content-security-policy: All Results

Test files: 384; Total subtests: 894

Test Files

  1. /content-security-policy/navigation/to-javascript-url-frame-src.html
  2. /content-security-policy/connect-src/worker-connect-src-blocked.sub.html
  3. /content-security-policy/navigate-to/form-action/form-action-blocks-navigate-to-allows.sub.html
  4. /content-security-policy/style-src/style-src-injected-inline-style-blocked.html
  5. /content-security-policy/script-src/eval-allowed-in-report-only-mode.html
  6. /content-security-policy/svg/svg-policy-resource-doc-includes.html
  7. /content-security-policy/style-src/injected-inline-style-blocked.sub.html
  8. /content-security-policy/navigate-to/parent-navigates-child-allowed.html
  9. /content-security-policy/blob/blob-urls-do-not-match-self.sub.html
  10. /content-security-policy/securitypolicyviolation/constructor-required-fields.html
  11. /content-security-policy/worker-src/service-fallback.https.sub.html
  12. /content-security-policy/frame-ancestors/frame-ancestors-url-block.html
  13. /content-security-policy/inheritance/iframe-srcdoc-inheritance.html
  14. /content-security-policy/unsafe-hashes/style_attribute_denied_wrong_hash.html
  15. /content-security-policy/securitypolicyviolation/securitypolicyviolation-block-image.sub.html
  16. /content-security-policy/plugin-types/plugintypes-mismatched-data.html
  17. /content-security-policy/meta/meta-img-src.html
  18. /content-security-policy/form-action/form-action-src-redirect-blocked.sub.html
  19. /content-security-policy/securitypolicyviolation/idlharness.window.html
  20. /content-security-policy/frame-ancestors/frame-ancestors-nested-cross-in-same-self-block.html
  21. /content-security-policy/meta/combine-header-and-meta-policies.sub.html
  22. /content-security-policy/style-src/inline-style-attribute-blocked.sub.html
  23. /content-security-policy/media-src/media-src-7_1.html
  24. /content-security-policy/frame-src/frame-src-blocked.sub.html
  25. /content-security-policy/form-action/form-action-src-default-ignored.sub.html
  26. /content-security-policy/plugin-types/plugintypes-nourl-blocked.html
  27. /content-security-policy/plugin-types/plugintypes-nourl-allowed.html
  28. /content-security-policy/style-src/stylehash-default-src.sub.html
  29. /content-security-policy/embedded-enforcement/required_csp-header.html
  30. /content-security-policy/frame-ancestors/frame-ancestors-nested-same-in-same-star-allow.html
  31. /content-security-policy/style-src/style-src-inline-style-nonce-blocked-error-event.html
  32. /content-security-policy/style-src/stylehash-basic-blocked.sub.html
  33. /content-security-policy/inheritance/blob-url-in-main-window-self-navigate-inherits.sub.html
  34. /content-security-policy/script-src/script-src-overrides-default-src.sub.html
  35. /content-security-policy/media-src/media-src-7_2.html
  36. /content-security-policy/object-src/object-src-url-embed-allowed.html
  37. /content-security-policy/style-src/inline-style-allowed-while-cloning-objects.sub.html
  38. /content-security-policy/svg/svg-inline.sub.html
  39. /content-security-policy/sandbox/window-reuse-unsandboxed.html
  40. /content-security-policy/style-src/style-src-multiple-policies-multiple-hashing-algorithms.html
  41. /content-security-policy/script-src/worker-eval-blocked.sub.html
  42. /content-security-policy/base-uri/base-uri-deny.sub.html
  43. /content-security-policy/reporting/report-cross-origin-no-cookies.sub.html
  44. /content-security-policy/unsafe-eval/eval-blocked-and-sends-report.sub.html
  45. /content-security-policy/style-src/style-src-injected-stylesheet-allowed.sub.html
  46. /content-security-policy/navigate-to/href-location-blocked.sub.html
  47. /content-security-policy/form-action/form-action-src-get-allowed.sub.html
  48. /content-security-policy/media-src/media-src-redir-bug.sub.html
  49. /content-security-policy/frame-ancestors/frame-ancestors-nested-cross-in-sandboxed-cross-url-block.html
  50. /content-security-policy/style-src-attr-elem/style-src-elem-allowed-attr-blocked.html
  51. /content-security-policy/style-src-attr-elem/style-src-attr-blocked-src-allowed.html
  52. /content-security-policy/unsafe-eval/eval-blocked-in-about-blank-iframe.sub.html
  53. /content-security-policy/connect-src/connect-src-websocket-blocked.sub.html
  54. /content-security-policy/plugin-types/plugintypes-notype-data.html
  55. /content-security-policy/generic/cspro-not-enforced-in-worker.html
  56. /content-security-policy/font-src/font-match-allowed.sub.html
  57. /content-security-policy/style-src/style-src-stylesheet-nonce-blocked.html
  58. /content-security-policy/script-src/injected-inline-script-allowed.sub.html
  59. /content-security-policy/securitypolicyviolation/upgrade-insecure-requests-reporting.https.html
  60. /content-security-policy/unsafe-hashes/javascript_src_denied_missing_unsafe_hashes-window_location.html
  61. /content-security-policy/navigate-to/form-redirected-allowed.html
  62. /content-security-policy/reporting/report-strips-fragment.html
  63. /content-security-policy/connect-src/shared-worker-connect-src-blocked.sub.html
  64. /content-security-policy/navigate-to/link-click-cross-origin-allowed.sub.html
  65. /content-security-policy/form-action/form-action-src-redirect-allowed-target-frame.sub.html
  66. /content-security-policy/reporting/report-uri-from-child-frame.html
  67. /content-security-policy/object-src/object-src-url-allowed.html
  68. /content-security-policy/style-src-attr-elem/style-src-elem-blocked-src-allowed.html
  69. /content-security-policy/sandbox/iframe-inside-csp.sub.html
  70. /content-security-policy/embedded-enforcement/subsumption_algorithm-hashes.html
  71. /content-security-policy/connect-src/connect-src-xmlhttprequest-blocked.sub.html
  72. /content-security-policy/child-src/child-src-allowed.sub.html
  73. /content-security-policy/worker-src/dedicated-fallback.sub.html
  74. /content-security-policy/script-src/scriptnonce-basic-blocked.sub.html
  75. /content-security-policy/form-action/form-action-src-allowed.sub.html
  76. /content-security-policy/script-src/hash-always-converted-to-utf-8/iso-8859-9.html
  77. /content-security-policy/unsafe-eval/eval-blocked.sub.html
  78. /content-security-policy/form-action/form-action-src-javascript-blocked.sub.html
  79. /content-security-policy/unsafe-eval/eval-scripts-setInterval-allowed.sub.html
  80. /content-security-policy/frame-ancestors/frame-ancestors-self-block.html
  81. /content-security-policy/style-src/style-src-inline-style-blocked.html
  82. /content-security-policy/script-src/worker-set-timeout-blocked.sub.html
  83. /content-security-policy/unsafe-eval/eval-scripts-setTimeout-allowed.sub.html
  84. /content-security-policy/embedded-enforcement/subsumption_algorithm-unsafe_inline.html
  85. /content-security-policy/script-src/worker-importscripts-blocked.sub.html
  86. /content-security-policy/svg/svg-from-guid.html
  87. /content-security-policy/frame-ancestors/frame-ancestors-nested-cross-in-same-star-allow.html
  88. /content-security-policy/unsafe-hashes/style_attribute_denied_missing_unsafe_hashes.html
  89. /content-security-policy/worker-src/dedicated-self.sub.html
  90. /content-security-policy/img-src/icon-blocked.sub.html
  91. /content-security-policy/img-src/report-blocked-data-uri.sub.html
  92. /content-security-policy/frame-ancestors/frame-ancestors-nested-same-in-cross-star-allow.html
  93. /content-security-policy/worker-src/shared-none.sub.html
  94. /content-security-policy/navigate-to/meta-refresh-redirected-allowed.html
  95. /content-security-policy/navigate-to/child-navigates-parent-blocked.sub.html
  96. /content-security-policy/securitypolicyviolation/blockeduri-eval.html
  97. /content-security-policy/worker-src/dedicated-list.sub.html
  98. /content-security-policy/img-src/img-src-host-partial-wildcard-allowed.sub.html
  99. /content-security-policy/reporting/report-blocked-uri-cross-origin.sub.html
  100. /content-security-policy/style-src/style-src-error-event-fires.html
  101. /content-security-policy/generic/filesystem-urls-do-not-match-self.sub.html
  102. /content-security-policy/sandbox/sandbox-allow-scripts.sub.html
  103. /content-security-policy/script-src/worker-function-function-blocked.sub.html
  104. /content-security-policy/style-src-attr-elem/style-src-elem-blocked-attr-allowed.html
  105. /content-security-policy/generic/generic-0_10.html
  106. /content-security-policy/style-src/style-src-injected-inline-style-allowed.html
  107. /content-security-policy/generic/generic-0_9.sub.html
  108. /content-security-policy/generic/directive-name-case-insensitive.sub.html
  109. /content-security-policy/navigate-to/href-location-allowed.html
  110. /content-security-policy/navigate-to/link-click-redirected-blocked.sub.html
  111. /content-security-policy/worker-src/service-child.https.sub.html
  112. /content-security-policy/navigate-to/unsafe-allow-redirects/blocked-end-of-chain.sub.html
  113. /content-security-policy/media-src/media-src-7_2_2.sub.html
  114. /content-security-policy/frame-ancestors/frame-ancestors-nested-same-in-same-url-block.html
  115. /content-security-policy/script-src/srcdoc-doesnt-bypass-script-src.sub.html
  116. /content-security-policy/script-src/hash-always-converted-to-utf-8/utf-8-lone-surrogate.html
  117. /content-security-policy/navigate-to/link-click-blocked.sub.html
  118. /content-security-policy/img-src/img-src-none-blocks.html
  119. /content-security-policy/frame-ancestors/frame-ancestors-nested-cross-in-cross-url-block.html
  120. /content-security-policy/frame-ancestors/frame-ancestors-nested-cross-in-cross-star-allow.html
  121. /content-security-policy/prefetch-src/prefetch-header-allowed.html
  122. /content-security-policy/blob/star-doesnt-match-blob.sub.html
  123. /content-security-policy/script-src/scripthash-ignore-unsafeinline.sub.html
  124. /content-security-policy/script-src/script-src-1_10_1.html
  125. /content-security-policy/reporting/report-uri-from-inline-javascript.html
  126. /content-security-policy/embedded-enforcement/idlharness.window.html
  127. /content-security-policy/navigate-to/form-cross-origin-blocked.sub.html
  128. /content-security-policy/script-src/script-src-1_2_1.html
  129. /content-security-policy/script-src/scriptnonce-redirect.sub.html
  130. /content-security-policy/generic/only-valid-whitespaces-are-allowed.html
  131. /content-security-policy/frame-src/frame-src-redirect.html
  132. /content-security-policy/inside-worker/shared-inheritance.html
  133. /content-security-policy/worker-src/service-none.https.sub.html
  134. /content-security-policy/frame-src/frame-src-about-blank-allowed-by-scheme.sub.html
  135. /content-security-policy/script-src-attr-elem/script-src-elem-blocked-attr-allowed.html
  136. /content-security-policy/reporting/report-blocked-data-uri.html
  137. /content-security-policy/securitypolicyviolation/securitypolicyviolation-block-cross-origin-image-from-script.sub.html
  138. /content-security-policy/style-src/style-src-imported-style-allowed.sub.html
  139. /content-security-policy/reporting/report-uri-multiple.html
  140. /content-security-policy/inheritance/inherited-csp-list-modifications-are-local.html
  141. /content-security-policy/navigation/javascript-url-navigation-inherits-csp.html
  142. /content-security-policy/sandbox/window-reuse-sandboxed.html
  143. /content-security-policy/unsafe-eval/function-constructor-blocked.sub.html
  144. /content-security-policy/navigate-to/spv-only-sent-to-initiator.sub.html
  145. /content-security-policy/worker-src/dedicated-none.sub.html
  146. /content-security-policy/unsafe-eval/eval-scripts-setInterval-blocked.sub.html
  147. /content-security-policy/generic/generic-0_8.sub.html
  148. /content-security-policy/generic/generic-0_10_1.sub.html
  149. /content-security-policy/style-src/style-src-inline-style-nonce-allowed.html
  150. /content-security-policy/securitypolicyviolation/style-sample-no-opt-in.html
  151. /content-security-policy/frame-ancestors/frame-ancestors-nested-same-in-same-url-allow.html
  152. /content-security-policy/font-src/font-self-allowed.html
  153. /content-security-policy/plugin-types/plugintypes-notype-url.html
  154. /content-security-policy/frame-ancestors/frame-ancestors-star-allow-crossorigin.html
  155. /content-security-policy/frame-ancestors/frame-ancestors-nested-cross-in-same-none-block.html
  156. /content-security-policy/plugin-types/plugintypes-mismatched-url.html
  157. /content-security-policy/blob/self-doesnt-match-blob.sub.html
  158. /content-security-policy/object-src/object-src-url-embed-blocked.html
  159. /content-security-policy/style-src/stylenonce-allowed.sub.html
  160. /content-security-policy/generic/generic-0_2_3.html
  161. /content-security-policy/script-src/script-src-1_10.html
  162. /content-security-policy/script-src/script-src-1_2.html
  163. /content-security-policy/navigate-to/child-navigates-parent-allowed.html
  164. /content-security-policy/style-src/style-src-none-blocked.html
  165. /content-security-policy/navigation/to-javascript-parent-initiated-parent-csp.html
  166. /content-security-policy/sandbox/sandbox-empty-subframe.sub.html
  167. /content-security-policy/frame-ancestors/frame-ancestors-nested-cross-in-cross-url-allow.html
  168. /content-security-policy/frame-ancestors/frame-ancestors-nested-same-in-cross-url-block.html
  169. /content-security-policy/frame-ancestors/frame-ancestors-nested-same-in-cross-self-block.html
  170. /content-security-policy/generic/generic-0_2.html
  171. /content-security-policy/frame-ancestors/frame-ancestors-none-block.html
  172. /content-security-policy/form-action/form-action-src-allowed-target-frame.sub.html
  173. /content-security-policy/navigate-to/meta-refresh-cross-origin-blocked.sub.html
  174. /content-security-policy/media-src/media-src-7_3.sub.html
  175. /content-security-policy/script-src-attr-elem/script-src-elem-allowed-attr-blocked.html
  176. /content-security-policy/object-src/object-src-url-blocked.html
  177. /content-security-policy/prefetch-src/prefetch-allowed.html
  178. /content-security-policy/worker-src/service-worker-src-default-fallback.https.sub.html
  179. /content-security-policy/securitypolicyviolation/style-sample.html
  180. /content-security-policy/sandbox/sandbox-empty.sub.html
  181. /content-security-policy/worker-src/shared-worker-src-default-fallback.sub.html
  182. /content-security-policy/base-uri/base-uri-allow.sub.html
  183. /content-security-policy/frame-ancestors/frame-ancestors-star-allow-sameorigin.html
  184. /content-security-policy/connect-src/connect-src-eventsource-allowed.sub.html
  185. /content-security-policy/style-src/inline-style-attribute-allowed.sub.html
