content-security-policy: All Results

Test files: 384; Total subtests: 894

Test Files

  1. /content-security-policy/embedded-enforcement/required_csp-header.html
  2. /content-security-policy/font-src/font-self-allowed.html
  3. /content-security-policy/prefetch-src/prefetch-allowed.html
  4. /content-security-policy/reporting/report-uri-effective-directive.html
  5. /content-security-policy/embedded-enforcement/allow_csp_from-header.html
  6. /content-security-policy/script-src/hash-always-converted-to-utf-8/utf-8.html
  7. /content-security-policy/embedded-enforcement/subsumption_algorithm-unsafe_inline.html
  8. /content-security-policy/reporting-api/reporting-api-sends-reports-on-violation.https.sub.html
  9. /content-security-policy/generic/generic-0_8_1.sub.html
  10. /content-security-policy/securitypolicyviolation/securitypolicyviolation-block-image-from-script.sub.html
  11. /content-security-policy/style-src/inline-style-blocked.sub.html
  12. /content-security-policy/navigate-to/meta-refresh-cross-origin-allowed.sub.html
  13. /content-security-policy/connect-src/connect-src-beacon-allowed.sub.html
  14. /content-security-policy/navigate-to/unsafe-allow-redirects/blocked-end-of-chain.sub.html
  15. /content-security-policy/prefetch-src/prefetch-header-blocked.html
  16. /content-security-policy/media-src/media-src-7_3.sub.html
  17. /content-security-policy/frame-src/frame-src-blocked.sub.html
  18. /content-security-policy/reporting/report-multiple-violations-02.html
  19. /content-security-policy/form-action/form-action-self-allowed-target-blank.html
  20. /content-security-policy/reporting/report-blocked-uri-cross-origin.sub.html
  21. /content-security-policy/unsafe-eval/eval-scripts-setInterval-blocked.sub.html
  22. /content-security-policy/script-src/script-src-1_4_1.html
  23. /content-security-policy/img-src/img-src-wildcard-allowed.html
  24. /content-security-policy/style-src-attr-elem/style-src-attr-allowed-src-blocked.html
  25. /content-security-policy/style-src/style-src-hash-allowed.html
  26. /content-security-policy/object-src/object-src-no-url-allowed.html
  27. /content-security-policy/securitypolicyviolation/blockeduri-eval.html
  28. /content-security-policy/media-src/media-src-7_1.html
  29. /content-security-policy/frame-ancestors/frame-ancestors-nested-same-in-cross-self-block.html
  30. /content-security-policy/reporting/report-uri-from-inline-javascript.html
  31. /content-security-policy/base-uri/base-uri-deny.sub.html
  32. /content-security-policy/style-src/style-src-hash-blocked.html
  33. /content-security-policy/frame-ancestors/frame-ancestors-nested-cross-in-same-self-block.html
  34. /content-security-policy/securitypolicyviolation/inside-service-worker.https.html
  35. /content-security-policy/reporting/report-original-url.sub.html
  36. /content-security-policy/sandbox/sandbox-allow-scripts.sub.html
  37. /content-security-policy/navigate-to/href-location-cross-origin-allowed.sub.html
  38. /content-security-policy/frame-ancestors/frame-ancestors-self-allow.html
  39. /content-security-policy/sandbox/sandbox-empty-subframe.sub.html
  40. /content-security-policy/style-src/stylenonce-allowed.sub.html
  41. /content-security-policy/frame-ancestors/frame-ancestors-nested-cross-in-same-none-block.html
  42. /content-security-policy/script-src/injected-inline-script-blocked.sub.html
  43. /content-security-policy/generic/generic-0_2_2.sub.html
  44. /content-security-policy/generic/filesystem-urls-match-filesystem.sub.html
  45. /content-security-policy/embedded-enforcement/idlharness.window.html
  46. /content-security-policy/frame-ancestors/frame-ancestors-self-block.html
  47. /content-security-policy/script-src/scriptnonce-redirect.sub.html
  48. /content-security-policy/reporting-api/reporting-api-report-to-overrides-report-uri-1.https.sub.html
  49. /content-security-policy/media-src/media-src-redir-bug.sub.html
  50. /content-security-policy/font-src/font-mismatch-blocked.sub.html
  51. /content-security-policy/form-action/form-action-src-allowed-target-blank.sub.html
  52. /content-security-policy/frame-ancestors/frame-ancestors-nested-cross-in-same-star-allow.html
  53. /content-security-policy/embedded-enforcement/required-csp-header-cascade.html
  54. /content-security-policy/navigate-to/form-action/form-action-allows-navigate-to-allows.sub.html
  55. /content-security-policy/media-src/media-src-blocked.sub.html
  56. /content-security-policy/connect-src/connect-src-eventsource-allowed.sub.html
  57. /content-security-policy/sandbox/iframe-inside-csp.sub.html
  58. /content-security-policy/unsafe-eval/eval-scripts-setInterval-allowed.sub.html
  59. /content-security-policy/unsafe-eval/eval-blocked-in-about-blank-iframe.sub.html
  60. /content-security-policy/form-action/form-action-src-redirect-allowed-target-blank.sub.html
  61. /content-security-policy/script-src/scripthash-unicode-normalization.sub.html
  62. /content-security-policy/sandbox/window-reuse-unsandboxed.html
  63. /content-security-policy/object-src/object-src-url-redirect-blocked.sub.html
  64. /content-security-policy/worker-src/service-worker-src-default-fallback.https.sub.html
  65. /content-security-policy/embedded-enforcement/subsumption_algorithm-host_sources-ports.html
  66. /content-security-policy/script-src/worker-set-timeout-blocked.sub.html
  67. /content-security-policy/style-src-attr-elem/style-src-elem-allowed-attr-blocked.html
  68. /content-security-policy/securitypolicyviolation/img-src-redirect-upgrade-reporting.https.html
  69. /content-security-policy/navigate-to/href-location-redirected-blocked.sub.html
  70. /content-security-policy/navigate-to/link-click-cross-origin-allowed.sub.html
  71. /content-security-policy/navigate-to/link-click-redirected-blocked.sub.html
  72. /content-security-policy/script-src/script-src-overrides-default-src.sub.html
  73. /content-security-policy/script-src/worker-eval-blocked.sub.html
  74. /content-security-policy/navigation/to-javascript-url-frame-src.html
  75. /content-security-policy/child-src/child-src-cross-origin-load.sub.html
  76. /content-security-policy/style-src/injected-inline-style-allowed.sub.html
  77. /content-security-policy/style-src/style-src-injected-inline-style-allowed.html
  78. /content-security-policy/worker-src/service-self.https.sub.html
  79. /content-security-policy/style-src/style-src-none-blocked.html
  80. /content-security-policy/script-src/scripthash-ignore-unsafeinline.sub.html
  81. /content-security-policy/navigate-to/form-allowed.html
  82. /content-security-policy/style-src/stylehash-default-src.sub.html
  83. /content-security-policy/script-src-attr-elem/script-src-elem-allowed-attr-blocked.html
  84. /content-security-policy/script-src/script-src-1_10_1.html
  85. /content-security-policy/unsafe-hashes/javascript_src_denied_wrong_hash-window_location.html
  86. /content-security-policy/reporting-api/reporting-api-works-on-frame-src.https.sub.html
  87. /content-security-policy/navigate-to/link-click-redirected-allowed.html
  88. /content-security-policy/worker-src/dedicated-none.sub.html
  89. /content-security-policy/style-src/style-blocked.sub.html
  90. /content-security-policy/worker-src/shared-fallback.sub.html
  91. /content-security-policy/frame-ancestors/frame-ancestors-nested-same-in-cross-url-allow.html
  92. /content-security-policy/frame-ancestors/frame-ancestors-nested-cross-in-sandboxed-cross-url-block.html
  93. /content-security-policy/blob/self-doesnt-match-blob.sub.html
  94. /content-security-policy/object-src/object-src-no-url-blocked.html
  95. /content-security-policy/sandbox/window-reuse-sandboxed.html
  96. /content-security-policy/script-src/script-src-wildcards-disallowed.html
  97. /content-security-policy/connect-src/connect-src-beacon-redirect-to-blocked.sub.html
  98. /content-security-policy/unsafe-hashes/style_attribute_allowed.html
  99. /content-security-policy/navigate-to/href-location-allowed.html
  100. /content-security-policy/worker-src/dedicated-child.sub.html
  101. /content-security-policy/inheritance/window.html
  102. /content-security-policy/object-src/object-src-url-embed-blocked.html
  103. /content-security-policy/generic/only-valid-whitespaces-are-allowed.html
  104. /content-security-policy/embedded-enforcement/subsumption_algorithm-unsafe_eval.html
  105. /content-security-policy/navigate-to/spv-only-sent-to-initiator.sub.html
  106. /content-security-policy/worker-src/dedicated-self.sub.html
  107. /content-security-policy/svg/object-in-svg-foreignobject.sub.html
  108. /content-security-policy/inside-worker/dedicated-inheritance.html
  109. /content-security-policy/style-src/style-src-inline-style-nonce-allowed.html
  110. /content-security-policy/meta/meta-img-src.html
  111. /content-security-policy/inheritance/iframe-all-local-schemes-inherit-self.sub.html
  112. /content-security-policy/navigate-to/form-cross-origin-blocked.sub.html
  113. /content-security-policy/style-src-attr-elem/style-src-attr-blocked-src-allowed.html
  114. /content-security-policy/navigate-to/link-click-cross-origin-blocked.sub.html
  115. /content-security-policy/form-action/form-action-src-get-blocked.sub.html
  116. /content-security-policy/script-src-attr-elem/script-src-elem-blocked-attr-allowed.html
  117. /content-security-policy/script-src/worker-script-src.sub.html
  118. /content-security-policy/inheritance/inherited-csp-list-modifications-are-local.html
  119. /content-security-policy/unsafe-hashes/javascript_src_allowed-window_location.html
  120. /content-security-policy/navigate-to/meta-refresh-redirected-allowed.html
  121. /content-security-policy/navigate-to/link-click-blocked.sub.html
  122. /content-security-policy/reporting/report-same-origin-with-cookies.html
  123. /content-security-policy/navigate-to/meta-refresh-allowed.html
  124. /content-security-policy/child-src/child-src-allowed.sub.html
  125. /content-security-policy/worker-src/service-none.https.sub.html
  126. /content-security-policy/form-action/form-action-src-allowed.sub.html
  127. /content-security-policy/securitypolicyviolation/constructor-required-fields.html
  128. /content-security-policy/media-src/media-src-7_2_2.sub.html
  129. /content-security-policy/frame-ancestors/frame-ancestors-nested-same-in-same-url-block.html
  130. /content-security-policy/frame-ancestors/frame-ancestors-nested-cross-in-cross-self-block.html
  131. /content-security-policy/style-src/style-allowed.sub.html
  132. /content-security-policy/frame-ancestors/frame-ancestors-star-allow-crossorigin.html
  133. /content-security-policy/connect-src/connect-src-xmlhttprequest-redirect-to-blocked.sub.html
  134. /content-security-policy/default-src/default-src-inline-allowed.sub.html
  135. /content-security-policy/blob/blob-urls-do-not-match-self.sub.html
  136. /content-security-policy/unsafe-eval/eval-blocked-and-sends-report.sub.html
  137. /content-security-policy/navigate-to/href-location-redirected-allowed.html
  138. /content-security-policy/securitypolicyviolation/style-sample-no-opt-in.html
  139. /content-security-policy/style-src/style-src-inline-style-allowed.html
  140. /content-security-policy/securitypolicyviolation/inside-shared-worker.html
  141. /content-security-policy/securitypolicyviolation/securitypolicyviolation-block-image.sub.html
  142. /content-security-policy/generic/generic-0_1-script-src.html
  143. /content-security-policy/style-src/style-src-multiple-policies-multiple-hashing-algorithms.html
  144. /content-security-policy/style-src/style-src-inline-style-attribute-blocked.html
  145. /content-security-policy/style-src/style-src-imported-style-blocked.html
  146. /content-security-policy/navigate-to/form-action/form-action-blocks-navigate-to-allows.sub.html
  147. /content-security-policy/frame-ancestors/frame-ancestors-overrides-xfo.html
  148. /content-security-policy/frame-src/frame-src-about-blank-allowed-by-default.sub.html
  149. /content-security-policy/child-src/child-src-redirect-blocked.sub.html
  150. /content-security-policy/unsafe-eval/function-constructor-blocked.sub.html
  151. /content-security-policy/script-src/hash-always-converted-to-utf-8/iso-8859-9.html
  152. /content-security-policy/worker-src/service-fallback.https.sub.html
  153. /content-security-policy/style-src/style-src-inline-style-nonce-blocked-error-event.html
  154. /content-security-policy/frame-ancestors/frame-ancestors-nested-cross-in-cross-url-allow.html
  155. /content-security-policy/navigate-to/link-click-allowed.html
  156. /content-security-policy/style-src/style-src-stylesheet-nonce-allowed.html
  157. /content-security-policy/embedded-enforcement/subsumption_algorithm-host_sources-hosts.html
  158. /content-security-policy/plugin-types/plugintypes-mismatched-data.html
  159. /content-security-policy/style-src/style-src-inline-style-blocked.html
  160. /content-security-policy/navigate-to/form-action/form-action-blocks-navigate-to-blocks.sub.html
  161. /content-security-policy/navigate-to/form-redirected-blocked.sub.html
  162. /content-security-policy/img-src/icon-allowed.sub.html
  163. /content-security-policy/reporting/report-and-enforce.html
  164. /content-security-policy/style-src/style-src-inline-style-attribute-allowed.html
  165. /content-security-policy/securitypolicyviolation/inside-dedicated-worker.html
  166. /content-security-policy/navigate-to/parent-navigates-child-blocked.html
  167. /content-security-policy/generic/filesystem-urls-do-not-match-self.sub.html
  168. /content-security-policy/reporting/report-uri-from-child-frame.html
  169. /content-security-policy/frame-ancestors/frame-ancestors-nested-cross-in-same-url-block.html
  170. /content-security-policy/generic/generic-0_2_3.html
  171. /content-security-policy/reporting/report-uri-multiple.html
  172. /content-security-policy/securitypolicyviolation/upgrade-insecure-requests-reporting.https.html
  173. /content-security-policy/script-src/hash-always-converted-to-utf-8/iso-8859-1.html
  174. /content-security-policy/frame-src/frame-src-redirect.html
  175. /content-security-policy/script-src/scriptnonce-allowed.sub.html
  176. /content-security-policy/media-src/media-src-7_2.html
  177. /content-security-policy/plugin-types/plugintypes-nourl-allowed.html
  178. /content-security-policy/embedded-enforcement/subsumption_algorithm-strict_dynamic.html
  179. /content-security-policy/media-src/media-src-7_3_2.sub.html
  180. /content-security-policy/generic/generic-0_10.html
  181. /content-security-policy/script-src/script-src-1_2.html
  182. /content-security-policy/style-src/style-src-star-allowed.html
  183. /content-security-policy/reporting-api/reporting-api-report-to-overrides-report-uri-2.https.sub.html
