[wpt-sync] Sync PR 58294 - Support attribute API for processing instructions
Categories
(Core :: DOM: Core & HTML, task, P4)
Tracking
()
| Tracking | Status | |
|---|---|---|
| firefox150 | --- | fixed |
People
(Reporter: wpt-sync, Unassigned)
References
()
Details
(Whiteboard: [wptsync downstream])
Sync web-platform-tests PR 58294 into mozilla-central (this bug is closed when the sync is complete).
PR: https://github.com/web-platform-tests/wpt/pull/58294
Details from upstream follow.
Noam Rosenthal <nrosenthal@chromium.org> wrote:
Support attribute API for processing instructions
Add setAttribute/getAttribute/hasAttribute/removeAttribute etc. to
ProcessingInstruction. They act similarly to attributes on elements,
however they don't produce attribute mutation records.See spec PR: https://github.com/whatwg/dom/pull/1454
Bug: 431374376
Change-Id: I659e772f0fb11a6ffe2fe3876cf61ee0f6ad042aReviewed-on: https://chromium-review.googlesource.com/7607900
WPT-Export-Revision: 5a7c9aa994d673f0f796dec1ce39452247946cb1
| Assignee | ||
Updated•2 months ago
|
| Assignee | ||
Comment 1•2 months ago
|
||
| Assignee | ||
Comment 2•2 months ago
|
||
CI Results
Ran 9 Firefox configurations based on mozilla-central, and Firefox, Chrome, and Safari on GitHub CI
Total 57 tests and 1 subtests
Status Summary
Firefox
OK : 1[GitHub] 57[Gecko-android-em-14-x86_64-debug-geckoview, Gecko-android-em-14-x86_64-lite-opt-geckoview, Gecko-android-em-14-x86_64-opt-geckoview, Gecko-linux2404-64-debug, Gecko-linux2404-64-opt, Gecko-windows11-32-24h2-debug, Gecko-windows11-32-24h2-opt, Gecko-windows11-64-24h2-debug, Gecko-windows11-64-24h2-opt]
PASS: 9
FAIL: 45[GitHub] 554[Gecko-android-em-14-x86_64-debug-geckoview, Gecko-android-em-14-x86_64-lite-opt-geckoview, Gecko-android-em-14-x86_64-opt-geckoview, Gecko-linux2404-64-debug, Gecko-linux2404-64-opt, Gecko-windows11-32-24h2-debug, Gecko-windows11-32-24h2-opt, Gecko-windows11-64-24h2-debug, Gecko-windows11-64-24h2-opt]
Chrome
OK : 1
FAIL: 45
Safari
OK : 1
FAIL: 45
Links
Gecko CI (Treeherder)
GitHub PR Head
GitHub PR Base
Details
New Tests That Don't Pass
- /html/dom/partial-updates/tentative/marker-attribute.html [wpt.fyi]
- Access to .marker returns an empty DOMTokenList.:
FAIL - Multiple names give a DOMTokenList with multiple entries.:
FAIL - DOMTokenList created by access is persisted.:
FAIL - Changes in DOMTokenList are refected in attribute.:
FAIL
- Access to .marker returns an empty DOMTokenList.:
- /html/dom/partial-updates/tentative/positional-methods-with-trusted-types.html [wpt.fyi]
- Element.beforeHTML does not go via createHTML:
FAIL - Policies can disable scripts but not enable them: Element.beforeHTML (runScripts=true => true):
FAIL - Policies can disable scripts but not enable them: Element.beforeHTML (runScripts=true => false):
FAIL - Policies can disable scripts but not enable them: Element.beforeHTML (runScripts=false => true):
FAIL - Policies can disable scripts but not enable them: Element.beforeHTML (runScripts=false => false):
FAIL - Policy can inject sanitizer: Element.beforeHTML:
FAIL - TrustedParserOptions overrides default policy: Element.beforeHTML:
FAIL - Element.beforeHTMLUnsafe goes via createHTML:
FAIL - Policies can disable scripts but not enable them: Element.beforeHTMLUnsafe (runScripts=true => true):
FAIL - Policies can disable scripts but not enable them: Element.beforeHTMLUnsafe (runScripts=true => false):
FAIL - Policies can disable scripts but not enable them: Element.beforeHTMLUnsafe (runScripts=false => true):