  186. /content-security-policy/connect-src/shared-worker-connect-src-allowed.sub.html
  187. /content-security-policy/connect-src/connect-src-websocket-self.sub.html
  188. /content-security-policy/script-src/scripthash-default-src.sub.html
  189. /content-security-policy/prefetch-src/prefetch-header-blocked.html
  190. /content-security-policy/navigation/to-javascript-parent-initiated-child-csp.html
  191. /content-security-policy/script-src/scripthash-allowed.sub.html
  192. /content-security-policy/navigate-to/href-location-redirected-allowed.html
  193. /content-security-policy/inside-worker/dedicated-script.html
  194. /content-security-policy/generic/filesystem-urls-match-filesystem.sub.html
  195. /content-security-policy/navigate-to/form-redirected-blocked.sub.html
  196. /content-security-policy/frame-ancestors/frame-ancestors-overrides-xfo.html
  197. /content-security-policy/navigate-to/unsafe-allow-redirects/allowed-end-of-chain-because-of-same-origin.sub.html
  198. /content-security-policy/script-src/script-src-1_1.html
  199. /content-security-policy/img-src/img-src-wildcard-allowed.html
  200. /content-security-policy/form-action/form-action-src-allowed-target-blank.sub.html
  201. /content-security-policy/embedded-enforcement/subsumption_algorithm-host_sources-protocols.html
  202. /content-security-policy/reporting/report-blocked-uri.html
  203. /content-security-policy/reporting-api/reporting-api-report-only-sends-reports-on-violation.https.sub.html
  204. /content-security-policy/connect-src/connect-src-websocket-allowed.sub.html
  205. /content-security-policy/script-src/hash-always-converted-to-utf-8/iso-8859-7.html
  206. /content-security-policy/style-src-attr-elem/style-src-attr-allowed-src-blocked.html
  207. /content-security-policy/frame-ancestors/frame-ancestors-url-allow.sub.html
  208. /content-security-policy/connect-src/connect-src-xmlhttprequest-allowed.sub.html
  209. /content-security-policy/style-src/style-src-injected-stylesheet-blocked.sub.html
  210. /content-security-policy/navigate-to/href-location-cross-origin-blocked.sub.html
  211. /content-security-policy/object-src/object-src-url-redirect-blocked.sub.html
  212. /content-security-policy/script-src/script-src-wildcards-disallowed.html
  213. /content-security-policy/reporting-api/reporting-api-report-to-overrides-report-uri-1.https.sub.html
  214. /content-security-policy/embedded-enforcement/subsumption_algorithm-self.html
  215. /content-security-policy/navigate-to/link-click-cross-origin-blocked.sub.html
  216. /content-security-policy/style-src/style-src-star-allowed.html
  217. /content-security-policy/inheritance/iframe-all-local-schemes-inherit-self.sub.html
  218. /content-security-policy/child-src/child-src-cross-origin-load.sub.html
  219. /content-security-policy/embedded-enforcement/allow_csp_from-header.html
  220. /content-security-policy/reporting/report-uri-multiple-reversed.html
  221. /content-security-policy/generic/generic-0_1-img-src.html
  222. /content-security-policy/navigate-to/href-location-cross-origin-allowed.sub.html
  223. /content-security-policy/frame-src/frame-src-allowed.sub.html
  224. /content-security-policy/securitypolicyviolation/inside-dedicated-worker.html
  225. /content-security-policy/generic/duplicate-directive.sub.html
  226. /content-security-policy/frame-ancestors/frame-ancestors-nested-cross-in-same-url-allow.html
  227. /content-security-policy/unsafe-hashes/javascript_src_denied_wrong_hash-window_location.html
  228. /content-security-policy/style-src/stylehash-allowed.sub.html
  229. /content-security-policy/worker-src/service-self.https.sub.html
  230. /content-security-policy/script-src/scriptnonce-ignore-unsafeinline.sub.html
  231. /content-security-policy/script-src/script-src-1_3.html
  232. /content-security-policy/meta/meta-outside-head.sub.html
  233. /content-security-policy/navigate-to/link-click-redirected-allowed.html
  234. /content-security-policy/child-src/child-src-about-blank-allowed-by-scheme.sub.html
  235. /content-security-policy/default-src/default-src-inline-blocked.sub.html
  236. /content-security-policy/prefetch-src/prefetch-blocked.html
  237. /content-security-policy/style-src/style-src-inline-style-allowed.html
  238. /content-security-policy/script-src/eval-allowed-in-report-only-mode-and-sends-report.html
  239. /content-security-policy/embedded-enforcement/subsumption_algorithm-host_sources-hosts.html
  240. /content-security-policy/reporting/multiple-report-policies.html
  241. /content-security-policy/navigate-to/meta-refresh-blocked.sub.html
  242. /content-security-policy/frame-ancestors/frame-ancestors-nested-same-in-cross-none-block.html
  243. /content-security-policy/navigate-to/anchor-navigation-always-allowed.html
  244. /content-security-policy/worker-src/shared-fallback.sub.html
  245. /content-security-policy/unsafe-hashes/style_attribute_allowed.html
  246. /content-security-policy/reporting/report-and-enforce.html
  247. /content-security-policy/script-src/hash-always-converted-to-utf-8/iso-8859-3.html
  248. /content-security-policy/media-src/media-src-7_1_2.sub.html
  249. /content-security-policy/securitypolicyviolation/inside-shared-worker.html
  250. /content-security-policy/frame-ancestors/frame-ancestors-nested-cross-in-same-url-block.html
  251. /content-security-policy/connect-src/connect-src-eventsource-redirect-to-blocked.sub.html
  252. /content-security-policy/script-src-attr-elem/script-src-attr-blocked-src-allowed.html
  253. /content-security-policy/style-src/inline-style-allowed.sub.html
  254. /content-security-policy/worker-src/service-list.https.sub.html
  255. /content-security-policy/connect-src/connect-src-beacon-redirect-to-blocked.sub.html
  256. /content-security-policy/script-src/script-src-strict_dynamic_discard_whitelist.html
  257. /content-security-policy/inside-worker/dedicated-inheritance.html
  258. /content-security-policy/generic/generic-0_2_2.sub.html
  259. /content-security-policy/script-src/hash-always-converted-to-utf-8/iso-8859-1.html
  260. /content-security-policy/navigate-to/form-blocked.sub.html
  261. /content-security-policy/style-src/style-src-hash-blocked.html
  262. /content-security-policy/child-src/child-src-redirect-blocked.sub.html
  263. /content-security-policy/embedded-enforcement/subsumption_algorithm-general.html
  264. /content-security-policy/generic/no-default-src.sub.html
  265. /content-security-policy/reporting/report-same-origin-with-cookies.html
  266. /content-security-policy/frame-ancestors/frame-ancestors-nested-same-in-same-self-allow.html
  267. /content-security-policy/script-src/scripthash-unicode-normalization.sub.html
  268. /content-security-policy/script-src/scriptnonce-allowed.sub.html
  269. /content-security-policy/child-src/child-src-conflicting-frame-src.sub.html
  270. /content-security-policy/navigate-to/form-action/form-action-allows-navigate-to-allows.sub.html
  271. /content-security-policy/style-src/style-blocked.sub.html
  272. /content-security-policy/securitypolicyviolation/securitypolicyviolation-block-cross-origin-image.sub.html
  273. /content-security-policy/font-src/font-mismatch-blocked.sub.html
  274. /content-security-policy/embedded-enforcement/subsumption_algorithm-nonces.html
  275. /content-security-policy/connect-src/connect-src-beacon-allowed.sub.html
  276. /content-security-policy/media-src/media-src-7_3_2.sub.html
  277. /content-security-policy/img-src/img-src-self-unique-origin.html
  278. /content-security-policy/connect-src/worker-connect-src-allowed.sub.html
  279. /content-security-policy/form-action/form-action-src-blocked.sub.html
  280. /content-security-policy/style-src/style-src-imported-style-blocked.html
  281. /content-security-policy/navigate-to/form-allowed.html
  282. /content-security-policy/securitypolicyviolation/securitypolicyviolation-block-image-from-script.sub.html
  283. /content-security-policy/embedded-enforcement/subsumption_algorithm-none.html
  284. /content-security-policy/connect-src/worker-from-guid.sub.html
  285. /content-security-policy/reporting/report-only-in-meta.sub.html
  286. /content-security-policy/embedded-enforcement/subsumption_algorithm-strict_dynamic.html
  287. /content-security-policy/worker-src/dedicated-worker-src-default-fallback.sub.html
  288. /content-security-policy/object-src/object-src-url-redirect-allowed.html
  289. /content-security-policy/worker-src/shared-child.sub.html
  290. /content-security-policy/embedded-enforcement/subsumption_algorithm-unsafe_hashes.html
  291. /content-security-policy/embedded-enforcement/subsumption_algorithm-host_sources-ports.html
  292. /content-security-policy/script-src/scripthash-basic-blocked.sub.html
  293. /content-security-policy/base-uri/report-uri-does-not-respect-base-uri.sub.html
  294. /content-security-policy/generic/generic-0_8_1.sub.html
  295. /content-security-policy/reporting/report-uri-scheme-relative.html
  296. /content-security-policy/reporting-api/reporting-api-sends-reports-on-violation.https.sub.html
  297. /content-security-policy/svg/svg-policy-with-resource.html
  298. /content-security-policy/style-src/inline-style-blocked.sub.html
  299. /content-security-policy/img-src/icon-allowed.sub.html
  300. /content-security-policy/style-src/style-src-hash-allowed.html
  301. /content-security-policy/reporting-api/reporting-api-report-to-overrides-report-uri-2.https.sub.html
  302. /content-security-policy/navigate-to/form-action/form-action-allows-navigate-to-blocks.sub.html
  303. /content-security-policy/child-src/child-src-about-blank-allowed-by-default.sub.html
  304. /content-security-policy/securitypolicyviolation/img-src-redirect-upgrade-reporting.https.html
  305. /content-security-policy/navigate-to/meta-refresh-allowed.html
  306. /content-security-policy/inside-worker/shared-script.html
  307. /content-security-policy/unsafe-eval/function-constructor-allowed.sub.html
  308. /content-security-policy/worker-src/shared-self.sub.html
  309. /content-security-policy/navigate-to/meta-refresh-cross-origin-allowed.sub.html
  310. /content-security-policy/img-src/img-src-4_1.sub.html
  311. /content-security-policy/connect-src/connect-src-beacon-blocked.sub.html
  312. /content-security-policy/navigate-to/form-action/form-action-blocks-navigate-to-blocks.sub.html
  313. /content-security-policy/object-src/object-src-no-url-blocked.html
  314. /content-security-policy/style-src-attr-elem/style-src-elem-allowed-src-blocked.html
  315. /content-security-policy/font-src/font-none-blocked.sub.html
  316. /content-security-policy/script-src/script-src-1_4_2.html
  317. /content-security-policy/child-src/child-src-blocked.sub.html
  318. /content-security-policy/style-src/inline-style-attribute-on-html.sub.html
  319. /content-security-policy/navigate-to/href-location-redirected-blocked.sub.html
  320. /content-security-policy/inheritance/iframe-all-local-schemes.sub.html
  321. /content-security-policy/frame-ancestors/frame-ancestors-nested-cross-in-cross-self-block.html
  322. /content-security-policy/connect-src/connect-src-eventsource-blocked.sub.html
  323. /content-security-policy/form-action/form-action-self-allowed-target-blank.html
  324. /content-security-policy/default-src/default-src-inline-allowed.sub.html
  325. /content-security-policy/generic/policy-inherited-correctly-by-plznavigate.html
  326. /content-security-policy/script-src/worker-script-src.sub.html
  327. /content-security-policy/navigate-to/meta-refresh-redirected-blocked.sub.html
  328. /content-security-policy/unsafe-eval/eval-allowed.sub.html
  329. /content-security-policy/media-src/media-src-blocked.sub.html
  330. /content-security-policy/meta/meta-modified.html
  331. /content-security-policy/reporting/report-multiple-violations-01.html
  332. /content-security-policy/font-src/font-stylesheet-font-blocked.sub.html
  333. /content-security-policy/embedded-enforcement/required-csp-header-cascade.html
  334. /content-security-policy/generic/generic-0_1-script-src.html
  335. /content-security-policy/embedded-enforcement/iframe-csp-attribute.html
  336. /content-security-policy/frame-ancestors/frame-ancestors-nested-same-in-same-none-block.html
  337. /content-security-policy/style-src/style-src-stylesheet-nonce-allowed.html
  338. /content-security-policy/generic/policy-does-not-affect-child.sub.html
  339. /content-security-policy/img-src/img-src-full-host-wildcard-blocked.sub.html
  340. /content-security-policy/script-src/injected-inline-script-blocked.sub.html
  341. /content-security-policy/frame-src/frame-src-about-blank-allowed-by-default.sub.html
  342. /content-security-policy/style-src/style-src-inline-style-attribute-allowed.html
  343. /content-security-policy/reporting/report-multiple-violations-02.html
  344. /content-security-policy/style-src/style-src-inline-style-attribute-blocked.html
  345. /content-security-policy/navigate-to/form-cross-origin-allowed.sub.html
  346. /content-security-policy/script-src/scriptnonce-and-scripthash.sub.html
  347. /content-security-policy/style-src/injected-inline-style-allowed.sub.html
  348. /content-security-policy/reporting-api/reporting-api-works-on-frame-src.https.sub.html
  349. /content-security-policy/form-action/form-action-src-redirect-allowed-target-blank.sub.html
  350. /content-security-policy/blob/blob-urls-match-blob.sub.html
  351. /content-security-policy/reporting/report-uri-from-javascript.html
  352. /content-security-policy/object-src/object-src-no-url-allowed.html
  353. /content-security-policy/reporting/report-uri-effective-directive.html
  354. /content-security-policy/embedded-enforcement/subsumption_algorithm-unsafe_eval.html
  355. /content-security-policy/form-action/form-action-src-get-blocked.sub.html
  356. /content-security-policy/script-src/script-src-1_4_1.html
  357. /content-security-policy/unsafe-hashes/javascript_src_allowed-window_location.html
  358. /content-security-policy/frame-src/frame-src-self-unique-origin.html
  359. /content-security-policy/worker-src/shared-list.sub.html
  360. /content-security-policy/base-uri/base-uri_iframe_sandbox.sub.html
  361. /content-security-policy/style-src/style-allowed.sub.html
  362. /content-security-policy/worker-src/dedicated-child.sub.html
  363. /content-security-policy/frame-src/frame-src-cross-origin-load.sub.html
  364. /content-security-policy/navigate-to/link-click-allowed.html
  365. /content-security-policy/embedded-enforcement/subsumption_algorithm-host_sources-paths.html
  366. /content-security-policy/frame-ancestors/frame-ancestors-self-allow.html
  367. /content-security-policy/connect-src/connect-src-xmlhttprequest-redirect-to-blocked.sub.html
  368. /content-security-policy/navigate-to/parent-navigates-child-blocked.html