  184. /content-security-policy/frame-ancestors/frame-ancestors-nested-cross-in-same-url-allow.html
  185. /content-security-policy/generic/generic-0_8.sub.html
  186. /content-security-policy/img-src/img-src-4_1.sub.html
  187. /content-security-policy/meta/meta-modified.html
  188. /content-security-policy/script-src/script-src-1_2_1.html
  189. /content-security-policy/connect-src/connect-src-beacon-blocked.sub.html
  190. /content-security-policy/securitypolicyviolation/idlharness.window.html
  191. /content-security-policy/reporting/report-blocked-data-uri.html
  192. /content-security-policy/worker-src/dedicated-fallback.sub.html
  193. /content-security-policy/frame-ancestors/frame-ancestors-nested-same-in-same-none-block.html
  194. /content-security-policy/reporting-api/reporting-api-report-only-sends-reports-on-violation.https.sub.html
  195. /content-security-policy/script-src/scriptnonce-basic-blocked.sub.html
  196. /content-security-policy/unsafe-hashes/style_attribute_denied_wrong_hash.html
  197. /content-security-policy/script-src/hash-always-converted-to-utf-8/iso-8859-7.html
  198. /content-security-policy/frame-src/frame-src-allowed.sub.html
  199. /content-security-policy/style-src-attr-elem/style-src-elem-blocked-src-allowed.html
  200. /content-security-policy/connect-src/connect-src-xmlhttprequest-blocked.sub.html
  201. /content-security-policy/img-src/icon-blocked.sub.html
  202. /content-security-policy/style-src/style-src-injected-stylesheet-allowed.sub.html
  203. /content-security-policy/securitypolicyviolation/style-sample.html
  204. /content-security-policy/svg/svg-from-guid.html
  205. /content-security-policy/blob/blob-urls-match-blob.sub.html
  206. /content-security-policy/reporting/report-strips-fragment.html
  207. /content-security-policy/worker-src/service-list.https.sub.html
  208. /content-security-policy/plugin-types/plugintypes-mismatched-url.html
  209. /content-security-policy/navigate-to/meta-refresh-redirected-blocked.sub.html
  210. /content-security-policy/unsafe-eval/eval-scripts-setTimeout-allowed.sub.html
  211. /content-security-policy/script-src/eval-allowed-in-report-only-mode.html
  212. /content-security-policy/form-action/form-action-src-javascript-blocked.sub.html
  213. /content-security-policy/frame-ancestors/frame-ancestors-none-block.html
  214. /content-security-policy/inside-worker/shared-inheritance.html
  215. /content-security-policy/connect-src/connect-src-websocket-self.sub.html
  216. /content-security-policy/inheritance/blob-url-in-main-window-self-navigate-inherits.sub.html
  217. /content-security-policy/script-src/scriptnonce-ignore-unsafeinline.sub.html
  218. /content-security-policy/style-src-attr-elem/style-src-elem-allowed-src-blocked.html
  219. /content-security-policy/object-src/object-src-url-redirect-allowed.html
  220. /content-security-policy/worker-src/shared-none.sub.html
  221. /content-security-policy/inheritance/iframe-srcdoc-inheritance.html
  222. /content-security-policy/media-src/media-src-7_1_2.sub.html
  223. /content-security-policy/generic/generic-0_2.html
  224. /content-security-policy/meta/meta-outside-head.sub.html
  225. /content-security-policy/img-src/report-blocked-data-uri.sub.html
  226. /content-security-policy/inside-worker/dedicated-script.html
  227. /content-security-policy/base-uri/base-uri_iframe_sandbox.sub.html
  228. /content-security-policy/embedded-enforcement/iframe-csp-attribute.html
  229. /content-security-policy/prefetch-src/prefetch-blocked.html
  230. /content-security-policy/worker-src/dedicated-list.sub.html
  231. /content-security-policy/img-src/img-src-none-blocks.html
  232. /content-security-policy/form-action/form-action-src-redirect-allowed-target-frame.sub.html
  233. /content-security-policy/child-src/child-src-conflicting-frame-src.sub.html
  234. /content-security-policy/child-src/child-src-about-blank-allowed-by-default.sub.html
  235. /content-security-policy/frame-src/frame-src-about-blank-allowed-by-scheme.sub.html
  236. /content-security-policy/worker-src/shared-child.sub.html
  237. /content-security-policy/frame-ancestors/frame-ancestors-nested-same-in-same-star-allow.html
  238. /content-security-policy/default-src/default-src-inline-blocked.sub.html
  239. /content-security-policy/frame-ancestors/frame-ancestors-nested-same-in-same-self-allow.html
  240. /content-security-policy/connect-src/worker-connect-src-allowed.sub.html
  241. /content-security-policy/img-src/img-src-full-host-wildcard-blocked.sub.html
  242. /content-security-policy/style-src/inline-style-allowed-while-cloning-objects.sub.html
  243. /content-security-policy/frame-ancestors/frame-ancestors-nested-cross-in-cross-star-allow.html
  244. /content-security-policy/style-src/stylehash-allowed.sub.html
  245. /content-security-policy/generic/policy-inherited-correctly-by-plznavigate.html
  246. /content-security-policy/script-src/script-src-1_4_2.html
  247. /content-security-policy/connect-src/connect-src-websocket-blocked.sub.html
  248. /content-security-policy/svg/svg-policy-resource-doc-includes.html
  249. /content-security-policy/object-src/object-src-url-allowed.html
  250. /content-security-policy/reporting/report-blocked-uri.html
  251. /content-security-policy/frame-ancestors/frame-ancestors-nested-cross-in-cross-none-block.html
  252. /content-security-policy/script-src/scripthash-basic-blocked.sub.html
  253. /content-security-policy/navigation/to-javascript-parent-initiated-parent-csp.html
  254. /content-security-policy/navigation/to-javascript-parent-initiated-child-csp.html
  255. /content-security-policy/worker-src/shared-self.sub.html
  256. /content-security-policy/unsafe-eval/eval-blocked.sub.html
  257. /content-security-policy/frame-ancestors/frame-ancestors-star-allow-sameorigin.html
  258. /content-security-policy/form-action/form-action-src-default-ignored.sub.html
  259. /content-security-policy/navigate-to/child-navigates-parent-allowed.html
  260. /content-security-policy/generic/duplicate-directive.sub.html
  261. /content-security-policy/unsafe-eval/function-constructor-allowed.sub.html
  262. /content-security-policy/reporting/multiple-report-policies.html
  263. /content-security-policy/reporting/report-uri-from-javascript.html
  264. /content-security-policy/script-src/script-src-1_1.html
  265. /content-security-policy/prefetch-src/prefetch-header-allowed.html
  266. /content-security-policy/style-src/inline-style-attribute-blocked.sub.html
  267. /content-security-policy/navigate-to/child-navigates-parent-blocked.sub.html
  268. /content-security-policy/generic/generic-0_10_1.sub.html
  269. /content-security-policy/script-src-attr-elem/script-src-attr-blocked-src-allowed.html
  270. /content-security-policy/connect-src/shared-worker-connect-src-blocked.sub.html
  271. /content-security-policy/base-uri/base-uri-allow.sub.html
  272. /content-security-policy/style-src/inline-style-allowed.sub.html
  273. /content-security-policy/frame-ancestors/frame-ancestors-nested-same-in-cross-url-block.html
  274. /content-security-policy/sandbox/sandbox-allow-scripts-subframe.sub.html
  275. /content-security-policy/font-src/font-stylesheet-font-blocked.sub.html
  276. /content-security-policy/frame-ancestors/frame-ancestors-nested-same-in-same-url-allow.html
  277. /content-security-policy/child-src/child-src-blocked.sub.html
  278. /content-security-policy/unsafe-hashes/style_attribute_denied_missing_unsafe_hashes.html
  279. /content-security-policy/meta/combine-header-and-meta-policies.sub.html
  280. /content-security-policy/script-src/script-src-1_3.html
  281. /content-security-policy/frame-ancestors/frame-ancestors-url-block.html
  282. /content-security-policy/script-src/script-src-strict_dynamic_in_img-src.html
  283. /content-security-policy/generic/directive-name-case-insensitive.sub.html
  284. /content-security-policy/navigate-to/meta-refresh-cross-origin-blocked.sub.html
  285. /content-security-policy/navigate-to/unsafe-allow-redirects/allowed-end-of-chain-because-of-same-origin.sub.html
  286. /content-security-policy/navigate-to/form-cross-origin-allowed.sub.html
  287. /content-security-policy/style-src/injected-inline-style-blocked.sub.html
  288. /content-security-policy/sandbox/sandbox-empty.sub.html
  289. /content-security-policy/reporting/report-only-in-meta.sub.html
  290. /content-security-policy/navigate-to/form-action/form-action-allows-navigate-to-blocks.sub.html
  291. /content-security-policy/embedded-enforcement/subsumption_algorithm-host_sources-protocols.html
  292. /content-security-policy/inside-worker/shared-script.html
  293. /content-security-policy/style-src/inline-style-attribute-allowed.sub.html
  294. /content-security-policy/img-src/img-src-self-unique-origin.html
  295. /content-security-policy/script-src/scriptnonce-and-scripthash.sub.html
  296. /content-security-policy/img-src/img-src-port-wildcard-allowed.sub.html
  297. /content-security-policy/navigate-to/parent-navigates-child-allowed.html
  298. /content-security-policy/style-src/style-src-stylesheet-nonce-blocked.html
  299. /content-security-policy/style-src/style-src-injected-inline-style-blocked.html
  300. /content-security-policy/embedded-enforcement/subsumption_algorithm-nonces.html
  301. /content-security-policy/embedded-enforcement/subsumption_algorithm-hashes.html
  302. /content-security-policy/style-src/style-src-error-event-fires.html
  303. /content-security-policy/securitypolicyviolation/securitypolicyviolation-block-cross-origin-image-from-script.sub.html
  304. /content-security-policy/form-action/form-action-src-get-allowed.sub.html
  305. /content-security-policy/generic/policy-does-not-affect-child.sub.html
  306. /content-security-policy/worker-src/service-child.https.sub.html
  307. /content-security-policy/script-src/hash-always-converted-to-utf-8/iso-8859-3.html
  308. /content-security-policy/style-src/stylehash-basic-blocked.sub.html
  309. /content-security-policy/embedded-enforcement/subsumption_algorithm-self.html
  310. /content-security-policy/reporting/report-cross-origin-no-cookies.sub.html
  311. /content-security-policy/embedded-enforcement/subsumption_algorithm-general.html
  312. /content-security-policy/object-src/object-src-url-blocked.html
  313. /content-security-policy/script-src/injected-inline-script-allowed.sub.html
  314. /content-security-policy/unsafe-hashes/javascript_src_denied_missing_unsafe_hashes-window_location.html
  315. /content-security-policy/script-src/script-src-1_4.html
  316. /content-security-policy/navigation/javascript-url-navigation-inherits-csp.html
  317. /content-security-policy/generic/generic-0_9.sub.html
  318. /content-security-policy/inheritance/iframe-all-local-schemes.sub.html
  319. /content-security-policy/worker-src/shared-list.sub.html
  320. /content-security-policy/script-src/script-src-strict_dynamic_discard_whitelist.html
  321. /content-security-policy/style-src/stylenonce-blocked.sub.html
  322. /content-security-policy/connect-src/worker-connect-src-blocked.sub.html
  323. /content-security-policy/connect-src/connect-src-eventsource-redirect-to-blocked.sub.html
  324. /content-security-policy/font-src/font-none-blocked.sub.html
  325. /content-security-policy/font-src/font-match-allowed.sub.html
  326. /content-security-policy/script-src/worker-importscripts-blocked.sub.html
  327. /content-security-policy/frame-ancestors/frame-ancestors-nested-same-in-cross-star-allow.html
  328. /content-security-policy/style-src/style-src-injected-stylesheet-blocked.sub.html
  329. /content-security-policy/plugin-types/plugintypes-notype-data.html
  330. /content-security-policy/generic/304-response-should-update-csp.sub.html
  331. /content-security-policy/connect-src/connect-src-websocket-allowed.sub.html
  332. /content-security-policy/script-src/scripthash-default-src.sub.html
  333. /content-security-policy/connect-src/connect-src-eventsource-blocked.sub.html
  334. /content-security-policy/connect-src/shared-worker-connect-src-allowed.sub.html
  335. /content-security-policy/embedded-enforcement/subsumption_algorithm-host_sources-paths.html
  336. /content-security-policy/connect-src/connect-src-xmlhttprequest-allowed.sub.html
  337. /content-security-policy/frame-ancestors/frame-ancestors-nested-same-in-cross-none-block.html
  338. /content-security-policy/style-src-attr-elem/style-src-elem-blocked-attr-allowed.html
  339. /content-security-policy/navigate-to/href-location-cross-origin-blocked.sub.html
  340. /content-security-policy/worker-src/shared-worker-src-default-fallback.sub.html
  341. /content-security-policy/generic/no-default-src.sub.html
  342. /content-security-policy/plugin-types/plugintypes-nourl-blocked.html
  343. /content-security-policy/worker-src/dedicated-worker-src-default-fallback.sub.html
  344. /content-security-policy/navigate-to/meta-refresh-blocked.sub.html
  345. /content-security-policy/form-action/form-action-src-redirect-blocked.sub.html
  346. /content-security-policy/blob/star-doesnt-match-blob.sub.html
  347. /content-security-policy/plugin-types/plugintypes-notype-url.html
  348. /content-security-policy/frame-src/frame-src-cross-origin-load.sub.html
  349. /content-security-policy/generic/cspro-not-enforced-in-worker.html
  350. /content-security-policy/frame-ancestors/frame-ancestors-nested-cross-in-cross-url-block.html
  351. /content-security-policy/frame-src/frame-src-self-unique-origin.html
  352. /content-security-policy/embedded-enforcement/subsumption_algorithm-none.html
  353. /content-security-policy/script-src/eval-allowed-in-report-only-mode-and-sends-report.html
  354. /content-security-policy/script-src/worker-function-function-blocked.sub.html
  355. /content-security-policy/reporting/report-uri-multiple-reversed.html
  356. /content-security-policy/object-src/object-src-url-embed-allowed.html
  357. /content-security-policy/img-src/img-src-host-partial-wildcard-allowed.sub.html
  358. /content-security-policy/embedded-enforcement/subsumption_algorithm-unsafe_hashes.html
  359. /content-security-policy/unsafe-eval/eval-scripts-setTimeout-blocked.sub.html
  360. /content-security-policy/navigate-to/form-redirected-allowed.html
  361. /content-security-policy/form-action/form-action-src-blocked.sub.html
  362. /content-security-policy/frame-ancestors/frame-ancestors-url-allow.sub.html
  363. /content-security-policy/navigate-to/anchor-navigation-always-allowed.html
  364. /content-security-policy/style-src/style-src-inline-style-nonce-blocked.html
  365. /content-security-policy/script-src/hash-always-converted-to-utf-8/utf-8-lone-surrogate.html
  366. /content-security-policy/script-src/scripthash-allowed.sub.html
