Closed Bug 2021406 Opened 2 months ago Closed 2 months ago

[wpt-sync] Sync PR 58294 - Support attribute API for processing instructions

Categories

(Core :: DOM: Core & HTML, task, P4)

task

Tracking

()

RESOLVED FIXED
150 Branch
Tracking Status
firefox150 --- fixed

People

(Reporter: wpt-sync, Unassigned)

References

()

Details

(Whiteboard: [wptsync downstream])

Sync web-platform-tests PR 58294 into mozilla-central (this bug is closed when the sync is complete).

PR: https://github.com/web-platform-tests/wpt/pull/58294
Details from upstream follow.

Noam Rosenthal <nrosenthal@chromium.org> wrote:

Support attribute API for processing instructions

Add setAttribute/getAttribute/hasAttribute/removeAttribute etc. to
ProcessingInstruction. They act similarly to attributes on elements,
however they don't produce attribute mutation records.

See spec PR: https://github.com/whatwg/dom/pull/1454

Bug: 431374376
Change-Id: I659e772f0fb11a6ffe2fe3876cf61ee0f6ad042a

Reviewed-on: https://chromium-review.googlesource.com/7607900
WPT-Export-Revision: 5a7c9aa994d673f0f796dec1ce39452247946cb1

Component: web-platform-tests → DOM: Core & HTML
Product: Testing → Core

CI Results

Ran 9 Firefox configurations based on mozilla-central, and Firefox, Chrome, and Safari on GitHub CI

Total 57 tests and 1 subtests

Status Summary

Firefox

OK : 1[GitHub] 57[Gecko-android-em-14-x86_64-debug-geckoview, Gecko-android-em-14-x86_64-lite-opt-geckoview, Gecko-android-em-14-x86_64-opt-geckoview, Gecko-linux2404-64-debug, Gecko-linux2404-64-opt, Gecko-windows11-32-24h2-debug, Gecko-windows11-32-24h2-opt, Gecko-windows11-64-24h2-debug, Gecko-windows11-64-24h2-opt]
PASS: 9
FAIL: 45[GitHub] 554[Gecko-android-em-14-x86_64-debug-geckoview, Gecko-android-em-14-x86_64-lite-opt-geckoview, Gecko-android-em-14-x86_64-opt-geckoview, Gecko-linux2404-64-debug, Gecko-linux2404-64-opt, Gecko-windows11-32-24h2-debug, Gecko-windows11-32-24h2-opt, Gecko-windows11-64-24h2-debug, Gecko-windows11-64-24h2-opt]

