test_expansion - for artifact in test_expansion_schema: - details['test_expansion_field'] = artifact - assert_atom_or_list_items_from( - excluded_test_expansion, - artifact, - ['*'] + test_expansion_schema[artifact]) - del details['test_expansion_field'] - - # Validate subresource paths. - details['object'] = subresource_path - assert_contains_only_fields(subresource_path, - test_expansion_schema['subresource']); - - for subresource in subresource_path: - local_rel_path = "." + subresource_path[subresource] - full_path = os.path.join(test_root_directory, local_rel_path) - assert os.path.isfile(full_path), "%s is not an existing file" % path - - del details['object'] - - -def assert_valid_spec_json(spec_json): - error_details = {} - try: - validate(spec_json, error_details) - except AssertionError, err: - print 'ERROR:', err.message - print json.dumps(error_details, indent=4) - sys.exit(1) - - -def main(): - spec_json = load_spec_json(); - assert_valid_spec_json(spec_json) - print "Spec JSON is valid." - - -if __name__ == '__main__': - main() diff --git a/testing/web-platform/tests/referrer-policy/generic/unsupported-csp-referrer-directive.html b/testing/web-platform/tests/referrer-policy/generic/unsupported-csp-referrer-directive.html deleted file mode 100644 index a40dded44..000000000 --- a/testing/web-platform/tests/referrer-policy/generic/unsupported-csp-referrer-directive.html +++ /dev/null @@ -1,30 +0,0 @@ -<!DOCTYPE html> -<html> - <head> - <title>Referrer Policy: CSP 'referrer' directive should not be supported</title> - <meta http-equiv="Content-Security-Policy" content="referrer no-referrer"> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- Common global functions for referrer-policy tests. --> - <script src="/referrer-policy/generic/common.js"></script> - </head> - <body> - <h1>Referrer Policy: CSP 'referrer' directive should not be supported</h1> - <p>CSP used to have a 'referrer' directive to set a Referrer Policy. This directive has been removed and should not be supported.</p> - - <pre id="received_message">Running...</pre> - - <script> - var test = async_test("Image has a referrer despite CSP 'referrer' directive"); - var urlPath = '/referrer-policy/generic/subresource/image.py'; - var url = location.protocol + "//www1." + location.hostname + ":" + location.port + - urlPath; - queryImage(url, test.step_func(function(message) { - assert_equals(message.referrer, document.location.href); - test.done(); - })); - </script> - - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index e5e6a7861..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html deleted file mode 100644 index 9d0ab2400..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index a8935c2be..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 35d6245f5..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html deleted file mode 100644 index dae1ad56c..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 86fa9997c..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 9f8f2d884..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index ca6ada181..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 49a8973c4..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index a1eaf56ef..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 70e193434..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 85d4a15f7..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index c5c0dd241..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html deleted file mode 100644 index d5e3b9fe0..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index b3e883240..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 1415f88e6..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html deleted file mode 100644 index c9e14a5c6..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 1197e4ea0..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 34a7176c9..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 621a3f4f5..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 708135798..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index ca8b0837b..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 553af1be5..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 5ac87bc66..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/attr-referrer/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 301edeccd..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/insecure-protocol.no-redirect.http.html deleted file mode 100644 index e398d4662..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/insecure-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/insecure-protocol.no-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/insecure-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index eb995697d..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/insecure-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/insecure-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/fetch-request/insecure-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index a05ee8ec3..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html deleted file mode 100644 index 00e0b12f9..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 4e1745300..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 99be5759b..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html deleted file mode 100644 index 8b4c4a85c..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 3a808fa16..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index e6a4a48ef..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/insecure-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/insecure-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/insecure-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/insecure-protocol.no-redirect.http.html deleted file mode 100644 index 5b6a0f069..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/insecure-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/insecure-protocol.no-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/insecure-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 45a76a776..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/insecure-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/insecure-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/script-tag/insecure-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index a3f6a8b60..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/insecure-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/insecure-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/insecure-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/insecure-protocol.no-redirect.http.html deleted file mode 100644 index 013ad95a1..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/insecure-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/insecure-protocol.no-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/insecure-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index eb834de9b..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/insecure-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/insecure-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-http/xhr-request/insecure-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index a3f6d25c8..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 7e456c402..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 6684bb31e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 293756816..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 695a773b0..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index f7e7f0bf2..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index a54cf8649..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index b7adfc59b..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 6639c028e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index f6e4ba09b..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 8aaee1ba9..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 0a7d63121..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 5c4afd6b4..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index bd9dec511..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index dd03fe581..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 5b0157e85..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/insecure-protocol.no-redirect.http.html deleted file mode 100644 index 47a08ddf8..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/insecure-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/insecure-protocol.no-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/insecure-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index be990f211..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/insecure-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/insecure-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/fetch-request/insecure-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 8cf74125a..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html deleted file mode 100644 index 7cb08817b..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 2a4bde0b9..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 55ccac1f1..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html deleted file mode 100644 index 36e1fed42..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index fc4a9865c..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index c0fe57edd..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/insecure-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/insecure-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/insecure-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/insecure-protocol.no-redirect.http.html deleted file mode 100644 index dffd45534..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/insecure-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/insecure-protocol.no-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/insecure-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 79d8995f9..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/insecure-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/insecure-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/script-tag/insecure-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index d521c1671..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/insecure-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/insecure-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/insecure-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/insecure-protocol.no-redirect.http.html deleted file mode 100644 index 6299e8ec7..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/insecure-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/insecure-protocol.no-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/insecure-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index c67433bb7..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/insecure-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/insecure-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-http/xhr-request/insecure-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 8b46cf583..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 94290a0c4..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index dd800d38e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 96b2d3201..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 75f0f3334..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 97c4bb92e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index f6e9650e2..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 71ff29503..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 399bb0c14..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 2ec45b40a..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 6a93f8429..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 9b72d4bbb..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index a7fac6177..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 6e8a612c8..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 68cc56301..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index f2152da95..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer-when-downgrade -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 33d9214bb..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/fetch-request/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/fetch-request/insecure-protocol.no-redirect.http.html deleted file mode 100644 index fe4596ea0..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/fetch-request/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/fetch-request/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/fetch-request/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 0f6a74f59..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/fetch-request/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 59fec5603..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html deleted file mode 100644 index c3bc39e7a..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index d6efd8973..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index aa00c6f71..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html deleted file mode 100644 index 55083571c..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index e1d4a6b3f..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/script-tag/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/script-tag/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 6717cc2aa..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/script-tag/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/script-tag/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/script-tag/insecure-protocol.no-redirect.http.html deleted file mode 100644 index fd9e58638..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/script-tag/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/script-tag/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/script-tag/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index d7fd00050..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/script-tag/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/xhr-request/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/xhr-request/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 21f160024..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/xhr-request/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/xhr-request/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/xhr-request/insecure-protocol.no-redirect.http.html deleted file mode 100644 index aac4a2a3f..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/xhr-request/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/xhr-request/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/xhr-request/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 7e1ce57dd..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-http/xhr-request/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 8d84056e7..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index e09f582d7..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index e4f4232ae..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index d3b557d79..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index c748f8c25..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 7ff4aea0e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index cad3acfe5..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 6975f7807..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index b55f5379b..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 514baf51f..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 41ad2badf..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 36c8aaeaf..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 6cee2216b..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 5a67b55e6..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index a3d17dd1d..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/cross-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index c86db50d2..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/fetch-request/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/fetch-request/insecure-protocol.no-redirect.http.html deleted file mode 100644 index ba698b85d..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/fetch-request/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/fetch-request/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/fetch-request/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index e153ebd84..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/fetch-request/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index e1d04f843..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html deleted file mode 100644 index 4451804cd..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index ec8dcc3bb..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 13d58dccf..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html deleted file mode 100644 index e7ed38632..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index ce744e009..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/script-tag/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/script-tag/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index a70858c05..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/script-tag/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/script-tag/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/script-tag/insecure-protocol.no-redirect.http.html deleted file mode 100644 index 621b14550..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/script-tag/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/script-tag/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/script-tag/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 134267bb1..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/script-tag/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/xhr-request/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/xhr-request/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 74f1935ef..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/xhr-request/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/xhr-request/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/xhr-request/insecure-protocol.no-redirect.http.html deleted file mode 100644 index 2da8ff784..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/xhr-request/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/xhr-request/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/xhr-request/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 559862ade..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-http/xhr-request/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 293d8c330..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 7571a86f5..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 96939619c..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index c79814f0e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 04b4a5946..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 5c749f4bf..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 5246fb54f..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 3885e8a6a..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 9de62cd2a..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index af9798b9c..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 36464436d..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 455693efa..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 25ca0138f..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index dd5055d0e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index dbecd9406..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> - <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="no-referrer-when-downgrade"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer-when-downgrade", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 0b7655ace..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html deleted file mode 100644 index fe44085e3..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 875a8ffe4..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 58af86ef0..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/generic.no-redirect.http.html deleted file mode 100644 index fb82ab874..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index bdabcd3f3..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index c5434c6cd..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html deleted file mode 100644 index 0531f45d3..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 8691721fe..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 4d69c86dd..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/generic.no-redirect.http.html deleted file mode 100644 index 3330e7cb7..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index f159ef61e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 563ad1b91..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/same-origin/http-http/iframe-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/same-origin/http-http/iframe-tag/generic.no-redirect.http.html deleted file mode 100644 index 1271218d0..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/same-origin/http-http/iframe-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index a7b4ad7a5..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 4ba159c7f..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/generic.no-redirect.http.html deleted file mode 100644 index c52392c32..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 51c5c5247..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 639c0246b..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/same-origin/http-https/iframe-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/same-origin/http-https/iframe-tag/generic.no-redirect.http.html deleted file mode 100644 index 88db01292..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/same-origin/http-https/iframe-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 2663e303d..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 11f22d858..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/generic.no-redirect.http.html deleted file mode 100644 index 3ce8fa977..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index c17e9a846..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/attr-referrer/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html deleted file mode 100644 index 57cddb7c4..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/generic.no-redirect.http.html deleted file mode 100644 index e0388dbf5..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/generic.no-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html deleted file mode 100644 index a3355ef97..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 1aed56a52..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html deleted file mode 100644 index 4dc27f057..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index fc98c1d72..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 435a4b7cb..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/generic.no-redirect.http.html deleted file mode 100644 index 787e03d5b..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/generic.no-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 8dc6c82e1..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 4a52130cc..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/generic.no-redirect.http.html deleted file mode 100644 index 0b5fc2178..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/generic.no-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 5a47798f0..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/script-tag/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html deleted file mode 100644 index 5fece1114..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/generic.no-redirect.http.html deleted file mode 100644 index f3921aaf5..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/generic.no-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html deleted file mode 100644 index 04ddbada0..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html deleted file mode 100644 index 68528a3d1..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/generic.no-redirect.http.html deleted file mode 100644 index 0485112fb..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/generic.no-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html deleted file mode 100644 index c2ae6abed..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 43a2c9c6f..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html deleted file mode 100644 index c6fafef57..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index d0b61af2b..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 07949589b..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/generic.no-redirect.http.html deleted file mode 100644 index 325eaeba0..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/generic.no-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index b68a4e517..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 8f8f01f20..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/generic.no-redirect.http.html deleted file mode 100644 index 74cf6d4e7..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/generic.no-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 57c858aec..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/script-tag/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html deleted file mode 100644 index 097b8cdd3..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/generic.no-redirect.http.html deleted file mode 100644 index c53cf0d94..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/generic.no-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html deleted file mode 100644 index a9370a998..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/cross-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html deleted file mode 100644 index 712a2cee4..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/generic.no-redirect.http.html deleted file mode 100644 index db4b684c7..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/generic.no-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html deleted file mode 100644 index 334c54917..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 9a3844012..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/generic.no-redirect.http.html deleted file mode 100644 index 5e8d81c2d..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/generic.no-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index a49ecda4d..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 723f22630..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/generic.no-redirect.http.html deleted file mode 100644 index c11e69041..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/generic.no-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index fd4612eff..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 4f12853c0..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/generic.no-redirect.http.html deleted file mode 100644 index 52d3ae126..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/generic.no-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index cb20e18af..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/script-tag/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html deleted file mode 100644 index 8a49347b7..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/generic.no-redirect.http.html deleted file mode 100644 index 9ab2958e4..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/generic.no-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html deleted file mode 100644 index bda2e6175..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html deleted file mode 100644 index c114a3f8a..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/generic.no-redirect.http.html deleted file mode 100644 index f1dc1238a..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/generic.no-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html deleted file mode 100644 index 44e0199f5..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index b7b1fc547..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/generic.no-redirect.http.html deleted file mode 100644 index 216a1e6cd..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/generic.no-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 355f562c1..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index e61542595..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/generic.no-redirect.http.html deleted file mode 100644 index 7170884a6..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/generic.no-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 65a9ba9b7..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 20dda3fe1..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/generic.no-redirect.http.html deleted file mode 100644 index 9beec5d64..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/generic.no-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index d02fce2bb..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/script-tag/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html deleted file mode 100644 index ec472b264..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/generic.no-redirect.http.html deleted file mode 100644 index deb8d736b..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/generic.no-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html deleted file mode 100644 index 8fa40cb48..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9b531426e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/http-rp/same-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: no-referrer -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html deleted file mode 100644 index bc1c5021a..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/fetch-request/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/fetch-request/generic.no-redirect.http.html deleted file mode 100644 index 7b2c327c3..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/fetch-request/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html deleted file mode 100644 index e5ea31157..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index cd54256ad..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html deleted file mode 100644 index 84b7c650f..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index b9e130b96..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index ee64a3991..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/img-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/img-tag/generic.no-redirect.http.html deleted file mode 100644 index 83168afa2..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/img-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 6e624a4c0..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/script-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/script-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 206283f31..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/script-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/script-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/script-tag/generic.no-redirect.http.html deleted file mode 100644 index c45116994..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/script-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/script-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/script-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index c4399815d..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/script-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html deleted file mode 100644 index 29831095f..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/xhr-request/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/xhr-request/generic.no-redirect.http.html deleted file mode 100644 index 488a26b43..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/xhr-request/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html deleted file mode 100644 index 1cf420f93..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html deleted file mode 100644 index 15ff3f5ac..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/fetch-request/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/fetch-request/generic.no-redirect.http.html deleted file mode 100644 index 0dd487b42..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/fetch-request/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html deleted file mode 100644 index b48e45310..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index ba04f94ac..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html deleted file mode 100644 index b35d2db83..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index e923921d1..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index c1b54abd4..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/img-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/img-tag/generic.no-redirect.http.html deleted file mode 100644 index 3ce103711..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/img-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 1b4719a32..