  367. /content-security-policy/script-src/script-src-1_10.html
  368. /content-security-policy/script-src/srcdoc-doesnt-bypass-script-src.sub.html
  369. /content-security-policy/style-src/inline-style-attribute-on-html.sub.html
  370. /content-security-policy/navigate-to/href-location-blocked.sub.html
  371. /content-security-policy/base-uri/report-uri-does-not-respect-base-uri.sub.html
  372. /content-security-policy/reporting/report-uri-scheme-relative.html
  373. /content-security-policy/connect-src/worker-from-guid.sub.html
  374. /content-security-policy/child-src/child-src-about-blank-allowed-by-scheme.sub.html
  375. /content-security-policy/unsafe-eval/eval-allowed.sub.html
  376. /content-security-policy/generic/generic-0_1-img-src.html
  377. /content-security-policy/reporting/report-multiple-violations-01.html
  378. /content-security-policy/style-src/style-src-imported-style-allowed.sub.html
  379. /content-security-policy/svg/svg-policy-with-resource.html
  380. /content-security-policy/plugin-types/plugintypes-empty.sub.html
  381. /content-security-policy/svg/svg-inline.sub.html
  382. /content-security-policy/securitypolicyviolation/securitypolicyviolation-block-cross-origin-image.sub.html
  383. /content-security-policy/navigate-to/form-blocked.sub.html
  384. /content-security-policy/form-action/form-action-src-allowed-target-frame.sub.html
Test Show/Hide MessagesSf12
/content-security-policy/embedded-enforcement/required_csp-header.htmlOK
Test Required-CSP value on `csp` change: Sec-Required-CSP is not sent if `csp` attribute is not set on <iframe>.FAIL
Test Required-CSP value on `csp` change: Send Sec-Required-CSP Header on change of `src` attribute on iframe.FAIL
Test Required-CSP value on `csp` change: Send Sec-Required-CSP when `csp` attribute of <iframe> is not empty.FAIL
Test Required-CSP value on `csp` change: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - comma separatedFAIL
Test Required-CSP value on `csp` change: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - gibberish cspFAIL
Test Required-CSP value on `csp` change: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - html encoded stringFAIL
Test Required-CSP value on `csp` change: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - missing semicolonFAIL
Test Required-CSP value on `csp` change: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - misspeled 'none'FAIL
Test Required-CSP value on `csp` change: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - query values in pathFAIL
Test Required-CSP value on `csp` change: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - report-to presentFAIL
Test Required-CSP value on `csp` change: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - report-uri presentFAIL
Test Required-CSP value on `csp` change: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - unknown policy nameFAIL
Test Required-CSP value on `csp` change: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - unknown policy name in multiple directivesFAIL
Test Required-CSP value on `csp` change: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - url encoded stringFAIL
Test cross origin redirect of cross origin iframe: Sec-Required-CSP is not sent if `csp` attribute is not set on <iframe>.PASS
Test cross origin redirect of cross origin iframe: Send Sec-Required-CSP Header on change of `src` attribute on iframe.FAIL
Test cross origin redirect of cross origin iframe: Send Sec-Required-CSP when `csp` attribute of <iframe> is not empty.FAIL
Test cross origin redirect of cross origin iframe: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - comma separatedPASS
Test cross origin redirect of cross origin iframe: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - gibberish cspPASS
Test cross origin redirect of cross origin iframe: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - html encoded stringPASS
Test cross origin redirect of cross origin iframe: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - missing semicolonPASS
Test cross origin redirect of cross origin iframe: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - misspeled 'none'PASS
Test cross origin redirect of cross origin iframe: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - query values in pathPASS
Test cross origin redirect of cross origin iframe: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - report-to presentPASS
Test cross origin redirect of cross origin iframe: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - report-uri presentPASS
Test cross origin redirect of cross origin iframe: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - unknown policy namePASS
Test cross origin redirect of cross origin iframe: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - unknown policy name in multiple directivesPASS
Test cross origin redirect of cross origin iframe: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - url encoded stringPASS
Test cross origin redirect: Sec-Required-CSP is not sent if `csp` attribute is not set on <iframe>.PASS
Test cross origin redirect: Send Sec-Required-CSP Header on change of `src` attribute on iframe.FAIL
Test cross origin redirect: Send Sec-Required-CSP when `csp` attribute of <iframe> is not empty.FAIL
Test cross origin redirect: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - comma separatedPASS
Test cross origin redirect: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - gibberish cspPASS
Test cross origin redirect: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - html encoded stringPASS
Test cross origin redirect: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - missing semicolonPASS
Test cross origin redirect: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - misspeled 'none'PASS
Test cross origin redirect: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - query values in pathPASS
Test cross origin redirect: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - report-to presentPASS
Test cross origin redirect: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - report-uri presentPASS
Test cross origin redirect: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - unknown policy namePASS
Test cross origin redirect: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - unknown policy name in multiple directivesPASS
Test cross origin redirect: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - url encoded stringPASS
Test same origin redirect: Sec-Required-CSP is not sent if `csp` attribute is not set on <iframe>.PASS
Test same origin redirect: Send Sec-Required-CSP Header on change of `src` attribute on iframe.FAIL
Test same origin redirect: Send Sec-Required-CSP when `csp` attribute of <iframe> is not empty.FAIL
Test same origin redirect: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - comma separatedPASS
Test same origin redirect: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - gibberish cspPASS
Test same origin redirect: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - html encoded stringPASS
Test same origin redirect: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - missing semicolonPASS
Test same origin redirect: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - misspeled 'none'PASS
Test same origin redirect: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - query values in pathPASS
Test same origin redirect: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - report-to presentPASS
Test same origin redirect: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - report-uri presentPASS
Test same origin redirect: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - unknown policy namePASS
Test same origin redirect: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - unknown policy name in multiple directivesPASS
Test same origin redirect: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - url encoded stringPASS
Test same origin: Sec-Required-CSP is not sent if `csp` attribute is not set on <iframe>.PASS
Test same origin: Send Sec-Required-CSP Header on change of `src` attribute on iframe.FAIL
Test same origin: Send Sec-Required-CSP when `csp` attribute of <iframe> is not empty.FAIL
Test same origin: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - comma separatedPASS
Test same origin: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - gibberish cspPASS
Test same origin: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - html encoded stringPASS
Test same origin: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - missing semicolonPASS
Test same origin: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - misspeled 'none'PASS
Test same origin: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - query values in pathPASS
Test same origin: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - report-to presentPASS
Test same origin: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - report-uri presentPASS
Test same origin: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - unknown policy namePASS
Test same origin: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - unknown policy name in multiple directivesPASS
Test same origin: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - url encoded stringPASS
/content-security-policy/font-src/font-self-allowed.htmlOK
Test font loads if it matches font-src.PASS
/content-security-policy/prefetch-src/prefetch-allowed.htmlOK
Browser supports performance APIs.PASS
Browser supports prefetch.FAIL
Prefetch succeeds when allowed by prefetch-srcFAIL
/content-security-policy/reporting/report-uri-effective-directive.htmlOK
Violation report status OK.FAIL
/content-security-policy/embedded-enforcement/allow_csp_from-header.htmlOK
Allow-CSP-From header enforces EmbeddingCSP.FAIL
Allow-CSP-From header with a star value can be returned.PASS
Cross origin iframe with an empty Allow-CSP-From header gets blocked.FAIL
Cross origin iframe without Allow-CSP-From header gets blocked.FAIL
Iframe with improper Allow-CSP-From header gets blocked.FAIL
Same origin iframes are allowed even if Allow-CSP-From does not match origin.PASS
Same origin iframes are allowed even if the Allow-CSP-From is empty.PASS
Same origin iframes are allowed even if the Allow-CSP-From is not present.PASS
Same origin iframes are always allowed.PASS
Star Allow-CSP-From header enforces EmbeddingCSP.FAIL
iframe from cross origin does not load without Allow-CSP-From header.PASS
/content-security-policy/script-src/hash-always-converted-to-utf-8/utf-8.htmlOK
Should convert the script contents to UTF-8 before hashing - greek small letter muPASS
Should convert the script contents to UTF-8 before hashing - latin capital letter g with brevePASS
Should convert the script contents to UTF-8 before hashing - latin micro signPASS
/content-security-policy/embedded-enforcement/subsumption_algorithm-unsafe_inline.htmlTIMEOUT
'strict-dynamic' is ineffective for `style-src`.PASS
'unsafe-inline' does not matter if returned csp is effectively `none`.PASS
'unsafe-inline' is ineffective when nonces are present.TIMEOUT
'unsafe-inline' is only ineffective if the effective returned csp has hashes in `script-src`.TIMEOUT
'unsafe-inline' is only ineffective if the effective returned csp has hashes in `style-src`.PASS
'unsafe-inline' is only ineffective if the effective returned csp has nonces in `style-src`.PASS
'unsafe-inline' is properly subsumed in `script-src`.PASS
'unsafe-inline' is properly subsumed in `style-src`.PASS
Effective returned csp allows 'unsafe-inline'FAIL
Effective returned csp does not allow 'sha512-321cba' hash.PASS
Required csp allows `strict-dynamic`, but retuned csp does.FAIL
Required csp does not allow `unsafe-inline`, but retuned csp does.FAIL
Returned csp does not have to allow 'unsafe-inline' in `style-src` to be subsumed.PASS
Returned csp only loads 'unsafe-inline' scripts with 'nonce-abc'.TIMEOUT
Returned csp whitelists a hash.FAIL
Returned csp whitelists a nonce.FAIL
/content-security-policy/reporting-api/reporting-api-sends-reports-on-violation.https.sub.htmlTIMEOUT
Event is firedTIMEOUT
Test that image does not loadPASS
Violation report status OK.FAIL
/content-security-policy/generic/generic-0_8_1.sub.htmlTIMEOUT
Should fire violation events for every failed violationNOTRUN
Wildcard host matching works.PASS
/content-security-policy/securitypolicyviolation/securitypolicyviolation-block-image-from-script.sub.htmlTIMEOUT
Non-redirected cross-origin URLs are not stripped.TIMEOUT
/content-security-policy/style-src/inline-style-blocked.sub.htmlOK
Expecting logs: ["PASS"]PASS
/content-security-policy/navigate-to/meta-refresh-cross-origin-allowed.sub.htmlOK
Test that the child iframe navigation is allowedPASS
/content-security-policy/connect-src/connect-src-beacon-allowed.sub.htmlOK
Expecting logs: ["Pass"]PASS
/content-security-policy/navigate-to/unsafe-allow-redirects/blocked-end-of-chain.sub.htmlOK
Test that the child iframe navigation is blockedFAIL
/content-security-policy/prefetch-src/prefetch-header-blocked.htmlTIMEOUT
Browser supports performance APIs.PASS
Browser supports prefetch.FAIL
Prefetch via `Link` header succeeds when allowed by prefetch-srcTIMEOUT
/content-security-policy/media-src/media-src-7_3.sub.htmlTIMEOUT
In-policy track elementNOTRUN
Should not fire policy violation eventsNOTRUN
/content-security-policy/frame-src/frame-src-blocked.sub.htmlOK
Expecting logs: ["PASS IFrame #1 generated a load event.","violated-directive=frame-src"]FAIL
/content-security-policy/reporting/report-multiple-violations-02.htmlOK
Test number of sent reports.FAIL
Violation report status OK.PASS
/content-security-policy/form-action/form-action-self-allowed-target-blank.htmlTIMEOUT
The form submission should not be blocked by the iframe's CSP.TIMEOUT
/content-security-policy/reporting/report-blocked-uri-cross-origin.sub.htmlOK
Violation report status OK.PASS
/content-security-policy/unsafe-eval/eval-scripts-setInterval-blocked.sub.htmlOK
Expecting logs: ["PASS","violated-directive=script-src"]FAIL
/content-security-policy/script-src/script-src-1_4_1.htmlTIMEOUT
Test that securitypolicyviolation event is firedNOTRUN
window.setInterval()PASS
window.setTimeout()PASS
/content-security-policy/img-src/img-src-wildcard-allowed.htmlOK
img-src with wildcard should match allPASS
img-src with wildcard should not match blobPASS
/content-security-policy/style-src-attr-elem/style-src-attr-allowed-src-blocked.htmlOK
Should apply the style attributeFAIL
/content-security-policy/style-src/style-src-hash-allowed.htmlOK
All style elements should load because they have proper hashesPASS
/content-security-policy/object-src/object-src-no-url-allowed.htmlOK
Violation report status OK.PASS
/content-security-policy/securitypolicyviolation/blockeduri-eval.htmlTIMEOUT
Eval violations have a blockedURI of 'eval'TIMEOUT