  369. /content-security-policy/plugin-types/plugintypes-empty.sub.html
  370. /content-security-policy/img-src/img-src-port-wildcard-allowed.sub.html
  371. /content-security-policy/style-src/stylenonce-blocked.sub.html
  372. /content-security-policy/generic/304-response-should-update-csp.sub.html
  373. /content-security-policy/style-src/style-src-inline-style-nonce-blocked.html
  374. /content-security-policy/script-src/script-src-strict_dynamic_in_img-src.html
  375. /content-security-policy/securitypolicyviolation/inside-service-worker.https.html
  376. /content-security-policy/frame-ancestors/frame-ancestors-nested-same-in-cross-url-allow.html
  377. /content-security-policy/script-src/hash-always-converted-to-utf-8/utf-8.html
  378. /content-security-policy/sandbox/sandbox-allow-scripts-subframe.sub.html
  379. /content-security-policy/svg/object-in-svg-foreignobject.sub.html
  380. /content-security-policy/unsafe-eval/eval-scripts-setTimeout-blocked.sub.html
  381. /content-security-policy/script-src/script-src-1_4.html
  382. /content-security-policy/reporting/report-original-url.sub.html
  383. /content-security-policy/inheritance/window.html
  384. /content-security-policy/frame-ancestors/frame-ancestors-nested-cross-in-cross-none-block.html
Test Show/Hide MessagesFF64
/content-security-policy/navigation/to-javascript-url-frame-src.htmlOK
<iframe src='javascript:...'> not blocked by 'frame-src'PASS
/content-security-policy/connect-src/worker-connect-src-blocked.sub.htmlOK
Expecting logs: ["xhr blocked","TEST COMPLETE"]PASS
/content-security-policy/navigate-to/form-action/form-action-blocks-navigate-to-allows.sub.htmlOK
Test that form-action overrides navigate-to when present.FAIL
/content-security-policy/style-src/style-src-injected-inline-style-blocked.htmlOK
Injected style attributes should not be appliedPASS
Should fire a securitypolicyviolation eventFAIL
/content-security-policy/script-src/eval-allowed-in-report-only-mode.htmlOK
Eval is allowed because the CSP is report-onlyPASS
/content-security-policy/svg/svg-policy-resource-doc-includes.htmlOK
Expecting logs: ["TEST COMPLETE"]PASS
/content-security-policy/style-src/injected-inline-style-blocked.sub.htmlOK
Expecting logs: ["violated-directive=style-src-elem","PASS"]FAIL
/content-security-policy/navigate-to/parent-navigates-child-allowed.htmlOK
Test that the parent can navigate the child because the relevant policy belongs to the navigation initiator (in this case the parent, which has the policy `navigate-to 'self'`)PASS
/content-security-policy/blob/blob-urls-do-not-match-self.sub.htmlOK
Expecting logs: ["violated-directive=script-src-elem"]FAIL
/content-security-policy/securitypolicyviolation/constructor-required-fields.htmlOK
SecurityPolicyViolationEvent constructor does not require blockedURIPASS
SecurityPolicyViolationEvent constructor does not require columnNumberPASS
SecurityPolicyViolationEvent constructor does not require lineNumberPASS
SecurityPolicyViolationEvent constructor does not require referrerPASS
SecurityPolicyViolationEvent constructor does not require samplePASS
SecurityPolicyViolationEvent constructor does not require sourceFilePASS
SecurityPolicyViolationEvent constructor requires dispositionFAIL
SecurityPolicyViolationEvent constructor requires documentURIFAIL
SecurityPolicyViolationEvent constructor requires effectiveDirectiveFAIL
SecurityPolicyViolationEvent constructor requires originalPolicyFAIL
SecurityPolicyViolationEvent constructor requires statusCodeFAIL
SecurityPolicyViolationEvent constructor requires violatedDirectiveFAIL
SecurityPolicyViolationEvent constructor should throw with no parametersPASS
SecurityPolicyViolationEvent constructor works with an init dictPASS
/content-security-policy/worker-src/service-fallback.https.sub.htmlOK
Same-origin service worker allowed by host-source expression.PASS
/content-security-policy/frame-ancestors/frame-ancestors-url-block.htmlTIMEOUT
A 'frame-ancestors' CSP directive with a URL which doesn't match this origin should be blocked.NOTRUN
/content-security-policy/inheritance/iframe-srcdoc-inheritance.htmlTIMEOUT
First image should be blockedNOTRUN
Second image should be blockedNOTRUN
/content-security-policy/unsafe-hashes/style_attribute_denied_wrong_hash.htmlOK
Test that the inline style attribute is blockedFAIL
/content-security-policy/securitypolicyviolation/securitypolicyviolation-block-image.sub.htmlOK
Non-redirected same-origin URLs are not stripped.PASS
/content-security-policy/plugin-types/plugintypes-mismatched-data.htmlTIMEOUT
Should not load the object because its declared type does not match its actual typeNOTRUN
/content-security-policy/meta/meta-img-src.htmlOK
Expecting logs: ["PASS","TEST COMPLETE"]PASS
/content-security-policy/form-action/form-action-src-redirect-blocked.sub.htmlOK
Expecting logs: ["violated-directive=form-action","TEST COMPLETE"]FAIL
form-action-src-redirect-blockedFAIL
/content-security-policy/securitypolicyviolation/idlharness.window.htmlOK
SecurityPolicyViolationEvent interface object lengthPASS
SecurityPolicyViolationEvent interface object namePASS
SecurityPolicyViolationEvent interface: attribute blockedURIPASS
SecurityPolicyViolationEvent interface: attribute blockedURLFAIL
SecurityPolicyViolationEvent interface: attribute colnoFAIL
SecurityPolicyViolationEvent interface: attribute columnNumberPASS
SecurityPolicyViolationEvent interface: attribute dispositionPASS
SecurityPolicyViolationEvent interface: attribute documentURIPASS
SecurityPolicyViolationEvent interface: attribute documentURLFAIL
SecurityPolicyViolationEvent interface: attribute effectiveDirectivePASS
SecurityPolicyViolationEvent interface: attribute lineNumberPASS
SecurityPolicyViolationEvent interface: attribute linenoFAIL
SecurityPolicyViolationEvent interface: attribute originalPolicyPASS
SecurityPolicyViolationEvent interface: attribute referrerPASS
SecurityPolicyViolationEvent interface: attribute samplePASS
SecurityPolicyViolationEvent interface: attribute sourceFilePASS
SecurityPolicyViolationEvent interface: attribute statusCodePASS
SecurityPolicyViolationEvent interface: attribute violatedDirectivePASS
SecurityPolicyViolationEvent interface: existence and properties of interface objectPASS
SecurityPolicyViolationEvent interface: existence and properties of interface prototype objectPASS
SecurityPolicyViolationEvent interface: existence and properties of interface prototype object's "constructor" propertyPASS
SecurityPolicyViolationEvent interface: existence and properties of interface prototype object's @@unscopables propertyPASS
SecurityPolicyViolationEvent interface: new SecurityPolicyViolationEvent("securitypolicyviolation") must inherit property "blockedURI" with the proper typePASS
SecurityPolicyViolationEvent interface: new SecurityPolicyViolationEvent("securitypolicyviolation") must inherit property "blockedURL" with the proper typeFAIL
SecurityPolicyViolationEvent interface: new SecurityPolicyViolationEvent("securitypolicyviolation") must inherit property "colno" with the proper typeFAIL
SecurityPolicyViolationEvent interface: new SecurityPolicyViolationEvent("securitypolicyviolation") must inherit property "columnNumber" with the proper typePASS
SecurityPolicyViolationEvent interface: new SecurityPolicyViolationEvent("securitypolicyviolation") must inherit property "disposition" with the proper typePASS
SecurityPolicyViolationEvent interface: new SecurityPolicyViolationEvent("securitypolicyviolation") must inherit property "documentURI" with the proper typePASS
SecurityPolicyViolationEvent interface: new SecurityPolicyViolationEvent("securitypolicyviolation") must inherit property "documentURL" with the proper typeFAIL
SecurityPolicyViolationEvent interface: new SecurityPolicyViolationEvent("securitypolicyviolation") must inherit property "effectiveDirective" with the proper typePASS
SecurityPolicyViolationEvent interface: new SecurityPolicyViolationEvent("securitypolicyviolation") must inherit property "lineNumber" with the proper typePASS
SecurityPolicyViolationEvent interface: new SecurityPolicyViolationEvent("securitypolicyviolation") must inherit property "lineno" with the proper typeFAIL
SecurityPolicyViolationEvent interface: new SecurityPolicyViolationEvent("securitypolicyviolation") must inherit property "originalPolicy" with the proper typePASS
SecurityPolicyViolationEvent interface: new SecurityPolicyViolationEvent("securitypolicyviolation") must inherit property "referrer" with the proper typePASS
SecurityPolicyViolationEvent interface: new SecurityPolicyViolationEvent("securitypolicyviolation") must inherit property "sample" with the proper typePASS
SecurityPolicyViolationEvent interface: new SecurityPolicyViolationEvent("securitypolicyviolation") must inherit property "sourceFile" with the proper typePASS
SecurityPolicyViolationEvent interface: new SecurityPolicyViolationEvent("securitypolicyviolation") must inherit property "statusCode" with the proper typePASS
SecurityPolicyViolationEvent interface: new SecurityPolicyViolationEvent("securitypolicyviolation") must inherit property "violatedDirective" with the proper typePASS
SecurityPolicyViolationEvent must be primary interface of new SecurityPolicyViolationEvent("securitypolicyviolation")PASS
Stringification of new SecurityPolicyViolationEvent("securitypolicyviolation")PASS
idl_test setupPASS
/content-security-policy/frame-ancestors/frame-ancestors-nested-cross-in-same-self-block.htmlTIMEOUT
A 'frame-ancestors' CSP directive with a value 'same' should block render in same-origin nested frames.NOTRUN
/content-security-policy/meta/combine-header-and-meta-policies.sub.htmlOK
Expecting logs: ["TEST COMPLETE", "violated-directive=img-src", "violated-directive=style-src-elem"]FAIL
combine-header-and-meta-policiesPASS
/content-security-policy/style-src/inline-style-attribute-blocked.sub.htmlOK
Expecting logs: ["violated-directive=style-src-attr","PASS"]FAIL
/content-security-policy/media-src/media-src-7_1.htmlOK
In-policy async video source elementPASS
In-policy async video srcPASS
Should not fire policy violation eventsPASS
/content-security-policy/frame-src/frame-src-blocked.sub.htmlOK
Expecting logs: ["PASS IFrame #1 generated a load event.","violated-directive=frame-src"]FAIL
/content-security-policy/form-action/form-action-src-default-ignored.sub.htmlOK
Expecting logs: ["PASS","TEST COMPLETE"]FAIL
/content-security-policy/plugin-types/plugintypes-nourl-blocked.htmlTIMEOUT
Should not load the object because it does not match plugin-typesNOTRUN
/content-security-policy/plugin-types/plugintypes-nourl-allowed.htmlOK
Violation report status OK.PASS
/content-security-policy/style-src/stylehash-default-src.sub.htmlOK
stylehash allowed from default-srcFAIL
/content-security-policy/embedded-enforcement/required_csp-header.htmlOK
Test Required-CSP value on `csp` change: Sec-Required-CSP is not sent if `csp` attribute is not set on <iframe>.FAIL
Test Required-CSP value on `csp` change: Send Sec-Required-CSP Header on change of `src` attribute on iframe.FAIL
Test Required-CSP value on `csp` change: Send Sec-Required-CSP when `csp` attribute of <iframe> is not empty.FAIL
Test Required-CSP value on `csp` change: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - comma separatedFAIL
Test Required-CSP value on `csp` change: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - gibberish cspFAIL
Test Required-CSP value on `csp` change: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - html encoded stringFAIL
Test Required-CSP value on `csp` change: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - missing semicolonFAIL
Test Required-CSP value on `csp` change: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - misspeled 'none'FAIL
Test Required-CSP value on `csp` change: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - query values in pathFAIL
Test Required-CSP value on `csp` change: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - report-to presentFAIL
Test Required-CSP value on `csp` change: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - report-uri presentFAIL
Test Required-CSP value on `csp` change: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - unknown policy nameFAIL
Test Required-CSP value on `csp` change: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - unknown policy name in multiple directivesFAIL
Test Required-CSP value on `csp` change: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - url encoded stringFAIL
Test cross origin redirect of cross origin iframe: Sec-Required-CSP is not sent if `csp` attribute is not set on <iframe>.PASS
Test cross origin redirect of cross origin iframe: Send Sec-Required-CSP Header on change of `src` attribute on iframe.FAIL
Test cross origin redirect of cross origin iframe: Send Sec-Required-CSP when `csp` attribute of <iframe> is not empty.FAIL
Test cross origin redirect of cross origin iframe: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - comma separatedPASS
Test cross origin redirect of cross origin iframe: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - gibberish cspPASS
Test cross origin redirect of cross origin iframe: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - html encoded stringPASS
Test cross origin redirect of cross origin iframe: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - missing semicolonPASS
Test cross origin redirect of cross origin iframe: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - misspeled 'none'PASS
Test cross origin redirect of cross origin iframe: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - query values in pathPASS
Test cross origin redirect of cross origin iframe: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - report-to presentPASS
Test cross origin redirect of cross origin iframe: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - report-uri presentPASS
Test cross origin redirect of cross origin iframe: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - unknown policy namePASS
Test cross origin redirect of cross origin iframe: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - unknown policy name in multiple directivesPASS
Test cross origin redirect of cross origin iframe: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - url encoded stringPASS
Test cross origin redirect: Sec-Required-CSP is not sent if `csp` attribute is not set on <iframe>.PASS
Test cross origin redirect: Send Sec-Required-CSP Header on change of `src` attribute on iframe.FAIL
Test cross origin redirect: Send Sec-Required-CSP when `csp` attribute of <iframe> is not empty.FAIL
Test cross origin redirect: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - comma separatedPASS
Test cross origin redirect: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - gibberish cspPASS