Chrome

OK : 1
FAIL: 45

Safari

OK : 1
FAIL: 45

Links

Gecko CI (Treeherder)
GitHub PR Head
GitHub PR Base

Details

New Tests That Don't Pass

  • /html/dom/partial-updates/tentative/marker-attribute.html [wpt.fyi]
    • Access to .marker returns an empty DOMTokenList.: FAIL
    • Multiple names give a DOMTokenList with multiple entries.: FAIL
    • DOMTokenList created by access is persisted.: FAIL
    • Changes in DOMTokenList are refected in attribute.: FAIL
  • /html/dom/partial-updates/tentative/positional-methods-with-trusted-types.html [wpt.fyi]
    • Element.beforeHTML does not go via createHTML: FAIL
    • Policies can disable scripts but not enable them: Element.beforeHTML (runScripts=true => true): FAIL
    • Policies can disable scripts but not enable them: Element.beforeHTML (runScripts=true => false): FAIL
    • Policies can disable scripts but not enable them: Element.beforeHTML (runScripts=false => true): FAIL
    • Policies can disable scripts but not enable them: Element.beforeHTML (runScripts=false => false): FAIL
    • Policy can inject sanitizer: Element.beforeHTML: FAIL
    • TrustedParserOptions overrides default policy: Element.beforeHTML: FAIL
    • Element.beforeHTMLUnsafe goes via createHTML: FAIL
    • Policies can disable scripts but not enable them: Element.beforeHTMLUnsafe (runScripts=true => true): FAIL
    • Policies can disable scripts but not enable them: Element.beforeHTMLUnsafe (runScripts=true => false): FAIL
    • Policies can disable scripts but not enable them: Element.beforeHTMLUnsafe (runScripts=false => true): FAIL
    • Policies can disable scripts but not enable them: Element.beforeHTMLUnsafe (runScripts=false => false): FAIL
    • Policy can inject sanitizer: Element.beforeHTMLUnsafe: FAIL
    • TrustedParserOptions overrides default policy: Element.beforeHTMLUnsafe: FAIL
    • Element.afterHTML does not go via createHTML: FAIL
    • Policies can disable scripts but not enable them: Element.afterHTML (runScripts=true => true): FAIL
    • Policies can disable scripts but not enable them: Element.afterHTML (runScripts=true => false): FAIL
    • Policies can disable scripts but not enable them: Element.afterHTML (runScripts=false => true): FAIL
    • Policies can disable scripts but not enable them: Element.afterHTML (runScripts=false => false): FAIL
    • Policy can inject sanitizer: Element.afterHTML: FAIL
    • TrustedParserOptions overrides default policy: Element.afterHTML: FAIL
    • Element.afterHTMLUnsafe goes via createHTML: FAIL
    • Policies can disable scripts but not enable them: Element.afterHTMLUnsafe (runScripts=true => true): FAIL
    • Policies can disable scripts but not enable them: Element.afterHTMLUnsafe (runScripts=true => false): FAIL
    • Policies can disable scripts but not enable them: Element.afterHTMLUnsafe (runScripts=false => true): FAIL
    • Policies can disable scripts but not enable them: Element.afterHTMLUnsafe (runScripts=false => false): FAIL
    • Policy can inject sanitizer: Element.afterHTMLUnsafe: FAIL
    • TrustedParserOptions overrides default policy: Element.afterHTMLUnsafe: FAIL
    • Element.replaceWithHTML does not go via createHTML: FAIL
    • Policies can disable scripts but not enable them: Element.replaceWithHTML (runScripts=true => true): FAIL
    • Policies can disable scripts but not enable them: Element.replaceWithHTML (runScripts=true => false): FAIL
    • Policies can disable scripts but not enable them: Element.replaceWithHTML (runScripts=false => true): FAIL
    • Policies can disable scripts but not enable them: Element.replaceWithHTML (runScripts=false => false): FAIL
    • Policy can inject sanitizer: Element.replaceWithHTML: FAIL
    • TrustedParserOptions overrides default policy: Element.replaceWithHTML: FAIL
    • Element.replaceWithHTMLUnsafe goes via createHTML: FAIL
    • Policies can disable scripts but not enable them: Element.replaceWithHTMLUnsafe (runScripts=true => true): FAIL
    • Policies can disable scripts but not enable them: Element.replaceWithHTMLUnsafe (runScripts=true => false): FAIL
    • Policies can disable scripts but not enable them: Element.replaceWithHTMLUnsafe (runScripts=false => true): FAIL
    • Policies can disable scripts but not enable them: Element.replaceWithHTMLUnsafe (runScripts=false => false): FAIL
    • Policy can inject sanitizer: Element.replaceWithHTMLUnsafe: FAIL
    • TrustedParserOptions overrides default policy: Element.replaceWithHTMLUnsafe: FAIL
    • Element.appendHTML does not go via createHTML: FAIL
    • Policies can disable scripts but not enable them: Element.appendHTML (runScripts=true => true): FAIL
    • Policies can disable scripts but not enable them: Element.appendHTML (runScripts=true => false): FAIL
    • Policies can disable scripts but not enable them: Element.appendHTML (runScripts=false => true): FAIL
    • Policies can disable scripts but not enable them: Element.appendHTML (runScripts=false => false): FAIL
    • Policy can inject sanitizer: Element.appendHTML: FAIL
    • TrustedParserOptions overrides default policy: Element.appendHTML: FAIL
    • Element.appendHTMLUnsafe goes via createHTML: FAIL
    • Policies can disable scripts but not enable them: Element.appendHTMLUnsafe (runScripts=true => true): FAIL
    • Policies can disable scripts but not enable them: Element.appendHTMLUnsafe (runScripts=true => false): FAIL
    • Policies can disable scripts but not enable them: Element.appendHTMLUnsafe (runScripts=false => true): FAIL
    • Policies can disable scripts but not enable them: Element.appendHTMLUnsafe (runScripts=false => false): FAIL
    • Policy can inject sanitizer: Element.appendHTMLUnsafe: FAIL
    • TrustedParserOptions overrides default policy: Element.appendHTMLUnsafe: FAIL
    • Element.prependHTML does not go via createHTML: FAIL
    • Policies can disable scripts but not enable them: Element.prependHTML (runScripts=true => true): FAIL
    • Policies can disable scripts but not enable them: Element.prependHTML (runScripts=true => false): FAIL
    • Policies can disable scripts but not enable them: Element.prependHTML (runScripts=false => true): FAIL
    • Policies can disable scripts but not enable them: Element.prependHTML (runScripts=false => false): FAIL
    • Policy can inject sanitizer: Element.prependHTML: FAIL
    • TrustedParserOptions overrides default policy: Element.prependHTML: FAIL
    • Element.prependHTMLUnsafe goes via createHTML: FAIL
    • Policies can disable scripts but not enable them: Element.prependHTMLUnsafe (runScripts=true => true): FAIL
    • Policies can disable scripts but not enable them: Element.prependHTMLUnsafe (runScripts=true => false): FAIL
    • Policies can disable scripts but not enable them: Element.prependHTMLUnsafe (runScripts=false => true): FAIL
    • Policies can disable scripts but not enable them: Element.prependHTMLUnsafe (runScripts=false => false): FAIL
    • Policy can inject sanitizer: Element.prependHTMLUnsafe: FAIL
    • TrustedParserOptions overrides default policy: Element.prependHTMLUnsafe: FAIL