/content-security-policy/media-src/media-src-7_1.htmlTIMEOUT
In-policy async video source elementFAIL
In-policy async video srcFAIL
Should not fire policy violation eventsNOTRUN
/content-security-policy/frame-ancestors/frame-ancestors-nested-same-in-cross-self-block.htmlTIMEOUT
A 'frame-ancestors' CSP directive with a value 'same' should block render in same-origin nested frames.NOTRUN
/content-security-policy/reporting/report-uri-from-inline-javascript.htmlOK
Violation report status OK.PASS
/content-security-policy/base-uri/base-uri-deny.sub.htmlOK
Check that baseURI fires a securitypolicyviolation event when it does not match the csp directivePASS
Check that the baseURI is not set when it does not match the csp directivePASS
/content-security-policy/style-src/style-src-hash-blocked.htmlOK
Should fire a securitypolicyviolation eventFAIL
Should load the style with a correct hashPASS
Should not load style that does not match hashPASS
/content-security-policy/frame-ancestors/frame-ancestors-nested-cross-in-same-self-block.htmlTIMEOUT
A 'frame-ancestors' CSP directive with a value 'same' should block render in same-origin nested frames.NOTRUN
/content-security-policy/securitypolicyviolation/inside-service-worker.https.htmlTIMEOUT
No SecurityPolicyViolation event fired for successful load.PASS
SecurityPolicyViolation event fired on global with the correct blockedURI.TIMEOUT
SecurityPolicyViolation event fired on global.TIMEOUT
/content-security-policy/reporting/report-original-url.sub.htmlTIMEOUT
Block after redirect, cross-origin = original URL in reportPASS
Block after redirect, same-origin = original URL in reportPASS
Direct block, cross-origin = full URL in reportTIMEOUT
Direct block, same-origin = full URL in reportPASS
Violation report status OK.PASS
/content-security-policy/sandbox/sandbox-allow-scripts.sub.htmlOK
Expecting logs: ["Message"]PASS
/content-security-policy/navigate-to/href-location-cross-origin-allowed.sub.htmlTIMEOUT
Test that the child iframe navigation is allowedNOTRUN
/content-security-policy/frame-ancestors/frame-ancestors-self-allow.htmlOK
A 'frame-ancestors' CSP directive with a value 'self' should allow rendering.PASS
/content-security-policy/sandbox/sandbox-empty-subframe.sub.htmlOK
Expecting logs: ["PASS2"]PASS
/content-security-policy/style-src/stylenonce-allowed.sub.htmlTIMEOUT
Should fire securitypolicyviolationNOTRUN
stylenonce-allowedPASS
stylenonce-allowed 1PASS
/content-security-policy/frame-ancestors/frame-ancestors-nested-cross-in-same-none-block.htmlTIMEOUT
A 'frame-ancestors' CSP directive with a value 'none' should block rendering in nested frames.NOTRUN
/content-security-policy/script-src/injected-inline-script-blocked.sub.htmlOK
Expecting logs: ["violated-directive=script-src-elem",]FAIL
/content-security-policy/generic/generic-0_2_2.sub.htmlTIMEOUT
Prevents access to external scripts.PASS
Should fire violation events for every failed violationNOTRUN
/content-security-policy/generic/filesystem-urls-match-filesystem.sub.htmlOK
Expecting logs: ["PASS (1/1)"]NOTRUN
/content-security-policy/embedded-enforcement/idlharness.window.htmlOK
HTMLIFrameElement interface: attribute cspFAIL
HTMLIFrameElement interface: document.createElement("iframe") must inherit property "csp" with the proper typeFAIL
Partial interface HTMLIFrameElement: original interface definedPASS
idl_test setupPASS
/content-security-policy/frame-ancestors/frame-ancestors-self-block.htmlTIMEOUT
A 'frame-ancestors' CSP directive with a value 'self' should block rendering.NOTRUN
/content-security-policy/script-src/scriptnonce-redirect.sub.htmlOK
Expecting alerts: ["PASS"]PASS
/content-security-policy/reporting-api/reporting-api-report-to-overrides-report-uri-1.https.sub.htmlTIMEOUT
Event is firedTIMEOUT
Test that image does not loadPASS
/content-security-policy/media-src/media-src-redir-bug.sub.htmlTIMEOUT
In-policy async video source elementFAIL
In-policy async video source element w/redirNOTRUN
In-policy async video srcFAIL
Should not fire policy violation eventsNOTRUN
in-policy async video src w/redirFAIL
/content-security-policy/font-src/font-mismatch-blocked.sub.htmlTIMEOUT
Test font does not load if it does not match font-src.TIMEOUT
/content-security-policy/form-action/form-action-src-allowed-target-blank.sub.htmlTIMEOUT
form submission targetting _blank allowed after a redirectNOTRUN
/content-security-policy/frame-ancestors/frame-ancestors-nested-cross-in-same-star-allow.htmlTIMEOUT
A 'frame-ancestors' CSP directive with a value '*' should render in nested frames.NOTRUN
/content-security-policy/embedded-enforcement/required-csp-header-cascade.htmlOK
Test same origin: Test invalid policy on first iframe (bad directive)FAIL
Test same origin: Test invalid policy on first iframe (report directive)FAIL
Test same origin: Test invalid policy on second iframe (bad directive)FAIL
Test same origin: Test invalid policy on second iframe (report directive)FAIL
Test same origin: Test less restrictive policy on second iframeFAIL
Test same origin: Test more restrictive policy on second iframeFAIL
Test same origin: Test no policy on first iframeFAIL
Test same origin: Test no policy on second iframeFAIL
Test same origin: Test same policy for both iframesFAIL
/content-security-policy/navigate-to/form-action/form-action-allows-navigate-to-allows.sub.htmlOK
Test that form-action overrides navigate-to when present.PASS
/content-security-policy/media-src/media-src-blocked.sub.htmlTIMEOUT
Disallaowed audio srcPASS
Disallowed async video source elementPASS
Disallowed async video srcPASS
Disallowed audio source elementPASS
Test that securitypolicyviolation events are firedNOTRUN
/content-security-policy/connect-src/connect-src-eventsource-allowed.sub.htmlOK
Expecting logs: ["allowed"]FAIL
/content-security-policy/sandbox/iframe-inside-csp.sub.htmlOK
Expecting logs: ["PASS (1/2): Script can execute","PASS (2/2): Eval works"]PASS
/content-security-policy/unsafe-eval/eval-scripts-setInterval-allowed.sub.htmlOK
Expecting logs: ["PASS 1 of 2","PASS 2 of 2"]PASS
/content-security-policy/unsafe-eval/eval-blocked-in-about-blank-iframe.sub.htmlOK
Expecting logs: ["violated-directive=script-src","PASS"]FAIL
/content-security-policy/form-action/form-action-src-redirect-allowed-target-blank.sub.htmlTIMEOUT
form submission targetting _blank allowed after a redirectNOTRUN
/content-security-policy/script-src/scripthash-unicode-normalization.sub.htmlTIMEOUT
Only matching content runs even with NFC normalization.FAIL
Should fire securitypolicyviolationNOTRUN
/content-security-policy/sandbox/window-reuse-unsandboxed.htmlTIMEOUT
Window object should be reusedNOTRUN
/content-security-policy/object-src/object-src-url-redirect-blocked.sub.htmlTIMEOUT
Should block the object and fire a spvNOTRUN
/content-security-policy/worker-src/service-worker-src-default-fallback.https.sub.htmlOK
Same-origin service worker allowed by default-src 'self'.PASS
/content-security-policy/embedded-enforcement/subsumption_algorithm-host_sources-ports.htmlOK
Returned CSP should be subsumed even if the port is not specified but is a default port for a more secure scheme.PASS
Returned CSP should be subsumed even if the port is not specified but is a default port for a scheme.PASS
Returned CSP should be subsumed if the port is specified but is not default for a more secure scheme.FAIL
Returned CSP should be subsumed if the port is specified but the scheme is more secure.PASS
Returned CSP should be subsumed if the port is specified.PASS
Returned CSP should be subsumed if the ports match but schemes are not identical for `ws`.PASS
Returned CSP should be subsumed if the ports match but schemes are not identical.PASS
Specified ports must match.FAIL
The same should hold for `ws` case.PASS
Unspecified ports must match if schemes match.PASS
Wildcard port should match a wildcard.PASS
Wildcard port should match any specific port.PASS
Wildcard port should match unspecified port.PASS
Wildcard port should not be subsumed by a default port.FAIL
Wildcard port should not be subsumed by a spcified port.FAIL
/content-security-policy/script-src/worker-set-timeout-blocked.sub.htmlOK
Expecting alerts: ["setTimeout blocked"]PASS
/content-security-policy/style-src-attr-elem/style-src-elem-allowed-attr-blocked.htmlTIMEOUT
Should fire a security policy violation for the attributeNOTRUN
The attribute style should not be applied and the inline style should be appliedPASS
/content-security-policy/securitypolicyviolation/img-src-redirect-upgrade-reporting.https.htmlTIMEOUT
Image that redirects to http:// URL prohibited by Report-Only must generate a violation report, even with upgrade-insecure-requestsTIMEOUT
/content-security-policy/navigate-to/href-location-redirected-blocked.sub.htmlTIMEOUT
Test that the child iframe navigation is not allowedNOTRUN
Violation report status OK.FAIL
/content-security-policy/navigate-to/link-click-cross-origin-allowed.sub.htmlOK
Test that the child iframe navigation is allowedPASS
/content-security-policy/navigate-to/link-click-redirected-blocked.sub.htmlOK
Test that the child iframe navigation is not allowedFAIL
Violation report status OK.FAIL
/content-security-policy/script-src/script-src-overrides-default-src.sub.htmlOK
Expecting logs: ["PASS 1 of 2","PASS 2 of 2"]PASS
/content-security-policy/script-src/worker-eval-blocked.sub.htmlOK
Expecting logs: ["eval blocked"]PASS
/content-security-policy/navigation/to-javascript-url-frame-src.htmlOK
<iframe src='javascript:...'> not blocked by 'frame-src'PASS
/content-security-policy/child-src/child-src-cross-origin-load.sub.htmlOK
Expecting alerts: ["PASS","PASS"]PASS
Expecting logs: ["PASS IFrame #1 generated a load event.","PASS IFrame #2 generated a load event.","PASS IFrame #3 generated a load event.", "violated-directive=frame-src"]FAIL
/content-security-policy/style-src/injected-inline-style-allowed.sub.htmlOK
Expecting logs: ["PASS: 2 stylesheets on the page."]PASS
/content-security-policy/style-src/style-src-injected-inline-style-allowed.htmlOK
Injected inline style should load with 'unsafe-inline'PASS
/content-security-policy/worker-src/service-self.https.sub.htmlOK
Same-origin service worker allowed by 'self'.PASS
/content-security-policy/style-src/style-src-none-blocked.htmlOK
Should fire a securitypolicyviolation eventFAIL
Should not stylesheet when style-src is 'none'PASS
/content-security-policy/script-src/scripthash-ignore-unsafeinline.sub.htmlOK
Expecting alerts: ["PASS (1/1)"]PASS
/content-security-policy/navigate-to/form-allowed.htmlOK
Test that the child iframe navigation is allowedPASS
/content-security-policy/style-src/stylehash-default-src.sub.htmlOK
stylehash allowed from default-srcPASS
/content-security-policy/script-src-attr-elem/script-src-elem-allowed-attr-blocked.htmlTIMEOUT
Should execute the inline script blockPASS
Should fire a security policy violation for the attributeNOTRUN
/content-security-policy/script-src/script-src-1_10_1.htmlOK
Test that no report violation event was raisedPASS
Verify that data: as script src runs with this policyPASS
/content-security-policy/unsafe-hashes/javascript_src_denied_wrong_hash-window_location.htmlTIMEOUT
Test that the javascript: src is not allowed to runNOTRUN
/content-security-policy/reporting-api/reporting-api-works-on-frame-src.https.sub.htmlTIMEOUT
Event is firedTIMEOUT
Violation report status OK.FAIL
/content-security-policy/navigate-to/link-click-redirected-allowed.htmlOK
Test that the child iframe navigation is allowedPASS
/content-security-policy/worker-src/dedicated-none.sub.htmlOK
Same-origin dedicated worker blocked by host-source expression.FAIL
blob: dedicated worker blocked by 'blob:'.FAIL
/content-security-policy/style-src/style-blocked.sub.htmlOK
Expecting logs: ["violated-directive=style-src","PASS"]FAIL
/content-security-policy/worker-src/shared-fallback.sub.htmlOK
Same-origin dedicated worker allowed by 'self'.FAIL
blob: dedicated worker allowed by 'blob:'.FAIL
/content-security-policy/frame-ancestors/frame-ancestors-nested-same-in-cross-url-allow.htmlTIMEOUT
A 'frame-ancestors' CSP directive with a URL value should block or allow rendering in nested frames as appropriate.NOTRUN
/content-security-policy/frame-ancestors/frame-ancestors-nested-cross-in-sandboxed-cross-url-block.htmlTIMEOUT
A 'frame-ancestors' CSP directive with a URL value should compare against each frame's origin rather than URL, so a nested frame with a sandboxed parent frame should be blocked due to the parent having a unique origin.NOTRUN
/content-security-policy/blob/self-doesnt-match-blob.sub.htmlOK
Expecting logs: ["violated-directive=worker-src","TEST COMPLETE"]FAIL
/content-security-policy/object-src/object-src-no-url-blocked.htmlTIMEOUT
Should block the object and fire a spvNOTRUN
/content-security-policy/sandbox/window-reuse-sandboxed.htmlTIMEOUT
Window object should not be reusedNOTRUN
/content-security-policy/script-src/script-src-wildcards-disallowed.htmlOK
blob: URIs should not match *PASS
data: URIs should not match *PASS
filesystem URIs should not match *PASS
/content-security-policy/connect-src/connect-src-beacon-redirect-to-blocked.sub.htmlOK
Expecting logs: ["violated-directive=connect-src"]FAIL
/content-security-policy/unsafe-hashes/style_attribute_allowed.htmlOK
Test that the inline style attribute is loadedFAIL
/content-security-policy/navigate-to/href-location-allowed.htmlTIMEOUT
Test that the child iframe navigation is allowedNOTRUN
/content-security-policy/worker-src/dedicated-child.sub.htmlOK
Same-origin dedicated worker allowed by host-source expression.PASS
blob: dedicated worker allowed by 'blob:'.PASS
/content-security-policy/inheritance/window.htmlTIMEOUT
`document.write` into `window.open()` inherits policy.FAIL
window.open('blob:...') inherits policy.TIMEOUT
window.open('javascript:...') inherits policy.TIMEOUT
window.open() inherits policy.FAIL
/content-security-policy/object-src/object-src-url-embed-blocked.htmlTIMEOUT
Should block the object and fire a spvNOTRUN
/content-security-policy/generic/only-valid-whitespaces-are-allowed.htmlOK
Should load image without any CSP - HTTP headerPASS
Should load image without any CSP - meta tagPASS
Should not load image with 'none' CSP - HTTP headerPASS
Should not load image with 'none' CSP - meta tagPASS
U+0009 TAB should be properly parsed between directive name and value - HTTP headerPASS
U+0009 TAB should be properly parsed between directive name and value - meta tagPASS
U+0009 TAB should be properly parsed inside directive value - HTTP headerPASS
U+0009 TAB should be properly parsed inside directive value - meta tagPASS
U+000A LF should be properly parsed between directive name and value - meta tagPASS
U+000A LF should be properly parsed inside directive value - meta tagPASS
U+000C FF should be properly parsed between directive name and value - HTTP headerPASS