Test cross origin redirect: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - html encoded stringPASS
Test cross origin redirect: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - missing semicolonPASS
Test cross origin redirect: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - misspeled 'none'PASS
Test cross origin redirect: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - query values in pathPASS
Test cross origin redirect: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - report-to presentPASS
Test cross origin redirect: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - report-uri presentPASS
Test cross origin redirect: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - unknown policy namePASS
Test cross origin redirect: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - unknown policy name in multiple directivesPASS
Test cross origin redirect: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - url encoded stringPASS
Test same origin redirect: Sec-Required-CSP is not sent if `csp` attribute is not set on <iframe>.PASS
Test same origin redirect: Send Sec-Required-CSP Header on change of `src` attribute on iframe.FAIL
Test same origin redirect: Send Sec-Required-CSP when `csp` attribute of <iframe> is not empty.FAIL
Test same origin redirect: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - comma separatedPASS
Test same origin redirect: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - gibberish cspPASS
Test same origin redirect: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - html encoded stringPASS
Test same origin redirect: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - missing semicolonPASS
Test same origin redirect: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - misspeled 'none'PASS
Test same origin redirect: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - query values in pathPASS
Test same origin redirect: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - report-to presentPASS
Test same origin redirect: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - report-uri presentPASS
Test same origin redirect: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - unknown policy namePASS
Test same origin redirect: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - unknown policy name in multiple directivesPASS
Test same origin redirect: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - url encoded stringPASS
Test same origin: Sec-Required-CSP is not sent if `csp` attribute is not set on <iframe>.PASS
Test same origin: Send Sec-Required-CSP Header on change of `src` attribute on iframe.FAIL
Test same origin: Send Sec-Required-CSP when `csp` attribute of <iframe> is not empty.FAIL
Test same origin: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - comma separatedPASS
Test same origin: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - gibberish cspPASS
Test same origin: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - html encoded stringPASS
Test same origin: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - missing semicolonPASS
Test same origin: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - misspeled 'none'PASS
Test same origin: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - query values in pathPASS
Test same origin: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - report-to presentPASS
Test same origin: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - report-uri presentPASS
Test same origin: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - unknown policy namePASS
Test same origin: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - unknown policy name in multiple directivesPASS
Test same origin: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - url encoded stringPASS
/content-security-policy/frame-ancestors/frame-ancestors-nested-same-in-same-star-allow.htmlTIMEOUT
undefinedTIMEOUT
/content-security-policy/style-src/style-src-inline-style-nonce-blocked-error-event.htmlTIMEOUT
Should fire a securitypolicyviolation eventFAIL
Test that paragraph remains unmodified and error events received.NOTRUN
/content-security-policy/style-src/stylehash-basic-blocked.sub.htmlOK
Expecting alerts: ["PASS: The 'p' element's text is green, which means the style was correctly applied.", "violated-directive=style-src-elem"]FAIL
/content-security-policy/inheritance/blob-url-in-main-window-self-navigate-inherits.sub.htmlOK
Violation report status OK.FAIL
/content-security-policy/script-src/script-src-overrides-default-src.sub.htmlOK
Expecting logs: ["PASS 1 of 2","PASS 2 of 2"]PASS
/content-security-policy/media-src/media-src-7_2.htmlOK
In-policy audio source elementPASS
In-policy audio srcPASS
Should not fire policy violation eventsPASS
/content-security-policy/object-src/object-src-url-embed-allowed.htmlOK
Violation report status OK.PASS
/content-security-policy/style-src/inline-style-allowed-while-cloning-objects.sub.htmlOK
Test that violation report event was firedPASS
/content-security-policy/svg/svg-inline.sub.htmlOK
Should fire violation eventFAIL
/content-security-policy/sandbox/window-reuse-unsandboxed.htmlTIMEOUT
Window object should be reusedNOTRUN
/content-security-policy/style-src/style-src-multiple-policies-multiple-hashing-algorithms.htmlOK
Test that style loads if allowed by proper hash valuesPASS
Violation report status OK.PASS
/content-security-policy/script-src/worker-eval-blocked.sub.htmlOK
Expecting logs: ["eval blocked"]PASS
/content-security-policy/base-uri/base-uri-deny.sub.htmlOK
Check that baseURI fires a securitypolicyviolation event when it does not match the csp directivePASS
Check that the baseURI is not set when it does not match the csp directivePASS
/content-security-policy/reporting/report-cross-origin-no-cookies.sub.htmlOK
Image should not loadPASS
Test report cookies.PASS
Violation report status OK.PASS
/content-security-policy/unsafe-eval/eval-blocked-and-sends-report.sub.htmlOK
Expecting logs: ["PASS: eval() blocked.","violated-directive=script-src"]PASS
/content-security-policy/style-src/style-src-injected-stylesheet-allowed.sub.htmlOK
Programatically injected stylesheet should loadPASS
/content-security-policy/navigate-to/href-location-blocked.sub.htmlTIMEOUT
Test that the child iframe navigation is not allowedNOTRUN
Violation report status OK.FAIL
/content-security-policy/form-action/form-action-src-get-allowed.sub.htmlOK
Expecting logs: ["PASS","TEST COMPLETE"]PASS
/content-security-policy/media-src/media-src-redir-bug.sub.htmlOK
In-policy async video source elementPASS
In-policy async video source element w/redirPASS
In-policy async video srcPASS
Should not fire policy violation eventsPASS
in-policy async video src w/redirPASS
/content-security-policy/frame-ancestors/frame-ancestors-nested-cross-in-sandboxed-cross-url-block.htmlTIMEOUT
A 'frame-ancestors' CSP directive with a URL value should compare against each frame's origin rather than URL, so a nested frame with a sandboxed parent frame should be blocked due to the parent having a unique origin.NOTRUN
/content-security-policy/style-src-attr-elem/style-src-elem-allowed-attr-blocked.htmlTIMEOUT
Should fire a security policy violation for the attributeNOTRUN
The attribute style should not be applied and the inline style should be appliedPASS
/content-security-policy/style-src-attr-elem/style-src-attr-blocked-src-allowed.htmlTIMEOUT
Should fire a security policy violation eventNOTRUN
The attribute style should not be appliedPASS
/content-security-policy/unsafe-eval/eval-blocked-in-about-blank-iframe.sub.htmlOK
Expecting logs: ["violated-directive=script-src","PASS"]FAIL
/content-security-policy/connect-src/connect-src-websocket-blocked.sub.htmlOK
Expecting logs: ["blocked","violated-directive=connect-src"]PASS
/content-security-policy/plugin-types/plugintypes-notype-data.htmlTIMEOUT
Should not load the object because it does not have a declared typeNOTRUN
/content-security-policy/generic/cspro-not-enforced-in-worker.htmlOK
Check that eval is allowed since the inherited policy is report onlyPASS
Check that inline is allowed since the inherited policy is report onlyPASS
/content-security-policy/font-src/font-match-allowed.sub.htmlTIMEOUT
Test font loads if it matches font-src.TIMEOUT
/content-security-policy/style-src/style-src-stylesheet-nonce-blocked.htmlOK
Should fire a securitypolicyviolation eventFAIL
Should not load stylesheet without correct noncePASS
/content-security-policy/script-src/injected-inline-script-allowed.sub.htmlOK
Expecting logs: ["Pass 1 of 2","Pass 2 of 2"]PASS
/content-security-policy/securitypolicyviolation/upgrade-insecure-requests-reporting.https.htmlOK
Navigated iframe is upgraded and reportedFAIL
Upgraded iframe is reportedFAIL
Upgraded image is reportedFAIL
/content-security-policy/unsafe-hashes/javascript_src_denied_missing_unsafe_hashes-window_location.htmlTIMEOUT
Test that the javascript: src is not allowed to runNOTRUN
/content-security-policy/navigate-to/form-redirected-allowed.htmlOK
Test that the child iframe navigation is allowedPASS
/content-security-policy/reporting/report-strips-fragment.htmlOK
Reported document URI does not contain fragments.PASS
/content-security-policy/connect-src/shared-worker-connect-src-blocked.sub.htmlOK
Expecting logs: ["xhr blocked","TEST COMPLETE"]PASS
/content-security-policy/navigate-to/link-click-cross-origin-allowed.sub.htmlOK
Test that the child iframe navigation is allowedPASS
/content-security-policy/form-action/form-action-src-redirect-allowed-target-frame.sub.htmlOK
form submission targetting a frame allowed after a redirectPASS
/content-security-policy/reporting/report-uri-from-child-frame.htmlOK
Check that we received a message from the child framePASS
Violation report status OK.PASS
/content-security-policy/object-src/object-src-url-allowed.htmlOK
Violation report status OK.PASS
/content-security-policy/style-src-attr-elem/style-src-elem-blocked-src-allowed.htmlTIMEOUT
Should fire a security policy violation eventNOTRUN
The inline style should not be appliedFAIL
/content-security-policy/sandbox/iframe-inside-csp.sub.htmlOK
Expecting logs: ["PASS (1/2): Script can execute","PASS (2/2): Eval works"]PASS
/content-security-policy/embedded-enforcement/subsumption_algorithm-hashes.htmlOK
'sha256-abc123' is not subsumed by 'sha256-abc456'.FAIL
'sha256-abc123' is properly subsumed with other sources.PASS
'sha256-abc123' is properly subsumed.PASS
Effective policy is properly found where 'sha256-abc123' is not part of it.PASS
Effective policy is properly found where 'sha256-abc123' is not subsumed.FAIL
Effective policy is properly found.PASS
Effective policy now does not allow 'sha256-abc123'.PASS
Hashes do not have to be present in returned csp but must not allow all inline behavior.FAIL
Hashes do not have to be present in returned csp.PASS
Other expressions have to be subsumed but 'unsafe-inline' gets ignored.PASS
Other expressions have to be subsumed.FAIL
Required csp must allow 'sha256-abc123'.FAIL
Returned should not include hashes not present in required csp.FAIL
/content-security-policy/connect-src/connect-src-xmlhttprequest-blocked.sub.htmlOK
Expecting logs: ["Pass","violated-directive=connect-src"]PASS
/content-security-policy/child-src/child-src-allowed.sub.htmlOK
Expecting alerts: ["PASS"]PASS
Expecting logs: ["PASS IFrame #1 generated a load event."]PASS
/content-security-policy/worker-src/dedicated-fallback.sub.htmlOK
Same-origin dedicated worker allowed by host-source expression.PASS
blob: dedicated worker allowed by 'blob:'.PASS
/content-security-policy/script-src/scriptnonce-basic-blocked.sub.htmlOK
Expecting alerts: ["PASS (closely-quoted nonce)","PASS (nonce w/whitespace)", "violated-directive=script-src-elem", "violated-directive=script-src-elem", "violated-directive=script-src-elem"]FAIL
/content-security-policy/form-action/form-action-src-allowed.sub.htmlOK
Expecting logs: ["PASS","TEST COMPLETE"]PASS
/content-security-policy/script-src/hash-always-converted-to-utf-8/iso-8859-9.htmlOK
Should convert the script contents to UTF-8 before hashingFAIL
/content-security-policy/unsafe-eval/eval-blocked.sub.htmlOK
Expecting logs: ["PASS EvalError","PASS EvalError", "violated-directive=script-src"]PASS
/content-security-policy/form-action/form-action-src-javascript-blocked.sub.htmlOK
Expecting logs: ["violated-directive=form-action","TEST COMPLETE"]PASS
/content-security-policy/unsafe-eval/eval-scripts-setInterval-allowed.sub.htmlOK
Expecting logs: ["PASS 1 of 2","PASS 2 of 2"]PASS
/content-security-policy/frame-ancestors/frame-ancestors-self-block.htmlTIMEOUT
A 'frame-ancestors' CSP directive with a value 'self' should block rendering.NOTRUN
/content-security-policy/style-src/style-src-inline-style-blocked.htmlOK
Inline style element should not load without 'unsafe-inline'PASS
Should fire a securitypolicyviolation eventFAIL
/content-security-policy/script-src/worker-set-timeout-blocked.sub.htmlOK
Expecting alerts: ["setTimeout blocked"]PASS
/content-security-policy/unsafe-eval/eval-scripts-setTimeout-allowed.sub.htmlOK
Expecting logs: ["PASS 1 of 2","PASS 2 of 2"]PASS
/content-security-policy/embedded-enforcement/subsumption_algorithm-unsafe_inline.htmlOK
'strict-dynamic' is ineffective for `style-src`.PASS
'unsafe-inline' does not matter if returned csp is effectively `none`.PASS
'unsafe-inline' is ineffective when nonces are present.PASS
'unsafe-inline' is only ineffective if the effective returned csp has hashes in `script-src`.PASS
'unsafe-inline' is only ineffective if the effective returned csp has hashes in `style-src`.PASS
'unsafe-inline' is only ineffective if the effective returned csp has nonces in `style-src`.PASS
'unsafe-inline' is properly subsumed in `script-src`.PASS
'unsafe-inline' is properly subsumed in `style-src`.PASS
Effective returned csp allows 'unsafe-inline'FAIL
Effective returned csp does not allow 'sha512-321cba' hash.PASS
Required csp allows `strict-dynamic`, but retuned csp does.FAIL
Required csp does not allow `unsafe-inline`, but retuned csp does.FAIL
Returned csp does not have to allow 'unsafe-inline' in `style-src` to be subsumed.PASS
Returned csp only loads 'unsafe-inline' scripts with 'nonce-abc'.PASS
Returned csp whitelists a hash.FAIL
Returned csp whitelists a nonce.FAIL
/content-security-policy/script-src/worker-importscripts-blocked.sub.htmlOK
Expecting logs: ["TEST COMPLETE"]PASS
worker-importscripts-blockedPASS
/content-security-policy/svg/svg-from-guid.htmlOK
Expecting logs: ["TEST COMPLETE"]PASS
/content-security-policy/frame-ancestors/frame-ancestors-nested-cross-in-same-star-allow.htmlTIMEOUT
undefinedTIMEOUT
/content-security-policy/unsafe-hashes/style_attribute_denied_missing_unsafe_hashes.htmlTIMEOUT
Test that the inline style attribute is blockedNOTRUN