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/script-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/script-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index b83af76c6..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/script-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/script-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/script-tag/generic.no-redirect.http.html deleted file mode 100644 index a370ed358..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/script-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/script-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/script-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index fa2e7a8f5..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/script-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html deleted file mode 100644 index 485702bc2..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/xhr-request/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/xhr-request/generic.no-redirect.http.html deleted file mode 100644 index c412dce6c..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/xhr-request/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html deleted file mode 100644 index c1c32ba31..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/cross-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html deleted file mode 100644 index 852b2a7ac..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/fetch-request/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/fetch-request/generic.no-redirect.http.html deleted file mode 100644 index fa18f832d..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/fetch-request/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html deleted file mode 100644 index e8a9e5144..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 7932dd8bb..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/iframe-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/iframe-tag/generic.no-redirect.http.html deleted file mode 100644 index 324251c10..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/iframe-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 67df3bc8f..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 9000bcbee..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/img-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/img-tag/generic.no-redirect.http.html deleted file mode 100644 index 7f5cb7c8f..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/img-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index ea981ad14..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/script-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/script-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 222b078cc..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/script-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/script-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/script-tag/generic.no-redirect.http.html deleted file mode 100644 index 3c1c41cda..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/script-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/script-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/script-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 954dede4a..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/script-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html deleted file mode 100644 index b0528816d..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/xhr-request/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/xhr-request/generic.no-redirect.http.html deleted file mode 100644 index 524e650e9..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/xhr-request/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html deleted file mode 100644 index 0b6580b2e..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html deleted file mode 100644 index 5c88dcae2..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/fetch-request/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/fetch-request/generic.no-redirect.http.html deleted file mode 100644 index 2a83f8cc9..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/fetch-request/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html deleted file mode 100644 index 3714b4a98..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 57b4df568..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/iframe-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/iframe-tag/generic.no-redirect.http.html deleted file mode 100644 index dcf26139b..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/iframe-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 070d4283a..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 9da6e448b..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/img-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/img-tag/generic.no-redirect.http.html deleted file mode 100644 index 2159b24e0..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/img-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index aa032ca43..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/script-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/script-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 6e0dcd4c2..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/script-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/script-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/script-tag/generic.no-redirect.http.html deleted file mode 100644 index 25559421d..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/script-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/script-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/script-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 04bb56842..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/script-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html deleted file mode 100644 index da806358d..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/xhr-request/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/xhr-request/generic.no-redirect.http.html deleted file mode 100644 index 253f15de8..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/xhr-request/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html deleted file mode 100644 index 3b5271935..000000000 --- a/testing/web-platform/tests/referrer-policy/no-referrer/meta-referrer/same-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> - <meta name="description" content="Check that sub-resource never gets the referrer URL."> - <meta name="referrer" content="no-referrer"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "no-referrer", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-origin.keep-origin-redirect.http.html deleted file mode 100644 index 9455ed856..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-origin.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-origin.no-redirect.http.html deleted file mode 100644 index a6512954b..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-origin.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-origin.swap-origin-redirect.http.html deleted file mode 100644 index af8c262ad..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-origin.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html deleted file mode 100644 index 2b634b85e..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html deleted file mode 100644 index 42ed329bf..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html deleted file mode 100644 index 9e78e962c..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/cross-origin.keep-origin-redirect.http.html deleted file mode 100644 index f0dd273c3..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/cross-origin.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/cross-origin.no-redirect.http.html deleted file mode 100644 index 0687cc22f..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/cross-origin.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/cross-origin.swap-origin-redirect.http.html deleted file mode 100644 index 7b6dd7b98..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/cross-origin.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/cross-origin.keep-origin-redirect.http.html deleted file mode 100644 index c371ce993..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/cross-origin.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/cross-origin.no-redirect.http.html deleted file mode 100644 index 5bfef0ff6..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/cross-origin.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/cross-origin.swap-origin-redirect.http.html deleted file mode 100644 index 856951865..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/cross-origin.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.keep-origin-redirect.http.html deleted file mode 100644 index 1bcb41746..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.no-redirect.http.html deleted file mode 100644 index 8f3c27f7e..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 6633b43a0..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/same-origin-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/same-origin-insecure.keep-origin-redirect.http.html deleted file mode 100644 index 36941155b..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/same-origin-insecure.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/same-origin-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/same-origin-insecure.no-redirect.http.html deleted file mode 100644 index fc05b1e52..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/same-origin-insecure.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/same-origin-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 56560123c..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/same-origin-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-downgrade.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-downgrade.keep-origin-redirect.http.html deleted file mode 100644 index ca0b0b1b5..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-downgrade.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-downgrade.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-downgrade.no-redirect.http.html deleted file mode 100644 index 19cf59322..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-downgrade.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-downgrade.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-downgrade.swap-origin-redirect.http.html deleted file mode 100644 index 77452623c..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-downgrade.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 77452623c..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-upgrade.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-upgrade.keep-origin-redirect.http.html deleted file mode 100644 index ca0b0b1b5..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-upgrade.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-upgrade.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-upgrade.no-redirect.http.html deleted file mode 100644 index 19cf59322..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-upgrade.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-upgrade.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-upgrade.swap-origin-redirect.http.html deleted file mode 100644 index 77452623c..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-upgrade.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-downgrade.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-downgrade.keep-origin-redirect.http.html deleted file mode 100644 index f0c9e6fd9..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-downgrade.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-downgrade.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-downgrade.no-redirect.http.html deleted file mode 100644 index 2aed178fd..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-downgrade.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-downgrade.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-downgrade.swap-origin-redirect.http.html deleted file mode 100644 index 4e184519e..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-downgrade.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 4e184519e..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-upgrade.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-upgrade.keep-origin-redirect.http.html deleted file mode 100644 index f0c9e6fd9..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-upgrade.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-upgrade.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-upgrade.no-redirect.http.html deleted file mode 100644 index 2aed178fd..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-upgrade.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-upgrade.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-upgrade.swap-origin-redirect.http.html deleted file mode 100644 index 4e184519e..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-upgrade.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.keep-origin-redirect.http.html deleted file mode 100644 index f4902bd27..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.keep-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.no-redirect.http.html deleted file mode 100644 index fac616681..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.no-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.swap-origin-redirect.http.html deleted file mode 100644 index 7385003cf..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.keep-origin-redirect.http.html deleted file mode 100644 index 5e3a82f01..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.keep-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.no-redirect.http.html deleted file mode 100644 index 6eed1d779..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.no-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.swap-origin-redirect.http.html deleted file mode 100644 index cc3f2c42a..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html deleted file mode 100644 index c9f973b9b..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html deleted file mode 100644 index 6850d329d..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html deleted file mode 100644 index a27a2ee4e..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.keep-origin-redirect.http.html deleted file mode 100644 index 67a7335ef..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.keep-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.no-redirect.http.html deleted file mode 100644 index bace41398..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.no-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.swap-origin-redirect.http.html deleted file mode 100644 index ebedf9e28..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.keep-origin-redirect.http.html deleted file mode 100644 index 58121f98f..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.keep-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.no-redirect.http.html deleted file mode 100644 index 7381c1383..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.no-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.swap-origin-redirect.http.html deleted file mode 100644 index 5117e3dd8..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.keep-origin-redirect.http.html deleted file mode 100644 index 20fe88fde..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.keep-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.no-redirect.http.html deleted file mode 100644 index 224fc53a0..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.no-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.swap-origin-redirect.http.html deleted file mode 100644 index 856662a77..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.keep-origin-redirect.http.html deleted file mode 100644 index 17f781400..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.keep-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.no-redirect.http.html deleted file mode 100644 index 53d9a7044..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.no-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.swap-origin-redirect.http.html deleted file mode 100644 index 423c8ed20..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.keep-origin-redirect.http.html deleted file mode 100644 index 790b68586..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.keep-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.no-redirect.http.html deleted file mode 100644 index 1dae9fecc..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.no-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.swap-origin-redirect.http.html deleted file mode 100644 index 75644a3cc..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.keep-origin-redirect.http.html deleted file mode 100644 index 2a226c6e1..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.keep-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.no-redirect.http.html deleted file mode 100644 index e1c3ecd12..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.no-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.swap-origin-redirect.http.html deleted file mode 100644 index edd101a83..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.keep-origin-redirect.http.html deleted file mode 100644 index 37979395e..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.keep-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.no-redirect.http.html deleted file mode 100644 index bc7c6d02d..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.no-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.swap-origin-redirect.http.html deleted file mode 100644 index f9fbbbc32..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.keep-origin-redirect.http.html deleted file mode 100644 index 6ef928b6e..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.keep-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.no-redirect.http.html deleted file mode 100644 index b253ef852..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.no-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 2d20c7c6d..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.keep-origin-redirect.http.html deleted file mode 100644 index 67169cf16..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.keep-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.no-redirect.http.html deleted file mode 100644 index d21c6bda1..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.no-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 3859dcedf..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.keep-origin-redirect.http.html deleted file mode 100644 index 77f71fb39..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.keep-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.no-redirect.http.html deleted file mode 100644 index 024d43ea1..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.no-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.swap-origin-redirect.http.html deleted file mode 100644 index fa35c1f3e..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.keep-origin-redirect.http.html deleted file mode 100644 index 61669344d..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.keep-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.no-redirect.http.html deleted file mode 100644 index 4daa07719..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.no-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 369e98e0f..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.keep-origin-redirect.http.html deleted file mode 100644 index 3ca50f3d6..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.keep-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.no-redirect.http.html deleted file mode 100644 index 5bddea2b1..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.no-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 9798ee5b0..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/same-origin-downgrade.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/same-origin-downgrade.keep-origin-redirect.http.html deleted file mode 100644 index ee78d6ef1..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/same-origin-downgrade.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/same-origin-downgrade.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/same-origin-downgrade.keep-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/same-origin-downgrade.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/same-origin-downgrade.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/same-origin-downgrade.no-redirect.http.html deleted file mode 100644 index 0019b7d1f..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/same-origin-downgrade.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/same-origin-downgrade.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/same-origin-downgrade.no-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/same-origin-downgrade.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/same-origin-downgrade.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/same-origin-downgrade.swap-origin-redirect.http.html deleted file mode 100644 index f4020bdff..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/same-origin-downgrade.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/same-origin-downgrade.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/same-origin-downgrade.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/same-origin-downgrade.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/same-origin-insecure.swap-origin-redirect.http.html deleted file mode 100644 index f4020bdff..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/same-origin-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/same-origin-insecure.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/same-origin-insecure.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/same-origin-insecure.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/same-origin-upgrade.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/same-origin-upgrade.keep-origin-redirect.http.html deleted file mode 100644 index ee78d6ef1..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/same-origin-upgrade.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/same-origin-upgrade.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/same-origin-upgrade.keep-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/same-origin-upgrade.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/same-origin-upgrade.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/same-origin-upgrade.no-redirect.http.html deleted file mode 100644 index 0019b7d1f..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/same-origin-upgrade.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/same-origin-upgrade.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/same-origin-upgrade.no-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/same-origin-upgrade.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/same-origin-upgrade.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/same-origin-upgrade.swap-origin-redirect.http.html deleted file mode 100644 index f4020bdff..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/same-origin-upgrade.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/same-origin-upgrade.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/same-origin-upgrade.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/same-origin-upgrade.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-downgrade.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-downgrade.keep-origin-redirect.http.html deleted file mode 100644 index 48dcc5d52..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-downgrade.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-downgrade.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-downgrade.keep-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-downgrade.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-downgrade.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-downgrade.no-redirect.http.html deleted file mode 100644 index 6cc4669d9..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-downgrade.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-downgrade.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-downgrade.no-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-downgrade.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-downgrade.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-downgrade.swap-origin-redirect.http.html deleted file mode 100644 index b1bacfe9b..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-downgrade.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-downgrade.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-downgrade.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-downgrade.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html deleted file mode 100644 index b1bacfe9b..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-upgrade.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-upgrade.keep-origin-redirect.http.html deleted file mode 100644 index 48dcc5d52..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-upgrade.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-upgrade.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-upgrade.keep-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-upgrade.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-upgrade.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-upgrade.no-redirect.http.html deleted file mode 100644 index 6cc4669d9..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-upgrade.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-upgrade.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-upgrade.no-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-upgrade.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-upgrade.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-upgrade.swap-origin-redirect.http.html deleted file mode 100644 index b1bacfe9b..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-upgrade.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-upgrade.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-upgrade.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-upgrade.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/same-origin-downgrade.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/same-origin-downgrade.keep-origin-redirect.http.html deleted file mode 100644 index 08156b668..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/same-origin-downgrade.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/same-origin-downgrade.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/same-origin-downgrade.keep-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/same-origin-downgrade.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/same-origin-downgrade.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/same-origin-downgrade.no-redirect.http.html deleted file mode 100644 index ae1f44978..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/same-origin-downgrade.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/same-origin-downgrade.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/same-origin-downgrade.no-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/same-origin-downgrade.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/same-origin-downgrade.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/same-origin-downgrade.swap-origin-redirect.http.html deleted file mode 100644 index 7b0f9d4b3..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/same-origin-downgrade.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/same-origin-downgrade.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/same-origin-downgrade.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/same-origin-downgrade.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/same-origin-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 7b0f9d4b3..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/same-origin-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/same-origin-insecure.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/same-origin-insecure.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/same-origin-insecure.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/same-origin-upgrade.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/same-origin-upgrade.keep-origin-redirect.http.html deleted file mode 100644 index 08156b668..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/same-origin-upgrade.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/same-origin-upgrade.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/same-origin-upgrade.keep-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/same-origin-upgrade.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/same-origin-upgrade.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/same-origin-upgrade.no-redirect.http.html deleted file mode 100644 index ae1f44978..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/same-origin-upgrade.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/same-origin-upgrade.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/same-origin-upgrade.no-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/same-origin-upgrade.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/same-origin-upgrade.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/same-origin-upgrade.swap-origin-redirect.http.html deleted file mode 100644 index 7b0f9d4b3..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/same-origin-upgrade.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/same-origin-upgrade.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/same-origin-upgrade.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/same-origin-upgrade.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/same-origin-downgrade.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/same-origin-downgrade.keep-origin-redirect.http.html deleted file mode 100644 index 633eb15d9..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/same-origin-downgrade.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/same-origin-downgrade.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/same-origin-downgrade.keep-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/same-origin-downgrade.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/same-origin-downgrade.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/same-origin-downgrade.no-redirect.http.html deleted file mode 100644 index b7dd2d260..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/same-origin-downgrade.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/same-origin-downgrade.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/same-origin-downgrade.no-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/same-origin-downgrade.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/same-origin-downgrade.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/same-origin-downgrade.swap-origin-redirect.http.html deleted file mode 100644 index d968e31f4..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/same-origin-downgrade.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/same-origin-downgrade.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/same-origin-downgrade.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/same-origin-downgrade.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/same-origin-insecure.swap-origin-redirect.http.html deleted file mode 100644 index d968e31f4..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/same-origin-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/same-origin-insecure.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/same-origin-insecure.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/same-origin-insecure.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/same-origin-upgrade.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/same-origin-upgrade.keep-origin-redirect.http.html deleted file mode 100644 index 633eb15d9..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/same-origin-upgrade.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/same-origin-upgrade.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/same-origin-upgrade.keep-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/same-origin-upgrade.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/same-origin-upgrade.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/same-origin-upgrade.no-redirect.http.html deleted file mode 100644 index b7dd2d260..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/same-origin-upgrade.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/same-origin-upgrade.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/same-origin-upgrade.no-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/same-origin-upgrade.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/same-origin-upgrade.