    • ShadowRoot.beforeHTML does not go via createHTML: FAIL
    • Policies can disable scripts but not enable them: ShadowRoot.beforeHTML (runScripts=true => true): FAIL
    • Policies can disable scripts but not enable them: ShadowRoot.beforeHTML (runScripts=true => false): FAIL
    • Policies can disable scripts but not enable them: ShadowRoot.beforeHTML (runScripts=false => true): FAIL
    • Policies can disable scripts but not enable them: ShadowRoot.beforeHTML (runScripts=false => false): FAIL
    • Policy can inject sanitizer: ShadowRoot.beforeHTML: FAIL
    • TrustedParserOptions overrides default policy: ShadowRoot.beforeHTML: FAIL
    • ShadowRoot.beforeHTMLUnsafe goes via createHTML: FAIL
    • Policies can disable scripts but not enable them: ShadowRoot.beforeHTMLUnsafe (runScripts=true => true): FAIL
    • Policies can disable scripts but not enable them: ShadowRoot.beforeHTMLUnsafe (runScripts=true => false): FAIL
    • Policies can disable scripts but not enable them: ShadowRoot.beforeHTMLUnsafe (runScripts=false => true): FAIL
    • Policies can disable scripts but not enable them: ShadowRoot.beforeHTMLUnsafe (runScripts=false => false): FAIL
    • Policy can inject sanitizer: ShadowRoot.beforeHTMLUnsafe: FAIL
    • TrustedParserOptions overrides default policy: ShadowRoot.beforeHTMLUnsafe: FAIL
    • ShadowRoot.afterHTML does not go via createHTML: FAIL
    • Policies can disable scripts but not enable them: ShadowRoot.afterHTML (runScripts=true => true): FAIL
    • Policies can disable scripts but not enable them: ShadowRoot.afterHTML (runScripts=true => false): FAIL
    • Policies can disable scripts but not enable them: ShadowRoot.afterHTML (runScripts=false => true): FAIL
    • Policies can disable scripts but not enable them: ShadowRoot.afterHTML (runScripts=false => false): FAIL
    • Policy can inject sanitizer: ShadowRoot.afterHTML: FAIL
    • TrustedParserOptions overrides default policy: ShadowRoot.afterHTML: FAIL
    • ShadowRoot.afterHTMLUnsafe goes via createHTML: FAIL
    • Policies can disable scripts but not enable them: ShadowRoot.afterHTMLUnsafe (runScripts=true => true): FAIL
    • Policies can disable scripts but not enable them: ShadowRoot.afterHTMLUnsafe (runScripts=true => false): FAIL
    • Policies can disable scripts but not enable them: ShadowRoot.afterHTMLUnsafe (runScripts=false => true): FAIL
    • Policies can disable scripts but not enable them: ShadowRoot.afterHTMLUnsafe (runScripts=false => false): FAIL
    • Policy can inject sanitizer: ShadowRoot.afterHTMLUnsafe: FAIL
    • TrustedParserOptions overrides default policy: ShadowRoot.afterHTMLUnsafe: FAIL
    • ShadowRoot.replaceWithHTML does not go via createHTML: FAIL
    • Policies can disable scripts but not enable them: ShadowRoot.replaceWithHTML (runScripts=true => true): FAIL
    • Policies can disable scripts but not enable them: ShadowRoot.replaceWithHTML (runScripts=true => false): FAIL
    • Policies can disable scripts but not enable them: ShadowRoot.replaceWithHTML (runScripts=false => true): FAIL
    • Policies can disable scripts but not enable them: ShadowRoot.replaceWithHTML (runScripts=false => false): FAIL
    • Policy can inject sanitizer: ShadowRoot.replaceWithHTML: FAIL
    • TrustedParserOptions overrides default policy: ShadowRoot.replaceWithHTML: FAIL
    • ShadowRoot.replaceWithHTMLUnsafe goes via createHTML: FAIL
    • Policies can disable scripts but not enable them: ShadowRoot.replaceWithHTMLUnsafe (runScripts=true => true): FAIL
    • Policies can disable scripts but not enable them: ShadowRoot.replaceWithHTMLUnsafe (runScripts=true => false): FAIL
    • Policies can disable scripts but not enable them: ShadowRoot.replaceWithHTMLUnsafe (runScripts=false => true): FAIL
    • Policies can disable scripts but not enable them: ShadowRoot.replaceWithHTMLUnsafe (runScripts=false => false): FAIL
    • Policy can inject sanitizer: ShadowRoot.replaceWithHTMLUnsafe: FAIL
    • TrustedParserOptions overrides default policy: ShadowRoot.replaceWithHTMLUnsafe: FAIL
    • ShadowRoot.appendHTML does not go via createHTML: FAIL
    • Policies can disable scripts but not enable them: ShadowRoot.appendHTML (runScripts=true => true): FAIL
    • Policies can disable scripts but not enable them: ShadowRoot.appendHTML (runScripts=true => false): FAIL
    • Policies can disable scripts but not enable them: ShadowRoot.appendHTML (runScripts=false => true): FAIL
    • Policies can disable scripts but not enable them: ShadowRoot.appendHTML (runScripts=false => false): FAIL
    • Policy can inject sanitizer: ShadowRoot.appendHTML: FAIL
    • TrustedParserOptions overrides default policy: ShadowRoot.appendHTML: FAIL
    • ShadowRoot.appendHTMLUnsafe goes via createHTML: FAIL
    • Policies can disable scripts but not enable them: ShadowRoot.appendHTMLUnsafe (runScripts=true => true): FAIL
    • Policies can disable scripts but not enable them: ShadowRoot.appendHTMLUnsafe (runScripts=true => false): FAIL
    • Policies can disable scripts but not enable them: ShadowRoot.appendHTMLUnsafe (runScripts=false => true): FAIL
    • Policies can disable scripts but not enable them: ShadowRoot.appendHTMLUnsafe (runScripts=false => false): FAIL
    • Policy can inject sanitizer: ShadowRoot.appendHTMLUnsafe: FAIL
    • TrustedParserOptions overrides default policy: ShadowRoot.appendHTMLUnsafe: FAIL
    • ShadowRoot.prependHTML does not go via createHTML: FAIL
    • Policies can disable scripts but not enable them: ShadowRoot.prependHTML (runScripts=true => true): FAIL
    • Policies can disable scripts but not enable them: ShadowRoot.prependHTML (runScripts=true => false): FAIL
    • Policies can disable scripts but not enable them: ShadowRoot.prependHTML (runScripts=false => true): FAIL
    • Policies can disable scripts but not enable them: ShadowRoot.prependHTML (runScripts=false => false): FAIL
    • Policy can inject sanitizer: ShadowRoot.prependHTML: FAIL
    • TrustedParserOptions overrides default policy: ShadowRoot.prependHTML: FAIL
    • ShadowRoot.prependHTMLUnsafe goes via createHTML: FAIL
    • Policies can disable scripts but not enable them: ShadowRoot.prependHTMLUnsafe (runScripts=true => true): FAIL
    • Policies can disable scripts but not enable them: ShadowRoot.prependHTMLUnsafe (runScripts=true => false): FAIL
    • Policies can disable scripts but not enable them: ShadowRoot.prependHTMLUnsafe (runScripts=false => true): FAIL
    • Policies can disable scripts but not enable them: ShadowRoot.prependHTMLUnsafe (runScripts=false => false): FAIL
    • Policy can inject sanitizer: ShadowRoot.prependHTMLUnsafe: FAIL
    • TrustedParserOptions overrides default policy: ShadowRoot.prependHTMLUnsafe: FAIL
  • /html/dom/partial-updates/tentative/positional-methods.html [wpt.fyi]
    • Position check: Element.appendHTML (Element): FAIL
    • Only unsafe variants should run scripts: Element.appendHTML (Element) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: Element.appendHTML (Element) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: Element.appendHTML (Element): FAIL