/content-security-policy/worker-src/dedicated-self.sub.htmlOK
Same-origin dedicated worker allowed by 'self'.PASS
/content-security-policy/img-src/icon-blocked.sub.htmlOK
Test that image does not loadPASS
Test that spv event is firedFAIL
/content-security-policy/img-src/report-blocked-data-uri.sub.htmlOK
Expecting logs: ["violated-directive=img-src"]PASS
/content-security-policy/frame-ancestors/frame-ancestors-nested-same-in-cross-star-allow.htmlTIMEOUT
A 'frame-ancestors' CSP directive with a value '*' should render in nested frames.NOTRUN
/content-security-policy/worker-src/shared-none.sub.htmlOK
Same-origin shared worker blocked by 'none'.FAIL
blob: shared worker blocked by 'none'.FAIL
/content-security-policy/navigate-to/meta-refresh-redirected-allowed.htmlOK
Test that the child iframe navigation is allowedPASS
/content-security-policy/navigate-to/child-navigates-parent-blocked.sub.htmlOK
Test that the child can't navigate the parent because the relevant policy belongs to the navigation initiator (in this case the child which has the policy `navigate-to 'none'`)FAIL
Violation report status OK.FAIL
/content-security-policy/securitypolicyviolation/blockeduri-eval.htmlOK
Eval violations have a blockedURI of 'eval'PASS
/content-security-policy/worker-src/dedicated-list.sub.htmlOK
Same-origin dedicated worker allowed by host-source expression.PASS
blob: dedicated worker allowed by 'blob:'.PASS
/content-security-policy/img-src/img-src-host-partial-wildcard-allowed.sub.htmlOK
img src matches correctly partial wildcard host csp directivePASS
/content-security-policy/reporting/report-blocked-uri-cross-origin.sub.htmlOK
Violation report status OK.PASS
/content-security-policy/style-src/style-src-error-event-fires.htmlTIMEOUT
Test error event fires on inline styleNOTRUN
Test error event fires on stylesheet linkPASS
/content-security-policy/generic/filesystem-urls-do-not-match-self.sub.htmlTIMEOUT
Expecting logs: ["violated-directive=script-src-elem"]NOTRUN
filesystem-urls-do-not-match-selfNOTRUN
/content-security-policy/sandbox/sandbox-allow-scripts.sub.htmlOK
Expecting logs: ["Message"]PASS
/content-security-policy/script-src/worker-function-function-blocked.sub.htmlOK
Expecting logs: ["Function() function blocked"]PASS
/content-security-policy/style-src-attr-elem/style-src-elem-blocked-attr-allowed.htmlTIMEOUT
Should fire a security policy violation for the inline blockNOTRUN
The inline style should not be applied and the attribute style should be appliedFAIL
/content-security-policy/generic/generic-0_10.htmlOK
Test that script does not fire violation eventPASS
/content-security-policy/style-src/style-src-injected-inline-style-allowed.htmlOK
Injected inline style should load with 'unsafe-inline'PASS
/content-security-policy/generic/generic-0_9.sub.htmlTIMEOUT
Test that script does not fire violation eventPASS
/content-security-policy/generic/directive-name-case-insensitive.sub.htmlOK
Test that the www1 image is allowed to loadPASS
Test that the www2 image is not allowed to loadPASS
Test that the www2 image throws a violation eventPASS
/content-security-policy/navigate-to/href-location-allowed.htmlTIMEOUT
Test that the child iframe navigation is allowedNOTRUN
/content-security-policy/navigate-to/link-click-redirected-blocked.sub.htmlOK
Test that the child iframe navigation is not allowedFAIL
Violation report status OK.FAIL
/content-security-policy/worker-src/service-child.https.sub.htmlOK
Same-origin service worker allowed by host-source expression.PASS
/content-security-policy/navigate-to/unsafe-allow-redirects/blocked-end-of-chain.sub.htmlOK
Test that the child iframe navigation is blockedFAIL
/content-security-policy/media-src/media-src-7_2_2.sub.htmlOK
Disallaowed audio srcPASS
Disallowed audio source elementPASS
Test that securitypolicyviolation events are firedPASS
/content-security-policy/frame-ancestors/frame-ancestors-nested-same-in-same-url-block.htmlTIMEOUT
A 'frame-ancestors' CSP directive with a URL value should block or allow rendering in nested frames as appropriate.NOTRUN
/content-security-policy/script-src/srcdoc-doesnt-bypass-script-src.sub.htmlOK
Expecting logs: ["violated-directive=script-src-elem"]FAIL
/content-security-policy/script-src/hash-always-converted-to-utf-8/utf-8-lone-surrogate.htmlOK
Should convert the script contents to UTF-8 before hashingPASS
/content-security-policy/navigate-to/link-click-blocked.sub.htmlOK
Test that the child iframe navigation is not allowedFAIL
Violation report status OK.FAIL
/content-security-policy/img-src/img-src-none-blocks.htmlOK
img-src with 'none' source should not matchPASS
/content-security-policy/frame-ancestors/frame-ancestors-nested-cross-in-cross-url-block.htmlTIMEOUT
A 'frame-ancestors' CSP directive with a URL value should block or allow rendering in nested frames as appropriate.NOTRUN
/content-security-policy/frame-ancestors/frame-ancestors-nested-cross-in-cross-star-allow.htmlTIMEOUT
A 'frame-ancestors' CSP directive with a value '*' should render in nested frames.NOTRUN
/content-security-policy/prefetch-src/prefetch-header-allowed.htmlTIMEOUT
Browser supports performance APIs.PASS
Browser supports prefetch.PASS
Prefetch via `Link` header succeeds when allowed by prefetch-srcTIMEOUT
/content-security-policy/blob/star-doesnt-match-blob.sub.htmlOK
Expecting logs: ["violated-directive=worker-src","TEST COMPLETE"]FAIL
/content-security-policy/script-src/scripthash-ignore-unsafeinline.sub.htmlOK
Expecting alerts: ["PASS (1/1)"]PASS
/content-security-policy/script-src/script-src-1_10_1.htmlOK
Test that no report violation event was raisedPASS
Verify that data: as script src runs with this policyPASS
/content-security-policy/reporting/report-uri-from-inline-javascript.htmlOK
Violation report status OK.PASS
/content-security-policy/embedded-enforcement/idlharness.window.htmlOK
HTMLIFrameElement interface: attribute cspFAIL
HTMLIFrameElement interface: document.createElement("iframe") must inherit property "csp" with the proper typeFAIL
Partial interface HTMLIFrameElement: original interface definedPASS
idl_test setupPASS
/content-security-policy/navigate-to/form-cross-origin-blocked.sub.htmlOK
Test that the child iframe navigation is not allowedFAIL
Violation report status OK.FAIL
/content-security-policy/script-src/script-src-1_2_1.htmlOK
DOM manipulation inline testsPASS
Test that securitypolicyviolation event is firedFAIL
/content-security-policy/script-src/scriptnonce-redirect.sub.htmlOK
Expecting alerts: ["PASS"]PASS
/content-security-policy/generic/only-valid-whitespaces-are-allowed.htmlOK
Should load image without any CSP - HTTP headerPASS
Should load image without any CSP - meta tagPASS
Should not load image with 'none' CSP - HTTP headerPASS
Should not load image with 'none' CSP - meta tagPASS
U+0009 TAB should be properly parsed between directive name and value - HTTP headerPASS
U+0009 TAB should be properly parsed between directive name and value - meta tagPASS
U+0009 TAB should be properly parsed inside directive value - HTTP headerPASS
U+0009 TAB should be properly parsed inside directive value - meta tagPASS
U+000A LF should be properly parsed between directive name and value - meta tagPASS
U+000A LF should be properly parsed inside directive value - meta tagPASS
U+000C FF should be properly parsed between directive name and value - HTTP headerPASS
U+000C FF should be properly parsed between directive name and value - meta tagPASS
U+000C FF should be properly parsed inside directive value - HTTP headerPASS
U+000C FF should be properly parsed inside directive value - meta tagPASS
U+000D CR should be properly parsed between directive name and value - meta tagPASS
U+000D CR should be properly parsed inside directive value - meta tagPASS
U+0020 SPACE should be properly parsed between directive name and value - HTTP headerPASS
U+0020 SPACE should be properly parsed between directive name and value - meta tagPASS
U+0020 SPACE should be properly parsed inside directive value - HTTP headerPASS
U+0020 SPACE should be properly parsed inside directive value - meta tagPASS
U+00A0 NBSP should not be parsed between directive name and value - HTTP headerPASS
U+00A0 NBSP should not be parsed between directive name and value - meta tagPASS
U+00A0 NBSP should not be parsed inside directive value - HTTP headerFAIL
U+00A0 NBSP should not be parsed inside directive value - meta tagFAIL
/content-security-policy/frame-src/frame-src-redirect.htmlTIMEOUT
Redirected iframe src should evaluate both enforced and report-only policies on both original request and when following redirectTIMEOUT
/content-security-policy/inside-worker/shared-inheritance.htmlTIMEOUT
Cross-origin 'fetch()' in http:TIMEOUT
Cross-origin 'fetch()' in http:?pipe=sub|header(Content-Security-Policy,connect-src%20%27self%27)PASS
Cross-origin 'fetch()' in http:?pipe=sub|header(Content-Security-Policy,default-src%20%27self%27)PASS
Cross-origin XHR in http:TIMEOUT
Cross-origin XHR in http:?pipe=sub|header(Content-Security-Policy,connect-src%20%27self%27)PASS
Cross-origin XHR in http:?pipe=sub|header(Content-Security-Policy,default-src%20%27self%27)PASS
Same-origin 'fetch()' in http:PASS
Same-origin 'fetch()' in http:?pipe=sub|header(Content-Security-Policy,connect-src%20%27self%27)PASS
Same-origin 'fetch()' in http:?pipe=sub|header(Content-Security-Policy,default-src%20%27self%27)PASS
Same-origin => cross-origin 'fetch()' in http:TIMEOUT
Same-origin => cross-origin 'fetch()' in http:?pipe=sub|header(Content-Security-Policy,connect-src%20%27self%27)PASS
Same-origin => cross-origin 'fetch()' in http:?pipe=sub|header(Content-Security-Policy,default-src%20%27self%27)PASS
Same-origin XHR in http:PASS
Same-origin XHR in http:?pipe=sub|header(Content-Security-Policy,connect-src%20%27self%27)PASS
Same-origin XHR in http:?pipe=sub|header(Content-Security-Policy,default-src%20%27self%27)PASS
/content-security-policy/worker-src/service-none.https.sub.htmlOK
Same-origin service worker blocked by 'none'.FAIL
/content-security-policy/frame-src/frame-src-about-blank-allowed-by-scheme.sub.htmlOK
Expecting logs: ["PASS"]PASS
/content-security-policy/script-src-attr-elem/script-src-elem-blocked-attr-allowed.htmlTIMEOUT
Should execute the inline script attributePASS
Should fire a security policy violation for the attributeNOTRUN
/content-security-policy/reporting/report-blocked-data-uri.htmlOK
Violation report status OK.PASS
/content-security-policy/securitypolicyviolation/securitypolicyviolation-block-cross-origin-image-from-script.sub.htmlOK
Non-redirected cross-origin URLs are not stripped.FAIL
/content-security-policy/style-src/style-src-imported-style-allowed.sub.htmlOK
Imported style that violates policy should not loadPASS
/content-security-policy/reporting/report-uri-multiple.htmlOK
Violation report status OK.PASS
/content-security-policy/inheritance/inherited-csp-list-modifications-are-local.htmlTIMEOUT
Test that embedded iframe document image does not loadPASS
Test that parent document image loadsFAIL
Test that spv event is firedNOTRUN
/content-security-policy/navigation/javascript-url-navigation-inherits-csp.htmlOK
javascript-url-navigation-inherits-cspFAIL
/content-security-policy/sandbox/window-reuse-sandboxed.htmlTIMEOUT
Window object should not be reusedNOTRUN
/content-security-policy/unsafe-eval/function-constructor-blocked.sub.htmlOK
Expecting logs: ["PASS EvalError","violated-directive=script-src"]PASS
/content-security-policy/navigate-to/spv-only-sent-to-initiator.sub.htmlTIMEOUT
Test that no spv event is raisedNOTRUN
Violation report status OK.PASS
/content-security-policy/worker-src/dedicated-none.sub.htmlOK
Same-origin dedicated worker blocked by host-source expression.FAIL
blob: dedicated worker blocked by 'blob:'.FAIL
/content-security-policy/unsafe-eval/eval-scripts-setInterval-blocked.sub.htmlOK
Expecting logs: ["PASS","violated-directive=script-src"]PASS
/content-security-policy/generic/generic-0_8.sub.htmlOK
Test that script does not fire violation eventPASS
/content-security-policy/generic/generic-0_10_1.sub.htmlOK
Prevents access to external scripts.PASS
Should fire violation events for every failed violationFAIL
/content-security-policy/style-src/style-src-inline-style-nonce-allowed.htmlOK
Style with correct nonce should loadPASS
/content-security-policy/securitypolicyviolation/style-sample-no-opt-in.htmlOK
Inline style attributes should not have a sample.PASS
Inline style blocks should not have a sample.PASS
/content-security-policy/frame-ancestors/frame-ancestors-nested-same-in-same-url-allow.htmlOK
A 'frame-ancestors' CSP directive with a URL value should block or allow rendering in nested frames as appropriate.PASS
/content-security-policy/font-src/font-self-allowed.htmlTIMEOUT
Test font loads if it matches font-src.TIMEOUT
/content-security-policy/plugin-types/plugintypes-notype-url.htmlTIMEOUT
Should not load the object because it does not have a declared typeNOTRUN
/content-security-policy/frame-ancestors/frame-ancestors-star-allow-crossorigin.htmlTIMEOUT
A 'frame-ancestors' CSP directive with '*' should allow rendering.NOTRUN
/content-security-policy/frame-ancestors/frame-ancestors-nested-cross-in-same-none-block.htmlTIMEOUT
A 'frame-ancestors' CSP directive with a value 'none' should block rendering in nested frames.NOTRUN
/content-security-policy/plugin-types/plugintypes-mismatched-url.htmlTIMEOUT
Should not load the object because its declared type does not match its actual typeNOTRUN
/content-security-policy/blob/self-doesnt-match-blob.sub.htmlOK
Expecting logs: ["violated-directive=worker-src","TEST COMPLETE"]FAIL
/content-security-policy/object-src/object-src-url-embed-blocked.htmlOK
Should block the object and fire a spvPASS
/content-security-policy/style-src/stylenonce-allowed.sub.htmlOK
Should fire securitypolicyviolationFAIL
stylenonce-allowedPASS
stylenonce-allowed 1PASS
/content-security-policy/generic/generic-0_2_3.htmlOK
Prevents access to external scripts.PASS
Should fire violation events for every failed violationFAIL
/content-security-policy/script-src/script-src-1_10.htmlOK
Test that securitypolicyviolation event is firedFAIL
Verify that data: as script src doesn't run with this policyPASS
/content-security-policy/script-src/script-src-1_2.htmlOK
Inline event handlerPASS
Inline script blockPASS
Should fire policy violation eventsFAIL
/content-security-policy/navigate-to/child-navigates-parent-allowed.htmlOK
Test that the child can navigate the parent because the relevant policy belongs to the navigation initiator (in this case the child, which has the policy `navigate-to 'self'`)PASS
/content-security-policy/style-src/style-src-none-blocked.htmlOK
Should fire a securitypolicyviolation eventFAIL
Should not stylesheet when style-src is 'none'PASS
/content-security-policy/navigation/to-javascript-parent-initiated-parent-csp.htmlOK