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/same-origin-upgrade.swap-origin-redirect.http.html deleted file mode 100644 index d968e31f4..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/same-origin-upgrade.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/same-origin-upgrade.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/same-origin-upgrade.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/same-origin-upgrade.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/same-origin-downgrade.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/same-origin-downgrade.keep-origin-redirect.http.html deleted file mode 100644 index cde3c4dcb..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/same-origin-downgrade.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/same-origin-downgrade.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/same-origin-downgrade.keep-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/same-origin-downgrade.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/same-origin-downgrade.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/same-origin-downgrade.no-redirect.http.html deleted file mode 100644 index 69e0ac3f3..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/same-origin-downgrade.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/same-origin-downgrade.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/same-origin-downgrade.no-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/same-origin-downgrade.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/same-origin-downgrade.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/same-origin-downgrade.swap-origin-redirect.http.html deleted file mode 100644 index f9f5cbfc2..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/same-origin-downgrade.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/same-origin-downgrade.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/same-origin-downgrade.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/same-origin-downgrade.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/same-origin-insecure.swap-origin-redirect.http.html deleted file mode 100644 index f9f5cbfc2..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/same-origin-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/same-origin-insecure.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/same-origin-insecure.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/same-origin-insecure.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/same-origin-upgrade.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/same-origin-upgrade.keep-origin-redirect.http.html deleted file mode 100644 index cde3c4dcb..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/same-origin-upgrade.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/same-origin-upgrade.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/same-origin-upgrade.keep-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/same-origin-upgrade.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/same-origin-upgrade.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/same-origin-upgrade.no-redirect.http.html deleted file mode 100644 index 69e0ac3f3..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/same-origin-upgrade.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/same-origin-upgrade.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/same-origin-upgrade.no-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/same-origin-upgrade.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/same-origin-upgrade.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/same-origin-upgrade.swap-origin-redirect.http.html deleted file mode 100644 index f9f5cbfc2..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/same-origin-upgrade.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/same-origin-upgrade.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/same-origin-upgrade.swap-origin-redirect.http.html.headers deleted file mode 100644 index 9ce1de388..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/same-origin-upgrade.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/cross-origin.keep-origin-redirect.http.html deleted file mode 100644 index cae0548b2..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/cross-origin.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/cross-origin.no-redirect.http.html deleted file mode 100644 index dfbdf4e37..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/cross-origin.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/cross-origin.swap-origin-redirect.http.html deleted file mode 100644 index 33a64908d..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/cross-origin.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/cross-origin.keep-origin-redirect.http.html deleted file mode 100644 index 99d89c892..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/cross-origin.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/cross-origin.no-redirect.http.html deleted file mode 100644 index efc15af9b..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/cross-origin.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/cross-origin.swap-origin-redirect.http.html deleted file mode 100644 index 6457b6d07..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/cross-origin.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html deleted file mode 100644 index b4895ecb1..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html deleted file mode 100644 index 8253f1e26..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html deleted file mode 100644 index 8319c4799..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/cross-origin.keep-origin-redirect.http.html deleted file mode 100644 index c96142058..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/cross-origin.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/cross-origin.no-redirect.http.html deleted file mode 100644 index fc6604637..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/cross-origin.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/cross-origin.swap-origin-redirect.http.html deleted file mode 100644 index a821ec58a..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/cross-origin.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/cross-origin.keep-origin-redirect.http.html deleted file mode 100644 index f86d0e825..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/cross-origin.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/cross-origin.no-redirect.http.html deleted file mode 100644 index f4826c63a..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/cross-origin.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/cross-origin.swap-origin-redirect.http.html deleted file mode 100644 index d83650ee3..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/cross-origin.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/cross-origin.keep-origin-redirect.http.html deleted file mode 100644 index 48676a974..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/cross-origin.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/cross-origin.no-redirect.http.html deleted file mode 100644 index 2812882a2..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/cross-origin.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/cross-origin.swap-origin-redirect.http.html deleted file mode 100644 index cc13e377b..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/cross-origin.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/cross-origin.keep-origin-redirect.http.html deleted file mode 100644 index bbb011122..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/cross-origin.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/cross-origin.no-redirect.http.html deleted file mode 100644 index 6d3ec1b96..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/cross-origin.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/cross-origin.swap-origin-redirect.http.html deleted file mode 100644 index 76c95cdea..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/cross-origin.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/cross-origin.keep-origin-redirect.http.html deleted file mode 100644 index 114d4dc86..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/cross-origin.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/cross-origin.no-redirect.http.html deleted file mode 100644 index 0b7378bd6..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/cross-origin.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/cross-origin.swap-origin-redirect.http.html deleted file mode 100644 index d5e863d2e..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/cross-origin.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/cross-origin.keep-origin-redirect.http.html deleted file mode 100644 index 94f0f0b67..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/cross-origin.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/cross-origin.no-redirect.http.html deleted file mode 100644 index 4a1ba7ae9..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/cross-origin.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/cross-origin.swap-origin-redirect.http.html deleted file mode 100644 index 7009e93f4..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/cross-origin.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/cross-origin.keep-origin-redirect.http.html deleted file mode 100644 index 219ae6d84..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/cross-origin.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/cross-origin.no-redirect.http.html deleted file mode 100644 index df5a52f9a..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/cross-origin.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/cross-origin.swap-origin-redirect.http.html deleted file mode 100644 index 7436b3978..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/cross-origin.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/same-origin-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/same-origin-insecure.keep-origin-redirect.http.html deleted file mode 100644 index ebaa47c72..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/same-origin-insecure.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/same-origin-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/same-origin-insecure.no-redirect.http.html deleted file mode 100644 index 6cb598b38..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/same-origin-insecure.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/same-origin-insecure.swap-origin-redirect.http.html deleted file mode 100644 index f7b661028..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/same-origin-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.keep-origin-redirect.http.html deleted file mode 100644 index cc2175edb..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.no-redirect.http.html deleted file mode 100644 index b8cecaeed..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html deleted file mode 100644 index ba8b28780..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/same-origin-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/same-origin-insecure.keep-origin-redirect.http.html deleted file mode 100644 index 9aa2e5128..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/same-origin-insecure.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/same-origin-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/same-origin-insecure.no-redirect.http.html deleted file mode 100644 index 9d997bd1a..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/same-origin-insecure.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/same-origin-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 0245434f3..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/same-origin-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/same-origin-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/same-origin-insecure.keep-origin-redirect.http.html deleted file mode 100644 index 969d7e8dd..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/same-origin-insecure.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/same-origin-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/same-origin-insecure.no-redirect.http.html deleted file mode 100644 index 091ce5d0e..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/same-origin-insecure.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/same-origin-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 9be9f24e6..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/same-origin-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/same-origin-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/same-origin-insecure.keep-origin-redirect.http.html deleted file mode 100644 index 225c18eb7..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/same-origin-insecure.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/same-origin-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/same-origin-insecure.no-redirect.http.html deleted file mode 100644 index eb3e612fd..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/same-origin-insecure.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/same-origin-insecure.swap-origin-redirect.http.html deleted file mode 100644 index ef09fe30c..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/same-origin-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/same-origin-downgrade.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/same-origin-downgrade.keep-origin-redirect.http.html deleted file mode 100644 index f0adebf34..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/same-origin-downgrade.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/same-origin-downgrade.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/same-origin-downgrade.no-redirect.http.html deleted file mode 100644 index 4d5714f87..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/same-origin-downgrade.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/same-origin-downgrade.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/same-origin-downgrade.swap-origin-redirect.http.html deleted file mode 100644 index 6578bd1e6..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/same-origin-downgrade.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/same-origin-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 6578bd1e6..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/same-origin-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/same-origin-upgrade.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/same-origin-upgrade.keep-origin-redirect.http.html deleted file mode 100644 index f0adebf34..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/same-origin-upgrade.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/same-origin-upgrade.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/same-origin-upgrade.no-redirect.http.html deleted file mode 100644 index 4d5714f87..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/same-origin-upgrade.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/same-origin-upgrade.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/same-origin-upgrade.swap-origin-redirect.http.html deleted file mode 100644 index 6578bd1e6..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/same-origin-upgrade.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/same-origin-downgrade.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/same-origin-downgrade.keep-origin-redirect.http.html deleted file mode 100644 index 94802477e..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/same-origin-downgrade.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/same-origin-downgrade.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/same-origin-downgrade.no-redirect.http.html deleted file mode 100644 index a4298049e..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/same-origin-downgrade.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/same-origin-downgrade.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/same-origin-downgrade.swap-origin-redirect.http.html deleted file mode 100644 index 548e63ea9..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/same-origin-downgrade.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 548e63ea9..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/same-origin-upgrade.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/same-origin-upgrade.keep-origin-redirect.http.html deleted file mode 100644 index 94802477e..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/same-origin-upgrade.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/same-origin-upgrade.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/same-origin-upgrade.no-redirect.http.html deleted file mode 100644 index a4298049e..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/same-origin-upgrade.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/same-origin-upgrade.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/same-origin-upgrade.swap-origin-redirect.http.html deleted file mode 100644 index 548e63ea9..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/same-origin-upgrade.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/same-origin-downgrade.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/same-origin-downgrade.keep-origin-redirect.http.html deleted file mode 100644 index 32da6f1ea..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/same-origin-downgrade.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/same-origin-downgrade.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/same-origin-downgrade.no-redirect.http.html deleted file mode 100644 index c7367f706..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/same-origin-downgrade.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/same-origin-downgrade.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/same-origin-downgrade.swap-origin-redirect.http.html deleted file mode 100644 index a0e33c720..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/same-origin-downgrade.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/same-origin-insecure.swap-origin-redirect.http.html deleted file mode 100644 index a0e33c720..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/same-origin-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/same-origin-upgrade.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/same-origin-upgrade.keep-origin-redirect.http.html deleted file mode 100644 index 32da6f1ea..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/same-origin-upgrade.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/same-origin-upgrade.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/same-origin-upgrade.no-redirect.http.html deleted file mode 100644 index c7367f706..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/same-origin-upgrade.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/same-origin-upgrade.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/same-origin-upgrade.swap-origin-redirect.http.html deleted file mode 100644 index a0e33c720..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/same-origin-upgrade.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/same-origin-downgrade.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/same-origin-downgrade.keep-origin-redirect.http.html deleted file mode 100644 index c80a3c7e5..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/same-origin-downgrade.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/same-origin-downgrade.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/same-origin-downgrade.no-redirect.http.html deleted file mode 100644 index e7e65e19e..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/same-origin-downgrade.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/same-origin-downgrade.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/same-origin-downgrade.swap-origin-redirect.http.html deleted file mode 100644 index 42ecdbc0f..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/same-origin-downgrade.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/same-origin-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 42ecdbc0f..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/same-origin-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/same-origin-upgrade.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/same-origin-upgrade.keep-origin-redirect.http.html deleted file mode 100644 index c80a3c7e5..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/same-origin-upgrade.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/same-origin-upgrade.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/same-origin-upgrade.no-redirect.http.html deleted file mode 100644 index e7e65e19e..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/same-origin-upgrade.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/same-origin-upgrade.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/same-origin-upgrade.swap-origin-redirect.http.html deleted file mode 100644 index 42ecdbc0f..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/same-origin-upgrade.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/same-origin-downgrade.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/same-origin-downgrade.keep-origin-redirect.http.html deleted file mode 100644 index c6dcc471c..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/same-origin-downgrade.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/same-origin-downgrade.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/same-origin-downgrade.no-redirect.http.html deleted file mode 100644 index 53505abe0..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/same-origin-downgrade.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/same-origin-downgrade.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/same-origin-downgrade.swap-origin-redirect.http.html deleted file mode 100644 index 76b1b2df5..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/same-origin-downgrade.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/same-origin-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 76b1b2df5..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/same-origin-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/same-origin-upgrade.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/same-origin-upgrade.keep-origin-redirect.http.html deleted file mode 100644 index c6dcc471c..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/same-origin-upgrade.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/same-origin-upgrade.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/same-origin-upgrade.no-redirect.http.html deleted file mode 100644 index 53505abe0..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/same-origin-upgrade.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/same-origin-upgrade.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/same-origin-upgrade.swap-origin-redirect.http.html deleted file mode 100644 index 76b1b2df5..000000000 --- a/testing/web-platform/tests/referrer-policy/origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/same-origin-upgrade.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> - <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/attr-referrer/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/attr-referrer/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 403b08e5d..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/attr-referrer/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/attr-referrer/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/attr-referrer/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html deleted file mode 100644 index 25e9e2f45..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/attr-referrer/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/attr-referrer/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/attr-referrer/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 0ae83292f..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/attr-referrer/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/attr-referrer/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/attr-referrer/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 7358e1c70..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/attr-referrer/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/attr-referrer/cross-origin/http-http/img-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/attr-referrer/cross-origin/http-http/img-tag/generic.no-redirect.http.html deleted file mode 100644 index 77b87b8cb..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/attr-referrer/cross-origin/http-http/img-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/attr-referrer/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/attr-referrer/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index e8ba9a759..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/attr-referrer/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/attr-referrer/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/attr-referrer/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 5622a50bf..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/attr-referrer/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/attr-referrer/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/attr-referrer/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html deleted file mode 100644 index dfdf69fbc..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/attr-referrer/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/attr-referrer/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/attr-referrer/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index f5542f97e..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/attr-referrer/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/attr-referrer/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/attr-referrer/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 8cec185e1..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/attr-referrer/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/attr-referrer/cross-origin/http-https/img-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/attr-referrer/cross-origin/http-https/img-tag/generic.no-redirect.http.html deleted file mode 100644 index 9cb253f35..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/attr-referrer/cross-origin/http-https/img-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/attr-referrer/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/attr-referrer/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 2ce74e688..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/attr-referrer/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/attr-referrer/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/attr-referrer/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index ce0b1252e..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/attr-referrer/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/attr-referrer/same-origin/http-http/iframe-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/attr-referrer/same-origin/http-http/iframe-tag/generic.no-redirect.http.html deleted file mode 100644 index 39304901c..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/attr-referrer/same-origin/http-http/iframe-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/attr-referrer/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/attr-referrer/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 987106249..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/attr-referrer/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/attr-referrer/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/attr-referrer/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 33d76d384..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/attr-referrer/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/attr-referrer/same-origin/http-http/img-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/attr-referrer/same-origin/http-http/img-tag/generic.no-redirect.http.html deleted file mode 100644 index 56a0eabe7..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/attr-referrer/same-origin/http-http/img-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/attr-referrer/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/attr-referrer/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 2befe6ff3..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/attr-referrer/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/attr-referrer/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/attr-referrer/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index c9cb06842..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/attr-referrer/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/attr-referrer/same-origin/http-https/iframe-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/attr-referrer/same-origin/http-https/iframe-tag/generic.no-redirect.http.html deleted file mode 100644 index c6f8e1490..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/attr-referrer/same-origin/http-https/iframe-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/attr-referrer/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/attr-referrer/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index dd44b6679..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/attr-referrer/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/attr-referrer/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/attr-referrer/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 2ae35e050..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/attr-referrer/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/attr-referrer/same-origin/http-https/img-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/attr-referrer/same-origin/http-https/img-tag/generic.no-redirect.http.html deleted file mode 100644 index 2b7cc6d59..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/attr-referrer/same-origin/http-https/img-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/attr-referrer/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/attr-referrer/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index a6bbc66d3..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/attr-referrer/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html deleted file mode 100644 index 758ab5767..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/generic.no-redirect.http.html deleted file mode 100644 index 35a5049a5..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/generic.no-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html deleted file mode 100644 index 851b077e6..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index cd93dd64a..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html deleted file mode 100644 index 3cdd17258..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 34be306a1..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 33fe33fb1..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/generic.no-redirect.http.html deleted file mode 100644 index eecbe272b..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/generic.no-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 90f8d6aa6..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 8f88eaf53..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/generic.no-redirect.http.html deleted file mode 100644 index 3df62ffab..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/generic.no-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index f9961c352..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/script-tag/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html deleted file mode 100644 index 4c124d298..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/generic.no-redirect.http.html deleted file mode 100644 index 29b6635f9..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/generic.no-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html deleted file mode 100644 index 501315b2b..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html deleted file mode 100644 index ddae157a6..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/generic.no-redirect.http.html deleted file mode 100644 index b48445413..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/generic.no-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html deleted file mode 100644 index 2219a9204..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 22559b109..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html deleted file mode 100644 index ddfbd4e19..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 23df7f0ad..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 767c13872..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/generic.no-redirect.http.html deleted file mode 100644 index 414cae5d6..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/generic.no-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 081b8b55f..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index fd3a69a85..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/generic.no-redirect.http.html deleted file mode 100644 index 65a3a5326..