    • Position check: Element.appendHTMLUnsafe (Element): FAIL
    • Only unsafe variants should run scripts: Element.appendHTMLUnsafe (Element) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: Element.appendHTMLUnsafe (Element) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: Element.appendHTMLUnsafe (Element): FAIL
    • Position check: Element.prependHTML (Element): FAIL
    • Only unsafe variants should run scripts: Element.prependHTML (Element) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: Element.prependHTML (Element) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: Element.prependHTML (Element): FAIL
    • Position check: Element.prependHTMLUnsafe (Element): FAIL
    • Only unsafe variants should run scripts: Element.prependHTMLUnsafe (Element) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: Element.prependHTMLUnsafe (Element) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: Element.prependHTMLUnsafe (Element): FAIL
    • Position check: Element.beforeHTML (Element): FAIL
    • Only unsafe variants should run scripts: Element.beforeHTML (Element) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: Element.beforeHTML (Element) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: Element.beforeHTML (Element): FAIL
    • Position check: Element.beforeHTMLUnsafe (Element): FAIL
    • Only unsafe variants should run scripts: Element.beforeHTMLUnsafe (Element) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: Element.beforeHTMLUnsafe (Element) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: Element.beforeHTMLUnsafe (Element): FAIL
    • Position check: Element.afterHTML (Element): FAIL
    • Only unsafe variants should run scripts: Element.afterHTML (Element) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: Element.afterHTML (Element) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: Element.afterHTML (Element): FAIL
    • Position check: Element.afterHTMLUnsafe (Element): FAIL
    • Only unsafe variants should run scripts: Element.afterHTMLUnsafe (Element) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: Element.afterHTMLUnsafe (Element) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: Element.afterHTMLUnsafe (Element): FAIL
    • Position check: Element.replaceWithHTML (Element): FAIL
    • Only unsafe variants should run scripts: Element.replaceWithHTML (Element) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: Element.replaceWithHTML (Element) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: Element.replaceWithHTML (Element): FAIL
    • Position check: Element.replaceWithHTMLUnsafe (Element): FAIL
    • Only unsafe variants should run scripts: Element.replaceWithHTMLUnsafe (Element) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: Element.replaceWithHTMLUnsafe (Element) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: Element.replaceWithHTMLUnsafe (Element): FAIL
    • Position check: Comment.beforeHTML (Element): FAIL
    • Only unsafe variants should run scripts: Comment.beforeHTML (Element) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: Comment.beforeHTML (Element) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: Comment.beforeHTML (Element): FAIL
    • Position check: Comment.beforeHTMLUnsafe (Element): FAIL
    • Only unsafe variants should run scripts: Comment.beforeHTMLUnsafe (Element) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: Comment.beforeHTMLUnsafe (Element) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: Comment.beforeHTMLUnsafe (Element): FAIL
    • Position check: Comment.afterHTML (Element): FAIL
    • Only unsafe variants should run scripts: Comment.afterHTML (Element) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: Comment.afterHTML (Element) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: Comment.afterHTML (Element): FAIL
    • Position check: Comment.afterHTMLUnsafe (Element): FAIL
    • Only unsafe variants should run scripts: Comment.afterHTMLUnsafe (Element) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: Comment.afterHTMLUnsafe (Element) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: Comment.afterHTMLUnsafe (Element): FAIL
    • Position check: Comment.replaceWithHTML (Element): FAIL
    • Only unsafe variants should run scripts: Comment.replaceWithHTML (Element) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: Comment.replaceWithHTML (Element) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: Comment.replaceWithHTML (Element): FAIL
    • Position check: Comment.replaceWithHTMLUnsafe (Element): FAIL
    • Only unsafe variants should run scripts: Comment.replaceWithHTMLUnsafe (Element) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: Comment.replaceWithHTMLUnsafe (Element) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: Comment.replaceWithHTMLUnsafe (Element): FAIL
    • Position check: Text.beforeHTML (Element): FAIL
    • Only unsafe variants should run scripts: Text.beforeHTML (Element) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: Text.beforeHTML (Element) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: Text.beforeHTML (Element): FAIL
    • Position check: Text.beforeHTMLUnsafe (Element): FAIL
    • Only unsafe variants should run scripts: Text.beforeHTMLUnsafe (Element) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: Text.beforeHTMLUnsafe (Element) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: Text.beforeHTMLUnsafe (Element): FAIL
    • Position check: Text.afterHTML (Element): FAIL
    • Only unsafe variants should run scripts: Text.afterHTML (Element) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: Text.afterHTML (Element) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: Text.afterHTML (Element): FAIL
    • Position check: Text.afterHTMLUnsafe (Element): FAIL
    • Only unsafe variants should run scripts: Text.afterHTMLUnsafe (Element) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: Text.afterHTMLUnsafe (Element) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: Text.afterHTMLUnsafe (Element): FAIL
    • Position check: Text.replaceWithHTML (Element): FAIL
    • Only unsafe variants should run scripts: Text.replaceWithHTML (Element) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: Text.replaceWithHTML (Element) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: Text.replaceWithHTML (Element): FAIL
    • Position check: Text.replaceWithHTMLUnsafe (Element): FAIL
    • Only unsafe variants should run scripts: Text.replaceWithHTMLUnsafe (Element) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: Text.replaceWithHTMLUnsafe (Element) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: Text.replaceWithHTMLUnsafe (Element): FAIL
    • Position check: ProcessingInstruction.beforeHTML (Element): FAIL
    • Only unsafe variants should run scripts: ProcessingInstruction.beforeHTML (Element) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: ProcessingInstruction.beforeHTML (Element) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: ProcessingInstruction.beforeHTML (Element): FAIL
