Change namespace for Trusted-Types tests for setAttributeNS
to null
#44699
Community-TC Integration / wpt-chrome-dev-stability
succeeded
Feb 21, 2024 in 31m 20s
Community-TC (pull_request)
Verify that all tests affected by a pull request are stable when executed in chrome.
Details
View task in Taskcluster
View logs in Taskcluster
WPT Command: python3 ./wpt run --channel=dev --verify --verify-no-chaos-mode --verify-repeat-loop=0 --verify-repeat-restart=10 --github-checks-text-file=/home/test/artifacts/checkrun.md --affected base_head --log-mach-level=info --log-mach=- -y --no-pause --no-restart-on-unexpected --install-fonts --no-headless --verify-log-full --enable-swiftshader --install-browser --install-webdriver chrome
2:28.82 INFO ### /trusted-types/block-string-assignment-to-Document-parseHTMLUnsafe.html ###
2:28.82 INFO | Subtest | Results | Messages |
2:28.82 INFO |----------------------------------------------------------------------------------------------------|---------|---------------------------------------------------------------------------------------------------------------|
2:28.82 INFO | | OK | |
2:28.82 INFO | `Document.parseHTMLUnsafe assigned via policy (successful HTML transformation).` | PASS | |
2:28.82 INFO | `Document.parseHTMLUnsafe(string) throws.` | FAIL | `assert_throws_js: function "_ => {\n var doc = Document.parseHTMLUnsafe("Fail");\n }" did not throw` |
2:28.82 INFO | `'Document.parseHTMLUnsafe(null)' throws` | FAIL | `assert_throws_js: function "_ => {\n var doc = Document.parseHTMLUnsafe(null);\n }" did not throw` |
2:28.82 INFO | `'Document.parseHTMLUnsafe(string)' assigned via default policy (successful HTML transformation).` | FAIL | `assert_equals: expected "Quack, I want to be a duck!" but got "Hi, I want to be transformed!"` |
2:28.82 INFO | `'Document.parseHTMLUnsafe(null)' assigned via default policy does not throw` | PASS | |
2:28.82 INFO
2:28.82 INFO ### /trusted-types/block-string-assignment-to-Document-write.html ###
2:28.82 INFO | Subtest | Results | Messages |
2:28.82 INFO |-----------------------------------------------------------------------------------|---------|----------|
2:28.82 INFO | | OK | |
2:28.82 INFO | `document.write with html assigned via policy (successful URL transformation).` | PASS | |
2:28.82 INFO | `document.writeln with html assigned via policy (successful URL transformation).` | PASS | |
2:28.82 INFO | `document.write(string) throws` | PASS | |
2:28.82 INFO | `document.writeln(string) throws` | PASS | |
2:28.82 INFO | `document.write(null) throws` | PASS | |
2:28.82 INFO | `document.writeln(null) throws` | PASS | |
2:28.82 INFO | `document.write(string) observes default policy` | PASS | |
2:28.82 INFO | `document.writeln(string) observes default policy` | PASS | |
2:28.82 INFO
2:28.82 INFO ### /trusted-types/block-string-assignment-to-Element-insertAdjacentHTML.html ###
2:28.82 INFO | Subtest | Results | Messages |
2:28.82 INFO |--------------------------------------------------------------------------------------------|---------|----------|
2:28.82 INFO | | OK | |
2:28.82 INFO | `insertAdjacentHTML with html assigned via policy (successful HTML transformation).` | PASS | |
2:28.82 INFO | `insertAdjacentHTML(string) throws.` | PASS | |
2:28.82 INFO | `insertAdjacentHTML(null) throws.` | PASS | |
2:28.82 INFO | `insertAdjacentHTML(string) assigned via default policy (successful HTML transformation).` | PASS | |
2:28.82 INFO | `insertAdjacentHTML(null) assigned via default policy does not throw.` | PASS | |
2:28.82 INFO
2:28.82 INFO ### /trusted-types/block-string-assignment-to-Element-outerHTML.html ###