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/generic.no-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 6fb1b31b1..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/script-tag/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html deleted file mode 100644 index d8ff89441..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/generic.no-redirect.http.html deleted file mode 100644 index 58fbc4829..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/generic.no-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html deleted file mode 100644 index 229787117..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/cross-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html deleted file mode 100644 index 2a421f846..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/generic.no-redirect.http.html deleted file mode 100644 index df23d02dd..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/generic.no-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html deleted file mode 100644 index 0098e8f3e..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 6254fb8c7..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/generic.no-redirect.http.html deleted file mode 100644 index 8454f0665..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/generic.no-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 381737def..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 7b600cbbd..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/img-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/img-tag/generic.no-redirect.http.html deleted file mode 100644 index f6631d884..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/img-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/img-tag/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/img-tag/generic.no-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/img-tag/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 4f0872346..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/script-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/script-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 04027e95f..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/script-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/script-tag/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/script-tag/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/script-tag/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/script-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/script-tag/generic.no-redirect.http.html deleted file mode 100644 index 37037229b..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/script-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/script-tag/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/script-tag/generic.no-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/script-tag/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/script-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/script-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 13473d515..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/script-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/script-tag/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/script-tag/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/script-tag/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html deleted file mode 100644 index 619ed34a3..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/generic.no-redirect.http.html deleted file mode 100644 index 015a044da..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/generic.no-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html deleted file mode 100644 index 2b3c2527b..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html deleted file mode 100644 index 02d91a903..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/generic.no-redirect.http.html deleted file mode 100644 index 064eea5a3..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/generic.no-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html deleted file mode 100644 index d92098a31..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index a8f6d4c2b..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/generic.no-redirect.http.html deleted file mode 100644 index 22b20d3b1..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/generic.no-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index e4c0e8e69..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 30a7422fe..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/img-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/img-tag/generic.no-redirect.http.html deleted file mode 100644 index 99c436d7f..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/img-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/img-tag/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/img-tag/generic.no-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/img-tag/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index a94ce6d57..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/script-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/script-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 9f262c082..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/script-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/script-tag/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/script-tag/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/script-tag/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/script-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/script-tag/generic.no-redirect.http.html deleted file mode 100644 index e4d50953a..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/script-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/script-tag/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/script-tag/generic.no-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/script-tag/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/script-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/script-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 3a3e505e0..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/script-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/script-tag/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/script-tag/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/script-tag/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html deleted file mode 100644 index 8cf8a9db0..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/generic.no-redirect.http.html deleted file mode 100644 index f0e9bcfe4..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/generic.no-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html deleted file mode 100644 index 9bb9159fa..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index 306a53536..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/http-rp/same-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html deleted file mode 100644 index 66cad9817..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/fetch-request/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/fetch-request/generic.no-redirect.http.html deleted file mode 100644 index 373a9a1fb..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/fetch-request/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html deleted file mode 100644 index 0661bda2b..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 95cfae315..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html deleted file mode 100644 index 5631be438..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index c5f2de32e..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index e676621b2..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/img-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/img-tag/generic.no-redirect.http.html deleted file mode 100644 index d1f431ffd..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/img-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 10ba9c188..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/script-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/script-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 78762fe53..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/script-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/script-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/script-tag/generic.no-redirect.http.html deleted file mode 100644 index 8580bf41e..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/script-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/script-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/script-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 740cca8ff..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/script-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html deleted file mode 100644 index 38096523b..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/xhr-request/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/xhr-request/generic.no-redirect.http.html deleted file mode 100644 index 9d1db30f6..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/xhr-request/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html deleted file mode 100644 index f28bd6734..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html deleted file mode 100644 index 52ea79ea3..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/fetch-request/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/fetch-request/generic.no-redirect.http.html deleted file mode 100644 index 45bc707ab..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/fetch-request/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html deleted file mode 100644 index d80387047..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 6465e10c9..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html deleted file mode 100644 index 413690e8d..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 602ec76bd..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 1a987e7f5..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/img-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/img-tag/generic.no-redirect.http.html deleted file mode 100644 index b7d113508..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/img-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 312c8d556..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/script-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/script-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index ba9d5d08f..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/script-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/script-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/script-tag/generic.no-redirect.http.html deleted file mode 100644 index 93a164d27..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/script-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/script-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/script-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 9b8f447e5..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/script-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html deleted file mode 100644 index 8b1a8ea3d..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/xhr-request/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/xhr-request/generic.no-redirect.http.html deleted file mode 100644 index d40d7b411..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/xhr-request/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html deleted file mode 100644 index 65bc46987..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/cross-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html deleted file mode 100644 index cba7210bd..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-http/fetch-request/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-http/fetch-request/generic.no-redirect.http.html deleted file mode 100644 index 54122bd8d..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-http/fetch-request/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html deleted file mode 100644 index a83eed311..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 493f79902..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-http/iframe-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-http/iframe-tag/generic.no-redirect.http.html deleted file mode 100644 index 4aaae188f..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-http/iframe-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index acf0c7aa0..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 99da41e73..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-http/img-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-http/img-tag/generic.no-redirect.http.html deleted file mode 100644 index 756dfb3cd..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-http/img-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 65ed223f1..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-http/script-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-http/script-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 96e7d4e7b..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-http/script-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-http/script-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-http/script-tag/generic.no-redirect.http.html deleted file mode 100644 index d6c28231c..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-http/script-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-http/script-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-http/script-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index ee9ad9993..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-http/script-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html deleted file mode 100644 index e33ca1b5f..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-http/xhr-request/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-http/xhr-request/generic.no-redirect.http.html deleted file mode 100644 index e966c29b6..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-http/xhr-request/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html deleted file mode 100644 index 175441c9e..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html deleted file mode 100644 index 21828b7b7..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-https/fetch-request/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-https/fetch-request/generic.no-redirect.http.html deleted file mode 100644 index cadd6aa50..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-https/fetch-request/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html deleted file mode 100644 index ac6d689b5..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 92c2e4d40..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-https/iframe-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-https/iframe-tag/generic.no-redirect.http.html deleted file mode 100644 index eceedcb15..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-https/iframe-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index e847df8ff..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 9cb83cb0c..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-https/img-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-https/img-tag/generic.no-redirect.http.html deleted file mode 100644 index 700d95828..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-https/img-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 73c907dea..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-https/script-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-https/script-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 2b7786cd3..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-https/script-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-https/script-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-https/script-tag/generic.no-redirect.http.html deleted file mode 100644 index 15ff14f65..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-https/script-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-https/script-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-https/script-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index ba8411200..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-https/script-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html deleted file mode 100644 index 60df8dd48..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-https/xhr-request/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-https/xhr-request/generic.no-redirect.http.html deleted file mode 100644 index a119d66be..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-https/xhr-request/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html deleted file mode 100644 index 47c8084c3..000000000 --- a/testing/web-platform/tests/referrer-policy/origin/meta-referrer/same-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> - <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> - <meta name="referrer" content="origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-origin.keep-origin-redirect.http.html deleted file mode 100644 index 14e928ea8..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-origin.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-origin.no-redirect.http.html deleted file mode 100644 index 0e549ae0d..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-origin.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-origin.swap-origin-redirect.http.html deleted file mode 100644 index ea0d40232..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-origin.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html deleted file mode 100644 index 0acf101b8..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html deleted file mode 100644 index 7026fe1d1..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html deleted file mode 100644 index e8bb9ae85..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/iframe-tag/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/iframe-tag/cross-origin.keep-origin-redirect.http.html deleted file mode 100644 index 73f992b65..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/iframe-tag/cross-origin.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/iframe-tag/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/iframe-tag/cross-origin.no-redirect.http.html deleted file mode 100644 index 7fc3541bc..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/iframe-tag/cross-origin.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/iframe-tag/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/iframe-tag/cross-origin.swap-origin-redirect.http.html deleted file mode 100644 index 73ba641f9..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/iframe-tag/cross-origin.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/cross-origin.keep-origin-redirect.http.html deleted file mode 100644 index 172853a4f..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/cross-origin.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/cross-origin.no-redirect.http.html deleted file mode 100644 index b2104f4cb..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/cross-origin.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/cross-origin.swap-origin-redirect.http.html deleted file mode 100644 index c984c4363..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/cross-origin.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.keep-origin-redirect.http.html deleted file mode 100644 index 4cb71bcbf..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.no-redirect.http.html deleted file mode 100644 index 66abd90fd..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 7c366c108..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/same-origin-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/same-origin-insecure.keep-origin-redirect.http.html deleted file mode 100644 index 11683e44b..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/same-origin-insecure.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/same-origin-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/same-origin-insecure.no-redirect.http.html deleted file mode 100644 index 617093728..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/same-origin-insecure.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/same-origin-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 594c2984d..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/same-origin-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html deleted file mode 100644 index f17556c54..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-insecure.swap-origin-redirect.http.html deleted file mode 100644 index fa91f2cbb..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.keep-origin-redirect.http.html deleted file mode 100644 index 18dba0048..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.keep-origin-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.no-redirect.http.html deleted file mode 100644 index 9d8b2b2c4..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.no-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.swap-origin-redirect.http.html deleted file mode 100644 index 2befacac7..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.swap-origin-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.keep-origin-redirect.http.html deleted file mode 100644 index 988c99d5c..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.keep-origin-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.no-redirect.http.html deleted file mode 100644 index 7588d84e0..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.no-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.swap-origin-redirect.http.html deleted file mode 100644 index 3e2b36979..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.swap-origin-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html deleted file mode 100644 index b26c3efdc..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html deleted file mode 100644 index c7c348f90..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html deleted file mode 100644 index 126e278b4..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.keep-origin-redirect.http.html deleted file mode 100644 index f22d6d87b..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.keep-origin-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.no-redirect.http.html deleted file mode 100644 index 90dd8881d..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.no-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.swap-origin-redirect.http.html deleted file mode 100644 index 8dd055d71..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.swap-origin-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.keep-origin-redirect.http.html deleted file mode 100644 index 32248c739..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.keep-origin-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.no-redirect.http.html deleted file mode 100644 index 4e41494b8..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.no-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.swap-origin-redirect.http.html deleted file mode 100644 index 08973c571..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.swap-origin-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.keep-origin-redirect.http.html deleted file mode 100644 index 863791529..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.keep-origin-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.no-redirect.http.html deleted file mode 100644 index 1e66182f0..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.no-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.swap-origin-redirect.http.html deleted file mode 100644 index 289a4a507..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.swap-origin-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.keep-origin-redirect.http.html deleted file mode 100644 index 4d44a10b7..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.keep-origin-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.no-redirect.http.html deleted file mode 100644 index d76ff641a..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.no-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.swap-origin-redirect.http.html deleted file mode 100644 index 37d4e3e46..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.swap-origin-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.keep-origin-redirect.http.html deleted file mode 100644 index 2757dabaa..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.keep-origin-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.no-redirect.http.html deleted file mode 100644 index 8a405470c..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.no-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.swap-origin-redirect.http.html deleted file mode 100644 index f5c690b8b..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.swap-origin-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.keep-origin-redirect.http.html deleted file mode 100644 index ba1424c06..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.keep-origin-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.no-redirect.http.html deleted file mode 100644 index 7aebb65a5..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.no-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.swap-origin-redirect.http.html deleted file mode 100644 index 8d145be6b..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.swap-origin-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.keep-origin-redirect.http.html deleted file mode 100644 index 6d334876d..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.keep-origin-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.no-redirect.http.html deleted file mode 100644 index 941dd867f..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.no-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.swap-origin-redirect.http.html deleted file mode 100644 index 41e0570ec..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.swap-origin-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.keep-origin-redirect.http.html deleted file mode 100644 index 8f72529b6..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.keep-origin-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.no-redirect.http.html deleted file mode 100644 index 36e5d0a32..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.no-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 87cc41497..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.swap-origin-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.keep-origin-redirect.http.html deleted file mode 100644 index 41d8f63f2..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.keep-origin-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.no-redirect.http.html deleted file mode 100644 index e9082a803..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.no-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 731cb6339..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.keep-origin-redirect.http.html deleted file mode 100644 index 94a1ceca8..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.keep-origin-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.no-redirect.http.html deleted file mode 100644 index 0e0fc8e5b..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.no-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.swap-origin-redirect.http.html deleted file mode 100644 index b5f8a4cbd..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.swap-origin-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.keep-origin-redirect.http.html deleted file mode 100644 index bbc8f26a5..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.keep-origin-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.no-redirect.http.html deleted file mode 100644 index d373139d1..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.no-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 49468d125..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.swap-origin-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.keep-origin-redirect.http.html deleted file mode 100644 index c3be3878e..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.keep-origin-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.no-redirect.http.html deleted file mode 100644 index f4800516d..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.no-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.swap-origin-redirect.http.html deleted file mode 100644 index ce60482bd..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.swap-origin-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/fetch-request/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/fetch-request/same-origin-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 5714a7e06..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/fetch-request/same-origin-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/fetch-request/same-origin-insecure.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/fetch-request/same-origin-insecure.swap-origin-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/fetch-request/same-origin-insecure.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html deleted file mode 100644 index ca5c1fd4b..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/img-tag/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/img-tag/same-origin-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 934fb53a6..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/img-tag/same-origin-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/img-tag/same-origin-insecure.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/img-tag/same-origin-insecure.swap-origin-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/img-tag/same-origin-insecure.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/script-tag/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/script-tag/same-origin-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 755075a17..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/script-tag/same-origin-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/script-tag/same-origin-insecure.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/script-tag/same-origin-insecure.swap-origin-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/script-tag/same-origin-insecure.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/xhr-request/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/xhr-request/same-origin-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 56c1bdb7d..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/xhr-request/same-origin-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/xhr-request/same-origin-insecure.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/xhr-request/same-origin-insecure.swap-origin-redirect.http.html.headers deleted file mode 100644 index 309da8091..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/xhr-request/same-origin-insecure.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: same-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/fetch-request/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/fetch-request/cross-origin.keep-origin-redirect.http.html deleted file mode 100644 index 986434466..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/fetch-request/cross-origin.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/fetch-request/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/fetch-request/cross-origin.no-redirect.http.html deleted file mode 100644 index a70bbb7ff..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/fetch-request/cross-origin.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/fetch-request/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/fetch-request/cross-origin.swap-origin-redirect.http.html deleted file mode 100644 index 2199fbacc..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/fetch-request/cross-origin.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/iframe-tag/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/iframe-tag/cross-origin.keep-origin-redirect.http.html deleted file mode 100644 index 0038a1a78..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/iframe-tag/cross-origin.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/iframe-tag/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/iframe-tag/cross-origin.no-redirect.http.html deleted file mode 100644 index 8555bc6cc..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/iframe-tag/cross-origin.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/iframe-tag/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/iframe-tag/cross-origin.swap-origin-redirect.http.html deleted file mode 100644 index bd2014b06..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/iframe-tag/cross-origin.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html deleted file mode 100644 index b519ebcfb..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html deleted file mode 100644 index a70f22d69..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html deleted file mode 100644 index 633938985..