    • Position check: ProcessingInstruction.beforeHTMLUnsafe (Element): FAIL
    • Only unsafe variants should run scripts: ProcessingInstruction.beforeHTMLUnsafe (Element) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: ProcessingInstruction.beforeHTMLUnsafe (Element) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: ProcessingInstruction.beforeHTMLUnsafe (Element): FAIL
    • Position check: ProcessingInstruction.afterHTML (Element): FAIL
    • Only unsafe variants should run scripts: ProcessingInstruction.afterHTML (Element) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: ProcessingInstruction.afterHTML (Element) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: ProcessingInstruction.afterHTML (Element): FAIL
    • Position check: ProcessingInstruction.afterHTMLUnsafe (Element): FAIL
    • Only unsafe variants should run scripts: ProcessingInstruction.afterHTMLUnsafe (Element) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: ProcessingInstruction.afterHTMLUnsafe (Element) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: ProcessingInstruction.afterHTMLUnsafe (Element): FAIL
    • Position check: ProcessingInstruction.replaceWithHTML (Element): FAIL
    • Only unsafe variants should run scripts: ProcessingInstruction.replaceWithHTML (Element) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: ProcessingInstruction.replaceWithHTML (Element) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: ProcessingInstruction.replaceWithHTML (Element): FAIL
    • Position check: ProcessingInstruction.replaceWithHTMLUnsafe (Element): FAIL
    • Only unsafe variants should run scripts: ProcessingInstruction.replaceWithHTMLUnsafe (Element) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: ProcessingInstruction.replaceWithHTMLUnsafe (Element) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: ProcessingInstruction.replaceWithHTMLUnsafe (Element): FAIL
    • Position check: Element.appendHTML (ShadowRoot): FAIL
    • Only unsafe variants should run scripts: Element.appendHTML (ShadowRoot) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: Element.appendHTML (ShadowRoot) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: Element.appendHTML (ShadowRoot): FAIL
    • Position check: Element.appendHTMLUnsafe (ShadowRoot): FAIL
    • Only unsafe variants should run scripts: Element.appendHTMLUnsafe (ShadowRoot) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: Element.appendHTMLUnsafe (ShadowRoot) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: Element.appendHTMLUnsafe (ShadowRoot): FAIL
    • Position check: Element.prependHTML (ShadowRoot): FAIL
    • Only unsafe variants should run scripts: Element.prependHTML (ShadowRoot) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: Element.prependHTML (ShadowRoot) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: Element.prependHTML (ShadowRoot): FAIL
    • Position check: Element.prependHTMLUnsafe (ShadowRoot): FAIL
    • Only unsafe variants should run scripts: Element.prependHTMLUnsafe (ShadowRoot) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: Element.prependHTMLUnsafe (ShadowRoot) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: Element.prependHTMLUnsafe (ShadowRoot): FAIL
    • Position check: Element.beforeHTML (ShadowRoot): FAIL
    • Only unsafe variants should run scripts: Element.beforeHTML (ShadowRoot) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: Element.beforeHTML (ShadowRoot) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: Element.beforeHTML (ShadowRoot): FAIL
    • Position check: Element.beforeHTMLUnsafe (ShadowRoot): FAIL
    • Only unsafe variants should run scripts: Element.beforeHTMLUnsafe (ShadowRoot) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: Element.beforeHTMLUnsafe (ShadowRoot) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: Element.beforeHTMLUnsafe (ShadowRoot): FAIL
    • Position check: Element.afterHTML (ShadowRoot): FAIL
    • Only unsafe variants should run scripts: Element.afterHTML (ShadowRoot) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: Element.afterHTML (ShadowRoot) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: Element.afterHTML (ShadowRoot): FAIL
    • Position check: Element.afterHTMLUnsafe (ShadowRoot): FAIL
    • Only unsafe variants should run scripts: Element.afterHTMLUnsafe (ShadowRoot) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: Element.afterHTMLUnsafe (ShadowRoot) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: Element.afterHTMLUnsafe (ShadowRoot): FAIL
    • Position check: Element.replaceWithHTML (ShadowRoot): FAIL
    • Only unsafe variants should run scripts: Element.replaceWithHTML (ShadowRoot) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: Element.replaceWithHTML (ShadowRoot) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: Element.replaceWithHTML (ShadowRoot): FAIL
    • Position check: Element.replaceWithHTMLUnsafe (ShadowRoot): FAIL
    • Only unsafe variants should run scripts: Element.replaceWithHTMLUnsafe (ShadowRoot) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: Element.replaceWithHTMLUnsafe (ShadowRoot) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: Element.replaceWithHTMLUnsafe (ShadowRoot): FAIL
    • Position check: Comment.beforeHTML (ShadowRoot): FAIL
    • Only unsafe variants should run scripts: Comment.beforeHTML (ShadowRoot) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: Comment.beforeHTML (ShadowRoot) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: Comment.beforeHTML (ShadowRoot): FAIL
    • Position check: Comment.beforeHTMLUnsafe (ShadowRoot): FAIL
    • Only unsafe variants should run scripts: Comment.beforeHTMLUnsafe (ShadowRoot) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: Comment.beforeHTMLUnsafe (ShadowRoot) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: Comment.beforeHTMLUnsafe (ShadowRoot): FAIL
    • Position check: Comment.afterHTML (ShadowRoot): FAIL
    • Only unsafe variants should run scripts: Comment.afterHTML (ShadowRoot) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: Comment.afterHTML (ShadowRoot) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: Comment.afterHTML (ShadowRoot): FAIL
    • Position check: Comment.afterHTMLUnsafe (ShadowRoot): FAIL
    • Only unsafe variants should run scripts: Comment.afterHTMLUnsafe (ShadowRoot) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: Comment.afterHTMLUnsafe (ShadowRoot) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: Comment.afterHTMLUnsafe (ShadowRoot): FAIL
    • Position check: Comment.replaceWithHTML (ShadowRoot): FAIL
    • Only unsafe variants should run scripts: Comment.replaceWithHTML (ShadowRoot) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: Comment.replaceWithHTML (ShadowRoot) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: Comment.replaceWithHTML (ShadowRoot): FAIL
    • Position check: Comment.replaceWithHTMLUnsafe (ShadowRoot): FAIL