2:28.82 INFO | Subtest | Results | Messages |
2:28.82 INFO |------------------------------------------------------------------------------------|---------|----------|
2:28.82 INFO | | OK | |
2:28.82 INFO | `outerHTML with html assigned via policy (successful HTML transformation).` | PASS | |
2:28.82 INFO | `outerHTML = string throws.` | PASS | |
2:28.82 INFO | `outerHTML = null throws.` | PASS | |
2:28.82 INFO | `outerHTML = string assigned via default policy (successful HTML transformation).` | PASS | |
2:28.82 INFO | `outerHTML = null assigned via default policy does not throw` | PASS | |
2:28.82 INFO
2:28.82 INFO ### /trusted-types/block-string-assignment-to-Element-setAttribute.html ###
2:28.82 INFO | Subtest | Results | Messages |
2:28.82 INFO |-----------------------------------------------------------------------------|---------|----------|
2:28.82 INFO | | OK | |
2:28.82 INFO | `embed.src accepts only TrustedScriptURL` | PASS | |
2:28.82 INFO | `object.data accepts only TrustedScriptURL` | PASS | |
2:28.82 INFO | `object.codeBase accepts only TrustedScriptURL` | PASS | |
2:28.82 INFO | `script.src accepts only TrustedScriptURL` | PASS | |
2:28.82 INFO | `iframe.srcdoc accepts only TrustedHTML` | PASS | |
2:28.82 INFO | `div.onclick accepts only TrustedScript` | PASS | |
2:28.82 INFO | `Script.prototype.setAttribute.SrC = string throws.` | PASS | |
2:28.82 INFO | `embed.src accepts string and null after default policy was created.` | PASS | |
2:28.82 INFO | `object.data accepts string and null after default policy was created.` | PASS | |
2:28.82 INFO | `object.codeBase accepts string and null after default policy was created.` | PASS | |
2:28.82 INFO | `script.src accepts string and null after default policy was created.` | PASS | |
2:28.82 INFO | `iframe.srcdoc accepts string and null after default policy was created.` | PASS | |
2:28.82 INFO | `div.onclick accepts string and null after default policy was created.` | PASS | |
2:28.82 INFO | `a.rel accepts strings` | PASS | |
2:28.82 INFO | `a.rel accepts null` | PASS | |
2:28.82 INFO | `script.src = setAttributeNode(embed.src) with string works.` | PASS | |
2:28.82 INFO
2:28.82 INFO ### /trusted-types/block-string-assignment-to-Element-setAttributeNS.html ###
2:28.82 INFO | Subtest | Results | Messages |
2:28.82 INFO |------------------------------------------------------------------------------------|---------|----------|
2:28.82 INFO | | OK | |
2:28.82 INFO | `Element.setAttributeNS assigned via policy (successful HTML transformation)` | PASS | |
2:28.82 INFO | `Element.setAttributeNS assigned via policy (successful Script transformation)` | PASS | |
2:28.82 INFO | `Element.setAttributeNS assigned via policy (successful ScriptURL transformation)` | PASS | |
2:28.82 INFO | `Element.setAttributeNS accepts untrusted string for non-specced accessor` | PASS | |
2:28.82 INFO | `Element.setAttributeNS accepts null for non-specced accessor` | PASS | |
2:28.82 INFO | `Assigning TrustedScriptURL to <svg:script xlink:href=...> works` | PASS | |
2:28.82 INFO | `Blocking non-TrustedScriptURL assignment to <svg:script xlink:href=...> works` | PASS | |
2:28.82 INFO
2:28.82 INFO ### /trusted-types/block-string-assignment-to-Element-setHTMLUnsafe.html ###
2:28.82 INFO | Subtest | Results | Messages |
2:28.82 INFO |-----------------------------------------------------------------------------------------------|---------|-------------------------------------------------------------------------------------------------------|
2:28.82 INFO | | OK | |
2:28.82 INFO | `element.setHTMLUnsafe(html) assigned via policy (successful HTML transformation).` | PASS | |