Should not have executed the javascript urlFAIL
/content-security-policy/sandbox/sandbox-empty-subframe.sub.htmlOK
Expecting logs: ["PASS2"]PASS
/content-security-policy/frame-ancestors/frame-ancestors-nested-cross-in-cross-url-allow.htmlTIMEOUT
A 'frame-ancestors' CSP directive with a URL value should block or allow rendering in nested frames as appropriate.NOTRUN
/content-security-policy/frame-ancestors/frame-ancestors-nested-same-in-cross-url-block.htmlTIMEOUT
A 'frame-ancestors' CSP directive with a URL value should block or allow rendering in nested frames as appropriate.NOTRUN
/content-security-policy/frame-ancestors/frame-ancestors-nested-same-in-cross-self-block.htmlTIMEOUT
A 'frame-ancestors' CSP directive with a value 'same' should block render in same-origin nested frames.NOTRUN
/content-security-policy/generic/generic-0_2.htmlOK
Should fire violation events for every failed violationPASS
/content-security-policy/frame-ancestors/frame-ancestors-none-block.htmlTIMEOUT
A 'frame-ancestors' CSP directive with a value 'none' should block rendering.NOTRUN
/content-security-policy/form-action/form-action-src-allowed-target-frame.sub.htmlOK
form submission targetting a frame allowedPASS
/content-security-policy/navigate-to/meta-refresh-cross-origin-blocked.sub.htmlOK
Test that the child iframe navigation is not allowedFAIL
Violation report status OK.FAIL
/content-security-policy/media-src/media-src-7_3.sub.htmlOK
In-policy track elementPASS
Should not fire policy violation eventsPASS
/content-security-policy/script-src-attr-elem/script-src-elem-allowed-attr-blocked.htmlTIMEOUT
Should execute the inline script blockPASS
Should fire a security policy violation for the attributeNOTRUN
/content-security-policy/object-src/object-src-url-blocked.htmlOK
Should block the object and fire a spvPASS
/content-security-policy/prefetch-src/prefetch-allowed.htmlOK
Browser supports performance APIs.PASS
Browser supports prefetch.PASS
Prefetch succeeds when allowed by prefetch-srcFAIL
/content-security-policy/worker-src/service-worker-src-default-fallback.https.sub.htmlOK
Same-origin service worker allowed by default-src 'self'.PASS
/content-security-policy/securitypolicyviolation/style-sample.htmlOK
Inline style attributes should have a sample.PASS
Inline style blocks should have a sample.PASS
/content-security-policy/sandbox/sandbox-empty.sub.htmlOK
Expecting logs: ["PASS2"]PASS
/content-security-policy/worker-src/shared-worker-src-default-fallback.sub.htmlOK
Same-origin shared worker allowed by default-src 'self'.PASS
/content-security-policy/base-uri/base-uri-allow.sub.htmlOK
Check that base URIs can be set if they do not violate the page's policy.PASS
/content-security-policy/frame-ancestors/frame-ancestors-star-allow-sameorigin.htmlOK
A 'frame-ancestors' CSP directive with '*' should allow rendering.PASS
/content-security-policy/connect-src/connect-src-eventsource-allowed.sub.htmlOK
Expecting logs: ["allowed"]PASS
/content-security-policy/style-src/inline-style-attribute-allowed.sub.htmlOK
Expecting logs: ["PASS"]FAIL
/content-security-policy/connect-src/shared-worker-connect-src-allowed.sub.htmlOK
Expecting logs: ["xhr allowed","TEST COMPLETE"]PASS
/content-security-policy/connect-src/connect-src-websocket-self.sub.htmlOK
Expecting logs: ["allowed", "allowed"]PASS
/content-security-policy/script-src/scripthash-default-src.sub.htmlTIMEOUT
/content-security-policy/script-src/scripthash-default-src.sub.htmlTIMEOUT
/content-security-policy/prefetch-src/prefetch-header-blocked.htmlTIMEOUT
Browser supports performance APIs.PASS
Browser supports prefetch.PASS
Prefetch via `Link` header succeeds when allowed by prefetch-srcTIMEOUT
/content-security-policy/navigation/to-javascript-parent-initiated-child-csp.htmlOK
Should have executed the javascript urlPASS
/content-security-policy/script-src/scripthash-allowed.sub.htmlOK
Expecting alerts: ["PASS (1/4)","PASS (2/4)","PASS (3/4)","PASS (4/4)"]PASS
/content-security-policy/navigate-to/href-location-redirected-allowed.htmlTIMEOUT
Test that the child iframe navigation is allowedNOTRUN
/content-security-policy/inside-worker/dedicated-script.htmlTIMEOUT
Cross-origin `importScripts()` blocked in blob:PASS
Cross-origin `importScripts()` blocked in http:TIMEOUT
Cross-origin `importScripts()` blocked in http:?pipe=sub|header(Content-Security-Policy,default-src%20*)TIMEOUT
Cross-origin `importScripts()` blocked in http:?pipe=sub|header(Content-Security-Policy,script-src%20*)TIMEOUT
Filesystem and blob.PASS
`eval()` blocked in blob:PASS
`setTimeout([string])` blocked in blob:PASS
/content-security-policy/generic/filesystem-urls-match-filesystem.sub.htmlOK
Expecting logs: ["PASS (1/1)"]NOTRUN
/content-security-policy/navigate-to/form-redirected-blocked.sub.htmlOK
Test that the child iframe navigation is not allowedFAIL
Violation report status OK.FAIL
/content-security-policy/frame-ancestors/frame-ancestors-overrides-xfo.htmlTIMEOUT
A 'frame-ancestors' CSP directive overrides an 'x-frame-options' header which would allow the page.TIMEOUT
A 'frame-ancestors' CSP directive overrides an 'x-frame-options' header which would block the page.PASS
/content-security-policy/navigate-to/unsafe-allow-redirects/allowed-end-of-chain-because-of-same-origin.sub.htmlOK
Test that the child iframe navigation is allowedPASS
/content-security-policy/script-src/script-src-1_1.htmlOK
Inline event handlerPASS
Inline script blockPASS
Should fire policy violation eventsFAIL
/content-security-policy/img-src/img-src-wildcard-allowed.htmlOK
img-src with wildcard should match allPASS
img-src with wildcard should not match blobPASS
/content-security-policy/form-action/form-action-src-allowed-target-blank.sub.htmlOK
form submission targetting _blank allowed after a redirectPASS
/content-security-policy/embedded-enforcement/subsumption_algorithm-host_sources-protocols.htmlOK
All scheme sources are subsumed by their stronger variants.PASS
All scheme sources must be subsumed.FAIL
If scheme source is present in returned csp, it must be specified in required csp too.FAIL
Matching `https` protocols.PASS
The reverse allows iframe be to be loaded.PASS
`http:` does not subsume other protocols.FAIL
`http:` should subsume all host source expressions with `https:`.PASS
`http:` should subsume all host source expressions with this protocol.PASS
`http:` subsumes other `http:` source expression.PASS
`http:` subsumes other `https:` source expression and expressions with `http:`.PASS
`https` is more restrictive than `http`.FAIL
/content-security-policy/reporting/report-blocked-uri.htmlOK
Violation report status OK.PASS
/content-security-policy/reporting-api/reporting-api-report-only-sends-reports-on-violation.https.sub.htmlOK
Event is firedPASS
Test that image does not loadPASS
Violation report status OK.FAIL
/content-security-policy/connect-src/connect-src-websocket-allowed.sub.htmlOK
Expecting logs: ["allowed"]PASS
/content-security-policy/script-src/hash-always-converted-to-utf-8/iso-8859-7.htmlOK
Should convert the script contents to UTF-8 before hashingFAIL
/content-security-policy/style-src-attr-elem/style-src-attr-allowed-src-blocked.htmlOK
Should apply the style attributeFAIL
/content-security-policy/frame-ancestors/frame-ancestors-url-allow.sub.htmlOK
A 'frame-ancestors' CSP directive with a URL matching this origin should allow rendering.PASS
/content-security-policy/connect-src/connect-src-xmlhttprequest-allowed.sub.htmlOK
Expecting logs: ["Pass"]PASS
/content-security-policy/style-src/style-src-injected-stylesheet-blocked.sub.htmlOK
Programatically injected stylesheet should not loadPASS
Should fire a securitypolicyviolation eventFAIL
/content-security-policy/navigate-to/href-location-cross-origin-blocked.sub.htmlTIMEOUT
Test that the child iframe navigation is not allowedNOTRUN
Violation report status OK.FAIL
/content-security-policy/object-src/object-src-url-redirect-blocked.sub.htmlOK
Should block the object and fire a spvPASS
/content-security-policy/script-src/script-src-wildcards-disallowed.htmlOK
blob: URIs should not match *PASS
data: URIs should not match *PASS
filesystem URIs should not match *PASS
/content-security-policy/reporting-api/reporting-api-report-to-overrides-report-uri-1.https.sub.htmlOK
Event is firedPASS
Test that image does not loadPASS
/content-security-policy/embedded-enforcement/subsumption_algorithm-self.htmlOK
'self' keywords should match.PASS
Required 'self' should match to a origin's url.PASS
Required 'self' should subsume a more secure version of origin's url.PASS
Returned 'self' should match to an origin's url.PASS
Returned 'self' should not be subsumed by a more secure version of origin's url.FAIL
Returned CSP does not have to specify 'self'.PASS
Returned CSP must not allow 'self' if required CSP does not.FAIL
/content-security-policy/navigate-to/link-click-cross-origin-blocked.sub.htmlOK
Test that the child iframe navigation is not allowedFAIL
Violation report status OK.FAIL
/content-security-policy/style-src/style-src-star-allowed.htmlOK
* should allow any stylePASS
/content-security-policy/inheritance/iframe-all-local-schemes-inherit-self.sub.htmlOK
<iframe sandbox src='blob:...'>'s inherits policy. (opaque origin sandbox)PASS
<iframe src='blob:...'>'s inherits policy.PASS
<iframe src='data:...'>'s inherits policy.PASS
<iframe src='javascript:...'>'s inherits policy.PASS
<iframe srcdoc>'s inherits policy.PASS
<iframe>'s about:blank inherits policy.PASS
/content-security-policy/child-src/child-src-cross-origin-load.sub.htmlOK
Expecting alerts: ["PASS","PASS"]PASS
Expecting logs: ["PASS IFrame #1 generated a load event.","PASS IFrame #2 generated a load event.","PASS IFrame #3 generated a load event.", "violated-directive=frame-src"]FAIL
/content-security-policy/embedded-enforcement/allow_csp_from-header.htmlOK
Allow-CSP-From header enforces EmbeddingCSP.FAIL
Allow-CSP-From header with a star value can be returned.PASS
Cross origin iframe with an empty Allow-CSP-From header gets blocked.FAIL
Cross origin iframe without Allow-CSP-From header gets blocked.FAIL
Iframe with improper Allow-CSP-From header gets blocked.FAIL
Same origin iframes are allowed even if Allow-CSP-From does not match origin.PASS
Same origin iframes are allowed even if the Allow-CSP-From is empty.PASS
Same origin iframes are allowed even if the Allow-CSP-From is not present.PASS
Same origin iframes are always allowed.PASS
Star Allow-CSP-From header enforces EmbeddingCSP.FAIL
iframe from cross origin does not load without Allow-CSP-From header.PASS
/content-security-policy/reporting/report-uri-multiple-reversed.htmlOK
Violation report status OK.PASS
/content-security-policy/generic/generic-0_1-img-src.htmlOK
Should fire violation events for every failed violationFAIL
Verify cascading of default-src to img-src policyPASS
/content-security-policy/navigate-to/href-location-cross-origin-allowed.sub.htmlTIMEOUT
Test that the child iframe navigation is allowedNOTRUN
/content-security-policy/frame-src/frame-src-allowed.sub.htmlOK
Expecting alerts: ["PASS"]PASS
Expecting logs: ["PASS IFrame #1 generated a load event."]PASS
/content-security-policy/securitypolicyviolation/inside-dedicated-worker.htmlOK
No SecurityPolicyViolation event fired for successful load.PASS
SecurityPolicyViolation event fired on global with the correct blockedURI.PASS
SecurityPolicyViolation event fired on global.PASS
/content-security-policy/generic/duplicate-directive.sub.htmlOK
Expecting alerts: ["PASS (1/1)"]PASS
/content-security-policy/frame-ancestors/frame-ancestors-nested-cross-in-same-url-allow.htmlTIMEOUT
A 'frame-ancestors' CSP directive with a URL value should block or allow rendering in nested frames as appropriate.NOTRUN
/content-security-policy/unsafe-hashes/javascript_src_denied_wrong_hash-window_location.htmlTIMEOUT
Test that the javascript: src is not allowed to runNOTRUN
/content-security-policy/style-src/stylehash-allowed.sub.htmlOK
Expecting alerts: ["PASS (1/4): The '#p1' element's text is green, which means the style was correctly applied.","PASS (2/4): The '#p2' element's text is green, which means the style was correctly applied.","PASS (3/4): The '#p3' element's text is green, which means the style was correctly applied.","PASS (4/4): The '#p4' element's text is green, which means the style was correctly applied."]PASS
/content-security-policy/worker-src/service-self.https.sub.htmlOK
Same-origin service worker allowed by 'self'.PASS
/content-security-policy/script-src/scriptnonce-ignore-unsafeinline.sub.htmlOK
Expecting alerts: ["PASS (1/2)","PASS (2/2)", "violated-directive=script-src-elem"]FAIL
/content-security-policy/script-src/script-src-1_3.htmlOK
Inline script in a script tag should run with an unsafe-inline directivePASS
Should not fire policy violation eventsPASS
/content-security-policy/meta/meta-outside-head.sub.htmlOK
Expecting alerts: ["PASS (1/1)"]PASS
/content-security-policy/navigate-to/link-click-redirected-allowed.htmlOK
Test that the child iframe navigation is allowedPASS
/content-security-policy/child-src/child-src-about-blank-allowed-by-scheme.sub.htmlOK
Check that frames load without throwing any violation eventsPASS
/content-security-policy/default-src/default-src-inline-blocked.sub.htmlOK
Expecting logs: ["violated-directive=script-src-elem","violated-directive=script-src-elem"]FAIL
/content-security-policy/prefetch-src/prefetch-blocked.htmlTIMEOUT
Blocked prefetch generates report.TIMEOUT
Browser supports performance APIs.PASS
Browser supports prefetch.PASS
/content-security-policy/style-src/style-src-inline-style-allowed.htmlOK
Inline style should apply with 'unsafe-inline'PASS
/content-security-policy/script-src/eval-allowed-in-report-only-mode-and-sends-report.htmlOK
Eval is allowed because the CSP is report-onlyPASS
Violation report status OK.PASS
/content-security-policy/embedded-enforcement/subsumption_algorithm-host_sources-hosts.htmlOK
A wildcard host should match a more specific host.PASS
Host must match.FAIL
Hosts without wildcards must match.FAIL
More specific subdomain should not match.FAIL
Specified host should not match a wildcard host.FAIL
/content-security-policy/reporting/multiple-report-policies.htmlOK
1-Violation report status OKPASS
2-Violation report status OKPASS
/content-security-policy/navigate-to/meta-refresh-blocked.sub.htmlOK
Test that the child iframe navigation is not allowedFAIL
Violation report status OK.FAIL
/content-security-policy/frame-ancestors/frame-ancestors-nested-same-in-cross-none-block.htmlTIMEOUT
undefinedTIMEOUT
/content-security-policy/navigate-to/anchor-navigation-always-allowed.htmlOK
Test that anchor navigation is allowed regardless of the `navigate-to` directivePASS
/content-security-policy/worker-src/shared-fallback.sub.htmlOK
Same-origin dedicated worker allowed by 'self'.PASS
