Files
servo/tests/wpt/meta/html/dom/partial-updates/tentative/stream-html-sanitizer.html.ini
Servo WPT Sync c197caff99 Sync WPT with upstream (01-02-2026) (#42267)
Automated downstream sync of changes from upstream as of 01-02-2026
[no-wpt-sync]

Signed-off-by: WPT Sync Bot <ghbot+wpt-sync@servo.org>
2026-02-01 01:31:35 +00:00

85 lines
2.7 KiB
INI
Vendored

[stream-html-sanitizer.html]
[element.streamHTMLUnsafe with sanitizer {removeElements}]
expected: FAIL
[element.streamHTMLUnsafe with sanitizer {elements}]
expected: FAIL
[element.streamHTMLUnsafe with sanitizer {replaceWithChildrenElements}]
expected: FAIL
[element.streamHTMLUnsafe with sanitizer {replaceWithChildrenElements} and text]
expected: FAIL
[element.streamHTMLUnsafe with sanitizer {attributes}]
expected: FAIL
[element.streamHTMLUnsafe with sanitizer {removeAttributes}]
expected: FAIL
[element.streamHTMLUnsafe with sanitizer {element: [{removeAttributes}\]}]
expected: FAIL
[element.streamHTMLUnsafe with sanitizer {element: [{attributes}\]}]
expected: FAIL
[element.streamHTMLUnsafe with sanitizer should sanitize template contents]
expected: FAIL
[element.streamHTMLUnsafe: sanitizer shouldn't allow escaping template]
expected: FAIL
[element.streamHTMLUnsafe: sanitizer takes effect after foster parenting]
expected: FAIL
[element.streamHTMLUnsafe: sanitizer with foster parenting: <table><p><p>]
expected: FAIL
[element.streamHTMLUnsafe: sanitizer takes effect after adoption agency]
expected: FAIL
[element.streamHTMLUnsafe: mutating the sanitizer while streaming does not effect the originally given sanitizer]
expected: FAIL
[element.streamAppendHTMLUnsafe with sanitizer {removeElements}]
expected: FAIL
[element.streamAppendHTMLUnsafe with sanitizer {elements}]
expected: FAIL
[element.streamAppendHTMLUnsafe with sanitizer {replaceWithChildrenElements}]
expected: FAIL
[element.streamAppendHTMLUnsafe with sanitizer {replaceWithChildrenElements} and text]
expected: FAIL
[element.streamAppendHTMLUnsafe with sanitizer {attributes}]
expected: FAIL
[element.streamAppendHTMLUnsafe with sanitizer {removeAttributes}]
expected: FAIL
[element.streamAppendHTMLUnsafe with sanitizer {element: [{removeAttributes}\]}]
expected: FAIL
[element.streamAppendHTMLUnsafe with sanitizer {element: [{attributes}\]}]
expected: FAIL
[element.streamAppendHTMLUnsafe with sanitizer should sanitize template contents]
expected: FAIL
[element.streamAppendHTMLUnsafe: sanitizer shouldn't allow escaping template]
expected: FAIL
[element.streamAppendHTMLUnsafe: sanitizer takes effect after foster parenting]
expected: FAIL
[element.streamAppendHTMLUnsafe: sanitizer with foster parenting: <table><p><p>]
expected: FAIL
[element.streamAppendHTMLUnsafe: sanitizer takes effect after adoption agency]
expected: FAIL
[element.streamAppendHTMLUnsafe: mutating the sanitizer while streaming does not effect the originally given sanitizer]
expected: FAIL