mirror of
https://github.com/servo/servo
synced 2026-04-25 17:15:48 +02:00
Automated downstream sync of changes from upstream as of 01-02-2026 [no-wpt-sync] Signed-off-by: WPT Sync Bot <ghbot+wpt-sync@servo.org>
85 lines
2.7 KiB
INI
Vendored
85 lines
2.7 KiB
INI
Vendored
[stream-html-sanitizer.html]
|
|
[element.streamHTMLUnsafe with sanitizer {removeElements}]
|
|
expected: FAIL
|
|
|
|
[element.streamHTMLUnsafe with sanitizer {elements}]
|
|
expected: FAIL
|
|
|
|
[element.streamHTMLUnsafe with sanitizer {replaceWithChildrenElements}]
|
|
expected: FAIL
|
|
|
|
[element.streamHTMLUnsafe with sanitizer {replaceWithChildrenElements} and text]
|
|
expected: FAIL
|
|
|
|
[element.streamHTMLUnsafe with sanitizer {attributes}]
|
|
expected: FAIL
|
|
|
|
[element.streamHTMLUnsafe with sanitizer {removeAttributes}]
|
|
expected: FAIL
|
|
|
|
[element.streamHTMLUnsafe with sanitizer {element: [{removeAttributes}\]}]
|
|
expected: FAIL
|
|
|
|
[element.streamHTMLUnsafe with sanitizer {element: [{attributes}\]}]
|
|
expected: FAIL
|
|
|
|
[element.streamHTMLUnsafe with sanitizer should sanitize template contents]
|
|
expected: FAIL
|
|
|
|
[element.streamHTMLUnsafe: sanitizer shouldn't allow escaping template]
|
|
expected: FAIL
|
|
|
|
[element.streamHTMLUnsafe: sanitizer takes effect after foster parenting]
|
|
expected: FAIL
|
|
|
|
[element.streamHTMLUnsafe: sanitizer with foster parenting: <table><p><p>]
|
|
expected: FAIL
|
|
|
|
[element.streamHTMLUnsafe: sanitizer takes effect after adoption agency]
|
|
expected: FAIL
|
|
|
|
[element.streamHTMLUnsafe: mutating the sanitizer while streaming does not effect the originally given sanitizer]
|
|
expected: FAIL
|
|
|
|
[element.streamAppendHTMLUnsafe with sanitizer {removeElements}]
|
|
expected: FAIL
|
|
|
|
[element.streamAppendHTMLUnsafe with sanitizer {elements}]
|
|
expected: FAIL
|
|
|
|
[element.streamAppendHTMLUnsafe with sanitizer {replaceWithChildrenElements}]
|
|
expected: FAIL
|
|
|
|
[element.streamAppendHTMLUnsafe with sanitizer {replaceWithChildrenElements} and text]
|
|
expected: FAIL
|
|
|
|
[element.streamAppendHTMLUnsafe with sanitizer {attributes}]
|
|
expected: FAIL
|
|
|
|
[element.streamAppendHTMLUnsafe with sanitizer {removeAttributes}]
|
|
expected: FAIL
|
|
|
|
[element.streamAppendHTMLUnsafe with sanitizer {element: [{removeAttributes}\]}]
|
|
expected: FAIL
|
|
|
|
[element.streamAppendHTMLUnsafe with sanitizer {element: [{attributes}\]}]
|
|
expected: FAIL
|
|
|
|
[element.streamAppendHTMLUnsafe with sanitizer should sanitize template contents]
|
|
expected: FAIL
|
|
|
|
[element.streamAppendHTMLUnsafe: sanitizer shouldn't allow escaping template]
|
|
expected: FAIL
|
|
|
|
[element.streamAppendHTMLUnsafe: sanitizer takes effect after foster parenting]
|
|
expected: FAIL
|
|
|
|
[element.streamAppendHTMLUnsafe: sanitizer with foster parenting: <table><p><p>]
|
|
expected: FAIL
|
|
|
|
[element.streamAppendHTMLUnsafe: sanitizer takes effect after adoption agency]
|
|
expected: FAIL
|
|
|
|
[element.streamAppendHTMLUnsafe: mutating the sanitizer while streaming does not effect the originally given sanitizer]
|
|
expected: FAIL
|