FAIL - Policies can disable scripts but not enable them: Element.beforeHTMLUnsafe (runScripts=false => false):
FAIL - Policy can inject sanitizer: Element.beforeHTMLUnsafe:
FAIL - TrustedParserOptions overrides default policy: Element.beforeHTMLUnsafe:
FAIL - Element.afterHTML does not go via createHTML:
FAIL - Policies can disable scripts but not enable them: Element.afterHTML (runScripts=true => true):
FAIL - Policies can disable scripts but not enable them: Element.afterHTML (runScripts=true => false):
FAIL - Policies can disable scripts but not enable them: Element.afterHTML (runScripts=false => true):
FAIL - Policies can disable scripts but not enable them: Element.afterHTML (runScripts=false => false):
FAIL - Policy can inject sanitizer: Element.afterHTML:
FAIL - TrustedParserOptions overrides default policy: Element.afterHTML:
FAIL - Element.afterHTMLUnsafe goes via createHTML:
FAIL - Policies can disable scripts but not enable them: Element.afterHTMLUnsafe (runScripts=true => true):
FAIL - Policies can disable scripts but not enable them: Element.afterHTMLUnsafe (runScripts=true => false):
FAIL - Policies can disable scripts but not enable them: Element.afterHTMLUnsafe (runScripts=false => true):
FAIL - Policies can disable scripts but not enable them: Element.afterHTMLUnsafe (runScripts=false => false):
FAIL - Policy can inject sanitizer: Element.afterHTMLUnsafe:
FAIL - TrustedParserOptions overrides default policy: Element.afterHTMLUnsafe:
FAIL - Element.replaceWithHTML does not go via createHTML:
FAIL - Policies can disable scripts but not enable them: Element.replaceWithHTML (runScripts=true => true):
FAIL - Policies can disable scripts but not enable them: Element.replaceWithHTML (runScripts=true => false):
FAIL - Policies can disable scripts but not enable them: Element.replaceWithHTML (runScripts=false => true):
FAIL - Policies can disable scripts but not enable them: Element.replaceWithHTML (runScripts=false => false):
FAIL - Policy can inject sanitizer: Element.replaceWithHTML:
FAIL - TrustedParserOptions overrides default policy: Element.replaceWithHTML:
FAIL - Element.replaceWithHTMLUnsafe goes via createHTML:
FAIL - Policies can disable scripts but not enable them: Element.replaceWithHTMLUnsafe (runScripts=true => true):
FAIL - Policies can disable scripts but not enable them: Element.replaceWithHTMLUnsafe (runScripts=true => false):
FAIL - Policies can disable scripts but not enable them: Element.replaceWithHTMLUnsafe (runScripts=false => true):
FAIL - Policies can disable scripts but not enable them: Element.replaceWithHTMLUnsafe (runScripts=false => false):
FAIL - Policy can inject sanitizer: Element.replaceWithHTMLUnsafe:
FAIL - TrustedParserOptions overrides default policy: Element.replaceWithHTMLUnsafe:
FAIL - Element.appendHTML does not go via createHTML:
FAIL - Policies can disable scripts but not enable them: Element.appendHTML (runScripts=true => true):
FAIL - Policies can disable scripts but not enable them: Element.appendHTML (runScripts=true => false):
FAIL - Policies can disable scripts but not enable them: Element.appendHTML (runScripts=false => true):
FAIL - Policies can disable scripts but not enable them: Element.appendHTML (runScripts=false => false):
FAIL - Policy can inject sanitizer: Element.appendHTML:
FAIL - TrustedParserOptions overrides default policy: Element.appendHTML:
FAIL - Element.appendHTMLUnsafe goes via createHTML:
FAIL - Policies can disable scripts but not enable them: Element.appendHTMLUnsafe (runScripts=true => true):
FAIL - Policies can disable scripts but not enable them: Element.appendHTMLUnsafe (runScripts=true => false):
FAIL - Policies can disable scripts but not enable them: Element.appendHTMLUnsafe (runScripts=false => true):
FAIL - Policies can disable scripts but not enable them: Element.appendHTMLUnsafe (runScripts=false => false):
FAIL - Policy can inject sanitizer: Element.appendHTMLUnsafe:
FAIL - TrustedParserOptions overrides default policy: Element.appendHTMLUnsafe:
FAIL - Element.prependHTML does not go via createHTML:
FAIL - Policies can disable scripts but not enable them: Element.prependHTML (runScripts=true => true):
FAIL - Policies can disable scripts but not enable them: Element.prependHTML (runScripts=true => false):
FAIL - Policies can disable scripts but not enable them: Element.prependHTML (runScripts=false => true):
FAIL - Policies can disable scripts but not enable them: Element.prependHTML (runScripts=false => false):
FAIL - Policy can inject sanitizer: Element.prependHTML:
FAIL - TrustedParserOptions overrides default policy: Element.prependHTML:
FAIL - Element.prependHTMLUnsafe goes via createHTML:
FAIL - Policies can disable scripts but not enable them: Element.prependHTMLUnsafe (runScripts=true => true):
FAIL - Policies can disable scripts but not enable them: Element.prependHTMLUnsafe (runScripts=true => false):
FAIL - Policies can disable scripts but not enable them: Element.prependHTMLUnsafe (runScripts=false => true):
FAIL - Policies can disable scripts but not enable them: Element.prependHTMLUnsafe (runScripts=false => false):
FAIL - Policy can inject sanitizer: Element.prependHTMLUnsafe:
FAIL - TrustedParserOptions overrides default policy: Element.prependHTMLUnsafe:
FAIL - ShadowRoot.beforeHTML does not go via createHTML:
FAIL - Policies can disable scripts but not enable them: ShadowRoot.beforeHTML (runScripts=true => true):
FAIL - Policies can disable scripts but not enable them: ShadowRoot.beforeHTML (runScripts=true => false):
FAIL - Policies can disable scripts but not enable them: ShadowRoot.beforeHTML (runScripts=false => true):
FAIL - Policies can disable scripts but not enable them: ShadowRoot.beforeHTML (runScripts=false => false):
FAIL - Policy can inject sanitizer: ShadowRoot.beforeHTML:
FAIL - TrustedParserOptions overrides default policy: ShadowRoot.beforeHTML:
FAIL - ShadowRoot.beforeHTMLUnsafe goes via createHTML:
FAIL - Policies can disable scripts but not enable them: ShadowRoot.beforeHTMLUnsafe (runScripts=true => true):
FAIL - Policies can disable scripts but not enable them: ShadowRoot.beforeHTMLUnsafe (runScripts=true => false):
FAIL - Policies can disable scripts but not enable them: ShadowRoot.beforeHTMLUnsafe (runScripts=false => true):
FAIL - Policies can disable scripts but not enable them: ShadowRoot.beforeHTMLUnsafe (runScripts=false => false):
FAIL - Policy can inject sanitizer: ShadowRoot.beforeHTMLUnsafe:
FAIL - TrustedParserOptions overrides default policy: ShadowRoot.beforeHTMLUnsafe:
FAIL - ShadowRoot.afterHTML does not go via createHTML:
FAIL - Policies can disable scripts but not enable them: ShadowRoot.afterHTML (runScripts=true => true):
FAIL - Policies can disable scripts but not enable them: ShadowRoot.afterHTML (runScripts=true => false):
FAIL - Policies can disable scripts but not enable them: ShadowRoot.afterHTML (runScripts=false => true):
FAIL - Policies can disable scripts but not enable them: ShadowRoot.afterHTML (runScripts=false => false):