    • Only unsafe variants should run scripts: Comment.replaceWithHTMLUnsafe (ShadowRoot) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: Comment.replaceWithHTMLUnsafe (ShadowRoot) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: Comment.replaceWithHTMLUnsafe (ShadowRoot): FAIL
    • Position check: Text.beforeHTML (ShadowRoot): FAIL
    • Only unsafe variants should run scripts: Text.beforeHTML (ShadowRoot) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: Text.beforeHTML (ShadowRoot) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: Text.beforeHTML (ShadowRoot): FAIL
    • Position check: Text.beforeHTMLUnsafe (ShadowRoot): FAIL
    • Only unsafe variants should run scripts: Text.beforeHTMLUnsafe (ShadowRoot) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: Text.beforeHTMLUnsafe (ShadowRoot) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: Text.beforeHTMLUnsafe (ShadowRoot): FAIL
    • Position check: Text.afterHTML (ShadowRoot): FAIL
    • Only unsafe variants should run scripts: Text.afterHTML (ShadowRoot) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: Text.afterHTML (ShadowRoot) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: Text.afterHTML (ShadowRoot): FAIL
    • Position check: Text.afterHTMLUnsafe (ShadowRoot): FAIL
    • Only unsafe variants should run scripts: Text.afterHTMLUnsafe (ShadowRoot) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: Text.afterHTMLUnsafe (ShadowRoot) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: Text.afterHTMLUnsafe (ShadowRoot): FAIL
    • Position check: Text.replaceWithHTML (ShadowRoot): FAIL
    • Only unsafe variants should run scripts: Text.replaceWithHTML (ShadowRoot) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: Text.replaceWithHTML (ShadowRoot) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: Text.replaceWithHTML (ShadowRoot): FAIL
    • Position check: Text.replaceWithHTMLUnsafe (ShadowRoot): FAIL
    • Only unsafe variants should run scripts: Text.replaceWithHTMLUnsafe (ShadowRoot) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: Text.replaceWithHTMLUnsafe (ShadowRoot) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: Text.replaceWithHTMLUnsafe (ShadowRoot): FAIL
    • Position check: ProcessingInstruction.beforeHTML (ShadowRoot): FAIL
    • Only unsafe variants should run scripts: ProcessingInstruction.beforeHTML (ShadowRoot) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: ProcessingInstruction.beforeHTML (ShadowRoot) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: ProcessingInstruction.beforeHTML (ShadowRoot): FAIL
    • Position check: ProcessingInstruction.beforeHTMLUnsafe (ShadowRoot): FAIL
    • Only unsafe variants should run scripts: ProcessingInstruction.beforeHTMLUnsafe (ShadowRoot) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: ProcessingInstruction.beforeHTMLUnsafe (ShadowRoot) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: ProcessingInstruction.beforeHTMLUnsafe (ShadowRoot): FAIL
    • Position check: ProcessingInstruction.afterHTML (ShadowRoot): FAIL
    • Only unsafe variants should run scripts: ProcessingInstruction.afterHTML (ShadowRoot) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: ProcessingInstruction.afterHTML (ShadowRoot) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: ProcessingInstruction.afterHTML (ShadowRoot): FAIL
    • Position check: ProcessingInstruction.afterHTMLUnsafe (ShadowRoot): FAIL
    • Only unsafe variants should run scripts: ProcessingInstruction.afterHTMLUnsafe (ShadowRoot) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: ProcessingInstruction.afterHTMLUnsafe (ShadowRoot) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: ProcessingInstruction.afterHTMLUnsafe (ShadowRoot): FAIL
    • Position check: ProcessingInstruction.replaceWithHTML (ShadowRoot): FAIL
    • Only unsafe variants should run scripts: ProcessingInstruction.replaceWithHTML (ShadowRoot) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: ProcessingInstruction.replaceWithHTML (ShadowRoot) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: ProcessingInstruction.replaceWithHTML (ShadowRoot): FAIL
    • Position check: ProcessingInstruction.replaceWithHTMLUnsafe (ShadowRoot): FAIL
    • Only unsafe variants should run scripts: ProcessingInstruction.replaceWithHTMLUnsafe (ShadowRoot) (runScripts=true): FAIL
    • Only unsafe variants should run scripts: ProcessingInstruction.replaceWithHTMLUnsafe (ShadowRoot) (runScripts=false): FAIL
    • Sanitizer should remove forbidden elements: ProcessingInstruction.replaceWithHTMLUnsafe (ShadowRoot): FAIL
  • /html/dom/partial-updates/tentative/processing-instruction-attributes.html [wpt.fyi]
    • Processing instruction attribute mutation from DOM: FAIL (Chrome: FAIL, Safari: FAIL)
    • Processing instruction attribute mutation from parser: FAIL (Chrome: FAIL, Safari: FAIL)
    • Processing instruction attribute mutation from XML: FAIL (Chrome: FAIL, Safari: FAIL)
    • Processing instruction attributes with xml-stylesheet in HTML document: FAIL (Chrome: FAIL, Safari: FAIL)
    • Processing instruction attributes with xml-stylesheet in XML document: FAIL (Chrome: FAIL, Safari: FAIL)
    • Processing instruction toggleAttribute: FAIL (Chrome: FAIL, Safari: FAIL)
    • check attribute value: = (source: DOM): FAIL (Chrome: FAIL, Safari: FAIL)
    • check attribute value: = (source: parser): FAIL (Chrome: FAIL, Safari: FAIL)
    • check attribute value: = (source: xml): FAIL (Chrome: FAIL, Safari: FAIL)
    • check attribute value: axx" (source: DOM): FAIL (Chrome: FAIL, Safari: FAIL)
    • check attribute value: axx" (source: parser): FAIL (Chrome: FAIL, Safari: FAIL)
    • check attribute value: axx" (source: xml): FAIL (Chrome: FAIL, Safari: FAIL)
    • check attribute value: axx> (source: DOM): FAIL (Chrome: FAIL, Safari: FAIL)
    • check attribute value: axx> (source: parser): FAIL (Chrome: FAIL, Safari: FAIL)
    • check attribute value: axx> (source: xml): FAIL (Chrome: FAIL, Safari: FAIL)
    • check attribute value: some<> (source: DOM): FAIL (Chrome: FAIL, Safari: FAIL)
    • check attribute value: some<> (source: parser): FAIL (Chrome: FAIL, Safari: FAIL)
    • check attribute value: some<> (source: xml): FAIL (Chrome: FAIL, Safari: FAIL)
    • check attribute value: '""' (source: DOM): FAIL (Chrome: FAIL, Safari: FAIL)
    • check attribute value: '""' (source: parser): FAIL (Chrome: FAIL, Safari: FAIL)
    • check attribute value: '""' (source: xml): FAIL (Chrome: FAIL, Safari: FAIL)
    • check attribute value: aa"aa" (source: DOM): FAIL (Chrome: FAIL, Safari: FAIL)
    • check attribute value: aa"aa" (source: parser): FAIL (Chrome: FAIL, Safari: FAIL)
    • check attribute value: aa"aa" (source: xml): FAIL (Chrome: FAIL, Safari: FAIL)
    • Invalid attribute name: =: FAIL (Chrome: FAIL, Safari: FAIL)
    • Invalid attribute name: a=: FAIL (Chrome: FAIL, Safari: FAIL)
    • Invalid attribute name: =x: FAIL (Chrome: FAIL, Safari: FAIL)
    • Invalid attribute name: b>: FAIL (Chrome: FAIL, Safari: FAIL)
    • Invalid attribute name: >: FAIL (Chrome: FAIL, Safari: FAIL)
    • Invalid attribute name: >x: FAIL (Chrome: FAIL, Safari: FAIL)