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/script-tag/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/script-tag/cross-origin.keep-origin-redirect.http.html deleted file mode 100644 index b9eefbc30..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/script-tag/cross-origin.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/script-tag/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/script-tag/cross-origin.no-redirect.http.html deleted file mode 100644 index 82fc3b114..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/script-tag/cross-origin.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/script-tag/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/script-tag/cross-origin.swap-origin-redirect.http.html deleted file mode 100644 index bbcbe233f..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/script-tag/cross-origin.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/xhr-request/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/xhr-request/cross-origin.keep-origin-redirect.http.html deleted file mode 100644 index fd270955f..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/xhr-request/cross-origin.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/xhr-request/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/xhr-request/cross-origin.no-redirect.http.html deleted file mode 100644 index 4739c5847..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/xhr-request/cross-origin.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/xhr-request/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/xhr-request/cross-origin.swap-origin-redirect.http.html deleted file mode 100644 index fe6f02837..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/xhr-request/cross-origin.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/fetch-request/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/fetch-request/cross-origin.keep-origin-redirect.http.html deleted file mode 100644 index 5d0f8168c..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/fetch-request/cross-origin.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/fetch-request/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/fetch-request/cross-origin.no-redirect.http.html deleted file mode 100644 index 3a4fb95e8..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/fetch-request/cross-origin.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/fetch-request/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/fetch-request/cross-origin.swap-origin-redirect.http.html deleted file mode 100644 index 20c2f4f49..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/fetch-request/cross-origin.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/iframe-tag/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/iframe-tag/cross-origin.keep-origin-redirect.http.html deleted file mode 100644 index d3ad1f9c4..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/iframe-tag/cross-origin.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/iframe-tag/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/iframe-tag/cross-origin.no-redirect.http.html deleted file mode 100644 index 5de6a24aa..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/iframe-tag/cross-origin.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/iframe-tag/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/iframe-tag/cross-origin.swap-origin-redirect.http.html deleted file mode 100644 index d39c95d82..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/iframe-tag/cross-origin.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/img-tag/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/img-tag/cross-origin.keep-origin-redirect.http.html deleted file mode 100644 index df9f3a839..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/img-tag/cross-origin.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/img-tag/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/img-tag/cross-origin.no-redirect.http.html deleted file mode 100644 index 729839842..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/img-tag/cross-origin.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/img-tag/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/img-tag/cross-origin.swap-origin-redirect.http.html deleted file mode 100644 index f5e5c5230..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/img-tag/cross-origin.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/script-tag/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/script-tag/cross-origin.keep-origin-redirect.http.html deleted file mode 100644 index 5e03688c4..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/script-tag/cross-origin.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/script-tag/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/script-tag/cross-origin.no-redirect.http.html deleted file mode 100644 index 346e401ef..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/script-tag/cross-origin.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/script-tag/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/script-tag/cross-origin.swap-origin-redirect.http.html deleted file mode 100644 index 27d89b3c0..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/script-tag/cross-origin.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/xhr-request/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/xhr-request/cross-origin.keep-origin-redirect.http.html deleted file mode 100644 index 045dc0617..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/xhr-request/cross-origin.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/xhr-request/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/xhr-request/cross-origin.no-redirect.http.html deleted file mode 100644 index aadf71777..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/xhr-request/cross-origin.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/xhr-request/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/xhr-request/cross-origin.swap-origin-redirect.http.html deleted file mode 100644 index aada3951f..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/xhr-request/cross-origin.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/fetch-request/same-origin-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/fetch-request/same-origin-insecure.keep-origin-redirect.http.html deleted file mode 100644 index 9bbbfb72f..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/fetch-request/same-origin-insecure.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/fetch-request/same-origin-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/fetch-request/same-origin-insecure.no-redirect.http.html deleted file mode 100644 index 6d7a54cdb..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/fetch-request/same-origin-insecure.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/fetch-request/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/fetch-request/same-origin-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 8117e29c0..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/fetch-request/same-origin-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.keep-origin-redirect.http.html deleted file mode 100644 index 34859ed87..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.no-redirect.http.html deleted file mode 100644 index e73908952..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 0080977a7..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/img-tag/same-origin-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/img-tag/same-origin-insecure.keep-origin-redirect.http.html deleted file mode 100644 index 155bf0109..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/img-tag/same-origin-insecure.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/img-tag/same-origin-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/img-tag/same-origin-insecure.no-redirect.http.html deleted file mode 100644 index 7b3442d29..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/img-tag/same-origin-insecure.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/img-tag/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/img-tag/same-origin-insecure.swap-origin-redirect.http.html deleted file mode 100644 index fe2b40c58..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/img-tag/same-origin-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/script-tag/same-origin-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/script-tag/same-origin-insecure.keep-origin-redirect.http.html deleted file mode 100644 index 18f3dbc80..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/script-tag/same-origin-insecure.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/script-tag/same-origin-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/script-tag/same-origin-insecure.no-redirect.http.html deleted file mode 100644 index f296512ef..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/script-tag/same-origin-insecure.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/script-tag/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/script-tag/same-origin-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 8eaeb5cd8..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/script-tag/same-origin-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/xhr-request/same-origin-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/xhr-request/same-origin-insecure.keep-origin-redirect.http.html deleted file mode 100644 index 9ca451221..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/xhr-request/same-origin-insecure.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/xhr-request/same-origin-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/xhr-request/same-origin-insecure.no-redirect.http.html deleted file mode 100644 index a8ec1e6ac..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/xhr-request/same-origin-insecure.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/xhr-request/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/xhr-request/same-origin-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 5fdacce40..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/xhr-request/same-origin-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/fetch-request/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/fetch-request/same-origin-insecure.swap-origin-redirect.http.html deleted file mode 100644 index cac271986..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/fetch-request/same-origin-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 7023a52be..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/img-tag/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/img-tag/same-origin-insecure.swap-origin-redirect.http.html deleted file mode 100644 index a6be79bcd..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/img-tag/same-origin-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/script-tag/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/script-tag/same-origin-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 70602133f..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/script-tag/same-origin-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/xhr-request/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/xhr-request/same-origin-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 27a95b7ad..000000000 --- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/xhr-request/same-origin-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> - <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> - <meta name="referrer" content="same-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> - <meta name="assert" content="The referrer URL is omitted when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "same-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "omitted" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/spec.src.json b/testing/web-platform/tests/referrer-policy/spec.src.json deleted file mode 100644 index 6d76af2f6..000000000 --- a/testing/web-platform/tests/referrer-policy/spec.src.json +++ /dev/null @@ -1,638 +0,0 @@ -{ - "specification": [ - { - "name": "unset-referrer-policy", - "title": "Referrer Policy is not explicitly defined", - "description": "Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.", - "specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policies", - "referrer_policy": null, - "test_expansion": [ - { - "name": "insecure-protocol", - "expansion": "default", - "source_protocol": "http", - "target_protocol": "http", - "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], - "redirection": "*", - "origin": "*", - "subresource": "*", - "referrer_url": "stripped-referrer" - }, - { - "name": "upgrade-protocol", - "expansion": "default", - "source_protocol": "http", - "target_protocol": "https", - "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], - "redirection": "*", - "origin": "*", - "subresource": "*", - "referrer_url": "stripped-referrer" - }, - { - "name": "downgrade-protocol", - "expansion": "default", - "source_protocol": "https", - "target_protocol": "http", - "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], - "redirection": "*", - "origin": "*", - "subresource": "*", - "referrer_url": "omitted" - }, - { - "name": "secure-protocol", - "expansion": "default", - "source_protocol": "https", - "target_protocol": "https", - "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], - "redirection": "*", - "origin": "*", - "subresource": "*", - "referrer_url": "stripped-referrer" - } - ] - }, - { - "name": "no-referrer", - "title": "Referrer Policy is set to 'no-referrer'", - "description": "Check that sub-resource never gets the referrer URL.", - "specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer", - "referrer_policy": "no-referrer", - "test_expansion": [ - { - "name": "generic", - "expansion": "default", - "source_protocol": "*", - "target_protocol": "*", - "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], - "redirection": "*", - "origin": "*", - "subresource": "*", - "referrer_url": "omitted" - } - ] - }, - { - "name": "no-referrer-when-downgrade", - "title": "Referrer Policy is set to 'no-referrer-when-downgrade'", - "description": "Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.", - "specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade", - "referrer_policy": "no-referrer-when-downgrade", - "test_expansion": [ - { - "name": "insecure-protocol", - "expansion": "default", - "source_protocol": "http", - "target_protocol": "http", - "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], - "redirection": "*", - "origin": "*", - "subresource": "*", - "referrer_url": "stripped-referrer" - }, - { - "name": "upgrade-protocol", - "expansion": "default", - "source_protocol": "http", - "target_protocol": "https", - "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], - "redirection": "*", - "origin": "*", - "subresource": "*", - "referrer_url": "stripped-referrer" - }, - { - "name": "downgrade-protocol", - "expansion": "default", - "source_protocol": "https", - "target_protocol": "http", - "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], - "redirection": "*", - "origin": "*", - "subresource": "*", - "referrer_url": "omitted" - }, - { - "name": "secure-protocol", - "expansion": "default", - "source_protocol": "https", - "target_protocol": "https", - "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], - "redirection": "*", - "origin": "*", - "subresource": "*", - "referrer_url": "stripped-referrer" - } - ] - }, - { - "name": "origin", - "title": "Referrer Policy is set to 'origin'", - "description": "Check that all subresources in all casses get only the origin portion of the referrer URL.", - "specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin", - "referrer_policy": "origin", - "test_expansion": [ - { - "name": "generic", - "expansion": "default", - "source_protocol": "*", - "target_protocol": "*", - "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], - "redirection": "*", - "origin": "*", - "subresource": "*", - "referrer_url": "origin" - } - ] - }, - { - "name": "same-origin", - "title": "Referrer Policy is set to 'same-origin'", - "description": "Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.", - "specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin", - "referrer_policy": "same-origin", - "test_expansion": [ - { - "name": "same-origin-insecure", - "expansion": "default", - "source_protocol": "http", - "target_protocol": "http", - "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], - "redirection": "*", - "origin": "same-origin", - "subresource": "*", - "referrer_url": "stripped-referrer" - }, - { - "name": "same-origin-secure-default", - "expansion": "default", - "source_protocol": "https", - "target_protocol": "https", - "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], - "redirection": "*", - "origin": "same-origin", - "subresource": "*", - "referrer_url": "stripped-referrer" - }, - { - "name": "same-origin-insecure", - "expansion": "override", - "source_protocol": "*", - "target_protocol": "*", - "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "subresource": "*", - "referrer_url": "omitted" - }, - { - "name": "cross-origin", - "expansion": "default", - "source_protocol": "*", - "target_protocol": "*", - "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], - "redirection": "*", - "origin": "cross-origin", - "subresource": "*", - "referrer_url": "omitted" - } - ] - }, - { - "name": "origin-when-cross-origin", - "title": "Referrer Policy is set to 'origin-when-cross-origin'", - "description": "Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.", - "specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin", - "referrer_policy": "origin-when-cross-origin", - "test_expansion": [ - { - "name": "same-origin-insecure", - "expansion": "default", - "source_protocol": "http", - "target_protocol": "http", - "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], - "redirection": "*", - "origin": "same-origin", - "subresource": "*", - "referrer_url": "stripped-referrer" - }, - { - "name": "same-origin-secure-default", - "expansion": "default", - "source_protocol": "https", - "target_protocol": "https", - "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], - "redirection": "*", - "origin": "same-origin", - "subresource": "*", - "referrer_url": "stripped-referrer" - }, - { - "name": "same-origin-upgrade", - "expansion": "default", - "source_protocol": "http", - "target_protocol": "https", - "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], - "redirection": "*", - "origin": "same-origin", - "subresource": "*", - "referrer_url": "origin" - }, - { - "name": "same-origin-downgrade", - "expansion": "default", - "source_protocol": "http", - "target_protocol": "https", - "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], - "redirection": "*", - "origin": "same-origin", - "subresource": "*", - "referrer_url": "origin" - }, - { - "name": "same-origin-insecure", - "expansion": "override", - "source_protocol": "*", - "target_protocol": "*", - "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "subresource": "*", - "referrer_url": "origin" - }, - { - "name": "cross-origin", - "expansion": "default", - "source_protocol": "*", - "target_protocol": "*", - "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], - "redirection": "*", - "origin": "cross-origin", - "subresource": "*", - "referrer_url": "origin" - } - ] - }, - { - "name": "strict-origin", - "title": "Referrer Policy is set to 'strict-origin'", - "description": "Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.", - "specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin", - "referrer_policy": "strict-origin", - "test_expansion": [ - { - "name": "insecure-protocol", - "expansion": "default", - "source_protocol": "http", - "target_protocol": "http", - "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], - "redirection": "*", - "origin": "*", - "subresource": "*", - "referrer_url": "origin" - }, - { - "name": "upgrade-protocol", - "expansion": "default", - "source_protocol": "http", - "target_protocol": "https", - "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], - "redirection": "*", - "origin": "*", - "subresource": "*", - "referrer_url": "origin" - }, - { - "name": "downgrade-protocol", - "expansion": "default", - "source_protocol": "https", - "target_protocol": "http", - "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], - "redirection": "*", - "origin": "*", - "subresource": "*", - "referrer_url": "omitted" - }, - { - "name": "secure-protocol", - "expansion": "default", - "source_protocol": "https", - "target_protocol": "https", - "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], - "redirection": "*", - "origin": "*", - "subresource": "*", - "referrer_url": "origin" - } - ] - }, - { - "name": "strict-origin-when-cross-origin", - "title": "Referrer Policy is set to 'strict-origin-when-cross-origin'", - "description": "Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.", - "specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin", - "referrer_policy": "strict-origin-when-cross-origin", - "test_expansion": [ - { - "name": "same-insecure", - "expansion": "default", - "source_protocol": "http", - "target_protocol": "http", - "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], - "redirection": "*", - "origin": "same-origin", - "subresource": "*", - "referrer_url": "stripped-referrer" - }, - { - "name": "same-insecure", - "expansion": "override", - "source_protocol": "http", - "target_protocol": "http", - "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "subresource": "*", - "referrer_url": "origin" - }, - { - "name": "cross-insecure", - "expansion": "default", - "source_protocol": "http", - "target_protocol": "http", - "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], - "redirection": "*", - "origin": "cross-origin", - "subresource": "*", - "referrer_url": "origin" - }, - { - "name": "upgrade-protocol", - "expansion": "default", - "source_protocol": "http", - "target_protocol": "https", - "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], - "redirection": "*", - "origin": "*", - "subresource": "*", - "referrer_url": "origin" - }, - { - "name": "downgrade-protocol", - "expansion": "default", - "source_protocol": "https", - "target_protocol": "http", - "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], - "redirection": "*", - "origin": "*", - "subresource": "*", - "referrer_url": "omitted" - }, - { - "name": "same-secure", - "expansion": "default", - "source_protocol": "https", - "target_protocol": "https", - "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], - "redirection": "*", - "origin": "same-origin", - "subresource": "*", - "referrer_url": "stripped-referrer" - }, - { - "name": "same-secure", - "expansion": "override", - "source_protocol": "https", - "target_protocol": "https", - "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "subresource": "*", - "referrer_url": "origin" - }, - { - "name": "cross-secure", - "expansion": "default", - "source_protocol": "https", - "target_protocol": "https", - "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], - "redirection": "*", - "origin": "cross-origin", - "subresource": "*", - "referrer_url": "origin" - } - ] - }, - { - "name": "unsafe-url", - "title": "Referrer Policy is set to 'unsafe-url'", - "description": "Check that all sub-resources get the stripped referrer URL.", - "specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url", - "referrer_policy": "unsafe-url", - "test_expansion": [ - { - "name": "generic", - "expansion": "default", - "source_protocol": "*", - "target_protocol": "*", - "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], - "redirection": "*", - "origin": "*", - "subresource": "*", - "referrer_url": "stripped-referrer" - } - ] - } - ], - - "excluded_tests":[ - { - "name": "cross-origin-workers", - "expansion": "*", - "source_protocol": "*", - "target_protocol": "*", - "redirection": "*", - "delivery_method": "*", - "origin": "cross-origin", - "subresource": "worker-request", - "referrer_url": "*" - }, - { - "name": "upgraded-protocol-workers", - "expansion": "*", - "source_protocol": "http", - "target_protocol": "https", - "delivery_method": "*", - "redirection": "*", - "origin": "*", - "subresource": "worker-request", - "referrer_url": "*" - }, - { - "name": "mixed-content-insecure-subresources", - "expansion": "*", - "source_protocol": "https", - "target_protocol": "http", - "delivery_method": "*", - "redirection": "*", - "origin": "*", - "subresource": "*", - "referrer_url": "*" - }, - { - "name": "elements-not-supporting-attr-referrer", - "expansion": "*", - "source_protocol": "*", - "target_protocol": "*", - "delivery_method": ["attr-referrer"], - "redirection": "*", - "origin": "*", - "subresource": [ - "script-tag", - "xhr-request", - "worker-request", - "fetch-request" - ], - "referrer_url": "*" - }, - { - "name": "elements-not-supporting-rel-noreferrer", - "expansion": "*", - "source_protocol": "*", - "target_protocol": "*", - "delivery_method": ["rel-noreferrer"], - "redirection": "*", - "origin": "*", - "subresource": [ - "iframe-tag", - "img-tag", - "script-tag", - "xhr-request", - "worker-request", - "fetch-request", - "area-tag" - ], - "referrer_url": "*" - }, - { - "name": "area-tag", - "expansion": "*", - "source_protocol": "*", - "target_protocol": "*", - "delivery_method": "*", - "redirection": "*", - "origin": "*", - "subresource": "area-tag", - "referrer_url": "*" - }, - { - "name": "worker-requests-with-swap-origin-redirect", - "expansion": "*", - "source_protocol": "*", - "target_protocol": "*", - "delivery_method": "*", - "redirection": "swap-origin-redirect", - "origin": "*", - "subresource": ["worker-request"], - "referrer_url": "*" - }, - { - "name": "overhead-for-redirection", - "expansion": "*", - "source_protocol": "*", - "target_protocol": "*", - "delivery_method": "*", - "redirection": ["keep-origin-redirect", "swap-origin-redirect"], - "origin": "*", - "subresource": ["a-tag", "area-tag"], - "referrer_url": "*" - }, - { - "name": "source-https-unsupported-by-web-platform-tests-runners", - "expansion": "*", - "source_protocol": "https", - "target_protocol": "*", - "delivery_method": "*", - "redirection": "*", - "origin": "*", - "subresource": "*", - "referrer_url": "*" - } - ], - - "referrer_policy_schema": [ - null, - "no-referrer", - "no-referrer-when-downgrade", - "same-origin", - "origin", - "origin-when-cross-origin", - "strict-origin", - "strict-origin-when-cross-origin", - "unsafe-url" - ], - - "test_expansion_schema": { - "expansion": [ - "default", - "override" - ], - - "delivery_method": [ - "http-rp", - "meta-referrer", - "attr-referrer", - "rel-noreferrer" - ], - - "origin": [ - "same-origin", - "cross-origin" - ], - - "source_protocol": [ - "http", - "https" - ], - - "target_protocol": [ - "http", - "https" - ], - - "redirection": [ - "no-redirect", - "keep-origin-redirect", - "swap-origin-redirect" - ], - - "subresource": [ - "iframe-tag", - "img-tag", - "script-tag", - "a-tag", - "area-tag", - "xhr-request", - "worker-request", - "fetch-request" - ], - - "referrer_url": [ - "omitted", - "origin", - "stripped-referrer" - ] - }, - - "subresource_path": { - "a-tag": "/referrer-policy/generic/subresource/document.py", - "area-tag": "/referrer-policy/generic/subresource/document.py", - "fetch-request": "/referrer-policy/generic/subresource/xhr.py", - "iframe-tag": "/referrer-policy/generic/subresource/document.py", - "img-tag": "/referrer-policy/generic/subresource/image.py", - "script-tag": "/referrer-policy/generic/subresource/script.py", - "worker-request": "/referrer-policy/generic/subresource/worker.py", - "xhr-request": "/referrer-policy/generic/subresource/xhr.py" - } -} diff --git a/testing/web-platform/tests/referrer-policy/spec_json.js b/testing/web-platform/tests/referrer-policy/spec_json.js deleted file mode 100644 index 1da04bd59..000000000 --- a/testing/web-platform/tests/referrer-policy/spec_json.js +++ /dev/null @@ -1 +0,0 @@ -var SPEC_JSON = {"subresource_path": {"img-tag": "/referrer-policy/generic/subresource/image.py", "fetch-request": "/referrer-policy/generic/subresource/xhr.py", "a-tag": "/referrer-policy/generic/subresource/document.py", "area-tag": "/referrer-policy/generic/subresource/document.py", "iframe-tag": "/referrer-policy/generic/subresource/document.py", "xhr-request": "/referrer-policy/generic/subresource/xhr.py", "worker-request": "/referrer-policy/generic/subresource/worker.py", "script-tag": "/referrer-policy/generic/subresource/script.py"}, "test_expansion_schema": {"origin": ["same-origin", "cross-origin"], "subresource": ["iframe-tag", "img-tag", "script-tag", "a-tag", "area-tag", "xhr-request", "worker-request", "fetch-request"], "target_protocol": ["http", "https"], "expansion": ["default", "override"], "delivery_method": ["http-rp", "meta-referrer", "attr-referrer", "rel-noreferrer"], "redirection": ["no-redirect", "keep-origin-redirect", "swap-origin-redirect"], "referrer_url": ["omitted", "origin", "stripped-referrer"], "source_protocol": ["http", "https"]}, "specification": [{"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policies", "referrer_policy": null, "title": "Referrer Policy is not explicitly defined", "test_expansion": [{"origin": "*", "name": "insecure-protocol", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "http", "subresource": "*"}, {"origin": "*", "name": "upgrade-protocol", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "http", "subresource": "*"}, {"origin": "*", "name": "downgrade-protocol", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "omitted", "source_protocol": "https", "subresource": "*"}, {"origin": "*", "name": "secure-protocol", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "https", "subresource": "*"}], "name": "unset-referrer-policy", "description": "Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."}, {"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer", "referrer_policy": "no-referrer", "title": "Referrer Policy is set to 'no-referrer'", "test_expansion": [{"origin": "*", "name": "generic", "target_protocol": "*", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "omitted", "source_protocol": "*", "subresource": "*"}], "name": "no-referrer", "description": "Check that sub-resource never gets the referrer URL."}, {"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade", "referrer_policy": "no-referrer-when-downgrade", "title": "Referrer Policy is set to 'no-referrer-when-downgrade'", "test_expansion": [{"origin": "*", "name": "insecure-protocol", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "http", "subresource": "*"}, {"origin": "*", "name": "upgrade-protocol", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "http", "subresource": "*"}, {"origin": "*", "name": "downgrade-protocol", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "omitted", "source_protocol": "https", "subresource": "*"}, {"origin": "*", "name": "secure-protocol", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "https", "subresource": "*"}], "name": "no-referrer-when-downgrade", "description": "Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."}, {"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin", "referrer_policy": "origin", "title": "Referrer Policy is set to 'origin'", "test_expansion": [{"origin": "*", "name": "generic", "target_protocol": "*", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "*", "subresource": "*"}], "name": "origin", "description": "Check that all subresources in all casses get only the origin portion of the referrer URL."}, {"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin", "referrer_policy": "same-origin", "title": "Referrer Policy is set to 'same-origin'", "test_expansion": [{"origin": "same-origin", "name": "same-origin-insecure", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "http", "subresource": "*"}, {"origin": "same-origin", "name": "same-origin-secure-default", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "https", "subresource": "*"}, {"origin": "same-origin", "name": "same-origin-insecure", "target_protocol": "*", "expansion": "override", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "swap-origin-redirect", "referrer_url": "omitted", "source_protocol": "*", "subresource": "*"}, {"origin": "cross-origin", "name": "cross-origin", "target_protocol": "*", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "omitted", "source_protocol": "*", "subresource": "*"}], "name": "same-origin", "description": "Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."