2:28.82 INFO | `element.setHTMLUnsafe(string) throws.` | FAIL | `assert_throws_js: function "_ => {\n d.setHTMLUnsafe("Fail");\n }" did not throw` |
2:28.82 INFO | `element.setHTMLUnsafe(null) throws.` | FAIL | `assert_equals: expected "" but got "Fail"` |
2:28.82 INFO | `element.setHTMLUnsafe(string) assigned via default policy (successful HTML transformation).` | FAIL | `assert_equals: expected "Quack, I want to be a duck!" but got "Fail\nHi, I want to be transformed!"` |
2:28.82 INFO | `element.setHTMLUnsafe(string) assigned via default policy does not throw` | FAIL | `assert_equals: expected "null" but got "Fail\nHi, I want to be transformed!\nnull"` |
2:28.82 INFO
2:28.82 INFO ### /trusted-types/block-string-assignment-to-HTMLElement-generic.html ###
2:28.82 INFO | Subtest | Results | Messages |
2:28.82 INFO |----------------------------------------------------------------------------|---------|----------|
2:28.82 INFO | | OK | |
2:28.82 INFO | `embed.src accepts only TrustedScriptURL` | PASS | |
2:28.82 INFO | `object.codeBase accepts only TrustedScriptURL` | PASS | |
2:28.82 INFO | `object.data accepts only TrustedScriptURL` | PASS | |
2:28.82 INFO | `script.src accepts only TrustedScriptURL` | PASS | |
2:28.82 INFO | `div.innerHTML accepts only TrustedHTML` | PASS | |
2:28.82 INFO | `iframe.srcdoc accepts only TrustedHTML` | PASS | |
2:28.82 INFO | `embed.src accepts string and null after default policy was created` | PASS | |
2:28.82 INFO | `object.codeBase accepts string and null after default policy was created` | PASS | |
2:28.82 INFO | `object.data accepts string and null after default policy was created` | PASS | |
2:28.82 INFO | `script.src accepts string and null after default policy was created` | PASS | |
2:28.82 INFO | `div.innerHTML accepts string and null after default policy was created` | PASS | |
2:28.82 INFO | `iframe.srcdoc accepts string and null after default policy was created` | PASS | |
2:28.82 INFO | `script.text accepts only TrustedScript` | PASS | |
2:28.82 INFO | `script.innerText accepts only TrustedScript` | PASS | |
2:28.82 INFO | `script.textContent accepts only TrustedScript` | PASS | |
2:28.82 INFO
2:28.82 INFO ### /trusted-types/block-string-assignment-to-Range-createContextualFragment.html ###
2:28.82 INFO | Subtest | Results | Messages |
2:28.82 INFO |--------------------------------------------------------------------------------------------------------|---------|----------|
2:28.82 INFO | | OK | |
2:28.82 INFO | `range.createContextualFragment assigned via policy (successful HTML transformation).` | PASS | |
2:28.82 INFO | `range.createContextualFragment(string) throws.` | PASS | |
2:28.82 INFO | `range.createContextualFragment(null) throws.` | PASS | |
2:28.82 INFO | `range.createContextualFragment(string) assigned via default policy (successful HTML transformation).` | PASS | |
2:28.82 INFO | `range.createContextualFragment(null) assigned via default policy does not throw.` | PASS | |
2:28.82 INFO
2:28.82 INFO ### /trusted-types/block-string-assignment-to-ShadowRoot-setHTMLUnsafe.html ###
2:28.82 INFO | Subtest | Results | Messages |
2:28.82 INFO |--------------------------------------------------------------------------------------------------|---------|-------------------------------------------------------------------------------------------------|
2:28.82 INFO | | OK | |
2:28.82 INFO | `shadowRoot.setHTMLUnsafe(html) assigned via policy (successful HTML transformation).` | PASS | |
2:28.82 INFO | `shadowRoot.setHTMLUnsafe(string) throws.` | FAIL | `assert_throws_js: function "_ => {\n s.setHTMLUnsafe("Fail");\n }" did not throw` |