    • Invalid attribute name: /x/: FAIL (Chrome: FAIL, Safari: FAIL)
    • Invalid attribute name: /: FAIL (Chrome: FAIL, Safari: FAIL)
    • Invalid attribute name: x/: FAIL (Chrome: FAIL, Safari: FAIL)
    • Invalid attribute name: x : FAIL (Chrome: FAIL, Safari: FAIL)
    • Invalid attribute name: x: FAIL (Chrome: FAIL, Safari: FAIL)
    • Invalid attribute name: x
      : FAIL (Chrome: FAIL, Safari: FAIL)
    • Invalid attribute name:
      x: FAIL (Chrome: FAIL, Safari: FAIL)
    • Invalid attribute name: x
      : FAIL (Chrome: FAIL, Safari: FAIL)
    • Invalid attribute name:
      x: FAIL (Chrome: FAIL, Safari: FAIL)
    • Equivalent attribute name (source: DOM): ABC -> abc: FAIL (Chrome: FAIL, Safari: FAIL)
    • Equivalent attribute name (source: parser): ABC -> abc: FAIL (Chrome: FAIL, Safari: FAIL)
    • Equivalent attribute name (source: DOM): abC -> abc: FAIL (Chrome: FAIL, Safari: FAIL)
    • Equivalent attribute name (source: parser): abC -> abc: FAIL (Chrome: FAIL, Safari: FAIL)
    • Equivalent attribute name (source: DOM): x123A -> x123a: FAIL (Chrome: FAIL, Safari: FAIL)
    • Equivalent attribute name (source: parser): x123A -> x123a: FAIL (Chrome: FAIL, Safari: FAIL)
  • /html/dom/partial-updates/tentative/stream-append-has-invalidation.html [wpt.fyi]
    • HTML partial updates - :has invalidation with streaming: FAIL
  • /html/dom/partial-updates/tentative/stream-append-html-unsafe.html [wpt.fyi]
    • piping a response into streamAppendHTMLUnsafe(): FAIL
    • writing a string to streamAppendHTMLUnsafe(): FAIL
    • streamAppendHTMLUnsafe() does not buffer until close(): FAIL
    • writing a Symbol to streamAppendHTMLUnsafe(): FAIL
    • writing numbers to streamAppendHTMLUnsafe(): FAIL
    • writing null or undefined to streamAppendHTMLUnsafe(): FAIL
    • streamAppendHTMLUnsafe() can stream into <style>: FAIL
    • Aborting streamAppendHTMLUnsafe(): FAIL
    • Interleaved streamAppendHTMLUnsafe() writes: FAIL
    • streamAppendHTMLUnsafe into a ShadowRoot: FAIL
    • streamAppendHTMLUnsafe into a template: FAIL
    • streamAppendHTMLUnsafe should execute scripts when connected: FAIL
    • streamAppendHTMLUnsafe should not execute scripts when disconnected: FAIL
  • /html/dom/partial-updates/tentative/stream-append-html.html [wpt.fyi]
    • piping a response into streamAppendHTML(): FAIL
    • writing a string to streamAppendHTML(): FAIL
    • streamAppendHTML() should append to existing content: FAIL
    • streamAppendHTML() does not buffer until close(): FAIL
    • writing a Symbol to streamAppendHTML(): FAIL
    • writing numbers to streamAppendHTML(): FAIL
    • writing null or undefined to streamAppendHTML(): FAIL
    • streamAppendHTML() can stream into <style>: FAIL
    • streamAppendHTML() can stream into a non-empty <style>: FAIL
    • Aborting streamAppendHTML(): FAIL
    • Interleaved streamAppendHTML() writes: FAIL
    • streamAppendHTML should not execute scripts when connected: FAIL
    • streamAppendHTML should pass sanitizer options: FAIL
    • streamAppendHTML on ShadowRoot: FAIL
    • streamAppendHTML uses safe sanitizer: FAIL
    • streamAppendHTML on ShadowRoot uses safe sanitizer: FAIL
  • /html/dom/partial-updates/tentative/stream-append-with-template-for.html [wpt.fyi]
    • streamHTML methods can apply template with for: FAIL
  • /html/dom/partial-updates/tentative/stream-html-custom-element.html [wpt.fyi]
    • streamHTMLUnsafe should trigger CE reactions: FAIL
    • streamHTMLUnsafe should use scoped custom element registry: FAIL
    • streamAppendHTMLUnsafe should trigger CE reactions: FAIL
    • streamAppendHTMLUnsafe should use scoped custom element registry: FAIL
  • /html/dom/partial-updates/tentative/stream-html-run-scripts-option.html [wpt.fyi]
    • element.streamAppendHTMLUnsafe with runScripts: true: FAIL
    • element.streamAppendHTMLUnsafe with runScripts: false: FAIL
    • shadowRoot.streamAppendHTMLUnsafe with runScripts: false: FAIL
    • shadowRoot.streamAppendHTMLUnsafe with runScripts: true: FAIL
    • element.streamHTMLUnsafe with runScripts: true: FAIL
    • element.streamHTMLUnsafe with runScripts: false: FAIL
    • shadowRoot.streamHTMLUnsafe with runScripts: false: FAIL
    • shadowRoot.streamHTMLUnsafe with runScripts: true: FAIL
  • /html/dom/partial-updates/tentative/stream-html-sanitizer.html [wpt.fyi]
    • element.streamHTMLUnsafe with sanitizer {removeElements}: FAIL
    • element.streamHTMLUnsafe with sanitizer {elements}: FAIL
    • element.streamHTMLUnsafe with sanitizer {replaceWithChildrenElements}: FAIL
    • element.streamHTMLUnsafe with sanitizer {replaceWithChildrenElements} and text: FAIL
    • element.streamHTMLUnsafe with sanitizer {attributes}: FAIL
    • element.streamHTMLUnsafe with sanitizer {removeAttributes}: FAIL
    • element.streamHTMLUnsafe with sanitizer {element: [{removeAttributes}]}: FAIL
    • element.streamHTMLUnsafe with sanitizer {element: [{attributes}]}: FAIL
    • element.streamHTMLUnsafe with sanitizer should sanitize template contents: FAIL
    • element.streamHTMLUnsafe: sanitizer shouldn't allow escaping template: FAIL
    • element.streamHTMLUnsafe: sanitizer takes effect after foster parenting: FAIL
    • element.streamHTMLUnsafe: sanitizer with foster parenting: <table><p><p>: FAIL
    • element.streamHTMLUnsafe: sanitizer takes effect after adoption agency: FAIL
    • element.streamHTMLUnsafe: mutating the sanitizer while streaming does not effect the originally given sanitizer: FAIL
    • element.streamAppendHTMLUnsafe with sanitizer {removeElements}: FAIL
    • element.streamAppendHTMLUnsafe with sanitizer {elements}: FAIL
    • element.streamAppendHTMLUnsafe with sanitizer {replaceWithChildrenElements}: FAIL
    • element.streamAppendHTMLUnsafe with sanitizer {replaceWithChildrenElements} and text: FAIL
    • element.streamAppendHTMLUnsafe with sanitizer {attributes}: FAIL
    • element.streamAppendHTMLUnsafe with sanitizer {removeAttributes}: FAIL
    • element.streamAppendHTMLUnsafe with sanitizer {element: [{removeAttributes}]}: FAIL
    • element.streamAppendHTMLUnsafe with sanitizer {element: [{attributes}]}: FAIL
    • element.streamAppendHTMLUnsafe with sanitizer should sanitize template contents: FAIL
    • element.streamAppendHTMLUnsafe: sanitizer shouldn't allow escaping template: FAIL
    • element.streamAppendHTMLUnsafe: sanitizer takes effect after foster parenting: FAIL
    • element.streamAppendHTMLUnsafe: sanitizer with foster parenting: <table><p><p>: FAIL
    • element.streamAppendHTMLUnsafe: sanitizer takes effect after adoption agency: FAIL
    • element.streamAppendHTMLUnsafe: mutating the sanitizer while streaming does not effect the originally given sanitizer: FAIL
  • /html/dom/partial-updates/tentative/stream-html-unsafe.html [wpt.fyi]
    • piping a response into streamHTMLUnsafe(): FAIL
    • writing a string to streamHTMLUnsafe(): FAIL
    • streamHTMLUnsafe() should remove existing content immediately: FAIL
    • streamHTMLUnsafe() does not buffer until close(): FAIL
    • writing a Symbol to streamHTMLUnsafe(): FAIL