blob: dedicated worker allowed by 'blob:'.PASS
/content-security-policy/unsafe-hashes/style_attribute_allowed.htmlOK
Test that the inline style attribute is loadedFAIL
/content-security-policy/reporting/report-and-enforce.htmlOK
The image should be blockedPASS
The stylesheet should loadPASS
Violation report status OK.PASS
/content-security-policy/script-src/hash-always-converted-to-utf-8/iso-8859-3.htmlOK
Should convert the script contents to UTF-8 before hashingFAIL
/content-security-policy/media-src/media-src-7_1_2.sub.htmlOK
Disallowed async video source elementPASS
Disallowed async video srcPASS
Test that securitypolicyviolation events are firedPASS
/content-security-policy/securitypolicyviolation/inside-shared-worker.htmlOK
No SecurityPolicyViolation event fired for successful load.PASS
SecurityPolicyViolation event fired on global with the correct blockedURI.PASS
SecurityPolicyViolation event fired on global.PASS
/content-security-policy/frame-ancestors/frame-ancestors-nested-cross-in-same-url-block.htmlTIMEOUT
undefinedTIMEOUT
/content-security-policy/connect-src/connect-src-eventsource-redirect-to-blocked.sub.htmlOK
Expecting logs: ["PASS EventSource() did not follow the disallowed redirect.","TEST COMPLETE", "violated-directive=connect-src"]PASS
/content-security-policy/script-src-attr-elem/script-src-attr-blocked-src-allowed.htmlTIMEOUT
Should fire a security policy violation eventNOTRUN
/content-security-policy/style-src/inline-style-allowed.sub.htmlOK
Expecting logs: ["PASS"]PASS
/content-security-policy/worker-src/service-list.https.sub.htmlOK
Same-origin service worker allowed by host-source expression.PASS
/content-security-policy/connect-src/connect-src-beacon-redirect-to-blocked.sub.htmlOK
Expecting logs: ["violated-directive=connect-src"]PASS
/content-security-policy/script-src/script-src-strict_dynamic_discard_whitelist.htmlOK
Whitelisted script without a correct nonce is not allowed with `strict-dynamic`.FAIL
/content-security-policy/inside-worker/dedicated-inheritance.htmlTIMEOUT
Cross-origin 'fetch()' in blob:PASS
Cross-origin 'fetch()' in http:TIMEOUT
Cross-origin 'fetch()' in http:?pipe=sub|header(Content-Security-Policy,connect-src%20%27none%27)PASS
Cross-origin 'fetch()' in http:?pipe=sub|header(Content-Security-Policy,connect-src%20*)TIMEOUT
Cross-origin 'fetch()' in http:?pipe=sub|header(Content-Security-Policy,default-src%20*)TIMEOUT
Cross-origin XHR in blob:PASS
Cross-origin XHR in http:TIMEOUT
Cross-origin XHR in http:?pipe=sub|header(Content-Security-Policy,connect-src%20%27none%27)PASS
Cross-origin XHR in http:?pipe=sub|header(Content-Security-Policy,connect-src%20*)TIMEOUT
Cross-origin XHR in http:?pipe=sub|header(Content-Security-Policy,default-src%20*)TIMEOUT
Filesystem and blob.PASS
Same-origin 'fetch()' in blob:PASS
Same-origin 'fetch()' in http:PASS
Same-origin 'fetch()' in http:?pipe=sub|header(Content-Security-Policy,connect-src%20%27none%27)FAIL
Same-origin 'fetch()' in http:?pipe=sub|header(Content-Security-Policy,connect-src%20*)PASS
Same-origin 'fetch()' in http:?pipe=sub|header(Content-Security-Policy,default-src%20*)PASS
Same-origin => cross-origin 'fetch()' in blob:PASS
Same-origin => cross-origin 'fetch()' in http:TIMEOUT
Same-origin => cross-origin 'fetch()' in http:?pipe=sub|header(Content-Security-Policy,connect-src%20%27none%27)PASS
Same-origin => cross-origin 'fetch()' in http:?pipe=sub|header(Content-Security-Policy,connect-src%20*)TIMEOUT
Same-origin => cross-origin 'fetch()' in http:?pipe=sub|header(Content-Security-Policy,default-src%20*)TIMEOUT
Same-origin XHR in blob:PASS
Same-origin XHR in http:PASS
Same-origin XHR in http:?pipe=sub|header(Content-Security-Policy,connect-src%20%27none%27)FAIL
Same-origin XHR in http:?pipe=sub|header(Content-Security-Policy,connect-src%20*)PASS
Same-origin XHR in http:?pipe=sub|header(Content-Security-Policy,default-src%20*)PASS
/content-security-policy/generic/generic-0_2_2.sub.htmlOK
Prevents access to external scripts.PASS
Should fire violation events for every failed violationFAIL
/content-security-policy/script-src/hash-always-converted-to-utf-8/iso-8859-1.htmlOK
Should convert the script contents to UTF-8 before hashingFAIL
/content-security-policy/navigate-to/form-blocked.sub.htmlOK
Test that the child iframe navigation is not allowedFAIL
Violation report status OK.FAIL
/content-security-policy/style-src/style-src-hash-blocked.htmlOK
Should fire a securitypolicyviolation eventFAIL
Should load the style with a correct hashPASS
Should not load style that does not match hashPASS
/content-security-policy/child-src/child-src-redirect-blocked.sub.htmlOK
Expecting logs: ["PASS IFrame #1 generated a load event.", "violated-directive=frame-src"]FAIL
/content-security-policy/embedded-enforcement/subsumption_algorithm-general.htmlOK
If there is no required csp, iframe should load.PASS
Iframe should load even if the ports are different but are default for the protocols.PASS
Iframe with a different CSP should be blocked.FAIL
Iframe with a matching and more restrictive ports should load.PASS
Iframe with empty returned CSP should be blocked.FAIL
Iframe with less restricting CSP should be blocked.PASS
Iframe with matching CSP should load.PASS
Iframe with more restricting CSP should load.PASS
/content-security-policy/generic/no-default-src.sub.htmlOK
Allows scripts from the same host.PASS
Violation report status OK.PASS
/content-security-policy/reporting/report-same-origin-with-cookies.htmlOK
Image should not loadPASS
Test report cookies.FAIL
Violation report status OK.PASS
/content-security-policy/frame-ancestors/frame-ancestors-nested-same-in-same-self-allow.htmlOK
A 'frame-ancestors' CSP directive with a value 'same' should block render in same-origin nested frames.PASS
/content-security-policy/script-src/scripthash-unicode-normalization.sub.htmlOK
Only matching content runs even with NFC normalization.PASS
Should fire securitypolicyviolationFAIL
/content-security-policy/script-src/scriptnonce-allowed.sub.htmlOK
Expecting alerts: ["PASS (1/2)","PASS (2/2)"]PASS
/content-security-policy/child-src/child-src-conflicting-frame-src.sub.htmlOK
Expecting logs: ["PASS IFrame #1 generated a load event.", "violated-directive=frame-src"]FAIL
/content-security-policy/navigate-to/form-action/form-action-allows-navigate-to-allows.sub.htmlOK
Test that form-action overrides navigate-to when present.PASS
/content-security-policy/style-src/style-blocked.sub.htmlOK
Expecting logs: ["violated-directive=style-src","PASS"]PASS
/content-security-policy/securitypolicyviolation/securitypolicyviolation-block-cross-origin-image.sub.htmlOK
Non-redirected cross-origin URLs are not stripped.PASS
/content-security-policy/font-src/font-mismatch-blocked.sub.htmlTIMEOUT
Test font does not load if it does not match font-src.TIMEOUT
/content-security-policy/embedded-enforcement/subsumption_algorithm-nonces.htmlOK
A nonce has to be returned if required by the embedder.PASS
Any nonce subsumes.PASS
Exact nonce subsumes.PASS
Multiples nonces returned subsume.PASS
Nonce intersection is still done on exact match - matching nonces.PASS
Nonce intersection is still done on exact match - non-matching nonces.PASS
Other expressions still have to be subsumed - negative testPASS
Other expressions still have to be subsumed - positive test.PASS
/content-security-policy/connect-src/connect-src-beacon-allowed.sub.htmlOK
Expecting logs: ["Pass"]PASS
/content-security-policy/media-src/media-src-7_3_2.sub.htmlOK
Disallowed track element onerror handler fires.PASS
Test that securitypolicyviolation events are firedPASS
/content-security-policy/img-src/img-src-self-unique-origin.htmlOK
Image's url must not match with 'self'. Image must be blocked.PASS
/content-security-policy/connect-src/worker-connect-src-allowed.sub.htmlOK
Expecting logs: ["xhr allowed"]PASS
/content-security-policy/form-action/form-action-src-blocked.sub.htmlOK
Expecting logs: ["violated-directive=form-action","TEST COMPLETE"]PASS
/content-security-policy/style-src/style-src-imported-style-blocked.htmlOK
@import stylesheet should not load because it does not match style-srcPASS
Should fire a securitypolicyviolation eventFAIL
/content-security-policy/navigate-to/form-allowed.htmlOK
Test that the child iframe navigation is allowedPASS
/content-security-policy/securitypolicyviolation/securitypolicyviolation-block-image-from-script.sub.htmlOK
Non-redirected cross-origin URLs are not stripped.FAIL
/content-security-policy/embedded-enforcement/subsumption_algorithm-none.htmlOK
Both required and returned csp are `none` for only one directive.FAIL
Both required and returned csp are `none`.PASS
Both required and returned csp are effectively 'none'.PASS
Both required and returned csp are empty.PASS
Empty required csp subsumes a policy with `none`.PASS
Empty required csp subsumes any list of policies.PASS
Empty required csp subsumes empty list of returned policies.PASS
Required csp with `none` does not subsume `none` of another directive.FAIL
Required csp with `none` does not subsume `none` of different directives.FAIL
Required csp with `none` does not subsume a host source expression.FAIL
Required csp with `none` subsumes effective list of `none` despite other keywords.PASS
Required csp with `none` subsumes effective list of `none`.PASS
Required csp with effective `none` does not subsume `none` of another directive.FAIL
Required csp with effective `none` does not subsume a host source expression.FAIL
Required policy that allows `none` does not subsume empty list of policies.FAIL
Returned csp with `none` is subsumed by any required csp.PASS
Returned csp with effective `none` is subsumed by any required csp.PASS
Source list with exprssions other than `none` make `none` ineffective.PASS
/content-security-policy/connect-src/worker-from-guid.sub.htmlOK
Expecting logs: ["violated-directive=connect-src","xhr blocked","TEST COMPLETE"]PASS
/content-security-policy/reporting/report-only-in-meta.sub.htmlOK
Image should loadPASS
Violation report status OK.PASS
/content-security-policy/embedded-enforcement/subsumption_algorithm-strict_dynamic.htmlOK
'strict-dynamic' has to be allowed by required csp if it is present in returned csp.FAIL
'strict-dynamic' is effective only for `script-src`.PASS
'strict-dynamic' is ineffective for `child-src`.PASS
'strict-dynamic' is ineffective for `frame-src`.PASS
'strict-dynamic' is ineffective for `img-src`.PASS
'strict-dynamic' is ineffective for `style-src`.PASS
'strict-dynamic' is proper handled for finding effective policy.PASS
'strict-dynamic' makes 'self' ineffective.PASS
'strict-dynamic' makes 'unsafe-inline' ineffective.PASS
'strict-dynamic' makes host source expressions ineffective.PASS
'strict-dynamic' makes scheme source expressions ineffective.PASS
/content-security-policy/worker-src/dedicated-worker-src-default-fallback.sub.htmlOK
Same-origin dedicated worker allowed by default-src 'self'.PASS
/content-security-policy/object-src/object-src-url-redirect-allowed.htmlOK
Violation report status OK.PASS
/content-security-policy/worker-src/shared-child.sub.htmlOK
Same-origin dedicated worker allowed by 'self'.PASS
blob: dedicated worker allowed by 'blob:'.PASS
/content-security-policy/embedded-enforcement/subsumption_algorithm-unsafe_hashes.htmlOK
'unsafe-hashes' is properly subsumed.PASS
Effective policy is properly found where 'unsafe-hashes' is not part of it.PASS
Effective policy is properly found where 'unsafe-hashes' is not subsumed.FAIL
Effective policy is properly found.PASS
No other keyword has the same effect as 'unsafe-hashes'.FAIL
Other expressions have to be subsumed.FAIL
Required csp must allow 'unsafe-hashes'.FAIL
/content-security-policy/embedded-enforcement/subsumption_algorithm-host_sources-ports.htmlOK
Returned CSP should be subsumed even if the port is not specified but is a default port for a more secure scheme.PASS
Returned CSP should be subsumed even if the port is not specified but is a default port for a scheme.PASS
Returned CSP should be subsumed if the port is specified but is not default for a more secure scheme.FAIL
Returned CSP should be subsumed if the port is specified but the scheme is more secure.PASS
Returned CSP should be subsumed if the port is specified.PASS
Returned CSP should be subsumed if the ports match but schemes are not identical for `ws`.PASS
Returned CSP should be subsumed if the ports match but schemes are not identical.PASS
Specified ports must match.FAIL
The same should hold for `ws` case.PASS
Unspecified ports must match if schemes match.PASS
Wildcard port should match a wildcard.PASS
Wildcard port should match any specific port.PASS
Wildcard port should match unspecified port.PASS
Wildcard port should not be subsumed by a default port.FAIL
Wildcard port should not be subsumed by a spcified port.FAIL
/content-security-policy/script-src/scripthash-basic-blocked.sub.htmlOK
Expecting alerts: ["PASS (1/1)"]PASS
/content-security-policy/base-uri/report-uri-does-not-respect-base-uri.sub.htmlOK
Event is firedPASS
Test that image does not loadPASS
Violation report status OK.PASS
/content-security-policy/generic/generic-0_8_1.sub.htmlOK
Should fire violation events for every failed violationFAIL
/content-security-policy/reporting/report-uri-scheme-relative.htmlOK
Violation report status OK.PASS
/content-security-policy/reporting-api/reporting-api-sends-reports-on-violation.https.sub.htmlOK
Event is firedPASS
Test that image does not loadPASS
Violation report status OK.FAIL
/content-security-policy/svg/svg-policy-with-resource.htmlOK
Expecting logs: ["TEST COMPLETE"]PASS
/content-security-policy/style-src/inline-style-blocked.sub.htmlOK
Expecting logs: ["PASS"]PASS
/content-security-policy/img-src/icon-allowed.sub.htmlOK
Test that image loadsPASS
/content-security-policy/style-src/style-src-hash-allowed.htmlOK
All style elements should load because they have proper hashesPASS
/content-security-policy/reporting-api/reporting-api-report-to-overrides-report-uri-2.https.sub.htmlOK
Event is firedPASS
Test that image does not loadPASS
/content-security-policy/navigate-to/form-action/form-action-allows-navigate-to-blocks.sub.htmlOK
Test that form-action overrides navigate-to when present.PASS
/content-security-policy/child-src/child-src-about-blank-allowed-by-default.sub.htmlOK
Check that frames load without throwing any violation eventsPASS
/content-security-policy/securitypolicyviolation/img-src-redirect-upgrade-reporting.https.htmlOK
Image that redirects to http:// URL prohibited by Report-Only must generate a violation report, even with upgrade-insecure-requestsPASS
/content-security-policy/navigate-to/meta-refresh-allowed.htmlOK
Test that the child iframe navigation is allowedPASS
/content-security-policy/inside-worker/shared-script.htmlTIMEOUT