2:28.82 INFO | `shadowRoot.setHTMLUnsafe(null) throws.` | FAIL | `assert_throws_js: function "_ => {\n s.setHTMLUnsafe(null);\n }" did not throw` |
2:28.82 INFO | `shadowRoot.setHTMLUnsafe(string) assigned via default policy (successful HTML transformation).` | FAIL | `assert_equals: expected "Quack, I want to be a duck!" but got "Hi, I want to be transformed!"` |
2:28.82 INFO | `shadowRoot.setHTMLUnsafe(string) assigned via default policy does not throw` | PASS | |
2:28.82 INFO
2:28.82 INFO ### /trusted-types/csp-block-eval.html ###
2:28.82 INFO | Subtest | Results | Messages |
2:28.82 INFO |-------------------------------------------------------|---------|----------|
2:28.82 INFO | | OK | |
2:28.82 INFO | `eval with plain string throws (both block).` | PASS | |
2:28.82 INFO | `eval with TrustedScript throws (script-src blocks).` | PASS | |
2:28.82 INFO
2:28.82 INFO ### /trusted-types/default-policy-report-only.html ###
2:28.83 INFO | Subtest | Results | Messages |
2:28.83 INFO |-----------------------------------------|---------|----------|
2:28.83 INFO | | OK | |
2:28.83 INFO | `Count SecurityPolicyViolation events.` | PASS | |
2:28.83 INFO | `script.src no default policy` | PASS | |
2:28.83 INFO | `div.innerHTML no default policy` | PASS | |
2:28.83 INFO | `script.text no default policy` | PASS | |
2:28.83 INFO | `script.src default` | PASS | |
2:28.83 INFO | `script.src null` | PASS | |
2:28.83 INFO | `script.src throw` | PASS | |
2:28.83 INFO | `script.src undefined` | PASS | |
2:28.83 INFO | `script.src typeerror` | PASS | |
2:28.83 INFO | `div.innerHTML default` | PASS | |
2:28.83 INFO | `div.innerHTML null` | PASS | |
2:28.83 INFO | `div.innerHTML throw` | PASS | |
2:28.83 INFO | `div.innerHTML undefined` | PASS | |
2:28.83 INFO | `div.innerHTML typeerror` | PASS | |
2:28.83 INFO | `script.text default` | PASS | |
2:28.83 INFO | `script.text null` | PASS | |
2:28.83 INFO | `script.text throw` | PASS | |
2:28.83 INFO | `script.text undefined` | PASS | |
2:28.83 INFO | `script.text typeerror` | PASS | |
2:28.83 INFO
2:28.83 INFO ### /trusted-types/default-policy.html ###
2:28.83 INFO | Subtest | Results | Messages |
2:28.83 INFO |-----------------------------------------|---------|----------|
2:28.83 INFO | | OK | |
2:28.83 INFO | `Count SecurityPolicyViolation events.` | PASS | |
2:28.83 INFO | `script.src no default policy` | PASS | |
2:28.83 INFO | `div.innerHTML no default policy` | PASS | |
2:28.83 INFO | `script.text no default policy` | PASS | |
2:28.83 INFO | `script.src default` | PASS | |
2:28.83 INFO | `script.src null` | PASS | |
2:28.83 INFO | `script.src throw` | PASS | |
2:28.83 INFO | `script.src undefined` | PASS | |
2:28.83 INFO | `script.src typeerror` | PASS | |
2:28.83 INFO | `div.innerHTML default` | PASS | |
2:28.83 INFO | `div.innerHTML null` | PASS | |
2:28.83 INFO | `div.innerHTML throw` | PASS | |
2:28.83 INFO | `div.innerHTML undefined` | PASS | |
2:28.83 INFO | `div.innerHTML typeerror` | PASS | |
2:28.83 INFO | `script.text default` | PASS | |
2:28.83 INFO | `script.text null` | PASS | |
2:28.83 INFO | `script.text throw` | PASS | |
2:28.83 INFO | `script.text undefined` | PASS | |
2:28.83 INFO | `script.text typeerror` | PASS | |
2:28.83 INFO
2:28.83 INFO ### /trusted-types/eval-csp-no-tt.html ###
2:28.83 INFO | Subtest | Results | Messages |
2:28.83 INFO |------------------------------------------------|---------|----------|
2:28.83 INFO | | OK | |
2:28.83 INFO | `eval of TrustedScript works.` | PASS | |
2:28.83 INFO | `eval of string works.` | PASS | |
2:28.83 INFO | `eval of !TrustedScript and !string works.` | PASS | |
2:28.83 INFO | `Function constructor of TrustedScript works.` | PASS | |
