From 36d22d82aa202bb199967e9512281e9a53db42c9 Mon Sep 17 00:00:00 2001 From: Daniel Baumann Date: Sun, 7 Apr 2024 21:33:14 +0200 Subject: Adding upstream version 115.7.0esr. Signed-off-by: Daniel Baumann --- .../embedded-enforcement/__dir__.ini | 2 + .../allow_csp_from-header.html.ini | 16 ++++++ .../embedded-enforcement/idlharness.window.js.ini | 7 +++ .../iframe-csp-attribute.html.ini | 13 +++++ .../required-csp-header-cascade.html.ini | 28 +++++++++ .../required_csp-header.html.ini | 67 ++++++++++++++++++++++ .../subsumption_algorithm-general.html.ini | 6 ++ .../subsumption_algorithm-hashes.html.ini | 18 ++++++ ...bsumption_algorithm-host_sources-hosts.html.ini | 13 +++++ ...bsumption_algorithm-host_sources-paths.html.ini | 10 ++++ ...bsumption_algorithm-host_sources-ports.html.ini | 15 +++++ ...ption_algorithm-host_sources-protocols.html.ini | 13 +++++ .../subsumption_algorithm-none.html.ini | 26 +++++++++ .../subsumption_algorithm-self.html.ini | 7 +++ .../subsumption_algorithm-strict_dynamic.html.ini | 4 ++ .../subsumption_algorithm-unsafe_eval.html.ini | 15 +++++ .../subsumption_algorithm-unsafe_hashes.html.ini | 13 +++++ .../subsumption_algorithm-unsafe_inline.html.ini | 16 ++++++ 18 files changed, 289 insertions(+) create mode 100644 testing/web-platform/meta/content-security-policy/embedded-enforcement/__dir__.ini create mode 100644 testing/web-platform/meta/content-security-policy/embedded-enforcement/allow_csp_from-header.html.ini create mode 100644 testing/web-platform/meta/content-security-policy/embedded-enforcement/idlharness.window.js.ini create mode 100644 testing/web-platform/meta/content-security-policy/embedded-enforcement/iframe-csp-attribute.html.ini create mode 100644 testing/web-platform/meta/content-security-policy/embedded-enforcement/required-csp-header-cascade.html.ini create mode 100644 testing/web-platform/meta/content-security-policy/embedded-enforcement/required_csp-header.html.ini create mode 100644 testing/web-platform/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-general.html.ini create mode 100644 testing/web-platform/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-hashes.html.ini create mode 100644 testing/web-platform/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-host_sources-hosts.html.ini create mode 100644 testing/web-platform/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-host_sources-paths.html.ini create mode 100644 testing/web-platform/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-host_sources-ports.html.ini create mode 100644 testing/web-platform/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-host_sources-protocols.html.ini create mode 100644 testing/web-platform/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-none.html.ini create mode 100644 testing/web-platform/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-self.html.ini create mode 100644 testing/web-platform/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-strict_dynamic.html.ini create mode 100644 testing/web-platform/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-unsafe_eval.html.ini create mode 100644 testing/web-platform/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-unsafe_hashes.html.ini create mode 100644 testing/web-platform/meta/content-security-policy/embedded-enforcement/subsumption_algorithm-unsafe_inline.html.ini (limited to 'testing/web-platform/meta/content-security-policy/embedded-enforcement') diff --git a/testing/web-platform/meta/content-security-policy/embedded-enforcement/__dir__.ini b/testing/web-platform/meta/content-security-policy/embedded-enforcement/__dir__.ini new file mode 100644 index 0000000000..7a5cbf999c --- /dev/null +++ b/testing/web-platform/meta/content-security-policy/embedded-enforcement/__dir__.ini @@ -0,0 +1,2 @@ +implementation-status: not-implementing +bug: https://bugzilla.mozilla.org/show_bug.cgi?id=1553130 \ No newline at end of file diff --git a/testing/web-platform/meta/content-security-policy/embedded-enforcement/allow_csp_from-header.html.ini b/testing/web-platform/meta/content-security-policy/embedded-enforcement/allow_csp_from-header.html.ini new file mode 100644 index 0000000000..21cab9e30f --- /dev/null +++ b/testing/web-platform/meta/content-security-policy/embedded-enforcement/allow_csp_from-header.html.ini @@ -0,0 +1,16 @@ +[allow_csp_from-header.html] + [Cross origin iframe with an empty Allow-CSP-From header gets blocked.] + expected: FAIL + + [Cross origin iframe without Allow-CSP-From header gets blocked.] + expected: FAIL + + [Iframe with improper Allow-CSP-From header gets blocked.] + expected: FAIL + + [Star Allow-CSP-From header enforces EmbeddingCSP.] + expected: FAIL + + [Allow-CSP-From header enforces EmbeddingCSP.] + expected: FAIL + diff --git a/testing/web-platform/meta/content-security-policy/embedded-enforcement/idlharness.window.js.ini b/testing/web-platform/meta/content-security-policy/embedded-enforcement/idlharness.window.js.ini new file mode 100644 index 0000000000..f4848f7461 --- /dev/null +++ b/testing/web-platform/meta/content-security-policy/embedded-enforcement/idlharness.window.js.ini @@ -0,0 +1,7 @@ +[idlharness.window.html] + [HTMLIFrameElement interface: attribute csp] + expected: FAIL + + [HTMLIFrameElement interface: document.createElement("iframe") must inherit property "csp" with the proper type] + expected: FAIL + diff --git a/testing/web-platform/meta/content-security-policy/embedded-enforcement/iframe-csp-attribute.html.ini b/testing/web-platform/meta/content-security-policy/embedded-enforcement/iframe-csp-attribute.html.ini new file mode 100644 index 0000000000..6977d4fe21 --- /dev/null +++ b/testing/web-platform/meta/content-security-policy/embedded-enforcement/iframe-csp-attribute.html.ini @@ -0,0 +1,13 @@ +[iframe-csp-attribute.html] + [