}, {"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin", "referrer_policy": "origin-when-cross-origin", "title": "Referrer Policy is set to 'origin-when-cross-origin'", "test_expansion": [{"origin": "same-origin", "name": "same-origin-insecure", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "http", "subresource": "*"}, {"origin": "same-origin", "name": "same-origin-secure-default", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "https", "subresource": "*"}, {"origin": "same-origin", "name": "same-origin-upgrade", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "http", "subresource": "*"}, {"origin": "same-origin", "name": "same-origin-downgrade", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "http", "subresource": "*"}, {"origin": "same-origin", "name": "same-origin-insecure", "target_protocol": "*", "expansion": "override", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "swap-origin-redirect", "referrer_url": "origin", "source_protocol": "*", "subresource": "*"}, {"origin": "cross-origin", "name": "cross-origin", "target_protocol": "*", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "*", "subresource": "*"}], "name": "origin-when-cross-origin", "description": "Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."}, {"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin", "referrer_policy": "strict-origin", "title": "Referrer Policy is set to 'strict-origin'", "test_expansion": [{"origin": "*", "name": "insecure-protocol", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "http", "subresource": "*"}, {"origin": "*", "name": "upgrade-protocol", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "http", "subresource": "*"}, {"origin": "*", "name": "downgrade-protocol", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "omitted", "source_protocol": "https", "subresource": "*"}, {"origin": "*", "name": "secure-protocol", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "https", "subresource": "*"}], "name": "strict-origin", "description": "Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."}, {"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin", "referrer_policy": "strict-origin-when-cross-origin", "title": "Referrer Policy is set to 'strict-origin-when-cross-origin'", "test_expansion": [{"origin": "same-origin", "name": "same-insecure", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "http", "subresource": "*"}, {"origin": "same-origin", "name": "same-insecure", "target_protocol": "http", "expansion": "override", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "swap-origin-redirect", "referrer_url": "origin", "source_protocol": "http", "subresource": "*"}, {"origin": "cross-origin", "name": "cross-insecure", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "http", "subresource": "*"}, {"origin": "*", "name": "upgrade-protocol", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "http", "subresource": "*"}, {"origin": "*", "name": "downgrade-protocol", "target_protocol": "http", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "omitted", "source_protocol": "https", "subresource": "*"}, {"origin": "same-origin", "name": "same-secure", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "https", "subresource": "*"}, {"origin": "same-origin", "name": "same-secure", "target_protocol": "https", "expansion": "override", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "swap-origin-redirect", "referrer_url": "origin", "source_protocol": "https", "subresource": "*"}, {"origin": "cross-origin", "name": "cross-secure", "target_protocol": "https", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "origin", "source_protocol": "https", "subresource": "*"}], "name": "strict-origin-when-cross-origin", "description": "Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."}, {"specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url", "referrer_policy": "unsafe-url", "title": "Referrer Policy is set to 'unsafe-url'", "test_expansion": [{"origin": "*", "name": "generic", "target_protocol": "*", "expansion": "default", "delivery_method": ["http-rp", "meta-referrer", "attr-referrer"], "redirection": "*", "referrer_url": "stripped-referrer", "source_protocol": "*", "subresource": "*"}], "name": "unsafe-url", "description": "Check that all sub-resources get the stripped referrer URL."}], "referrer_policy_schema": [null, "no-referrer", "no-referrer-when-downgrade", "same-origin", "origin", "origin-when-cross-origin", "strict-origin", "strict-origin-when-cross-origin", "unsafe-url"], "excluded_tests": [{"origin": "cross-origin", "name": "cross-origin-workers", "target_protocol": "*", "expansion": "*", "delivery_method": "*", "redirection": "*", "referrer_url": "*", "source_protocol": "*", "subresource": "worker-request"}, {"origin": "*", "name": "upgraded-protocol-workers", "target_protocol": "https", "expansion": "*", "delivery_method": "*", "redirection": "*", "referrer_url": "*", "source_protocol": "http", "subresource": "worker-request"}, {"origin": "*", "name": "mixed-content-insecure-subresources", "target_protocol": "http", "expansion": "*", "delivery_method": "*", "redirection": "*", "referrer_url": "*", "source_protocol": "https", "subresource": "*"}, {"origin": "*", "name": "elements-not-supporting-attr-referrer", "target_protocol": "*", "expansion": "*", "delivery_method": ["attr-referrer"], "redirection": "*", "referrer_url": "*", "source_protocol": "*", "subresource": ["script-tag", "xhr-request", "worker-request", "fetch-request"]}, {"origin": "*", "name": "elements-not-supporting-rel-noreferrer", "target_protocol": "*", "expansion": "*", "delivery_method": ["rel-noreferrer"], "redirection": "*", "referrer_url": "*", "source_protocol": "*", "subresource": ["iframe-tag", "img-tag", "script-tag", "xhr-request", "worker-request", "fetch-request", "area-tag"]}, {"origin": "*", "name": "area-tag", "target_protocol": "*", "expansion": "*", "delivery_method": "*", "redirection": "*", "referrer_url": "*", "source_protocol": "*", "subresource": "area-tag"}, {"origin": "*", "name": "worker-requests-with-swap-origin-redirect", "target_protocol": "*", "expansion": "*", "delivery_method": "*", "redirection": "swap-origin-redirect", "referrer_url": "*", "source_protocol": "*", "subresource": ["worker-request"]}, {"origin": "*", "name": "overhead-for-redirection", "target_protocol": "*", "expansion": "*", "delivery_method": "*", "redirection": ["keep-origin-redirect", "swap-origin-redirect"], "referrer_url": "*", "source_protocol": "*", "subresource": ["a-tag", "area-tag"]}, {"origin": "*", "name": "source-https-unsupported-by-web-platform-tests-runners", "target_protocol": "*", "expansion": "*", "delivery_method": "*", "redirection": "*", "referrer_url": "*", "source_protocol": "https", "subresource": "*"}]}; diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-insecure.keep-origin-redirect.http.html deleted file mode 100644 index 410b5da8b..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-insecure.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-insecure.no-redirect.http.html deleted file mode 100644 index ee981716b..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-insecure.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 7f80e3dc6..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/cross-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/cross-insecure.keep-origin-redirect.http.html deleted file mode 100644 index e1acb81c2..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/cross-insecure.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/cross-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/cross-insecure.no-redirect.http.html deleted file mode 100644 index 8f524a23e..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/cross-insecure.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/cross-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/cross-insecure.swap-origin-redirect.http.html deleted file mode 100644 index d1d3bfbf4..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-http/img-tag/cross-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 6b6302a6a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index bcdf71566..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 18ec84b8a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 07bcce770..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 81c5c0b89..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 3e08734ae..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/same-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/same-insecure.keep-origin-redirect.http.html deleted file mode 100644 index 14ffec0f8..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/same-insecure.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/same-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/same-insecure.no-redirect.http.html deleted file mode 100644 index 1dd314595..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/same-insecure.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/same-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/same-insecure.swap-origin-redirect.http.html deleted file mode 100644 index fbda921ea..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/iframe-tag/same-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/same-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/same-insecure.keep-origin-redirect.http.html deleted file mode 100644 index 0ba667d9c..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/same-insecure.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/same-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/same-insecure.no-redirect.http.html deleted file mode 100644 index abbc2d80f..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/same-insecure.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/same-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/same-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 71b1a9038..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-http/img-tag/same-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index f21693a29..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 5ecad4840..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 4a37ed845..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 44d4afad9..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index e0135ac65..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index c03ac3ec3..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/attr-referrer/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/cross-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/cross-insecure.keep-origin-redirect.http.html deleted file mode 100644 index 78028ea11..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/cross-insecure.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/cross-insecure.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/cross-insecure.keep-origin-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/cross-insecure.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/cross-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/cross-insecure.no-redirect.http.html deleted file mode 100644 index b436f264f..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/cross-insecure.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/cross-insecure.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/cross-insecure.no-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/cross-insecure.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/cross-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/cross-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 7f0b239b6..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/cross-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/cross-insecure.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/cross-insecure.swap-origin-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/fetch-request/cross-insecure.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/cross-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/cross-insecure.keep-origin-redirect.http.html deleted file mode 100644 index 7d8657595..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/cross-insecure.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/cross-insecure.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/cross-insecure.keep-origin-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/cross-insecure.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/cross-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/cross-insecure.no-redirect.http.html deleted file mode 100644 index cf0764bda..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/cross-insecure.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/cross-insecure.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/cross-insecure.no-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/cross-insecure.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/cross-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/cross-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 68f7480b4..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/cross-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/cross-insecure.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/cross-insecure.swap-origin-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/iframe-tag/cross-insecure.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/cross-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/cross-insecure.keep-origin-redirect.http.html deleted file mode 100644 index 713b5eeb4..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/cross-insecure.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/cross-insecure.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/cross-insecure.keep-origin-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/cross-insecure.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/cross-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/cross-insecure.no-redirect.http.html deleted file mode 100644 index 5ce05593c..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/cross-insecure.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/cross-insecure.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/cross-insecure.no-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/cross-insecure.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/cross-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/cross-insecure.swap-origin-redirect.http.html deleted file mode 100644 index e1b43a7bd..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/cross-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/cross-insecure.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/cross-insecure.swap-origin-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/img-tag/cross-insecure.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/cross-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/cross-insecure.keep-origin-redirect.http.html deleted file mode 100644 index 57e841048..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/cross-insecure.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/cross-insecure.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/cross-insecure.keep-origin-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/cross-insecure.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/cross-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/cross-insecure.no-redirect.http.html deleted file mode 100644 index 220448dd2..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/cross-insecure.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/cross-insecure.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/cross-insecure.no-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/cross-insecure.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/cross-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/cross-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 1bf99f140..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/cross-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/cross-insecure.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/cross-insecure.swap-origin-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/script-tag/cross-insecure.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/cross-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/cross-insecure.keep-origin-redirect.http.html deleted file mode 100644 index 4b41fa5b8..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/cross-insecure.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/cross-insecure.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/cross-insecure.keep-origin-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/cross-insecure.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/cross-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/cross-insecure.no-redirect.http.html deleted file mode 100644 index f46debfbe..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/cross-insecure.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/cross-insecure.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/cross-insecure.no-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/cross-insecure.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/cross-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/cross-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 7642d2f3d..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/cross-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/cross-insecure.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/cross-insecure.swap-origin-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-http/xhr-request/cross-insecure.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 23dddef08..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 41eb7eaa3..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index fa964a4a4..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index a973b979e..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 8e6ca11f3..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 7073af2d6..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 6554f6cfc..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 65f8a5621..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 9c0a097c4..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index f456395c4..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 6943ffa98..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index b14bb43a9..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index b9275cb0f..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 947e631d1..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index f6c8623a0..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/same-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/same-insecure.keep-origin-redirect.http.html deleted file mode 100644 index 08135c2a8..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/same-insecure.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/same-insecure.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/same-insecure.keep-origin-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/same-insecure.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/same-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/same-insecure.no-redirect.http.html deleted file mode 100644 index 37fb15fef..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/same-insecure.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/same-insecure.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/same-insecure.no-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/same-insecure.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/same-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/same-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 3c35f0622..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/same-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/same-insecure.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/same-insecure.swap-origin-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/fetch-request/same-insecure.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/same-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/same-insecure.keep-origin-redirect.http.html deleted file mode 100644 index 0c49b4e91..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/same-insecure.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/same-insecure.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/same-insecure.keep-origin-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/same-insecure.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/same-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/same-insecure.no-redirect.http.html deleted file mode 100644 index bc9303905..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/same-insecure.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/same-insecure.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/same-insecure.no-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/same-insecure.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/same-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/same-insecure.swap-origin-redirect.http.html deleted file mode 100644 index af7d1df7a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/same-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/same-insecure.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/same-insecure.swap-origin-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/iframe-tag/same-insecure.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/same-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/same-insecure.keep-origin-redirect.http.html deleted file mode 100644 index b40e40125..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/same-insecure.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/same-insecure.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/same-insecure.keep-origin-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/same-insecure.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/same-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/same-insecure.no-redirect.http.html deleted file mode 100644 index fe66263f7..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/same-insecure.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/same-insecure.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/same-insecure.no-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/same-insecure.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/same-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/same-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 4f5483753..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/same-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/same-insecure.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/same-insecure.swap-origin-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/img-tag/same-insecure.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/same-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/same-insecure.keep-origin-redirect.http.html deleted file mode 100644 index 16c752ce0..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/same-insecure.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/same-insecure.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/same-insecure.keep-origin-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/same-insecure.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/same-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/same-insecure.no-redirect.http.html deleted file mode 100644 index 6acc89c80..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/same-insecure.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/same-insecure.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/same-insecure.no-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/same-insecure.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/same-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/same-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 7620c0160..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/same-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/same-insecure.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/same-insecure.swap-origin-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/script-tag/same-insecure.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/same-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/same-insecure.keep-origin-redirect.http.html deleted file mode 100644 index d5979d7ab..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/same-insecure.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/same-insecure.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/same-insecure.keep-origin-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/same-insecure.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/same-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/same-insecure.no-redirect.http.html deleted file mode 100644 index b6bedeeb0..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/same-insecure.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/same-insecure.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/same-insecure.no-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/same-insecure.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/same-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/same-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 7baab77a0..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/same-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/same-insecure.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/same-insecure.swap-origin-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-http/xhr-request/same-insecure.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index fa61f3528..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 316e28af9..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index f08708b1e..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index c922dd302..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index dbbc06464..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index cd93f802c..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 2ce4f8c4f..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 05cd14306..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 6c0eee6a9..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 55f137e6d..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index c13e87d45..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index ed886aa24..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 2cf0c49c1..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index c06e5fa46..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index f29aae30d..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index d74467b0a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin-when-cross-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/cross-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/cross-insecure.keep-origin-redirect.http.html deleted file mode 100644 index 5d8c30513..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/cross-insecure.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/cross-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/cross-insecure.no-redirect.http.html deleted file mode 100644 index fb54ac71a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/cross-insecure.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/cross-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/cross-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 4e71ba5f1..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/fetch-request/cross-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/cross-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/cross-insecure.keep-origin-redirect.http.html deleted file mode 100644 index feb537fbc..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/cross-insecure.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/cross-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/cross-insecure.no-redirect.http.html deleted file mode 100644 index 6dba08c88..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/cross-insecure.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/cross-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/cross-insecure.swap-origin-redirect.http.html deleted file mode 100644 index d40ed50ff..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/iframe-tag/cross-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/cross-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/cross-insecure.keep-origin-redirect.http.html deleted file mode 100644 index ba6cc74c4..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/cross-insecure.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/cross-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/cross-insecure.no-redirect.http.html deleted file mode 100644 index 285c361d1..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/cross-insecure.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/cross-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/cross-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 299767948..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/cross-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/cross-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/cross-insecure.keep-origin-redirect.http.html deleted file mode 100644 index dff241107..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/cross-insecure.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/cross-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/cross-insecure.no-redirect.http.html deleted file mode 100644 index 6d11862ed..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/cross-insecure.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/cross-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/cross-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 1fc31fe39..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/script-tag/cross-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/cross-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/cross-insecure.keep-origin-redirect.http.html deleted file mode 100644 index 4a8a1f048..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/cross-insecure.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/cross-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/cross-insecure.no-redirect.http.html deleted file mode 100644 index 68b177b6a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/cross-insecure.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/cross-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/cross-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 68a648275..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-http/xhr-request/cross-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 684dcaa14..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index ecfd82d06..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 7071663d6..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 9d7614521..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index f515e1d8a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 9bba4f399..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index b3d45d739..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 0faae4a90..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index cc26b0961..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 94b428184..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index ffb2366aa..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index b67826d77..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 596550e89..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index dc8ee2a8f..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 266d4ff26..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/cross-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/same-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/same-insecure.keep-origin-redirect.http.html deleted file mode 100644 index 0e1f1375d..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/same-insecure.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/same-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/same-insecure.no-redirect.http.html deleted file mode 100644 index c00e3501c..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/same-insecure.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/same-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/same-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 65aa8b72e..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/fetch-request/same-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/same-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/same-insecure.keep-origin-redirect.http.html deleted file mode 100644 index b3079d2dc..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/same-insecure.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/same-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/same-insecure.no-redirect.http.html deleted file mode 100644 index c3ef7af04..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/same-insecure.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/same-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/same-insecure.swap-origin-redirect.http.html deleted file mode 100644 index d21951e89..