2:28.83 INFO | `Function constructor of string works.` | PASS | |
2:28.83 INFO
2:28.83 INFO ### /trusted-types/eval-csp-tt-default-policy.html ###
2:28.83 INFO | Subtest | Results | Messages |
2:28.83 INFO |------------------------------------------------|---------|----------|
2:28.83 INFO | | OK | |
2:28.83 INFO | `eval of TrustedScript works.` | PASS | |
2:28.83 INFO | `eval of string works.` | PASS | |
2:28.83 INFO | `eval of !TrustedScript and !string works.` | PASS | |
2:28.83 INFO | `Function constructor of TrustedScript works.` | PASS | |
2:28.83 INFO | `Function constructor of string works.` | PASS | |
2:28.83 INFO
2:28.83 INFO ### /trusted-types/eval-csp-tt-no-default-policy.html ###
2:28.83 INFO | Subtest | Results | Messages |
2:28.83 INFO |------------------------------------------------|---------|----------|
2:28.83 INFO | | OK | |
2:28.83 INFO | `eval of TrustedScript works.` | PASS | |
2:28.83 INFO | `eval of string fails.` | PASS | |
2:28.83 INFO | `eval of !TrustedScript and !string works.` | PASS | |
2:28.83 INFO | `Function constructor of TrustedScript works.` | PASS | |
2:28.83 INFO | `Function constructor of string fails.` | PASS | |
2:28.83 INFO
2:28.83 INFO ### /trusted-types/eval-no-csp-no-tt-default-policy.html ###
2:28.83 INFO | Subtest | Results | Messages |
2:28.83 INFO |----------------------------------------------------------------------------|---------|----------|
2:28.83 INFO | | OK | |
2:28.83 INFO | `eval of TrustedScript works.` | PASS | |
2:28.83 INFO | `eval of string works and does not call a default policy.` | PASS | |
2:28.83 INFO | `eval of !TrustedScript and !string works.` | PASS | |
2:28.83 INFO | `Function constructor of TrustedScript works.` | PASS | |
2:28.83 INFO | `Function constructor of string works and does not call a default policy.` | PASS | |
2:28.83 INFO
2:28.83 INFO ### /trusted-types/eval-no-csp-no-tt.html ###
2:28.83 INFO | Subtest | Results | Messages |
2:28.83 INFO |------------------------------------------------|---------|----------|
2:28.83 INFO | | OK | |
2:28.83 INFO | `eval of TrustedScript works.` | PASS | |
2:28.83 INFO | `eval of string works.` | PASS | |
2:28.83 INFO | `eval of !TrustedScript and !string works.` | PASS | |
2:28.83 INFO | `Function constructor of TrustedScript works.` | PASS | |
2:28.83 INFO | `Function constructor of string works.` | PASS | |
2:28.83 INFO
2:28.83 INFO ### /trusted-types/eval-with-permissive-csp.html ###
2:28.83 INFO | Subtest | Results | Messages |
2:28.83 INFO |--------------------------------------------------------------------------------------------------|---------|----------|
2:28.83 INFO | | OK | |
2:28.83 INFO | `eval with plain string with Trusted Types and permissive CSP throws (no type).` | PASS | |
2:28.83 INFO | `Function constructor with plain string with Trusted Types and permissive CSP throws (no type).` | PASS | |
2:28.83 INFO | `eval with TrustedScript and permissive CSP works.` | PASS | |
2:28.83 INFO | `new Function with TrustedScript and permissive CSP works.` | PASS | |
2:28.83 INFO | `eval with default policy and permissive CSP still obeys default policy.` | PASS | |
2:28.83 INFO | `new Function with default policy and permissive CSP still obeys default policy.` | PASS | |
2:28.83 INFO
2:28.83 INFO ::: Running tests in a loop with restarts 10 times : PASS
2:28.83 INFO :::
2:28.83 INFO ::: Test verification PASS
2:28.83 INFO :::
X connection to :99.0 broken (explicit kill or server shutdown).
[taskcluster 2024-02-21 12:57:27.370Z] === Task Finished ===
[taskcluster 2024-02-21 12:57:27.677Z] Successful task run with exit code: 0 completed in 415.52 seconds
Loading