U+000C FF should be properly parsed between directive name and value - meta tagPASS
U+000C FF should be properly parsed inside directive value - HTTP headerPASS
U+000C FF should be properly parsed inside directive value - meta tagPASS
U+000D CR should be properly parsed between directive name and value - meta tagPASS
U+000D CR should be properly parsed inside directive value - meta tagPASS
U+0020 SPACE should be properly parsed between directive name and value - HTTP headerPASS
U+0020 SPACE should be properly parsed between directive name and value - meta tagPASS
U+0020 SPACE should be properly parsed inside directive value - HTTP headerPASS
U+0020 SPACE should be properly parsed inside directive value - meta tagPASS
U+00A0 NBSP should not be parsed between directive name and value - HTTP headerPASS
U+00A0 NBSP should not be parsed between directive name and value - meta tagPASS
U+00A0 NBSP should not be parsed inside directive value - HTTP headerPASS
U+00A0 NBSP should not be parsed inside directive value - meta tagPASS
/content-security-policy/embedded-enforcement/subsumption_algorithm-unsafe_eval.htmlOK
'unsafe-eval' is properly subsumed.PASS
Effective policy is properly found where 'unsafe-eval' is not part of it.PASS
Effective policy is properly found where 'unsafe-eval' is not subsumed.FAIL
Effective policy is properly found.PASS
No other keyword has the same effect as 'unsafe-eval'.FAIL
Other expressions have to be subsumed.FAIL
Required csp must allow 'unsafe-eval'.FAIL
/content-security-policy/navigate-to/spv-only-sent-to-initiator.sub.htmlTIMEOUT
Test that no spv event is raisedNOTRUN
Violation report status OK.PASS
/content-security-policy/worker-src/dedicated-self.sub.htmlOK
Same-origin dedicated worker allowed by 'self'.PASS
/content-security-policy/svg/object-in-svg-foreignobject.sub.htmlOK
Should throw a securitypolicyviolationFAIL
/content-security-policy/inside-worker/dedicated-inheritance.htmlTIMEOUT
Cross-origin 'fetch()' in blob:PASS
Cross-origin 'fetch()' in http:TIMEOUT
Cross-origin 'fetch()' in http:?pipe=sub|header(Content-Security-Policy,connect-src%20%27none%27)PASS
Cross-origin 'fetch()' in http:?pipe=sub|header(Content-Security-Policy,connect-src%20*)TIMEOUT
Cross-origin 'fetch()' in http:?pipe=sub|header(Content-Security-Policy,default-src%20*)TIMEOUT
Cross-origin XHR in blob:PASS
Cross-origin XHR in http:TIMEOUT
Cross-origin XHR in http:?pipe=sub|header(Content-Security-Policy,connect-src%20%27none%27)PASS
Cross-origin XHR in http:?pipe=sub|header(Content-Security-Policy,connect-src%20*)TIMEOUT
Cross-origin XHR in http:?pipe=sub|header(Content-Security-Policy,default-src%20*)TIMEOUT
Filesystem and blob.PASS
Same-origin 'fetch()' in blob:PASS
Same-origin 'fetch()' in http:PASS
Same-origin 'fetch()' in http:?pipe=sub|header(Content-Security-Policy,connect-src%20%27none%27)TIMEOUT
Same-origin 'fetch()' in http:?pipe=sub|header(Content-Security-Policy,connect-src%20*)PASS
Same-origin 'fetch()' in http:?pipe=sub|header(Content-Security-Policy,default-src%20*)PASS
Same-origin => cross-origin 'fetch()' in blob:PASS
Same-origin => cross-origin 'fetch()' in http:TIMEOUT
Same-origin => cross-origin 'fetch()' in http:?pipe=sub|header(Content-Security-Policy,connect-src%20%27none%27)PASS
Same-origin => cross-origin 'fetch()' in http:?pipe=sub|header(Content-Security-Policy,connect-src%20*)TIMEOUT
Same-origin => cross-origin 'fetch()' in http:?pipe=sub|header(Content-Security-Policy,default-src%20*)TIMEOUT
Same-origin XHR in blob:PASS
Same-origin XHR in http:PASS
Same-origin XHR in http:?pipe=sub|header(Content-Security-Policy,connect-src%20%27none%27)FAIL
Same-origin XHR in http:?pipe=sub|header(Content-Security-Policy,connect-src%20*)PASS
Same-origin XHR in http:?pipe=sub|header(Content-Security-Policy,default-src%20*)PASS
/content-security-policy/style-src/style-src-inline-style-nonce-allowed.htmlOK
Style with correct nonce should loadPASS
/content-security-policy/meta/meta-img-src.htmlOK
Expecting logs: ["PASS","TEST COMPLETE"]PASS
/content-security-policy/inheritance/iframe-all-local-schemes-inherit-self.sub.htmlOK
<iframe sandbox src='blob:...'>'s inherits policy. (opaque origin sandbox)PASS
<iframe src='blob:...'>'s inherits policy.PASS
<iframe src='data:...'>'s inherits policy.PASS
<iframe src='javascript:...'>'s inherits policy.PASS
<iframe srcdoc>'s inherits policy.PASS
<iframe>'s about:blank inherits policy.PASS
/content-security-policy/navigate-to/form-cross-origin-blocked.sub.htmlOK
Test that the child iframe navigation is not allowedFAIL
Violation report status OK.FAIL
/content-security-policy/style-src-attr-elem/style-src-attr-blocked-src-allowed.htmlTIMEOUT
Should fire a security policy violation eventNOTRUN
The attribute style should not be appliedPASS
/content-security-policy/navigate-to/link-click-cross-origin-blocked.sub.htmlOK
Test that the child iframe navigation is not allowedFAIL
Violation report status OK.FAIL
/content-security-policy/form-action/form-action-src-get-blocked.sub.htmlOK
Expecting logs: ["violated-directive=form-action","TEST COMPLETE"]FAIL
/content-security-policy/script-src-attr-elem/script-src-elem-blocked-attr-allowed.htmlTIMEOUT
Should execute the inline script attributePASS
Should fire a security policy violation for the attributeNOTRUN
/content-security-policy/script-src/worker-script-src.sub.htmlOK
Expecting logs: ["PASS"]PASS
/content-security-policy/inheritance/inherited-csp-list-modifications-are-local.htmlTIMEOUT
Test that embedded iframe document image does not loadPASS
Test that parent document image loadsPASS
Test that spv event is firedNOTRUN
/content-security-policy/unsafe-hashes/javascript_src_allowed-window_location.htmlTIMEOUT
Test that the javascript: src is allowed to runNOTRUN
/content-security-policy/navigate-to/meta-refresh-redirected-allowed.htmlOK
Test that the child iframe navigation is allowedPASS
/content-security-policy/navigate-to/link-click-blocked.sub.htmlOK
Test that the child iframe navigation is not allowedFAIL
Violation report status OK.FAIL
/content-security-policy/reporting/report-same-origin-with-cookies.htmlOK
Image should not loadPASS
Test report cookies.FAIL
Violation report status OK.PASS
/content-security-policy/navigate-to/meta-refresh-allowed.htmlOK
Test that the child iframe navigation is allowedPASS
/content-security-policy/child-src/child-src-allowed.sub.htmlOK
Expecting alerts: ["PASS"]PASS
Expecting logs: ["PASS IFrame #1 generated a load event."]PASS
/content-security-policy/worker-src/service-none.https.sub.htmlOK
Same-origin service worker blocked by 'none'.FAIL
/content-security-policy/form-action/form-action-src-allowed.sub.htmlOK
Expecting logs: ["PASS","TEST COMPLETE"]PASS
/content-security-policy/securitypolicyviolation/constructor-required-fields.htmlOK
SecurityPolicyViolationEvent constructor does not require blockedURIPASS
SecurityPolicyViolationEvent constructor does not require columnNumberPASS
SecurityPolicyViolationEvent constructor does not require lineNumberPASS
SecurityPolicyViolationEvent constructor does not require referrerPASS
SecurityPolicyViolationEvent constructor does not require samplePASS
SecurityPolicyViolationEvent constructor does not require sourceFilePASS
SecurityPolicyViolationEvent constructor requires dispositionFAIL
SecurityPolicyViolationEvent constructor requires documentURIFAIL
SecurityPolicyViolationEvent constructor requires effectiveDirectiveFAIL
SecurityPolicyViolationEvent constructor requires originalPolicyFAIL
SecurityPolicyViolationEvent constructor requires statusCodeFAIL
SecurityPolicyViolationEvent constructor requires violatedDirectiveFAIL
SecurityPolicyViolationEvent constructor should throw with no parametersPASS
SecurityPolicyViolationEvent constructor works with an init dictPASS
/content-security-policy/media-src/media-src-7_2_2.sub.htmlTIMEOUT
Disallaowed audio srcPASS
Disallowed audio source elementPASS
Test that securitypolicyviolation events are firedNOTRUN
/content-security-policy/frame-ancestors/frame-ancestors-nested-same-in-same-url-block.htmlOK
A 'frame-ancestors' CSP directive with a URL value should block or allow rendering in nested frames as appropriate.FAIL
/content-security-policy/frame-ancestors/frame-ancestors-nested-cross-in-cross-self-block.htmlTIMEOUT
A 'frame-ancestors' CSP directive with a value 'same' should block render in same-origin nested frames.NOTRUN
/content-security-policy/style-src/style-allowed.sub.htmlOK
Expecting logs: ["PASS"]PASS
/content-security-policy/frame-ancestors/frame-ancestors-star-allow-crossorigin.htmlTIMEOUT
A 'frame-ancestors' CSP directive with '*' should allow rendering.NOTRUN
/content-security-policy/connect-src/connect-src-xmlhttprequest-redirect-to-blocked.sub.htmlOK
Expecting logs: ["PASS XMLHttpRequest.send() did not follow the disallowed redirect.","TEST COMPLETE","violated-directive=connect-src"]FAIL
/content-security-policy/default-src/default-src-inline-allowed.sub.htmlOK
Expecting alerts: ["PASS 1 of 2","PASS 2 of 2"]PASS
/content-security-policy/blob/blob-urls-do-not-match-self.sub.htmlOK
Expecting logs: ["violated-directive=script-src-elem"]FAIL
/content-security-policy/unsafe-eval/eval-blocked-and-sends-report.sub.htmlOK
Expecting logs: ["PASS: eval() blocked.","violated-directive=script-src"]FAIL
/content-security-policy/navigate-to/href-location-redirected-allowed.htmlTIMEOUT
Test that the child iframe navigation is allowedNOTRUN
/content-security-policy/securitypolicyviolation/style-sample-no-opt-in.htmlTIMEOUT
Inline style attributes should not have a sample.TIMEOUT
Inline style blocks should not have a sample.TIMEOUT
/content-security-policy/style-src/style-src-inline-style-allowed.htmlOK
Inline style should apply with 'unsafe-inline'PASS
/content-security-policy/securitypolicyviolation/inside-shared-worker.htmlOK
inside-shared-workerFAIL
/content-security-policy/securitypolicyviolation/securitypolicyviolation-block-image.sub.htmlTIMEOUT
Non-redirected same-origin URLs are not stripped.TIMEOUT
/content-security-policy/generic/generic-0_1-script-src.htmlTIMEOUT
Should fire violation events for every failed violationNOTRUN
Verify cascading of default-src to script-src policy: allowPASS
Verify cascading of default-src to script-src policy: blockPASS
/content-security-policy/style-src/style-src-multiple-policies-multiple-hashing-algorithms.htmlOK
Test that style loads if allowed by proper hash valuesFAIL
Violation report status OK.FAIL
/content-security-policy/style-src/style-src-inline-style-attribute-blocked.htmlOK
Inline style attribute should not be applied without 'unsafe-inline'PASS
Should fire a securitypolicyviolation eventFAIL
/content-security-policy/style-src/style-src-imported-style-blocked.htmlOK
@import stylesheet should not load because it does not match style-srcPASS
Should fire a securitypolicyviolation eventFAIL
/content-security-policy/navigate-to/form-action/form-action-blocks-navigate-to-allows.sub.htmlTIMEOUT
Test that form-action overrides navigate-to when present.NOTRUN
/content-security-policy/frame-ancestors/frame-ancestors-overrides-xfo.htmlOK
A 'frame-ancestors' CSP directive overrides an 'x-frame-options' header which would allow the page.PASS
A 'frame-ancestors' CSP directive overrides an 'x-frame-options' header which would block the page.FAIL
/content-security-policy/frame-src/frame-src-about-blank-allowed-by-default.sub.htmlOK
Expecting logs: ["PASS"]PASS
/content-security-policy/child-src/child-src-redirect-blocked.sub.htmlOK
Expecting logs: ["PASS IFrame #1 generated a load event.", "violated-directive=frame-src"]FAIL
/content-security-policy/unsafe-eval/function-constructor-blocked.sub.htmlOK
Expecting logs: ["PASS EvalError","violated-directive=script-src"]FAIL
/content-security-policy/script-src/hash-always-converted-to-utf-8/iso-8859-9.htmlTIMEOUT
Should convert the script contents to UTF-8 before hashingNOTRUN
/content-security-policy/worker-src/service-fallback.https.sub.htmlOK
Same-origin service worker allowed by host-source expression.PASS
/content-security-policy/style-src/style-src-inline-style-nonce-blocked-error-event.htmlTIMEOUT
Should fire a securitypolicyviolation eventFAIL
Test that paragraph remains unmodified and error events received.NOTRUN
/content-security-policy/frame-ancestors/frame-ancestors-nested-cross-in-cross-url-allow.htmlTIMEOUT
A 'frame-ancestors' CSP directive with a URL value should block or allow rendering in nested frames as appropriate.NOTRUN
/content-security-policy/navigate-to/link-click-allowed.htmlOK
Test that the child iframe navigation is allowedPASS
/content-security-policy/style-src/style-src-stylesheet-nonce-allowed.htmlOK
Stylesheet link should load with correct noncePASS
/content-security-policy/embedded-enforcement/subsumption_algorithm-host_sources-hosts.htmlOK
A wildcard host should match a more specific host.PASS
Host must match.FAIL
Hosts without wildcards must match.FAIL
More specific subdomain should not match.FAIL
Specified host should not match a wildcard host.FAIL
/content-security-policy/plugin-types/plugintypes-mismatched-data.htmlTIMEOUT
Should not load the object because its declared type does not match its actual typeNOTRUN
/content-security-policy/style-src/style-src-inline-style-blocked.htmlOK
Inline style element should not load without 'unsafe-inline'PASS
Should fire a securitypolicyviolation eventFAIL
/content-security-policy/navigate-to/form-action/form-action-blocks-navigate-to-blocks.sub.htmlTIMEOUT
Test that form-action overrides navigate-to when present.NOTRUN
/content-security-policy/navigate-to/form-redirected-blocked.sub.htmlOK
Test that the child iframe navigation is not allowedFAIL
Violation report status OK.FAIL
/content-security-policy/img-src/icon-allowed.sub.htmlOK
Test that image loadsPASS
/content-security-policy/reporting/report-and-enforce.htmlOK
The image should be blockedPASS
The stylesheet should loadPASS
Violation report status OK.PASS
/content-security-policy/style-src/style-src-inline-style-attribute-allowed.htmlOK
Inline style attribute should apply with 'unsafe-inline'PASS
/content-security-policy/securitypolicyviolation/inside-dedicated-worker.htmlTIMEOUT
No SecurityPolicyViolation event fired for successful load.FAIL
SecurityPolicyViolation event fired on global with the correct blockedURI.TIMEOUT
SecurityPolicyViolation event fired on global.TIMEOUT
/content-security-policy/navigate-to/parent-navigates-child-blocked.htmlOK
Test that the parent can't navigate the child because the relevant policy belongs to the navigation initiator (in this case the parent, which has the policy `navigate-to support/wait_for_navigation.html;`)FAIL
Violation report status OK.FAIL
/content-security-policy/generic/filesystem-urls-do-not-match-self.sub.htmlTIMEOUT
