From 26a029d407be480d791972afb5975cf62c9360a6 Mon Sep 17 00:00:00 2001 From: Daniel Baumann Date: Fri, 19 Apr 2024 02:47:55 +0200 Subject: Adding upstream version 124.0.1. Signed-off-by: Daniel Baumann --- .../web-platform/meta/sanitizer-api/__dir__.ini | 1 + .../element-set-sanitized-html.https.html.ini | 3 + .../sanitizer-api/sanitizer-config.https.html.ini | 3 + .../sanitizer-insecure-context.html.ini | 4 + .../sanitizer-api/sanitizer-names.https.html.ini | 38 +++ .../sanitizer-query-config.https.html.ini | 11 + .../sanitizer-sanitize.https.tentative.html.ini | 15 ++ .../sanitizer-sanitizeFor.https.tentative.html.ini | 284 +++++++++++++++++++++ .../sanitizer-secure-context.https.html.ini | 3 + .../sanitizer-api/sanitizer-unknown.https.html.ini | 3 + 10 files changed, 365 insertions(+) create mode 100644 testing/web-platform/meta/sanitizer-api/__dir__.ini create mode 100644 testing/web-platform/meta/sanitizer-api/element-set-sanitized-html.https.html.ini create mode 100644 testing/web-platform/meta/sanitizer-api/sanitizer-config.https.html.ini create mode 100644 testing/web-platform/meta/sanitizer-api/sanitizer-insecure-context.html.ini create mode 100644 testing/web-platform/meta/sanitizer-api/sanitizer-names.https.html.ini create mode 100644 testing/web-platform/meta/sanitizer-api/sanitizer-query-config.https.html.ini create mode 100644 testing/web-platform/meta/sanitizer-api/sanitizer-sanitize.https.tentative.html.ini create mode 100644 testing/web-platform/meta/sanitizer-api/sanitizer-sanitizeFor.https.tentative.html.ini create mode 100644 testing/web-platform/meta/sanitizer-api/sanitizer-secure-context.https.html.ini create mode 100644 testing/web-platform/meta/sanitizer-api/sanitizer-unknown.https.html.ini (limited to 'testing/web-platform/meta/sanitizer-api') diff --git a/testing/web-platform/meta/sanitizer-api/__dir__.ini b/testing/web-platform/meta/sanitizer-api/__dir__.ini new file mode 100644 index 0000000000..fb4d1e09bf --- /dev/null +++ b/testing/web-platform/meta/sanitizer-api/__dir__.ini @@ -0,0 +1 @@ +prefs: [dom.security.sanitizer.enabled:true, dom.security.setHTML.enabled:true] diff --git a/testing/web-platform/meta/sanitizer-api/element-set-sanitized-html.https.html.ini b/testing/web-platform/meta/sanitizer-api/element-set-sanitized-html.https.html.ini new file mode 100644 index 0000000000..2f3bcfc1c8 --- /dev/null +++ b/testing/web-platform/meta/sanitizer-api/element-set-sanitized-html.https.html.ini @@ -0,0 +1,3 @@ +[element-set-sanitized-html.https.html] + [Sanitizer: Element.setHTML with config: attributes: unknown attributes and with unknownMarkup] + expected: FAIL diff --git a/testing/web-platform/meta/sanitizer-api/sanitizer-config.https.html.ini b/testing/web-platform/meta/sanitizer-api/sanitizer-config.https.html.ini new file mode 100644 index 0000000000..1ebd6b2251 --- /dev/null +++ b/testing/web-platform/meta/sanitizer-api/sanitizer-config.https.html.ini @@ -0,0 +1,3 @@ +[sanitizer-config.https.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] diff --git a/testing/web-platform/meta/sanitizer-api/sanitizer-insecure-context.html.ini b/testing/web-platform/meta/sanitizer-api/sanitizer-insecure-context.html.ini new file mode 100644 index 0000000000..fb3a525b1e --- /dev/null +++ b/testing/web-platform/meta/sanitizer-api/sanitizer-insecure-context.html.ini @@ -0,0 +1,4 @@ +[sanitizer-insecure-context.html] + expected: + if (os == "android") and debug and not fission: [OK, TIMEOUT] + if (os == "android") and debug and fission: [TIMEOUT, OK] diff --git a/testing/web-platform/meta/sanitizer-api/sanitizer-names.https.html.ini b/testing/web-platform/meta/sanitizer-api/sanitizer-names.https.html.ini new file mode 100644 index 0000000000..d8f4a8db48 --- /dev/null +++ b/testing/web-platform/meta/sanitizer-api/sanitizer-names.https.html.ini @@ -0,0 +1,38 @@ +[sanitizer-names.https.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [Element names in config item: elements] + expected: FAIL + + [Element names in config item: removeElements] + expected: FAIL + + [Element names in config item: replaceWithChildrenElements] + expected: FAIL + + [Attribute names in config item: attributes] + expected: FAIL + + [Attribute names in config item: removeAttributes] + expected: FAIL + + [Namespaced attributes #2: attributes: [{"name":"xlink:href"}\]] + expected: FAIL + + [Lower-case element names #0: "svg:feblend"] + expected: FAIL + + [Mixed case element names #0: "feBlend" is preserved in config.] + expected: FAIL + + [Lower-case element names #1: "svg:fecolormatrix"] + expected: FAIL + + [Mixed case element names #1: "feColorMatrix" is preserved in config.] + expected: FAIL + + [Lower-case element names #2: "svg:textpath"] + expected: FAIL + + [Mixed case element names #2: "textPath" is preserved in config.] + expected: FAIL diff --git a/testing/web-platform/meta/sanitizer-api/sanitizer-query-config.https.html.ini b/testing/web-platform/meta/sanitizer-api/sanitizer-query-config.https.html.ini new file mode 100644 index 0000000000..f0670dff94 --- /dev/null +++ b/testing/web-platform/meta/sanitizer-api/sanitizer-query-config.https.html.ini @@ -0,0 +1,11 @@ +[sanitizer-query-config.https.html] + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [SanitizerAPI getDefaultConfiguration()] + expected: FAIL + + [SanitizerAPI getConfiguration() on default created Sanitizer] + expected: FAIL + + [SanitizerAPI getConfiguration() reflects creation config.] + expected: FAIL diff --git a/testing/web-platform/meta/sanitizer-api/sanitizer-sanitize.https.tentative.html.ini b/testing/web-platform/meta/sanitizer-api/sanitizer-sanitize.https.tentative.html.ini new file mode 100644 index 0000000000..d1cb7c2715 --- /dev/null +++ b/testing/web-platform/meta/sanitizer-api/sanitizer-sanitize.https.tentative.html.ini @@ -0,0 +1,15 @@ +[sanitizer-sanitize.https.tentative.html] + max-asserts: 120 + expected: + if (os == "android") and fission: [OK, TIMEOUT] + [SanitizerAPI with config: plaintext, sanitize from document function for ] + expected: FAIL + + [SanitizerAPI with config: attributes: unknown attributes and with unknownMarkup, sanitize from document function for ] + expected: FAIL + + [SanitizerAPI with config: plaintext, sanitize from document fragment function for