File: referrer-unsafe-url.sub.html

package info (click to toggle)
firefox-esr 115.14.0esr-1~deb11u1
  • links: PTS, VCS
  • area: main
  • in suites: bullseye
  • size: 3,659,200 kB
  • sloc: cpp: 6,676,648; javascript: 5,690,850; ansic: 3,328,545; python: 1,120,605; asm: 397,163; xml: 180,531; java: 178,838; sh: 68,930; makefile: 20,999; perl: 12,595; objc: 12,561; yacc: 4,583; cs: 3,846; pascal: 2,840; lex: 1,720; ruby: 1,079; exp: 762; php: 436; lisp: 258; awk: 247; sql: 66; sed: 54; csh: 10
file content (81 lines) | stat: -rw-r--r-- 3,511 bytes parent folder | download | duplicates (24)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
<!DOCTYPE html>
<html>
<head>
<title>Referrer with the unsafe-url policy</title>
<meta name="referrer" content="unsafe-url">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
</head>
<body>
<script type="module">

// "name" parameter is necessary for bypassing the module map.

import { referrer as referrerSame } from "./resources/referrer-checker.py?name=same";

import { referrer as referrerRemote } from "http://{{domains[www1]}}:{{ports[http][0]}}/html/semantics/scripting-1/the-script-element/module/resources/referrer-checker.py?name=remote";

import { referrer as referrerSameSame } from "./resources/import-referrer-checker.sub.js?name=same_same";

import { referrer as referrerSameRemote } from "./resources/import-remote-origin-referrer-checker.sub.js?name=same_remote";

import { referrer as referrerRemoteRemote } from "http://{{domains[www1]}}:{{ports[http][0]}}/html/semantics/scripting-1/the-script-element/module/resources/import-referrer-checker.sub.js?name=remote_remote";

import { referrer as referrerRemoteSame } from "http://{{domains[www1]}}:{{ports[http][0]}}/html/semantics/scripting-1/the-script-element/module/resources/import-same-origin-referrer-checker-from-remote-origin.sub.js?name=remote_same";

test(t => {
  assert_equals(
      referrerSame, location.href,
      "Referrer should be sent for the same-origin top-level script.");
}, "Importing a same-origin top-level script with the unsafe-url policy.");

test(t => {
  assert_equals(
      referrerRemote, location.href,
      "Referrer should be sent for the remote-origin top-level script.");
}, "Importing a remote-origin top-level script with the unsafe-url policy.");

test(t => {
  const scriptURL =
      new URL("resources/import-referrer-checker.sub.js", location.href)
  assert_equals(
      referrerSameSame, scriptURL + "?name=same_same",
      "Referrer should be sent for the same-origin descendant script.");
}, "Importing a same-origin descendant script from a same-origin top-level " +
   "script with the unsafe-url policy.");

test(t => {
  const scriptURL =
      new URL("resources/import-remote-origin-referrer-checker.sub.js",
              location.href)
  assert_equals(
      referrerSameRemote, scriptURL + "?name=same_remote",
      "Referrer should be sent for the remote-origin descendant script.");
}, "Importing a remote-origin descendant script from a same-origin top-level " +
   "script with the unsafe-url policy.");

test(t => {
  const scriptURL =
      "http://{{domains[www1]}}:{{ports[http][0]}}/html/semantics/" +
      "scripting-1/the-script-element/module/resources/" +
      "import-referrer-checker.sub.js";
  assert_equals(
      referrerRemoteRemote, scriptURL + "?name=remote_remote",
      "Referrer should be sent for the remote-origin descendant script.");
}, "Importing a remote-origin descendant script from a remote-origin " +
   "top-level script with the unsafe-url policy.");

test(t => {
  const scriptURL =
      "http://{{domains[www1]}}:{{ports[http][0]}}/html/semantics/" +
      "scripting-1/the-script-element/module/resources/" +
      "import-same-origin-referrer-checker-from-remote-origin.sub.js";
  assert_equals(
      referrerRemoteSame, scriptURL + "?name=remote_same",
      "Referrer should be sent for the same-origin descendant script.");
}, "Importing a same-origin descendant script from a remote-origin " +
   "top-level script with the unsafe-url policy.");

</script>
</body>
</html>