Expecting logs: ["violated-directive=script-src-elem"]NOTRUN
filesystem-urls-do-not-match-selfNOTRUN
/content-security-policy/reporting/report-uri-from-child-frame.htmlOK
Check that we received a message from the child framePASS
/content-security-policy/frame-ancestors/frame-ancestors-nested-cross-in-same-url-block.htmlTIMEOUT
A 'frame-ancestors' CSP directive with a URL value should block or allow rendering in nested frames as appropriate.NOTRUN
/content-security-policy/generic/generic-0_2_3.htmlTIMEOUT
Prevents access to external scripts.PASS
Should fire violation events for every failed violationNOTRUN
/content-security-policy/reporting/report-uri-multiple.htmlOK
Violation report status OK.PASS
/content-security-policy/securitypolicyviolation/upgrade-insecure-requests-reporting.https.htmlOK
Navigated iframe is upgraded and reportedFAIL
Upgraded iframe is reportedFAIL
Upgraded image is reportedFAIL
/content-security-policy/script-src/hash-always-converted-to-utf-8/iso-8859-1.htmlTIMEOUT
Should convert the script contents to UTF-8 before hashingNOTRUN
/content-security-policy/frame-src/frame-src-redirect.htmlTIMEOUT
Redirected iframe src should evaluate both enforced and report-only policies on both original request and when following redirectTIMEOUT
/content-security-policy/script-src/scriptnonce-allowed.sub.htmlOK
Expecting alerts: ["PASS (1/2)","PASS (2/2)"]PASS
/content-security-policy/media-src/media-src-7_2.htmlTIMEOUT
In-policy audio source elementFAIL
In-policy audio srcFAIL
Should not fire policy violation eventsNOTRUN
/content-security-policy/plugin-types/plugintypes-nourl-allowed.htmlOK
Violation report status OK.PASS
/content-security-policy/embedded-enforcement/subsumption_algorithm-strict_dynamic.htmlOK
'strict-dynamic' has to be allowed by required csp if it is present in returned csp.FAIL
'strict-dynamic' is effective only for `script-src`.PASS
'strict-dynamic' is ineffective for `child-src`.PASS
'strict-dynamic' is ineffective for `frame-src`.PASS
'strict-dynamic' is ineffective for `img-src`.PASS
'strict-dynamic' is ineffective for `style-src`.PASS
'strict-dynamic' is proper handled for finding effective policy.PASS
'strict-dynamic' makes 'self' ineffective.PASS
'strict-dynamic' makes 'unsafe-inline' ineffective.PASS
'strict-dynamic' makes host source expressions ineffective.PASS
'strict-dynamic' makes scheme source expressions ineffective.PASS
/content-security-policy/media-src/media-src-7_3_2.sub.htmlTIMEOUT
Disallowed track element onerror handler fires.PASS
Test that securitypolicyviolation events are firedNOTRUN
/content-security-policy/generic/generic-0_10.htmlOK
Test that script does not fire violation eventPASS
/content-security-policy/script-src/script-src-1_2.htmlTIMEOUT
Inline event handlerPASS
Inline script blockPASS
Should fire policy violation eventsNOTRUN
/content-security-policy/style-src/style-src-star-allowed.htmlOK
* should allow any stylePASS
/content-security-policy/reporting-api/reporting-api-report-to-overrides-report-uri-2.https.sub.htmlTIMEOUT
Event is firedTIMEOUT
Test that image does not loadPASS
/content-security-policy/frame-ancestors/frame-ancestors-nested-cross-in-same-url-allow.htmlTIMEOUT
A 'frame-ancestors' CSP directive with a URL value should block or allow rendering in nested frames as appropriate.NOTRUN
/content-security-policy/generic/generic-0_8.sub.htmlOK
Test that script does not fire violation eventPASS
/content-security-policy/img-src/img-src-4_1.sub.htmlOK
img-src for relative path should loadPASS
img-src from approved domains should loadPASS
img-src from unapproved domains should not loadPASS
/content-security-policy/meta/meta-modified.htmlOK
Expecting logs: ["PASS", "PASS","TEST COMPLETE"]PASS
/content-security-policy/script-src/script-src-1_2_1.htmlTIMEOUT
DOM manipulation inline testsPASS
Test that securitypolicyviolation event is firedNOTRUN
/content-security-policy/connect-src/connect-src-beacon-blocked.sub.htmlOK
Expecting logs: ["Pass", "violated-directive=connect-src"]FAIL
/content-security-policy/securitypolicyviolation/idlharness.window.htmlOK
SecurityPolicyViolationEvent interface object lengthPASS
SecurityPolicyViolationEvent interface object namePASS
SecurityPolicyViolationEvent interface: attribute blockedURIPASS
SecurityPolicyViolationEvent interface: attribute blockedURLFAIL
SecurityPolicyViolationEvent interface: attribute colnoFAIL
SecurityPolicyViolationEvent interface: attribute columnNumberPASS
SecurityPolicyViolationEvent interface: attribute dispositionFAIL
SecurityPolicyViolationEvent interface: attribute documentURIPASS
SecurityPolicyViolationEvent interface: attribute documentURLFAIL
SecurityPolicyViolationEvent interface: attribute effectiveDirectivePASS
SecurityPolicyViolationEvent interface: attribute lineNumberPASS
SecurityPolicyViolationEvent interface: attribute linenoFAIL
SecurityPolicyViolationEvent interface: attribute originalPolicyPASS
SecurityPolicyViolationEvent interface: attribute referrerPASS
SecurityPolicyViolationEvent interface: attribute sampleFAIL
SecurityPolicyViolationEvent interface: attribute sourceFilePASS
SecurityPolicyViolationEvent interface: attribute statusCodePASS
SecurityPolicyViolationEvent interface: attribute violatedDirectivePASS
SecurityPolicyViolationEvent interface: existence and properties of interface objectPASS
SecurityPolicyViolationEvent interface: existence and properties of interface prototype objectPASS
SecurityPolicyViolationEvent interface: existence and properties of interface prototype object's "constructor" propertyPASS
SecurityPolicyViolationEvent interface: existence and properties of interface prototype object's @@unscopables propertyPASS
SecurityPolicyViolationEvent interface: new SecurityPolicyViolationEvent("securitypolicyviolation") must inherit property "blockedURI" with the proper typePASS
SecurityPolicyViolationEvent interface: new SecurityPolicyViolationEvent("securitypolicyviolation") must inherit property "blockedURL" with the proper typeFAIL
SecurityPolicyViolationEvent interface: new SecurityPolicyViolationEvent("securitypolicyviolation") must inherit property "colno" with the proper typeFAIL
SecurityPolicyViolationEvent interface: new SecurityPolicyViolationEvent("securitypolicyviolation") must inherit property "columnNumber" with the proper typePASS
SecurityPolicyViolationEvent interface: new SecurityPolicyViolationEvent("securitypolicyviolation") must inherit property "disposition" with the proper typeFAIL
SecurityPolicyViolationEvent interface: new SecurityPolicyViolationEvent("securitypolicyviolation") must inherit property "documentURI" with the proper typePASS
SecurityPolicyViolationEvent interface: new SecurityPolicyViolationEvent("securitypolicyviolation") must inherit property "documentURL" with the proper typeFAIL
SecurityPolicyViolationEvent interface: new SecurityPolicyViolationEvent("securitypolicyviolation") must inherit property "effectiveDirective" with the proper typePASS
SecurityPolicyViolationEvent interface: new SecurityPolicyViolationEvent("securitypolicyviolation") must inherit property "lineNumber" with the proper typePASS
SecurityPolicyViolationEvent interface: new SecurityPolicyViolationEvent("securitypolicyviolation") must inherit property "lineno" with the proper typeFAIL
SecurityPolicyViolationEvent interface: new SecurityPolicyViolationEvent("securitypolicyviolation") must inherit property "originalPolicy" with the proper typePASS
SecurityPolicyViolationEvent interface: new SecurityPolicyViolationEvent("securitypolicyviolation") must inherit property "referrer" with the proper typePASS
SecurityPolicyViolationEvent interface: new SecurityPolicyViolationEvent("securitypolicyviolation") must inherit property "sample" with the proper typeFAIL
SecurityPolicyViolationEvent interface: new SecurityPolicyViolationEvent("securitypolicyviolation") must inherit property "sourceFile" with the proper typePASS
SecurityPolicyViolationEvent interface: new SecurityPolicyViolationEvent("securitypolicyviolation") must inherit property "statusCode" with the proper typePASS
SecurityPolicyViolationEvent interface: new SecurityPolicyViolationEvent("securitypolicyviolation") must inherit property "violatedDirective" with the proper typePASS
SecurityPolicyViolationEvent must be primary interface of new SecurityPolicyViolationEvent("securitypolicyviolation")PASS
Stringification of new SecurityPolicyViolationEvent("securitypolicyviolation")PASS
idl_test setupPASS
/content-security-policy/reporting/report-blocked-data-uri.htmlOK
Violation report status OK.PASS
/content-security-policy/worker-src/dedicated-fallback.sub.htmlOK
Same-origin dedicated worker allowed by host-source expression.FAIL
blob: dedicated worker allowed by 'blob:'.FAIL
/content-security-policy/frame-ancestors/frame-ancestors-nested-same-in-same-none-block.htmlOK
A 'frame-ancestors' CSP directive with a value 'none' should block rendering in nested frames.FAIL
/content-security-policy/reporting-api/reporting-api-report-only-sends-reports-on-violation.https.sub.htmlTIMEOUT
Event is firedTIMEOUT
Test that image does not loadPASS
Violation report status OK.FAIL
/content-security-policy/script-src/scriptnonce-basic-blocked.sub.htmlOK
Expecting alerts: ["PASS (closely-quoted nonce)","PASS (nonce w/whitespace)", "violated-directive=script-src-elem", "violated-directive=script-src-elem", "violated-directive=script-src-elem"]FAIL
/content-security-policy/unsafe-hashes/style_attribute_denied_wrong_hash.htmlTIMEOUT
Test that the inline style attribute is blockedNOTRUN
/content-security-policy/script-src/hash-always-converted-to-utf-8/iso-8859-7.htmlTIMEOUT
Should convert the script contents to UTF-8 before hashingNOTRUN
/content-security-policy/frame-src/frame-src-allowed.sub.htmlOK
Expecting alerts: ["PASS"]PASS
Expecting logs: ["PASS IFrame #1 generated a load event."]PASS
/content-security-policy/style-src-attr-elem/style-src-elem-blocked-src-allowed.htmlTIMEOUT
Should fire a security policy violation eventNOTRUN
The inline style should not be appliedFAIL
/content-security-policy/connect-src/connect-src-xmlhttprequest-blocked.sub.htmlOK
Expecting logs: ["Pass","violated-directive=connect-src"]FAIL
/content-security-policy/img-src/icon-blocked.sub.htmlTIMEOUT
Test that image does not loadPASS
Test that spv event is firedNOTRUN
/content-security-policy/style-src/style-src-injected-stylesheet-allowed.sub.htmlOK
Programatically injected stylesheet should loadPASS
/content-security-policy/securitypolicyviolation/style-sample.htmlTIMEOUT
Inline style attributes should have a sample.TIMEOUT
Inline style blocks should have a sample.TIMEOUT
/content-security-policy/svg/svg-from-guid.htmlOK
Expecting logs: ["TEST COMPLETE"]PASS
/content-security-policy/blob/blob-urls-match-blob.sub.htmlOK
Expecting logs: ["PASS (1/1)"]PASS
/content-security-policy/reporting/report-strips-fragment.htmlTIMEOUT
Reported document URI does not contain fragments.TIMEOUT
/content-security-policy/worker-src/service-list.https.sub.htmlOK
Same-origin service worker allowed by host-source expression.PASS
/content-security-policy/plugin-types/plugintypes-mismatched-url.htmlTIMEOUT
Should not load the object because its declared type does not match its actual typeNOTRUN
/content-security-policy/navigate-to/meta-refresh-redirected-blocked.sub.htmlOK
Test that the child iframe navigation is not allowedFAIL
Violation report status OK.FAIL
/content-security-policy/unsafe-eval/eval-scripts-setTimeout-allowed.sub.htmlOK
Expecting logs: ["PASS 1 of 2","PASS 2 of 2"]PASS
/content-security-policy/script-src/eval-allowed-in-report-only-mode.htmlOK
Eval is allowed because the CSP is report-onlyPASS
/content-security-policy/form-action/form-action-src-javascript-blocked.sub.htmlOK
Expecting logs: ["violated-directive=form-action","TEST COMPLETE"]FAIL
/content-security-policy/frame-ancestors/frame-ancestors-none-block.htmlOK
A 'frame-ancestors' CSP directive with a value 'none' should block rendering.FAIL
/content-security-policy/inside-worker/shared-inheritance.htmlOK
shared-inheritanceFAIL
/content-security-policy/connect-src/connect-src-websocket-self.sub.htmlOK
Expecting logs: ["allowed", "allowed"]FAIL
/content-security-policy/inheritance/blob-url-in-main-window-self-navigate-inherits.sub.htmlOK
Violation report status OK.FAIL
/content-security-policy/script-src/scriptnonce-ignore-unsafeinline.sub.htmlTIMEOUT
Expecting alerts: ["PASS (1/2)","PASS (2/2)", "violated-directive=script-src-elem"]TIMEOUT
/content-security-policy/style-src-attr-elem/style-src-elem-allowed-src-blocked.htmlOK
Inline style should be appliedFAIL
/content-security-policy/object-src/object-src-url-redirect-allowed.htmlOK
Violation report status OK.PASS
/content-security-policy/worker-src/shared-none.sub.htmlOK
Same-origin shared worker blocked by 'none'.FAIL
blob: shared worker blocked by 'none'.FAIL
/content-security-policy/inheritance/iframe-srcdoc-inheritance.htmlTIMEOUT
First image should be blockedNOTRUN
Second image should be blockedNOTRUN
/content-security-policy/media-src/media-src-7_1_2.sub.htmlTIMEOUT
Disallowed async video source elementPASS
Disallowed async video srcPASS
Test that securitypolicyviolation events are firedNOTRUN
/content-security-policy/generic/generic-0_2.htmlOK
Should fire violation events for every failed violationPASS
/content-security-policy/meta/meta-outside-head.sub.htmlOK
Expecting alerts: ["PASS (1/1)"]PASS
/content-security-policy/img-src/report-blocked-data-uri.sub.htmlOK
Expecting logs: ["violated-directive=img-src"]FAIL
/content-security-policy/inside-worker/dedicated-script.htmlTIMEOUT
Cross-origin `importScripts()` blocked in blob:PASS
Cross-origin `importScripts()` blocked in http:TIMEOUT
Cross-origin `importScripts()` blocked in http:?pipe=sub|header(Content-Security-Policy,default-src%20*)TIMEOUT
Cross-origin `importScripts()` blocked in http:?pipe=sub|header(Content-Security-Policy,script-src%20*)TIMEOUT
Filesystem and blob.PASS
`eval()` blocked in blob:PASS
`setTimeout([string])` blocked in blob:TIMEOUT
/content-security-policy/base-uri/base-uri_iframe_sandbox.sub.htmlOK
base-uri 'self' blocks foreign-origin sandboxed iframes.PASS
base-uri 'self' works with same-origin sandboxed iframes.PASS
/content-security-policy/embedded-enforcement/iframe-csp-attribute.htmlOK
<iframe> has a 'csp' attibute which is an empty string if undefined.FAIL
<iframe>'s 'csp content attribute reflects the IDL attribute.FAIL
<iframe>'s IDL attribute reflects the DOM attribute.FAIL
<iframe>'s csp attribute is always a string.FAIL
/content-security-policy/prefetch-src/prefetch-blocked.htmlTIMEOUT
Blocked prefetch generates report.TIMEOUT
Browser supports performance APIs.PASS
Browser supports prefetch.FAIL