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/iframe-tag/same-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/same-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/same-insecure.keep-origin-redirect.http.html deleted file mode 100644 index 7077dfa12..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/same-insecure.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/same-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/same-insecure.no-redirect.http.html deleted file mode 100644 index e6b821182..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/same-insecure.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/same-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/same-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 28a143047..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/img-tag/same-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/same-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/same-insecure.keep-origin-redirect.http.html deleted file mode 100644 index 06e0cf6cc..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/same-insecure.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/same-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/same-insecure.no-redirect.http.html deleted file mode 100644 index d9cfc360d..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/same-insecure.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/same-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/same-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 882de7e13..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/script-tag/same-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/same-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/same-insecure.keep-origin-redirect.http.html deleted file mode 100644 index 2c9beb9b2..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/same-insecure.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/same-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/same-insecure.no-redirect.http.html deleted file mode 100644 index 2da9b429e..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/same-insecure.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/same-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/same-insecure.swap-origin-redirect.http.html deleted file mode 100644 index 61b40b556..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-http/xhr-request/same-insecure.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 3dc9ca4ed..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index fa5788b51..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index f226759df..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 263ca22b5..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index e631d7950..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index dd777e20b..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 3666ca93a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 083863b08..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 73e1f65bb..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 9b8cb3a1d..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index ec76e41dd..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 7f76db13d..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index c6dd5590c..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 8ebdfb9f1..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 793aef76e..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin-when-cross-origin/meta-referrer/same-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> - <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> - <meta name="referrer" content="strict-origin-when-cross-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin-when-cross-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 5cec2348d..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html deleted file mode 100644 index 0f5f5353d..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 67f62b51c..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 0185812ea..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html deleted file mode 100644 index b13d43aab..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 733dd399d..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/cross-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index e5171daca..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 518fc5ca9..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 07c8d14f0..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 307ec9454..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 94a45bbf4..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index ff3a4d5f9..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/same-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/same-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 6be360594..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/same-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/same-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/same-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html deleted file mode 100644 index 29a5417f7..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/same-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/same-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/same-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 1d19df2c2..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/same-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/same-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/same-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 29cec56f8..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/same-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/same-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/same-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html deleted file mode 100644 index fc158a9c9..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/same-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/same-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/same-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 0636fed23..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/same-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 3a3d0cb39..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index b1771d766..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index a2b64ec7a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 10d67abeb..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index c5d55deda..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 8b1c993d2..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/attr-referrer/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index b8bfa369c..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/insecure-protocol.no-redirect.http.html deleted file mode 100644 index e7abb5524..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/insecure-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/insecure-protocol.no-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/insecure-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index ee0f6a65e..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/insecure-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/insecure-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/fetch-request/insecure-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 6e0f4dd79..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html deleted file mode 100644 index 6dcc1de0c..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index dd867e250..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index a8a664fab..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html deleted file mode 100644 index 778eace94..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 151cdf90d..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 8356d3b18..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/insecure-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/insecure-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/insecure-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/insecure-protocol.no-redirect.http.html deleted file mode 100644 index be8889a92..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/insecure-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/insecure-protocol.no-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/insecure-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index f579e9627..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/insecure-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/insecure-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/script-tag/insecure-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 6771dfdc2..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/insecure-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/insecure-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/insecure-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/insecure-protocol.no-redirect.http.html deleted file mode 100644 index 82b6165be..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/insecure-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/insecure-protocol.no-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/insecure-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 850b62b05..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/insecure-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/insecure-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-http/xhr-request/insecure-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 8dd238f17..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index d0c92c8c3..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 80aba4f30..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 76edcef00..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 0c9a64d75..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 7261e079b..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index e3d99ada9..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index bf4f76c42..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 3568a5853..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 34678b6e0..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index fd6fa84b8..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 8e2f26110..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index f1ef4905a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 882ec58e8..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 61222c061..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 07324af6d..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/insecure-protocol.no-redirect.http.html deleted file mode 100644 index 74f5a7ccc..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/insecure-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/insecure-protocol.no-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/insecure-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index e0c913583..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/insecure-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/insecure-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/fetch-request/insecure-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 28616e8af..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html deleted file mode 100644 index 4fb70527b..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index dc4f644b7..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 829b2b072..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html deleted file mode 100644 index e2be71dd9..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index b3d3dc54a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 56fdc7923..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/insecure-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/insecure-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/insecure-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/insecure-protocol.no-redirect.http.html deleted file mode 100644 index 62397c248..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/insecure-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/insecure-protocol.no-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/insecure-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 183620ee8..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/insecure-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/insecure-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/script-tag/insecure-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index dce61d41d..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/insecure-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/insecure-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/insecure-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/insecure-protocol.no-redirect.http.html deleted file mode 100644 index c857f4c76..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/insecure-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/insecure-protocol.no-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/insecure-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 1f137283c..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/insecure-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/insecure-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-http/xhr-request/insecure-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 4a82c2944..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 787d3afc7..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 0a1d40c5f..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 999c43e8b..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 6330560d9..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 4681722ab..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 1487f9645..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index ddd876b91..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 6c92b8d51..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index c2fef2eab..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 51b0a8069..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index ab62bdbee..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index bd5bbed36..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index a3d7e8477..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index e264bc35c..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html.headers deleted file mode 100644 index 07af8e286..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: strict-origin -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 96cb24604..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/fetch-request/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/fetch-request/insecure-protocol.no-redirect.http.html deleted file mode 100644 index 97b2f4942..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/fetch-request/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/fetch-request/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/fetch-request/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 41c90bdfd..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/fetch-request/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 005b0fa5e..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html deleted file mode 100644 index bb240bee6..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 0d6b7b272..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 09d9594c2..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html deleted file mode 100644 index c83cd6618..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index d9ed4f6c0..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/script-tag/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/script-tag/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index f060d3b99..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/script-tag/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/script-tag/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/script-tag/insecure-protocol.no-redirect.http.html deleted file mode 100644 index d37724e7c..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/script-tag/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/script-tag/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/script-tag/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 7c9c53f86..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/script-tag/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/xhr-request/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/xhr-request/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 2b04c50a4..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/xhr-request/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/xhr-request/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/xhr-request/insecure-protocol.no-redirect.http.html deleted file mode 100644 index 064da1b69..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/xhr-request/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/xhr-request/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/xhr-request/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 7046e6e14..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-http/xhr-request/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 25557dfb8..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index f3ce31c69..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index fdbf7a78b..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index cf16f8ade..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index ffda52304..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index e013b680f..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 1a1b24044..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 5bfd8faa1..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index d64873822..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 25f01ca1b..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index c51a797d3..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 3562c938a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 50994e295..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index da91cfdd2..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index bb496aa3f..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/cross-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 0179180e5..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/fetch-request/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/fetch-request/insecure-protocol.no-redirect.http.html deleted file mode 100644 index 3b9d5beb6..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/fetch-request/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/fetch-request/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/fetch-request/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 01c5646b1..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/fetch-request/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index fccec81bb..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html deleted file mode 100644 index 5840859b4..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 4e93fafee..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 9a9490e66..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html deleted file mode 100644 index 9e1bd3a1c..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 46a7a33c3..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/script-tag/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/script-tag/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 6186d57f3..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/script-tag/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/script-tag/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/script-tag/insecure-protocol.no-redirect.http.html deleted file mode 100644 index 08a6df4fd..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/script-tag/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/script-tag/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/script-tag/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 8bf116b87..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/script-tag/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/xhr-request/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/xhr-request/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 3fe96e71d..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/xhr-request/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/xhr-request/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/xhr-request/insecure-protocol.no-redirect.http.html deleted file mode 100644 index bdfce453e..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/xhr-request/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/xhr-request/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/xhr-request/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 6e29cc16a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-http/xhr-request/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index dfc4b9792..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index dfbc93f20..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 4f581e783..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 610799d5e..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index db36bbc70..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 8f4eabfa2..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index e5acfb1b0..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index f2a6afb83..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 40dc6bfa4..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 2bac0fc5a..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 023680ab7..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index fbd9be455..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 1b2a3b3ce..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 0c002eff6..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 3aecaf52f..000000000 --- a/testing/web-platform/tests/referrer-policy/strict-origin/meta-referrer/same-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> - <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> - <meta name="referrer" content="strict-origin"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> - <meta name="assert" content="The referrer URL is origin when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "strict-origin", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "origin" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 1d4be3c77..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html deleted file mode 100644 index 715150770..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 814b6d9ba..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 3bb871203..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/generic.no-redirect.http.html deleted file mode 100644 index 8a8a459f9..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 04ae66bd2..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 4947e50aa..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html deleted file mode 100644 index 39deeac30..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 334ebae52..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index ca1f0a68f..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/generic.no-redirect.http.html deleted file mode 100644 index f813f24a6..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index d3272c435..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 22800cf4b..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/iframe-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/iframe-tag/generic.no-redirect.http.html deleted file mode 100644 index ceaa0164e..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/iframe-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 5117c0f4d..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index d891987d3..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/generic.no-redirect.http.html deleted file mode 100644 index 246089208..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 10fc2a00f..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 9d504a970..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/iframe-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/iframe-tag/generic.no-redirect.http.html deleted file mode 100644 index 5fc928a3c..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/iframe-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 01d2abbb8..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 2b520ff43..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/generic.no-redirect.http.html deleted file mode 100644 index 7a2fb09fc..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 7612d5ef6..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/attr-referrer/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html deleted file mode 100644 index 53ab93a35..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/generic.no-redirect.http.html deleted file mode 100644 index ae0a512ba..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/generic.no-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html deleted file mode 100644 index 1360c04c3..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index e608f52cb..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html deleted file mode 100644 index e8b105995..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 0755eaf96..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 6c873e8f0..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/generic.no-redirect.http.html deleted file mode 100644 index e9d9d2469..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/generic.no-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 78b871570..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index a38b20f17..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/generic.no-redirect.http.html deleted file mode 100644 index a7fd03c43..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/generic.no-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 06b2b252f..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/script-tag/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html deleted file mode 100644 index 49c3ec58e..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/generic.no-redirect.http.html deleted file mode 100644 index 163b8c8a0..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/generic.no-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html deleted file mode 100644 index c28550135..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html deleted file mode 100644 index 608035538..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/generic.no-redirect.http.html deleted file mode 100644 index 046b25859..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/generic.no-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html deleted file mode 100644 index 59bf756b8..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index eee0a3f8b..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html deleted file mode 100644 index 57f1a9d04..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index fdb7033c4..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 7168479ac..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/generic.no-redirect.http.html deleted file mode 100644 index 5689889eb..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/generic.no-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 678d95524..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 73cabcfd9..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/generic.no-redirect.http.html deleted file mode 100644 index fccf29967..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/generic.no-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 174c0feac..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/script-tag/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html deleted file mode 100644 index 832ceb02e..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/generic.no-redirect.http.html deleted file mode 100644 index 4ce779935..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/generic.no-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html deleted file mode 100644 index 664cb7e3d..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/cross-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html deleted file mode 100644 index 2ce45af4c..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/generic.no-redirect.http.html deleted file mode 100644 index 038a0b2dd..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/generic.no-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html deleted file mode 100644 index 78b340afe..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 12446ba14..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/generic.no-redirect.http.html deleted file mode 100644 index 70a115d87..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/generic.no-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 7a083ea6c..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 12871fac6..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/generic.no-redirect.http.html deleted file mode 100644 index abd803c44..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/generic.no-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 02e9b92a2..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 435281a74..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/generic.no-redirect.http.html deleted file mode 100644 index dbdf2d6fb..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/generic.no-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index e1643fd37..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/script-tag/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html deleted file mode 100644 index 89acf024f..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/generic.no-redirect.http.html deleted file mode 100644 index 9f4319130..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/generic.no-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html deleted file mode 100644 index 5e492ca91..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html deleted file mode 100644 index 54a2fc322..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/generic.no-redirect.http.html deleted file mode 100644 index e6775088a..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/generic.no-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html deleted file mode 100644 index c2bccdf77..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 79cd63640..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/generic.no-redirect.http.html deleted file mode 100644 index 4fc687f97..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/generic.no-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 3a24da90c..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 95154a991..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/generic.no-redirect.http.html deleted file mode 100644 index 501e8ed24..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/generic.no-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index a49c2a05c..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 77d22e913..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/generic.no-redirect.http.html deleted file mode 100644 index 6ab0525a9..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/generic.no-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 22057804a..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/script-tag/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html deleted file mode 100644 index 980c4a9aa..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/generic.no-redirect.http.html deleted file mode 100644 index 42c0c4b6f..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/generic.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/generic.no-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/generic.no-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html deleted file mode 100644 index efb989ee3..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <!-- No meta: Referrer policy delivered via HTTP headers. --> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html.headers deleted file mode 100644 index c67e52158..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/http-rp/same-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html.headers +++ /dev/null @@ -1,2 +0,0 @@ -Referrer-Policy: unsafe-url -Access-Control-Allow-Origin: * diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html deleted file mode 100644 index 15120a2dc..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/fetch-request/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/fetch-request/generic.no-redirect.http.html deleted file mode 100644 index dea4a85cf..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/fetch-request/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html deleted file mode 100644 index c46cbb6a1..