Cross-origin `importScripts()` blocked in http:?pipe=sub|header(Content-Security-Policy,default-src%20%27self%27PASS
Cross-origin `importScripts()` blocked in http:?pipe=sub|header(Content-Security-Policy,script-src%20%27self%27PASS
`eval()` blocked in http:?pipe=sub|header(Content-Security-Policy,default-src%20%27self%27PASS
`eval()` blocked in http:?pipe=sub|header(Content-Security-Policy,script-src%20%27self%27PASS
`setTimeout([string])` blocked in http:?pipe=sub|header(Content-Security-Policy,default-src%20%27self%27PASS
`setTimeout([string])` blocked in http:?pipe=sub|header(Content-Security-Policy,script-src%20%27self%27PASS
/content-security-policy/unsafe-eval/function-constructor-allowed.sub.htmlOK
Expecting logs: ["PASS"]PASS
/content-security-policy/worker-src/shared-self.sub.htmlOK
Same-origin dedicated worker allowed by 'self'.PASS
/content-security-policy/navigate-to/meta-refresh-cross-origin-allowed.sub.htmlOK
Test that the child iframe navigation is allowedPASS
/content-security-policy/img-src/img-src-4_1.sub.htmlOK
img-src for relative path should loadPASS
img-src from approved domains should loadPASS
img-src from unapproved domains should not loadPASS
/content-security-policy/connect-src/connect-src-beacon-blocked.sub.htmlOK
Expecting logs: ["Pass", "violated-directive=connect-src"]PASS
/content-security-policy/navigate-to/form-action/form-action-blocks-navigate-to-blocks.sub.htmlTIMEOUT
undefinedTIMEOUT
/content-security-policy/object-src/object-src-no-url-blocked.htmlTIMEOUT
Should block the object and fire a spvNOTRUN
/content-security-policy/style-src-attr-elem/style-src-elem-allowed-src-blocked.htmlOK
Inline style should be appliedFAIL
/content-security-policy/font-src/font-none-blocked.sub.htmlTIMEOUT
Test font does not load if it does not match font-src.TIMEOUT
/content-security-policy/script-src/script-src-1_4_2.htmlOK
Test that securitypolicyviolation event is firedPASS
Unsafe eval ran in Function() constructor.PASS
/content-security-policy/child-src/child-src-blocked.sub.htmlOK
Expecting logs: ["PASS IFrame #1 generated a load event.", "violated-directive=frame-src"]FAIL
/content-security-policy/style-src/inline-style-attribute-on-html.sub.htmlOK
Expecting logs: ["PASS"]PASS
/content-security-policy/navigate-to/href-location-redirected-blocked.sub.htmlTIMEOUT
Test that the child iframe navigation is not allowedNOTRUN
Violation report status OK.FAIL
/content-security-policy/inheritance/iframe-all-local-schemes.sub.htmlOK
<iframe sandbox src='blob:...'>'s inherits policy. (opaque origin sandbox)FAIL
<iframe src='blob:...'>'s inherits policy.PASS
<iframe src='data:...'>'s inherits policy.PASS
<iframe src='javascript:...'>'s inherits policy.PASS
<iframe srcdoc>'s inherits policy.PASS
<iframe>'s about:blank inherits policy.PASS
/content-security-policy/frame-ancestors/frame-ancestors-nested-cross-in-cross-self-block.htmlTIMEOUT
A 'frame-ancestors' CSP directive with a value 'same' should block render in same-origin nested frames.NOTRUN
/content-security-policy/connect-src/connect-src-eventsource-blocked.sub.htmlOK
Expecting logs: ["blocked","violated-directive=connect-src"]PASS
/content-security-policy/form-action/form-action-self-allowed-target-blank.htmlOK
The form submission should not be blocked by the iframe's CSP.PASS
/content-security-policy/default-src/default-src-inline-allowed.sub.htmlOK
Expecting alerts: ["PASS 1 of 2","PASS 2 of 2"]PASS
/content-security-policy/generic/policy-inherited-correctly-by-plznavigate.htmlTIMEOUT
Violation report status OK.PASS
iframe still inherits correct CSPNOTRUN
/content-security-policy/script-src/worker-script-src.sub.htmlOK
Expecting logs: ["PASS"]PASS
/content-security-policy/navigate-to/meta-refresh-redirected-blocked.sub.htmlOK
Test that the child iframe navigation is not allowedFAIL
Violation report status OK.FAIL
/content-security-policy/unsafe-eval/eval-allowed.sub.htmlOK
Expecting alerts: ["PASS (1 of 2)","PASS (2 of 2)"]PASS
/content-security-policy/media-src/media-src-blocked.sub.htmlTIMEOUT
Disallaowed audio srcPASS
Disallowed async video source elementPASS
Disallowed async video srcPASS
Disallowed audio source elementPASS
Test that securitypolicyviolation events are firedTIMEOUT
/content-security-policy/meta/meta-modified.htmlOK
Expecting logs: ["PASS", "PASS","TEST COMPLETE"]PASS
/content-security-policy/reporting/report-multiple-violations-01.htmlOK
Test number of sent reports.FAIL
Violation report status OK.PASS
/content-security-policy/font-src/font-stylesheet-font-blocked.sub.htmlOK
Test font does not load if it does not match font-src.PASS
/content-security-policy/embedded-enforcement/required-csp-header-cascade.htmlOK
Test same origin: Test invalid policy on first iframe (bad directive)FAIL
Test same origin: Test invalid policy on first iframe (report directive)FAIL
Test same origin: Test invalid policy on second iframe (bad directive)FAIL
Test same origin: Test invalid policy on second iframe (report directive)FAIL
Test same origin: Test less restrictive policy on second iframeFAIL
Test same origin: Test more restrictive policy on second iframeFAIL
Test same origin: Test no policy on first iframeFAIL
Test same origin: Test no policy on second iframeFAIL
Test same origin: Test same policy for both iframesFAIL
/content-security-policy/generic/generic-0_1-script-src.htmlOK
Should fire violation events for every failed violationFAIL
Verify cascading of default-src to script-src policy: allowPASS
Verify cascading of default-src to script-src policy: blockPASS
/content-security-policy/embedded-enforcement/iframe-csp-attribute.htmlOK
<iframe> has a 'csp' attibute which is an empty string if undefined.FAIL
<iframe>'s 'csp content attribute reflects the IDL attribute.FAIL
<iframe>'s IDL attribute reflects the DOM attribute.FAIL
<iframe>'s csp attribute is always a string.FAIL
/content-security-policy/frame-ancestors/frame-ancestors-nested-same-in-same-none-block.htmlTIMEOUT
A 'frame-ancestors' CSP directive with a value 'none' should block rendering in nested frames.NOTRUN
/content-security-policy/style-src/style-src-stylesheet-nonce-allowed.htmlOK
Stylesheet link should load with correct noncePASS
/content-security-policy/generic/policy-does-not-affect-child.sub.htmlOK
Expecting logs: ["PASS"]PASS
/content-security-policy/img-src/img-src-full-host-wildcard-blocked.sub.htmlOK
img src does not match full host and wildcard csp directivePASS
/content-security-policy/script-src/injected-inline-script-blocked.sub.htmlOK
Expecting logs: ["violated-directive=script-src-elem",]FAIL
/content-security-policy/frame-src/frame-src-about-blank-allowed-by-default.sub.htmlOK
Expecting logs: ["PASS"]PASS
/content-security-policy/style-src/style-src-inline-style-attribute-allowed.htmlOK
Inline style attribute should apply with 'unsafe-inline'PASS
/content-security-policy/reporting/report-multiple-violations-02.htmlOK
Test number of sent reports.FAIL
Violation report status OK.PASS
/content-security-policy/style-src/style-src-inline-style-attribute-blocked.htmlOK
Inline style attribute should not be applied without 'unsafe-inline'PASS
Should fire a securitypolicyviolation eventFAIL
/content-security-policy/navigate-to/form-cross-origin-allowed.sub.htmlOK
Test that the child iframe navigation is allowedPASS
/content-security-policy/script-src/scriptnonce-and-scripthash.sub.htmlOK
Expecting alerts: ["PASS (1/3)","PASS (2/3)","PASS (3/3)"]FAIL
/content-security-policy/style-src/injected-inline-style-allowed.sub.htmlOK
Expecting logs: ["PASS: 2 stylesheets on the page."]PASS
/content-security-policy/reporting-api/reporting-api-works-on-frame-src.https.sub.htmlOK
Event is firedPASS
Violation report status OK.FAIL
/content-security-policy/form-action/form-action-src-redirect-allowed-target-blank.sub.htmlOK
form submission targetting _blank allowed after a redirectPASS
/content-security-policy/blob/blob-urls-match-blob.sub.htmlOK
Expecting logs: ["PASS (1/1)"]PASS
/content-security-policy/reporting/report-uri-from-javascript.htmlOK
Violation report status OK.PASS
/content-security-policy/object-src/object-src-no-url-allowed.htmlOK
Violation report status OK.PASS
/content-security-policy/reporting/report-uri-effective-directive.htmlOK
Violation report status OK.FAIL
/content-security-policy/embedded-enforcement/subsumption_algorithm-unsafe_eval.htmlOK
'unsafe-eval' is properly subsumed.PASS
Effective policy is properly found where 'unsafe-eval' is not part of it.PASS
Effective policy is properly found where 'unsafe-eval' is not subsumed.FAIL
Effective policy is properly found.PASS
No other keyword has the same effect as 'unsafe-eval'.FAIL
Other expressions have to be subsumed.FAIL
Required csp must allow 'unsafe-eval'.FAIL
/content-security-policy/form-action/form-action-src-get-blocked.sub.htmlOK
Expecting logs: ["violated-directive=form-action","TEST COMPLETE"]PASS
/content-security-policy/script-src/script-src-1_4_1.htmlOK
Test that securitypolicyviolation event is firedPASS
window.setInterval()PASS
window.setTimeout()PASS
/content-security-policy/unsafe-hashes/javascript_src_allowed-window_location.htmlTIMEOUT
Test that the javascript: src is allowed to runNOTRUN
/content-security-policy/frame-src/frame-src-self-unique-origin.htmlOK
Iframe's url must not match with 'self'. It must be blocked.PASS
/content-security-policy/worker-src/shared-list.sub.htmlOK
Same-origin dedicated worker allowed by 'self'.PASS
blob: dedicated worker allowed by 'blob:'.PASS
/content-security-policy/base-uri/base-uri_iframe_sandbox.sub.htmlERROR
base-uri 'self' blocks foreign-origin sandboxed iframes.PASS
base-uri 'self' works with same-origin sandboxed iframes.PASS
/content-security-policy/style-src/style-allowed.sub.htmlOK
Expecting logs: ["PASS"]PASS
/content-security-policy/worker-src/dedicated-child.sub.htmlOK
Same-origin dedicated worker allowed by host-source expression.PASS
blob: dedicated worker allowed by 'blob:'.PASS
/content-security-policy/frame-src/frame-src-cross-origin-load.sub.htmlOK
Expecting alerts: ["PASS","PASS"]PASS
Expecting logs: ["PASS IFrame #1 generated a load event.","PASS IFrame #2 generated a load event.","PASS IFrame #3 generated a load event.","violated-directive=frame-src"]FAIL
/content-security-policy/navigate-to/link-click-allowed.htmlOK
Test that the child iframe navigation is allowedPASS
/content-security-policy/embedded-enforcement/subsumption_algorithm-host_sources-paths.htmlOK
All specific paths match except the order.PASS
Empty path is not subsumed by specified paths.FAIL
Matching paths.PASS
Returned CSP allows only one path.PASS
Returned CSP has a more specific path.PASS
Returned CSP must specify a path.FAIL
That should not be true when required csp specifies a specific page.FAIL
Unspecified path should be subsumed by `/`.PASS
`/` path should be subsumed by an empty path.PASS
/content-security-policy/frame-ancestors/frame-ancestors-self-allow.htmlOK
A 'frame-ancestors' CSP directive with a value 'self' should allow rendering.PASS
/content-security-policy/connect-src/connect-src-xmlhttprequest-redirect-to-blocked.sub.htmlOK
Expecting logs: ["PASS XMLHttpRequest.send() did not follow the disallowed redirect.","TEST COMPLETE","violated-directive=connect-src"]PASS
/content-security-policy/navigate-to/parent-navigates-child-blocked.htmlOK
Test that the parent can't navigate the child because the relevant policy belongs to the navigation initiator (in this case the parent, which has the policy `navigate-to support/wait_for_navigation.html;`)FAIL
Violation report status OK.FAIL
/content-security-policy/plugin-types/plugintypes-empty.sub.htmlTIMEOUT
Should not load the object because plugin-types allows no pluginsNOTRUN
/content-security-policy/img-src/img-src-port-wildcard-allowed.sub.htmlOK
img-src with wildcard port should match any portPASS
/content-security-policy/style-src/stylenonce-blocked.sub.htmlOK
Should fire securitypolicyviolationFAIL
stylenonce-blockedPASS
/content-security-policy/generic/304-response-should-update-csp.sub.htmlOK
Test that the first frame does not use nonce defFAIL
Test that the first frame uses nonce abcPASS
Test that the second frame does not use nonce abcFAIL
Test that the second frame uses nonce defPASS
/content-security-policy/style-src/style-src-inline-style-nonce-blocked.htmlOK
Should fire a securitypolicyviolation eventFAIL
Should not load inline style element with invalid noncePASS
/content-security-policy/script-src/script-src-strict_dynamic_in_img-src.htmlOK
`strict-dynamic` does not drop whitelists in `img-src`.PASS
/content-security-policy/securitypolicyviolation/inside-service-worker.https.htmlOK
No SecurityPolicyViolation event fired for successful load.PASS
SecurityPolicyViolation event fired on global with the correct blockedURI.PASS
SecurityPolicyViolation event fired on global.PASS
/content-security-policy/frame-ancestors/frame-ancestors-nested-same-in-cross-url-allow.htmlTIMEOUT
A 'frame-ancestors' CSP directive with a URL value should block or allow rendering in nested frames as appropriate.NOTRUN
/content-security-policy/script-src/hash-always-converted-to-utf-8/utf-8.htmlOK
Should convert the script contents to UTF-8 before hashing - greek small letter muPASS
Should convert the script contents to UTF-8 before hashing - latin capital letter g with brevePASS
Should convert the script contents to UTF-8 before hashing - latin micro signPASS
/content-security-policy/sandbox/sandbox-allow-scripts-subframe.sub.htmlOK
Expecting logs: ["Message"]PASS
/content-security-policy/svg/object-in-svg-foreignobject.sub.htmlTIMEOUT
Should throw a securitypolicyviolationTIMEOUT
/content-security-policy/unsafe-eval/eval-scripts-setTimeout-blocked.sub.htmlOK
Expecting logs: ["PASS","violated-directive=script-src"]PASS
/content-security-policy/script-src/script-src-1_4.htmlOK
Test that securitypolicyviolation event is firedPASS
eval() should not run without 'unsafe-eval' script-src directive.PASS
eval() should throw without 'unsafe-eval' keyword source in script-src directive.PASS
/content-security-policy/reporting/report-original-url.sub.htmlTIMEOUT
Block after redirect, cross-origin = original URL in reportTIMEOUT
Block after redirect, same-origin = original URL in reportTIMEOUT
Direct block, cross-origin = full URL in reportPASS
Direct block, same-origin = full URL in reportPASS
Violation report status OK.PASS
/content-security-policy/inheritance/window.htmlTIMEOUT
`document.write` into `window.open()` inherits policy.FAIL
window.open('blob:...') inherits policy.TIMEOUT
window.open('javascript:...') inherits policy.TIMEOUT
window.open() inherits policy.FAIL
/content-security-policy/frame-ancestors/frame-ancestors-nested-cross-in-cross-none-block.htmlTIMEOUT
A 'frame-ancestors' CSP directive with a value 'none' should block rendering in nested frames.NOTRUN