/content-security-policy/worker-src/dedicated-list.sub.htmlOK
Same-origin dedicated worker allowed by host-source expression.PASS
blob: dedicated worker allowed by 'blob:'.PASS
/content-security-policy/img-src/img-src-none-blocks.htmlOK
img-src with 'none' source should not matchPASS
/content-security-policy/form-action/form-action-src-redirect-allowed-target-frame.sub.htmlOK
form submission targetting a frame allowed after a redirectPASS
/content-security-policy/child-src/child-src-conflicting-frame-src.sub.htmlOK
Expecting logs: ["PASS IFrame #1 generated a load event.", "violated-directive=frame-src"]FAIL
/content-security-policy/child-src/child-src-about-blank-allowed-by-default.sub.htmlOK
Check that frames load without throwing any violation eventsPASS
/content-security-policy/frame-src/frame-src-about-blank-allowed-by-scheme.sub.htmlOK
Expecting logs: ["PASS"]PASS
/content-security-policy/worker-src/shared-child.sub.htmlOK
Same-origin dedicated worker allowed by 'self'.FAIL
blob: dedicated worker allowed by 'blob:'.FAIL
/content-security-policy/frame-ancestors/frame-ancestors-nested-same-in-same-star-allow.htmlOK
A 'frame-ancestors' CSP directive with a value '*' should render in nested frames.PASS
/content-security-policy/default-src/default-src-inline-blocked.sub.htmlOK
Expecting logs: ["violated-directive=script-src-elem","violated-directive=script-src-elem"]FAIL
/content-security-policy/frame-ancestors/frame-ancestors-nested-same-in-same-self-allow.htmlOK
A 'frame-ancestors' CSP directive with a value 'same' should block render in same-origin nested frames.PASS
/content-security-policy/connect-src/worker-connect-src-allowed.sub.htmlOK
Expecting logs: ["xhr allowed"]PASS
/content-security-policy/img-src/img-src-full-host-wildcard-blocked.sub.htmlOK
img src does not match full host and wildcard csp directiveFAIL
/content-security-policy/style-src/inline-style-allowed-while-cloning-objects.sub.htmlTIMEOUT
Test that violation report event was firedNOTRUN
inline-style-allowed-while-cloning-objectsPASS
inline-style-allowed-while-cloning-objects 1FAIL
inline-style-allowed-while-cloning-objects 10PASS
inline-style-allowed-while-cloning-objects 11PASS
inline-style-allowed-while-cloning-objects 12PASS
inline-style-allowed-while-cloning-objects 13PASS
inline-style-allowed-while-cloning-objects 14PASS
inline-style-allowed-while-cloning-objects 15PASS
inline-style-allowed-while-cloning-objects 16PASS
inline-style-allowed-while-cloning-objects 17PASS
inline-style-allowed-while-cloning-objects 18FAIL
inline-style-allowed-while-cloning-objects 19FAIL
inline-style-allowed-while-cloning-objects 2PASS
inline-style-allowed-while-cloning-objects 20PASS
inline-style-allowed-while-cloning-objects 21PASS
inline-style-allowed-while-cloning-objects 3FAIL
inline-style-allowed-while-cloning-objects 4PASS
inline-style-allowed-while-cloning-objects 5PASS
inline-style-allowed-while-cloning-objects 6PASS
inline-style-allowed-while-cloning-objects 7PASS
inline-style-allowed-while-cloning-objects 8PASS
inline-style-allowed-while-cloning-objects 9PASS
/content-security-policy/frame-ancestors/frame-ancestors-nested-cross-in-cross-star-allow.htmlTIMEOUT
A 'frame-ancestors' CSP directive with a value '*' should render in nested frames.NOTRUN
/content-security-policy/style-src/stylehash-allowed.sub.htmlOK
Expecting alerts: ["PASS (1/4): The '#p1' element's text is green, which means the style was correctly applied.","PASS (2/4): The '#p2' element's text is green, which means the style was correctly applied.","PASS (3/4): The '#p3' element's text is green, which means the style was correctly applied.","PASS (4/4): The '#p4' element's text is green, which means the style was correctly applied."]PASS
/content-security-policy/generic/policy-inherited-correctly-by-plznavigate.htmlTIMEOUT
Violation report status OK.FAIL
iframe still inherits correct CSPNOTRUN
/content-security-policy/script-src/script-src-1_4_2.htmlTIMEOUT
Test that securitypolicyviolation event is firedNOTRUN
Unsafe eval ran in Function() constructor.PASS
/content-security-policy/connect-src/connect-src-websocket-blocked.sub.htmlOK
Expecting logs: ["blocked","violated-directive=connect-src"]FAIL
/content-security-policy/svg/svg-policy-resource-doc-includes.htmlOK
Expecting logs: ["TEST COMPLETE"]PASS
/content-security-policy/object-src/object-src-url-allowed.htmlOK
Violation report status OK.PASS
/content-security-policy/reporting/report-blocked-uri.htmlOK
Violation report status OK.PASS
/content-security-policy/frame-ancestors/frame-ancestors-nested-cross-in-cross-none-block.htmlTIMEOUT
A 'frame-ancestors' CSP directive with a value 'none' should block rendering in nested frames.NOTRUN
/content-security-policy/script-src/scripthash-basic-blocked.sub.htmlOK
Expecting alerts: ["PASS (1/1)"]PASS
/content-security-policy/navigation/to-javascript-parent-initiated-parent-csp.htmlTIMEOUT
Should not have executed the javascript urlNOTRUN
/content-security-policy/navigation/to-javascript-parent-initiated-child-csp.htmlOK
Should have executed the javascript urlPASS
/content-security-policy/worker-src/shared-self.sub.htmlOK
Same-origin dedicated worker allowed by 'self'.FAIL
/content-security-policy/unsafe-eval/eval-blocked.sub.htmlOK
Expecting logs: ["PASS EvalError","PASS EvalError", "violated-directive=script-src"]FAIL
/content-security-policy/frame-ancestors/frame-ancestors-star-allow-sameorigin.htmlOK
A 'frame-ancestors' CSP directive with '*' should allow rendering.PASS
/content-security-policy/form-action/form-action-src-default-ignored.sub.htmlOK
Expecting logs: ["PASS","TEST COMPLETE"]PASS
/content-security-policy/navigate-to/child-navigates-parent-allowed.htmlOK
Test that the child can navigate the parent because the relevant policy belongs to the navigation initiator (in this case the child, which has the policy `navigate-to 'self'`)PASS
/content-security-policy/generic/duplicate-directive.sub.htmlOK
Expecting alerts: ["PASS (1/1)"]PASS
/content-security-policy/unsafe-eval/function-constructor-allowed.sub.htmlOK
Expecting logs: ["PASS"]PASS
/content-security-policy/reporting/multiple-report-policies.htmlOK
1-Violation report status OKPASS
2-Violation report status OKPASS
/content-security-policy/reporting/report-uri-from-javascript.htmlOK
Violation report status OK.PASS
/content-security-policy/script-src/script-src-1_1.htmlTIMEOUT
Inline event handlerPASS
Inline script blockPASS
Should fire policy violation eventsNOTRUN
/content-security-policy/prefetch-src/prefetch-header-allowed.htmlTIMEOUT
Browser supports performance APIs.PASS
Browser supports prefetch.FAIL
Prefetch via `Link` header succeeds when allowed by prefetch-srcTIMEOUT
/content-security-policy/style-src/inline-style-attribute-blocked.sub.htmlOK
Expecting logs: ["violated-directive=style-src-attr","PASS"]FAIL
/content-security-policy/navigate-to/child-navigates-parent-blocked.sub.htmlOK
Test that the child can't navigate the parent because the relevant policy belongs to the navigation initiator (in this case the child which has the policy `navigate-to 'none'`)FAIL
Violation report status OK.FAIL
/content-security-policy/generic/generic-0_10_1.sub.htmlTIMEOUT
Prevents access to external scripts.PASS
Should fire violation events for every failed violationNOTRUN
/content-security-policy/script-src-attr-elem/script-src-attr-blocked-src-allowed.htmlTIMEOUT
Should fire a security policy violation eventNOTRUN
/content-security-policy/connect-src/shared-worker-connect-src-blocked.sub.htmlOK
Expecting logs: ["xhr blocked","TEST COMPLETE"]NOTRUN
/content-security-policy/base-uri/base-uri-allow.sub.htmlOK
Check that base URIs can be set if they do not violate the page's policy.PASS
/content-security-policy/style-src/inline-style-allowed.sub.htmlOK
Expecting logs: ["PASS"]PASS
/content-security-policy/frame-ancestors/frame-ancestors-nested-same-in-cross-url-block.htmlTIMEOUT
A 'frame-ancestors' CSP directive with a URL value should block or allow rendering in nested frames as appropriate.NOTRUN
/content-security-policy/sandbox/sandbox-allow-scripts-subframe.sub.htmlOK
Expecting logs: ["Message"]PASS
/content-security-policy/font-src/font-stylesheet-font-blocked.sub.htmlOK
Test font does not load if it does not match font-src.FAIL
/content-security-policy/frame-ancestors/frame-ancestors-nested-same-in-same-url-allow.htmlOK
A 'frame-ancestors' CSP directive with a URL value should block or allow rendering in nested frames as appropriate.PASS
/content-security-policy/child-src/child-src-blocked.sub.htmlOK
Expecting logs: ["PASS IFrame #1 generated a load event.", "violated-directive=frame-src"]FAIL
/content-security-policy/unsafe-hashes/style_attribute_denied_missing_unsafe_hashes.htmlTIMEOUT
Test that the inline style attribute is blockedNOTRUN
/content-security-policy/meta/combine-header-and-meta-policies.sub.htmlOK
Expecting logs: ["TEST COMPLETE", "violated-directive=img-src", "violated-directive=style-src-elem"]FAIL
combine-header-and-meta-policiesPASS
/content-security-policy/script-src/script-src-1_3.htmlOK
Inline script in a script tag should run with an unsafe-inline directivePASS
Should not fire policy violation eventsPASS
/content-security-policy/frame-ancestors/frame-ancestors-url-block.htmlTIMEOUT
A 'frame-ancestors' CSP directive with a URL which doesn't match this origin should be blocked.NOTRUN
/content-security-policy/script-src/script-src-strict_dynamic_in_img-src.htmlOK
`strict-dynamic` does not drop whitelists in `img-src`.PASS
/content-security-policy/generic/directive-name-case-insensitive.sub.htmlTIMEOUT
Test that the www1 image is allowed to loadPASS
Test that the www2 image is not allowed to loadPASS
Test that the www2 image throws a violation eventNOTRUN
/content-security-policy/navigate-to/meta-refresh-cross-origin-blocked.sub.htmlOK
Test that the child iframe navigation is not allowedFAIL
Violation report status OK.FAIL
/content-security-policy/navigate-to/unsafe-allow-redirects/allowed-end-of-chain-because-of-same-origin.sub.htmlOK
Test that the child iframe navigation is allowedPASS
/content-security-policy/navigate-to/form-cross-origin-allowed.sub.htmlOK
Test that the child iframe navigation is allowedPASS
/content-security-policy/style-src/injected-inline-style-blocked.sub.htmlOK
Expecting logs: ["violated-directive=style-src-elem","PASS"]FAIL
/content-security-policy/sandbox/sandbox-empty.sub.htmlOK
Expecting logs: ["PASS2"]PASS
/content-security-policy/reporting/report-only-in-meta.sub.htmlOK
Image should loadPASS
/content-security-policy/navigate-to/form-action/form-action-allows-navigate-to-blocks.sub.htmlOK
Test that form-action overrides navigate-to when present.PASS
/content-security-policy/embedded-enforcement/subsumption_algorithm-host_sources-protocols.htmlOK
All scheme sources are subsumed by their stronger variants.PASS
All scheme sources must be subsumed.FAIL
If scheme source is present in returned csp, it must be specified in required csp too.FAIL
Matching `https` protocols.PASS
The reverse allows iframe be to be loaded.PASS
`http:` does not subsume other protocols.FAIL
`http:` should subsume all host source expressions with `https:`.PASS
`http:` should subsume all host source expressions with this protocol.PASS
`http:` subsumes other `http:` source expression.PASS
`http:` subsumes other `https:` source expression and expressions with `http:`.PASS
`https` is more restrictive than `http`.FAIL
/content-security-policy/inside-worker/shared-script.htmlOK
shared-scriptFAIL
/content-security-policy/style-src/inline-style-attribute-allowed.sub.htmlOK
Expecting logs: ["PASS"]FAIL
/content-security-policy/img-src/img-src-self-unique-origin.htmlTIMEOUT
Image's url must not match with 'self'. Image must be blocked.TIMEOUT
/content-security-policy/script-src/scriptnonce-and-scripthash.sub.htmlTIMEOUT
Expecting alerts: ["PASS (1/3)","PASS (2/3)","PASS (3/3)"]TIMEOUT
/content-security-policy/img-src/img-src-port-wildcard-allowed.sub.htmlOK
img-src with wildcard port should match any portPASS
/content-security-policy/navigate-to/parent-navigates-child-allowed.htmlOK
Test that the parent can navigate the child because the relevant policy belongs to the navigation initiator (in this case the parent, which has the policy `navigate-to 'self'`)PASS
/content-security-policy/style-src/style-src-stylesheet-nonce-blocked.htmlOK
Should fire a securitypolicyviolation eventFAIL
Should not load stylesheet without correct noncePASS
/content-security-policy/style-src/style-src-injected-inline-style-blocked.htmlOK
Injected style attributes should not be appliedPASS
Should fire a securitypolicyviolation eventFAIL
/content-security-policy/embedded-enforcement/subsumption_algorithm-nonces.htmlOK
A nonce has to be returned if required by the embedder.PASS
Any nonce subsumes.PASS
Exact nonce subsumes.PASS
Multiples nonces returned subsume.PASS
Nonce intersection is still done on exact match - matching nonces.PASS
Nonce intersection is still done on exact match - non-matching nonces.PASS
Other expressions still have to be subsumed - negative testPASS
Other expressions still have to be subsumed - positive test.PASS
/content-security-policy/embedded-enforcement/subsumption_algorithm-hashes.htmlOK
'sha256-abc123' is not subsumed by 'sha256-abc456'.FAIL
'sha256-abc123' is properly subsumed with other sources.PASS
'sha256-abc123' is properly subsumed.PASS
Effective policy is properly found where 'sha256-abc123' is not part of it.PASS
Effective policy is properly found where 'sha256-abc123' is not subsumed.FAIL
Effective policy is properly found.PASS
Effective policy now does not allow 'sha256-abc123'.PASS
Hashes do not have to be present in returned csp but must not allow all inline behavior.FAIL
Hashes do not have to be present in returned csp.PASS
Other expressions have to be subsumed but 'unsafe-inline' gets ignored.PASS
Other expressions have to be subsumed.FAIL
Required csp must allow 'sha256-abc123'.FAIL
Returned should not include hashes not present in required csp.FAIL
/content-security-policy/style-src/style-src-error-event-fires.htmlTIMEOUT
Test error event fires on inline styleNOTRUN
Test error event fires on stylesheet linkNOTRUN
/content-security-policy/securitypolicyviolation/securitypolicyviolation-block-cross-origin-image-from-script.sub.htmlTIMEOUT
Non-redirected cross-origin URLs are not stripped.TIMEOUT
/content-security-policy/form-action/form-action-src-get-allowed.sub.htmlOK
Expecting logs: ["PASS","TEST COMPLETE"]PASS
/content-security-policy/generic/policy-does-not-affect-child.sub.htmlOK
Expecting logs: ["PASS"]PASS
/content-security-policy/worker-src/service-child.https.sub.htmlOK
Same-origin service worker allowed by host-source expression.PASS
/content-security-policy/script-src/hash-always-converted-to-utf-8/iso-8859-3.htmlTIMEOUT
