summaryrefslogtreecommitdiffstats
path: root/testing/web-platform/tests/referrer-policy/generic/multiple-headers-one-invalid.html
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-07 19:33:14 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-07 19:33:14 +0000
commit36d22d82aa202bb199967e9512281e9a53db42c9 (patch)
tree105e8c98ddea1c1e4784a60a5a6410fa416be2de /testing/web-platform/tests/referrer-policy/generic/multiple-headers-one-invalid.html
parentInitial commit. (diff)
downloadfirefox-esr-36d22d82aa202bb199967e9512281e9a53db42c9.tar.xz
firefox-esr-36d22d82aa202bb199967e9512281e9a53db42c9.zip
Adding upstream version 115.7.0esr.upstream/115.7.0esr
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'testing/web-platform/tests/referrer-policy/generic/multiple-headers-one-invalid.html')
-rw-r--r--testing/web-platform/tests/referrer-policy/generic/multiple-headers-one-invalid.html34
1 files changed, 34 insertions, 0 deletions
diff --git a/testing/web-platform/tests/referrer-policy/generic/multiple-headers-one-invalid.html b/testing/web-platform/tests/referrer-policy/generic/multiple-headers-one-invalid.html
new file mode 100644
index 0000000000..eca734601a
--- /dev/null
+++ b/testing/web-platform/tests/referrer-policy/generic/multiple-headers-one-invalid.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<html>
+ <head>
+ <title>Referrer Policy: multiple Referrer-Policy headers with one invalid</title>
+ <script src="/resources/testharness.js"></script>
+ <script src="/resources/testharnessreport.js"></script>
+
+ <script src="/common/security-features/resources/common.sub.js"></script>
+ </head>
+ <body>
+ <h1>Referrer Policy: multiple Referrer-Policy headers with one invalid</h1>
+ <p></p>
+
+ <pre id="received_message">Running...</pre>
+
+ <script>
+ promise_test(() => {
+ var urlPath = '/common/security-features/subresource/image.py?cache_destroyer=' + (new Date()).getTime();
+ // The default referrer policy is strict-origin-when-cross-origin.
+ // This document's headers contain the 'origin' and 'no-referrer' tokens,
+ // and we're making a same-origin image load, so, if the image request,
+ // uses the default policy (which is what this test's verifying), we
+ // should see the full initiating URL in the referrer, rather than just
+ // the origin or an empty string.
+ return requestViaImage(urlPath, null, 'no-referrer')
+ .then(function(message) {
+ assert_equals(message.referrer, document.location.href);
+ });
+ }, "Referrer policy header parsing fails if one header is invalid");
+ </script>
+
+ <div id="log"></div>
+ </body>
+</html>