    • writing numbers to streamHTMLUnsafe(): FAIL
    • writing null or undefined to streamHTMLUnsafe(): FAIL
    • streamHTMLUnsafe() can stream into <style>: FAIL
    • Aborting streamHTMLUnsafe(): FAIL
    • Interleaved streamHTMLUnsafe() writes: FAIL
    • streamHTMLUnsafe into a ShadowRoot: FAIL
    • streamHTMLUnsafe into a template: FAIL
    • streamHTMLUnsafe should execute scripts when connected: FAIL
    • streamHTMLUnsafe should not execute scripts when disconnected: FAIL
  • /html/dom/partial-updates/tentative/stream-html-with-trusted-types-error-in-policy.html [wpt.fyi]
    • error in createParserOptions is rethrown from default policy: FAIL
    • error in createParserOptions is rethrown from named policy: FAIL
  • /html/dom/partial-updates/tentative/stream-html-with-trusted-types-pass-trusted.html [wpt.fyi]
    • A given TrustedParserOptions can override default policy's runScript: FAIL
    • A given TrustedParserOptions can override default policy's sanitizer: FAIL
  • /html/dom/partial-updates/tentative/stream-html-with-trusted-types-runScripts-cannot-be-turned-on.html [wpt.fyi]
    • The default TT policy cannot turn runScripts on if they are off in the options: FAIL
  • /html/dom/partial-updates/tentative/stream-html-with-trusted-types-runScripts-off.html [wpt.fyi]
    • The default TT policy can turn runScripts off: FAIL
  • /html/dom/partial-updates/tentative/stream-html-with-trusted-types-sanitizer.html [wpt.fyi]
    • createParserOptions can inject a sanitizer config: FAIL
    • createParserOptions can inject a sanitizer: FAIL
    • createParserOptions can override a sanitizer config: FAIL
    • createParserOptions can remove a sanitizer: FAIL
  • /html/dom/partial-updates/tentative/stream-html.html [wpt.fyi]
    • piping a response into streamHTML(): FAIL
    • writing a string to streamHTML(): FAIL
    • streamHTML() should remove existing content immediately: FAIL
    • streamHTML() does not buffer until close(): FAIL
    • writing a Symbol to streamHTML(): FAIL
    • writing numbers to streamHTML(): FAIL
    • writing null or undefined to streamHTML(): FAIL
    • streamHTML() can stream into <style>: FAIL
    • Aborting streamHTML(): FAIL
    • Interleaved streamHTML() writes: FAIL
    • streamHTML should not execute scripts when connected: FAIL
    • streamHTML should pass sanitizer options: FAIL
    • streamHTML uses safe sanitizer: FAIL
    • streamHTML on ShadowRoot: FAIL
    • streamHTML on ShadowRoot uses safe sanitizer: FAIL
  • /html/dom/partial-updates/tentative/template-for-append-element.html [wpt.fyi]
    • <template for> appending element: FAIL
  • /html/dom/partial-updates/tentative/template-for-append-text-and-element.html [wpt.fyi]
    • <template for> with text: FAIL
  • /html/dom/partial-updates/tentative/template-for-append-to-head.html [wpt.fyi]
    • HTML partial updates - append to head: FAIL
  • /html/dom/partial-updates/tentative/template-for-gradual-append.html [wpt.fyi]
    • Multiple <template for>: FAIL
  • /html/dom/partial-updates/tentative/template-for-ignores-case.html [wpt.fyi]
    • marker/end/start PI targets are case-insensitive: FAIL
  • /html/dom/partial-updates/tentative/template-for-innerHTML-ambiguous.html [wpt.fyi]
    • <template for> in innerHTML patching inner element: FAIL
  • /html/dom/partial-updates/tentative/template-for-innerHTML-within.html [wpt.fyi]
    • <template for> in innerHTML patching inner element: FAIL
  • /html/dom/partial-updates/tentative/template-for-move-end-while-appending.html [wpt.fyi]
    • Multiple <template for>: FAIL
  • /html/dom/partial-updates/tentative/template-for-move-marker-while-appending.html [wpt.fyi]
    • Multiple <template for>: FAIL
  • /html/dom/partial-updates/tentative/template-for-move-start-while-appending.html [wpt.fyi]
    • HTML partial updates - move <?start> while appending has no effect: FAIL
  • /html/dom/partial-updates/tentative/template-for-move-while-appending.html [wpt.fyi]
    • Multiple <template for>: FAIL
  • /html/dom/partial-updates/tentative/template-for-multiple.html [wpt.fyi]
    • Multiple <template for>: FAIL
  • /html/dom/partial-updates/tentative/template-for-mutation-records.html [wpt.fyi]
    • HTML partial updates - mutation records for removal: FAIL
  • /html/dom/partial-updates/tentative/template-for-prepend-element.html [wpt.fyi]
    • <template for> prepend element: FAIL
  • /html/dom/partial-updates/tentative/template-for-prepend-invalid-ref.html [wpt.fyi]
    • Prepending works even when element after the range is removed: FAIL
  • /html/dom/partial-updates/tentative/template-for-prepend-text.html [wpt.fyi]
    • <template for> prepend text: FAIL
  • /html/dom/partial-updates/tentative/template-for-replace-children-with-element.html [wpt.fyi]
    • <template for> replace children with element: FAIL
  • /html/dom/partial-updates/tentative/template-for-replace-children-with-text.html [wpt.fyi]
    • <template for> replace children with text: FAIL
  • /html/dom/partial-updates/tentative/template-for-replace-invalid-ref.html [wpt.fyi]
    • <template for> replace: FAIL
  • /html/dom/partial-updates/tentative/template-for-replace.html [wpt.fyi]
    • <template for> replace: FAIL
  • /html/dom/partial-updates/tentative/template-for-script-children.html [wpt.fyi]
    • HTML partial updates - a script inside a patch should execute: FAIL
  • /html/dom/partial-updates/tentative/template-for-script-eval.html [wpt.fyi]
    • HTML partial updates - template for can create a new executable script: FAIL
  • /html/dom/partial-updates/tentative/template-for-script-replace.html [wpt.fyi]
    • HTML partial updates - a script replaced with a patch should execute: FAIL
  • /html/dom/partial-updates/tentative/template-for-shadow-nested.html [wpt.fyi]
    • <template contentmethod> inside a <template shadowrootmode><div> should apply directly to its target: FAIL
  • /html/dom/partial-updates/tentative/template-for-shadow-root.html [wpt.fyi]
    • markers are respected in declarative shadow root: FAIL
    • markers are respected in imperative shadow root with streaming: FAIL
  • /html/dom/partial-updates/tentative/template-for-shadow.html [wpt.fyi]
    • <template contentmethod> inside a <template shadowrootmode> should apply directly to its target: FAIL
  • /html/dom/partial-updates/tentative/template-for-style-in-head.html [wpt.fyi]
    • HTML partial updates - patch updates style with plain text: FAIL
  • /html/dom/partial-updates/tentative/template-for-style.html [wpt.fyi]
    • HTML partial updates - patch updates style with plain text: FAIL
  • /html/dom/partial-updates/tentative/template-for-supersedes-invalid-shadowrootmode.html [wpt.fyi]
    • HTML partial updates: invalid shadowrootmode superseded by for: FAIL
  • /html/dom/partial-updates/tentative/template-for-title.html [wpt.fyi]
    • HTML partial updates - update title: FAIL
Status: NEW → RESOLVED
Closed: 2 months ago
Resolution: --- → FIXED
Target Milestone: --- → 150 Branch
You need to log in before you can comment on or make changes to this bug.