Should convert the script contents to UTF-8 before hashingNOTRUN
/content-security-policy/style-src/stylehash-basic-blocked.sub.htmlTIMEOUT
Expecting alerts: ["PASS: The 'p' element's text is green, which means the style was correctly applied.", "violated-directive=style-src-elem"]TIMEOUT
/content-security-policy/embedded-enforcement/subsumption_algorithm-self.htmlOK
'self' keywords should match.PASS
Required 'self' should match to a origin's url.PASS
Required 'self' should subsume a more secure version of origin's url.PASS
Returned 'self' should match to an origin's url.PASS
Returned 'self' should not be subsumed by a more secure version of origin's url.FAIL
Returned CSP does not have to specify 'self'.PASS
Returned CSP must not allow 'self' if required CSP does not.FAIL
/content-security-policy/reporting/report-cross-origin-no-cookies.sub.htmlOK
Image should not loadPASS
Test report cookies.PASS
Violation report status OK.PASS
/content-security-policy/embedded-enforcement/subsumption_algorithm-general.htmlOK
If there is no required csp, iframe should load.PASS
Iframe should load even if the ports are different but are default for the protocols.PASS
Iframe with a different CSP should be blocked.FAIL
Iframe with a matching and more restrictive ports should load.PASS
Iframe with empty returned CSP should be blocked.FAIL
Iframe with less restricting CSP should be blocked.PASS
Iframe with matching CSP should load.PASS
Iframe with more restricting CSP should load.PASS
/content-security-policy/object-src/object-src-url-blocked.htmlTIMEOUT
Should block the object and fire a spvNOTRUN
/content-security-policy/script-src/injected-inline-script-allowed.sub.htmlOK
Expecting logs: ["Pass 1 of 2","Pass 2 of 2"]PASS
/content-security-policy/unsafe-hashes/javascript_src_denied_missing_unsafe_hashes-window_location.htmlTIMEOUT
Test that the javascript: src is not allowed to runNOTRUN
/content-security-policy/script-src/script-src-1_4.htmlTIMEOUT
Test that securitypolicyviolation event is firedNOTRUN
eval() should not run without 'unsafe-eval' script-src directive.PASS
eval() should throw without 'unsafe-eval' keyword source in script-src directive.PASS
/content-security-policy/navigation/javascript-url-navigation-inherits-csp.htmlOK
javascript-url-navigation-inherits-cspFAIL
/content-security-policy/generic/generic-0_9.sub.htmlTIMEOUT
Test that script does not fire violation eventPASS
/content-security-policy/inheritance/iframe-all-local-schemes.sub.htmlOK
<iframe sandbox src='blob:...'>'s inherits policy. (opaque origin sandbox)FAIL
<iframe src='blob:...'>'s inherits policy.FAIL
<iframe src='data:...'>'s inherits policy.FAIL
<iframe src='javascript:...'>'s inherits policy.PASS
<iframe srcdoc>'s inherits policy.PASS
<iframe>'s about:blank inherits policy.PASS
/content-security-policy/worker-src/shared-list.sub.htmlOK
Same-origin dedicated worker allowed by 'self'.FAIL
blob: dedicated worker allowed by 'blob:'.FAIL
/content-security-policy/script-src/script-src-strict_dynamic_discard_whitelist.htmlOK
Whitelisted script without a correct nonce is not allowed with `strict-dynamic`.FAIL
/content-security-policy/style-src/stylenonce-blocked.sub.htmlTIMEOUT
Should fire securitypolicyviolationNOTRUN
stylenonce-blockedPASS
/content-security-policy/connect-src/worker-connect-src-blocked.sub.htmlOK
Expecting logs: ["xhr blocked","TEST COMPLETE"]PASS
/content-security-policy/connect-src/connect-src-eventsource-redirect-to-blocked.sub.htmlOK
Expecting logs: ["PASS EventSource() did not follow the disallowed redirect.","TEST COMPLETE", "violated-directive=connect-src"]FAIL
/content-security-policy/font-src/font-none-blocked.sub.htmlTIMEOUT
Test font does not load if it does not match font-src.TIMEOUT
/content-security-policy/font-src/font-match-allowed.sub.htmlOK
Test font loads if it matches font-src.PASS
/content-security-policy/script-src/worker-importscripts-blocked.sub.htmlOK
Expecting logs: ["TEST COMPLETE"]PASS
worker-importscripts-blockedPASS
/content-security-policy/frame-ancestors/frame-ancestors-nested-same-in-cross-star-allow.htmlTIMEOUT
A 'frame-ancestors' CSP directive with a value '*' should render in nested frames.NOTRUN
/content-security-policy/style-src/style-src-injected-stylesheet-blocked.sub.htmlOK
Programatically injected stylesheet should not loadPASS
Should fire a securitypolicyviolation eventFAIL
/content-security-policy/plugin-types/plugintypes-notype-data.htmlTIMEOUT
Should not load the object because it does not have a declared typeNOTRUN
/content-security-policy/generic/304-response-should-update-csp.sub.htmlTIMEOUT
Test that the first frame does not use nonce defNOTRUN
Test that the first frame uses nonce abcPASS
Test that the second frame does not use nonce abcFAIL
Test that the second frame uses nonce defFAIL
/content-security-policy/connect-src/connect-src-websocket-allowed.sub.htmlOK
Expecting logs: ["allowed"]PASS
/content-security-policy/script-src/scripthash-default-src.sub.htmlOK
script-hash allowed from default-srcPASS
/content-security-policy/connect-src/connect-src-eventsource-blocked.sub.htmlOK
Expecting logs: ["blocked","violated-directive=connect-src"]FAIL
/content-security-policy/connect-src/shared-worker-connect-src-allowed.sub.htmlERROR
Expecting logs: ["xhr allowed","TEST COMPLETE"]FAIL
/content-security-policy/embedded-enforcement/subsumption_algorithm-host_sources-paths.htmlOK
All specific paths match except the order.PASS
Empty path is not subsumed by specified paths.FAIL
Matching paths.PASS
Returned CSP allows only one path.PASS
Returned CSP has a more specific path.PASS
Returned CSP must specify a path.FAIL
That should not be true when required csp specifies a specific page.FAIL
Unspecified path should be subsumed by `/`.PASS
`/` path should be subsumed by an empty path.PASS
/content-security-policy/connect-src/connect-src-xmlhttprequest-allowed.sub.htmlOK
Expecting logs: ["Pass"]PASS
/content-security-policy/frame-ancestors/frame-ancestors-nested-same-in-cross-none-block.htmlTIMEOUT
A 'frame-ancestors' CSP directive with a value 'none' should block rendering in nested frames.NOTRUN
/content-security-policy/style-src-attr-elem/style-src-elem-blocked-attr-allowed.htmlTIMEOUT
Should fire a security policy violation for the inline blockNOTRUN
The inline style should not be applied and the attribute style should be appliedFAIL
/content-security-policy/navigate-to/href-location-cross-origin-blocked.sub.htmlTIMEOUT
Test that the child iframe navigation is not allowedNOTRUN
Violation report status OK.FAIL
/content-security-policy/worker-src/shared-worker-src-default-fallback.sub.htmlOK
Same-origin shared worker allowed by default-src 'self'.FAIL
/content-security-policy/generic/no-default-src.sub.htmlOK
Allows scripts from the same host.PASS
Violation report status OK.PASS
/content-security-policy/plugin-types/plugintypes-nourl-blocked.htmlTIMEOUT
Should not load the object because it does not match plugin-typesNOTRUN
/content-security-policy/worker-src/dedicated-worker-src-default-fallback.sub.htmlOK
Same-origin dedicated worker allowed by default-src 'self'.PASS
/content-security-policy/navigate-to/meta-refresh-blocked.sub.htmlOK
Test that the child iframe navigation is not allowedFAIL
Violation report status OK.FAIL
/content-security-policy/form-action/form-action-src-redirect-blocked.sub.htmlOK
Expecting logs: ["violated-directive=form-action","TEST COMPLETE"]FAIL
form-action-src-redirect-blockedFAIL
/content-security-policy/blob/star-doesnt-match-blob.sub.htmlOK
Expecting logs: ["violated-directive=worker-src","TEST COMPLETE"]FAIL
/content-security-policy/plugin-types/plugintypes-notype-url.htmlTIMEOUT
Should not load the object because it does not have a declared typeNOTRUN
/content-security-policy/frame-src/frame-src-cross-origin-load.sub.htmlOK
Expecting alerts: ["PASS","PASS"]PASS
Expecting logs: ["PASS IFrame #1 generated a load event.","PASS IFrame #2 generated a load event.","PASS IFrame #3 generated a load event.","violated-directive=frame-src"]FAIL
/content-security-policy/generic/cspro-not-enforced-in-worker.htmlOK
Check that eval is allowed since the inherited policy is report onlyPASS
Check that inline is allowed since the inherited policy is report onlyPASS
/content-security-policy/frame-ancestors/frame-ancestors-nested-cross-in-cross-url-block.htmlTIMEOUT
A 'frame-ancestors' CSP directive with a URL value should block or allow rendering in nested frames as appropriate.NOTRUN
/content-security-policy/frame-src/frame-src-self-unique-origin.htmlTIMEOUT
Iframe's url must not match with 'self'. It must be blocked.TIMEOUT
/content-security-policy/embedded-enforcement/subsumption_algorithm-none.htmlOK
Both required and returned csp are `none` for only one directive.FAIL
Both required and returned csp are `none`.PASS
Both required and returned csp are effectively 'none'.PASS
Both required and returned csp are empty.PASS
Empty required csp subsumes a policy with `none`.PASS
Empty required csp subsumes any list of policies.PASS
Empty required csp subsumes empty list of returned policies.PASS
Required csp with `none` does not subsume `none` of another directive.FAIL
Required csp with `none` does not subsume `none` of different directives.FAIL
Required csp with `none` does not subsume a host source expression.FAIL
Required csp with `none` subsumes effective list of `none` despite other keywords.PASS
Required csp with `none` subsumes effective list of `none`.PASS
Required csp with effective `none` does not subsume `none` of another directive.FAIL
Required csp with effective `none` does not subsume a host source expression.FAIL
Required policy that allows `none` does not subsume empty list of policies.FAIL
Returned csp with `none` is subsumed by any required csp.PASS
Returned csp with effective `none` is subsumed by any required csp.PASS
Source list with exprssions other than `none` make `none` ineffective.PASS
/content-security-policy/script-src/eval-allowed-in-report-only-mode-and-sends-report.htmlOK
Eval is allowed because the CSP is report-onlyPASS
Violation report status OK.PASS
/content-security-policy/script-src/worker-function-function-blocked.sub.htmlOK
Expecting logs: ["Function() function blocked"]PASS
/content-security-policy/reporting/report-uri-multiple-reversed.htmlOK
Violation report status OK.PASS
/content-security-policy/object-src/object-src-url-embed-allowed.htmlOK
Violation report status OK.PASS
/content-security-policy/img-src/img-src-host-partial-wildcard-allowed.sub.htmlOK
img src matches correctly partial wildcard host csp directivePASS
/content-security-policy/embedded-enforcement/subsumption_algorithm-unsafe_hashes.htmlOK
'unsafe-hashes' is properly subsumed.PASS
Effective policy is properly found where 'unsafe-hashes' is not part of it.PASS
Effective policy is properly found where 'unsafe-hashes' is not subsumed.FAIL
Effective policy is properly found.PASS
No other keyword has the same effect as 'unsafe-hashes'.FAIL
Other expressions have to be subsumed.FAIL
Required csp must allow 'unsafe-hashes'.FAIL
/content-security-policy/unsafe-eval/eval-scripts-setTimeout-blocked.sub.htmlOK
Expecting logs: ["PASS","violated-directive=script-src"]FAIL
/content-security-policy/navigate-to/form-redirected-allowed.htmlOK
Test that the child iframe navigation is allowedPASS
/content-security-policy/form-action/form-action-src-blocked.sub.htmlOK
Expecting logs: ["violated-directive=form-action","TEST COMPLETE"]FAIL
form-action-src-blockedFAIL
/content-security-policy/frame-ancestors/frame-ancestors-url-allow.sub.htmlOK
A 'frame-ancestors' CSP directive with a URL matching this origin should allow rendering.PASS
/content-security-policy/navigate-to/anchor-navigation-always-allowed.htmlOK
Test that anchor navigation is allowed regardless of the `navigate-to` directivePASS
/content-security-policy/style-src/style-src-inline-style-nonce-blocked.htmlOK
Should fire a securitypolicyviolation eventFAIL
Should not load inline style element with invalid noncePASS
/content-security-policy/script-src/hash-always-converted-to-utf-8/utf-8-lone-surrogate.htmlTIMEOUT
Should convert the script contents to UTF-8 before hashingNOTRUN
/content-security-policy/script-src/scripthash-allowed.sub.htmlOK
Expecting alerts: ["PASS (1/4)","PASS (2/4)","PASS (3/4)","PASS (4/4)"]PASS
/content-security-policy/script-src/script-src-1_10.htmlTIMEOUT
Test that securitypolicyviolation event is firedNOTRUN
Verify that data: as script src doesn't run with this policyPASS
/content-security-policy/script-src/srcdoc-doesnt-bypass-script-src.sub.htmlOK
Expecting logs: ["violated-directive=script-src-elem"]FAIL
/content-security-policy/style-src/inline-style-attribute-on-html.sub.htmlOK
Expecting logs: ["PASS"]PASS
/content-security-policy/navigate-to/href-location-blocked.sub.htmlTIMEOUT
Test that the child iframe navigation is not allowedNOTRUN
Violation report status OK.FAIL
/content-security-policy/base-uri/report-uri-does-not-respect-base-uri.sub.htmlTIMEOUT
Event is firedTIMEOUT
Test that image does not loadPASS
Violation report status OK.PASS
/content-security-policy/reporting/report-uri-scheme-relative.htmlOK
Violation report status OK.PASS
/content-security-policy/connect-src/worker-from-guid.sub.htmlOK
Expecting logs: ["violated-directive=connect-src","xhr blocked","TEST COMPLETE"]FAIL
/content-security-policy/child-src/child-src-about-blank-allowed-by-scheme.sub.htmlOK
Check that frames load without throwing any violation eventsPASS
/content-security-policy/unsafe-eval/eval-allowed.sub.htmlOK
Expecting alerts: ["PASS (1 of 2)","PASS (2 of 2)"]PASS
/content-security-policy/generic/generic-0_1-img-src.htmlTIMEOUT
Should fire violation events for every failed violationNOTRUN
Verify cascading of default-src to img-src policyPASS
/content-security-policy/reporting/report-multiple-violations-01.htmlOK
Test number of sent reports.FAIL
Violation report status OK.PASS
/content-security-policy/style-src/style-src-imported-style-allowed.sub.htmlOK
Imported style that violates policy should not loadPASS
/content-security-policy/svg/svg-policy-with-resource.htmlOK
Expecting logs: ["TEST COMPLETE"]PASS
/content-security-policy/plugin-types/plugintypes-empty.sub.htmlTIMEOUT
Should not load the object because plugin-types allows no pluginsNOTRUN
/content-security-policy/svg/svg-inline.sub.htmlTIMEOUT
Should fire violation eventNOTRUN
/content-security-policy/securitypolicyviolation/securitypolicyviolation-block-cross-origin-image.sub.htmlTIMEOUT
Non-redirected cross-origin URLs are not stripped.TIMEOUT
/content-security-policy/navigate-to/form-blocked.sub.htmlTIMEOUT
undefinedTIMEOUT
/content-security-policy/form-action/form-action-src-allowed-target-frame.sub.htmlOK
form submission targetting a frame allowedPASS