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index e89ee7f89..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html deleted file mode 100644 index 875901b25..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/iframe-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 82858ef62..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 775bf93fa..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/img-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/img-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/img-tag/generic.no-redirect.http.html deleted file mode 100644 index 41560ae8c..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/img-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 03073d50e..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/img-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/script-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/script-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 5a1e1ccc6..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/script-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/script-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/script-tag/generic.no-redirect.http.html deleted file mode 100644 index 5dab67170..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/script-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/script-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/script-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 50447b968..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/script-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html deleted file mode 100644 index e4d2e2c77..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/xhr-request/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/xhr-request/generic.no-redirect.http.html deleted file mode 100644 index 374f5c0ea..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/xhr-request/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html deleted file mode 100644 index f02d54bd7..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html deleted file mode 100644 index 71778ee0c..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/fetch-request/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/fetch-request/generic.no-redirect.http.html deleted file mode 100644 index 6f34ef157..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/fetch-request/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html deleted file mode 100644 index ebd930f69..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 18e6eb2b4..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html deleted file mode 100644 index fc44e3e25..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/iframe-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 5c8822601..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index ebf71f175..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/img-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/img-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/img-tag/generic.no-redirect.http.html deleted file mode 100644 index bf6262f26..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/img-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index f591cbef0..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/img-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/script-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/script-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index ba2d54d62..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/script-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/script-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/script-tag/generic.no-redirect.http.html deleted file mode 100644 index e8b0aa9e8..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/script-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/script-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/script-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index a34ce0378..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/script-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html deleted file mode 100644 index 6482686b5..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/xhr-request/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/xhr-request/generic.no-redirect.http.html deleted file mode 100644 index 2610bb065..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/xhr-request/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html deleted file mode 100644 index 740895b80..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/cross-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html deleted file mode 100644 index 681dab44c..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/fetch-request/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/fetch-request/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/fetch-request/generic.no-redirect.http.html deleted file mode 100644 index d72aeb785..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/fetch-request/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html deleted file mode 100644 index 77c3c68a7..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/fetch-request/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index e5592cd08..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/iframe-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/iframe-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/iframe-tag/generic.no-redirect.http.html deleted file mode 100644 index a87451fbd..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/iframe-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 631e1477c..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/iframe-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 0cbf66fed..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/img-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/img-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/img-tag/generic.no-redirect.http.html deleted file mode 100644 index 43dc43d04..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/img-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 7fe2baacf..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/img-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/script-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/script-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index e1db3d1e5..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/script-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/script-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/script-tag/generic.no-redirect.http.html deleted file mode 100644 index 404392c8e..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/script-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/script-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/script-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 18cd15910..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/script-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html deleted file mode 100644 index 34c729544..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/xhr-request/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/xhr-request/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/xhr-request/generic.no-redirect.http.html deleted file mode 100644 index 6386f26a9..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/xhr-request/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html deleted file mode 100644 index e9ffeeba0..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-http/xhr-request/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html deleted file mode 100644 index d3cc95adf..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/fetch-request/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/fetch-request/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/fetch-request/generic.no-redirect.http.html deleted file mode 100644 index dbd4183bd..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/fetch-request/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html deleted file mode 100644 index 6e07cfb09..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/fetch-request/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 8c54512a9..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/iframe-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/iframe-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/iframe-tag/generic.no-redirect.http.html deleted file mode 100644 index 07e669ccf..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/iframe-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index ec2e9c647..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/iframe-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index da52ddcc8..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/img-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/img-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/img-tag/generic.no-redirect.http.html deleted file mode 100644 index 38e401993..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/img-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 3ae164bf1..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/img-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/script-tag/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/script-tag/generic.keep-origin-redirect.http.html deleted file mode 100644 index 759728b00..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/script-tag/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/script-tag/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/script-tag/generic.no-redirect.http.html deleted file mode 100644 index 7b73c8ded..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/script-tag/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/script-tag/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/script-tag/generic.swap-origin-redirect.http.html deleted file mode 100644 index 379763fc3..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/script-tag/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html deleted file mode 100644 index 90417e90e..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/xhr-request/generic.keep-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/xhr-request/generic.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/xhr-request/generic.no-redirect.http.html deleted file mode 100644 index a4e1bee0d..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/xhr-request/generic.no-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html deleted file mode 100644 index 4780d0d49..000000000 --- a/testing/web-platform/tests/referrer-policy/unsafe-url/meta-referrer/same-origin/http-https/xhr-request/generic.swap-origin-redirect.http.html +++ /dev/null @@ -1,41 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> - <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> - <meta name="referrer" content="unsafe-url"> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": "unsafe-url", - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index bcd0a811b..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html deleted file mode 100644 index 55346939f..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index e377fc377..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 2b2c1b287..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html deleted file mode 100644 index e4d5cd7dc..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 2361a04f5..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 8d6e5f548..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 5fd5bf661..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index fb46a40ab..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 5d37c9fa6..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index efd914320..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 619865941..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 7c8e98fa3..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html deleted file mode 100644 index e67e90c80..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 18667759e..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index b47279c1c..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html deleted file mode 100644 index 997bbf49e..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 9472829ba..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index cb9ff640e..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 8f9818814..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 8c134e9c3..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 7eb825062..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "attr-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 35e905c39..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "attr-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 871679a6e..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/attr-referrer/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the attr-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "attr-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 0665510a6..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/fetch-request/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/fetch-request/insecure-protocol.no-redirect.http.html deleted file mode 100644 index a93c94af5..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/fetch-request/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/fetch-request/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/fetch-request/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 6665a2f35..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/fetch-request/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index b380ce0c9..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html deleted file mode 100644 index 1894667f0..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 033feffcc..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 1f6b62841..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html deleted file mode 100644 index 88a3e42a5..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 69d835c3d..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/script-tag/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/script-tag/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index ffa234c29..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/script-tag/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/script-tag/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/script-tag/insecure-protocol.no-redirect.http.html deleted file mode 100644 index f92abf01b..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/script-tag/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/script-tag/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/script-tag/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 953805774..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/script-tag/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/xhr-request/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/xhr-request/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index b6191fed6..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/xhr-request/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/xhr-request/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/xhr-request/insecure-protocol.no-redirect.http.html deleted file mode 100644 index 635ec9d82..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/xhr-request/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/xhr-request/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/xhr-request/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 00848d660..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-http/xhr-request/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 00cacb906..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 68b8f69e5..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 9390b64fd..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 1c12c9ca2..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index a76c98066..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index dd1c82dc6..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 307c76211..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 30530e663..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index d6e1c283c..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 19666416a..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index f05d225d8..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index efa96f50f..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index ecc377c68..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index c5b47ed3b..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index f8b744f61..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/cross-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 36757f5dc..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/fetch-request/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/fetch-request/insecure-protocol.no-redirect.http.html deleted file mode 100644 index c75ea8d74..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/fetch-request/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/fetch-request/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/fetch-request/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index e765d8200..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/fetch-request/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via fetch-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 5d2c1268c..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html deleted file mode 100644 index 07850f1d2..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index bea31157f..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index b1e6128a3..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html deleted file mode 100644 index 187644769..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 621aaf86a..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/script-tag/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/script-tag/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 2c16b549a..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/script-tag/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/script-tag/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/script-tag/insecure-protocol.no-redirect.http.html deleted file mode 100644 index 2c66e693d..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/script-tag/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/script-tag/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/script-tag/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index e6c6432c0..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/script-tag/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via script-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/xhr-request/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/xhr-request/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index ec52992fd..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/xhr-request/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/xhr-request/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/xhr-request/insecure-protocol.no-redirect.http.html deleted file mode 100644 index c0aef90b3..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/xhr-request/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/xhr-request/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/xhr-request/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 76e883fce..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-http/xhr-request/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via xhr-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index d719b5135..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 21b899d88..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index e83e55ecc..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via fetch-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index fdf3cf38c..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index ff768ca62..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index b36050b5e..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 943ec5cf3..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 44cf0ddec..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 9df29013d..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 5b392fb53..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 7d6be6e4d..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 29c554a2f..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via script-tag using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 2f60784c0..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 179877264..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index de46596f9..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/http-rp/same-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via xhr-request using the http-rp - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "http-rp", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 4ee0c81a5..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/fetch-request/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/fetch-request/insecure-protocol.no-redirect.http.html deleted file mode 100644 index 1db8f0d99..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/fetch-request/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/fetch-request/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/fetch-request/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 5b1533620..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/fetch-request/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 30dee3506..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html deleted file mode 100644 index 31b50bde1..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index cea04e81a..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 0e6469412..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html deleted file mode 100644 index f99e0f0ae..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 1bbcfbb06..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/script-tag/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/script-tag/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index a35c885ec..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/script-tag/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/script-tag/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/script-tag/insecure-protocol.no-redirect.http.html deleted file mode 100644 index 7e46eee5e..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/script-tag/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/script-tag/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/script-tag/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 3457d393c..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/script-tag/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/xhr-request/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/xhr-request/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 690b427f4..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/xhr-request/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/xhr-request/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/xhr-request/insecure-protocol.no-redirect.http.html deleted file mode 100644 index 7c1838c51..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/xhr-request/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/xhr-request/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/xhr-request/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index b891494cb..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-http/xhr-request/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 58c6f098c..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 31da00276..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index b4448f4da..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index a9c58e69f..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 71e9f32ec..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index da7331ae1..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 8fea31f3c..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 476ddd04e..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index a583699ff..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 6f6084587..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 88f9b2ff1..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index c36005af7..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 1b6773352..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 0003f46e3..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with no-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 89749f241..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/cross-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is cross-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "cross-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 36911507e..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/fetch-request/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/fetch-request/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/fetch-request/insecure-protocol.no-redirect.http.html deleted file mode 100644 index e8487bca9..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/fetch-request/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/fetch-request/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/fetch-request/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index f3a2ea727..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/fetch-request/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via fetch-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 4f0899351..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/iframe-tag/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html deleted file mode 100644 index 7cae21045..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/iframe-tag/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 59699ea0c..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/iframe-tag/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via iframe-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index a0e4f7aae..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/img-tag/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html deleted file mode 100644 index 39bc55b03..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/img-tag/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 842e32d57..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/img-tag/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via img-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/script-tag/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/script-tag/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 39410f46c..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/script-tag/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/script-tag/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/script-tag/insecure-protocol.no-redirect.http.html deleted file mode 100644 index 74c79e9fd..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/script-tag/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/script-tag/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/script-tag/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 5a66ee358..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/script-tag/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via script-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/xhr-request/insecure-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/xhr-request/insecure-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 85ecb5e65..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/xhr-request/insecure-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/xhr-request/insecure-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/xhr-request/insecure-protocol.no-redirect.http.html deleted file mode 100644 index c4207cf8b..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/xhr-request/insecure-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/xhr-request/insecure-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/xhr-request/insecure-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 359326b1a..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-http/xhr-request/insecure-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an http - sub-resource via xhr-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "http", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 8378e3f1b..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/fetch-request/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 735dc7639..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/fetch-request/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index ba6d9abb3..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/fetch-request/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via fetch-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "fetch-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 0d8231cfa..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 82296dc38..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 7a7c19a6d..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/iframe-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via iframe-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "iframe-tag", - "subresource_path": "/referrer-policy/generic/subresource/document.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 241ae8b80..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 57e56be55..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 98738a646..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via img-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "img-tag", - "subresource_path": "/referrer-policy/generic/subresource/image.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 3e504c049..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/script-tag/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index f48e258f0..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/script-tag/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 59e01959a..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/script-tag/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via script-tag using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "script-tag", - "subresource_path": "/referrer-policy/generic/subresource/script.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html deleted file mode 100644 index 32e8231f0..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/xhr-request/upgrade-protocol.keep-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with keep-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "keep-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html deleted file mode 100644 index 2d391dbbd..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/xhr-request/upgrade-protocol.no-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with no-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "no-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> diff --git a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html deleted file mode 100644 index 0bd9d4a42..000000000 --- a/testing/web-platform/tests/referrer-policy/unset-referrer-policy/meta-referrer/same-origin/http-https/xhr-request/upgrade-protocol.swap-origin-redirect.http.html +++ /dev/null @@ -1,40 +0,0 @@ -<!DOCTYPE html> -<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. --> -<html> - <head> - <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> - <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> - <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> - <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> - <meta name="assert" content="The referrer URL is stripped-referrer when a - document served over http requires an https - sub-resource via xhr-request using the meta-referrer - delivery method with swap-origin-redirect and when - the target request is same-origin."> - <script src="/resources/testharness.js"></script> - <script src="/resources/testharnessreport.js"></script> - <!-- TODO(kristijanburnik): Minify and merge both: --> - <script src="/referrer-policy/generic/common.js"></script> - <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script> - </head> - <body> - <script> - ReferrerPolicyTestCase( - { - "referrer_policy": null, - "delivery_method": "meta-referrer", - "redirection": "swap-origin-redirect", - "origin": "same-origin", - "source_protocol": "http", - "target_protocol": "https", - "subresource": "xhr-request", - "subresource_path": "/referrer-policy/generic/subresource/xhr.py", - "referrer_url": "stripped-referrer" - }, - document.querySelector("meta[name=assert]").content, - new SanityChecker() - ).start(); - </script> - <div id="log"></div> - </body> -</html> |