FAIL - Policy can inject sanitizer: ShadowRoot.afterHTML:
FAIL - TrustedParserOptions overrides default policy: ShadowRoot.afterHTML:
FAIL - ShadowRoot.afterHTMLUnsafe goes via createHTML:
FAIL - Policies can disable scripts but not enable them: ShadowRoot.afterHTMLUnsafe (runScripts=true => true):
FAIL - Policies can disable scripts but not enable them: ShadowRoot.afterHTMLUnsafe (runScripts=true => false):
FAIL - Policies can disable scripts but not enable them: ShadowRoot.afterHTMLUnsafe (runScripts=false => true):
FAIL - Policies can disable scripts but not enable them: ShadowRoot.afterHTMLUnsafe (runScripts=false => false):
FAIL - Policy can inject sanitizer: ShadowRoot.afterHTMLUnsafe:
FAIL - TrustedParserOptions overrides default policy: ShadowRoot.afterHTMLUnsafe:
FAIL - ShadowRoot.replaceWithHTML does not go via createHTML:
FAIL - Policies can disable scripts but not enable them: ShadowRoot.replaceWithHTML (runScripts=true => true):
FAIL - Policies can disable scripts but not enable them: ShadowRoot.replaceWithHTML (runScripts=true => false):
FAIL - Policies can disable scripts but not enable them: ShadowRoot.replaceWithHTML (runScripts=false => true):
FAIL - Policies can disable scripts but not enable them: ShadowRoot.replaceWithHTML (runScripts=false => false):
FAIL - Policy can inject sanitizer: ShadowRoot.replaceWithHTML:
FAIL - TrustedParserOptions overrides default policy: ShadowRoot.replaceWithHTML:
FAIL - ShadowRoot.replaceWithHTMLUnsafe goes via createHTML:
FAIL - Policies can disable scripts but not enable them: ShadowRoot.replaceWithHTMLUnsafe (runScripts=true => true):
FAIL - Policies can disable scripts but not enable them: ShadowRoot.replaceWithHTMLUnsafe (runScripts=true => false):
FAIL - Policies can disable scripts but not enable them: ShadowRoot.replaceWithHTMLUnsafe (runScripts=false => true):
FAIL - Policies can disable scripts but not enable them: ShadowRoot.replaceWithHTMLUnsafe (runScripts=false => false):
FAIL - Policy can inject sanitizer: ShadowRoot.replaceWithHTMLUnsafe:
FAIL - TrustedParserOptions overrides default policy: ShadowRoot.replaceWithHTMLUnsafe:
FAIL - ShadowRoot.appendHTML does not go via createHTML:
FAIL - Policies can disable scripts but not enable them: ShadowRoot.appendHTML (runScripts=true => true):
FAIL - Policies can disable scripts but not enable them: ShadowRoot.appendHTML (runScripts=true => false):
FAIL - Policies can disable scripts but not enable them: ShadowRoot.appendHTML (runScripts=false => true):
FAIL - Policies can disable scripts but not enable them: ShadowRoot.appendHTML (runScripts=false => false):
FAIL - Policy can inject sanitizer: ShadowRoot.appendHTML:
FAIL - TrustedParserOptions overrides default policy: ShadowRoot.appendHTML:
FAIL - ShadowRoot.appendHTMLUnsafe goes via createHTML:
FAIL - Policies can disable scripts but not enable them: ShadowRoot.appendHTMLUnsafe (runScripts=true => true):
FAIL - Policies can disable scripts but not enable them: ShadowRoot.appendHTMLUnsafe (runScripts=true => false):
FAIL - Policies can disable scripts but not enable them: ShadowRoot.appendHTMLUnsafe (runScripts=false => true):
FAIL - Policies can disable scripts but not enable them: ShadowRoot.appendHTMLUnsafe (runScripts=false => false):
FAIL - Policy can inject sanitizer: ShadowRoot.appendHTMLUnsafe:
FAIL - TrustedParserOptions overrides default policy: ShadowRoot.appendHTMLUnsafe:
FAIL - ShadowRoot.prependHTML does not go via createHTML:
FAIL - Policies can disable scripts but not enable them: ShadowRoot.prependHTML (runScripts=true => true):
FAIL - Policies can disable scripts but not enable them: ShadowRoot.prependHTML (runScripts=true => false):
FAIL - Policies can disable scripts but not enable them: ShadowRoot.prependHTML (runScripts=false => true):
FAIL - Policies can disable scripts but not enable them: ShadowRoot.prependHTML (runScripts=false => false):
FAIL - Policy can inject sanitizer: ShadowRoot.prependHTML:
FAIL - TrustedParserOptions overrides default policy: ShadowRoot.prependHTML:
FAIL - ShadowRoot.prependHTMLUnsafe goes via createHTML:
FAIL - Policies can disable scripts but not enable them: ShadowRoot.prependHTMLUnsafe (runScripts=true => true):
FAIL - Policies can disable scripts but not enable them: ShadowRoot.prependHTMLUnsafe (runScripts=true => false):
FAIL - Policies can disable scripts but not enable them: ShadowRoot.prependHTMLUnsafe (runScripts=false => true):
FAIL - Policies can disable scripts but not enable them: ShadowRoot.prependHTMLUnsafe (runScripts=false => false):
FAIL - Policy can inject sanitizer: ShadowRoot.prependHTMLUnsafe:
FAIL - TrustedParserOptions overrides default policy: ShadowRoot.prependHTMLUnsafe:
FAIL
- Element.beforeHTML does not go via createHTML:
- /html/dom/partial-updates/tentative/positional-methods.html [wpt.fyi]
- Position check: Element.appendHTML (Element):
FAIL - Only unsafe variants should run scripts: Element.appendHTML (Element) (runScripts=true):
FAIL - Only unsafe variants should run scripts: Element.appendHTML (Element) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: Element.appendHTML (Element):
FAIL - Position check: Element.appendHTMLUnsafe (Element):
FAIL - Only unsafe variants should run scripts: Element.appendHTMLUnsafe (Element) (runScripts=true):
FAIL - Only unsafe variants should run scripts: Element.appendHTMLUnsafe (Element) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: Element.appendHTMLUnsafe (Element):
FAIL - Position check: Element.prependHTML (Element):
FAIL - Only unsafe variants should run scripts: Element.prependHTML (Element) (runScripts=true):
FAIL - Only unsafe variants should run scripts: Element.prependHTML (Element) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: Element.prependHTML (Element):
FAIL - Position check: Element.prependHTMLUnsafe (Element):
FAIL - Only unsafe variants should run scripts: Element.prependHTMLUnsafe (Element) (runScripts=true):
FAIL - Only unsafe variants should run scripts: Element.prependHTMLUnsafe (Element) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: Element.prependHTMLUnsafe (Element):
FAIL - Position check: Element.beforeHTML (Element):
FAIL - Only unsafe variants should run scripts: Element.beforeHTML (Element) (runScripts=true):
FAIL - Only unsafe variants should run scripts: Element.beforeHTML (Element) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: Element.beforeHTML (Element):
FAIL - Position check: Element.beforeHTMLUnsafe (Element):
FAIL - Only unsafe variants should run scripts: Element.beforeHTMLUnsafe (Element) (runScripts=true):
FAIL - Only unsafe variants should run scripts: Element.beforeHTMLUnsafe (Element) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: Element.beforeHTMLUnsafe (Element):
FAIL - Position check: Element.afterHTML (Element):
FAIL - Only unsafe variants should run scripts: Element.afterHTML (Element) (runScripts=true):
FAIL - Only unsafe variants should run scripts: Element.afterHTML (Element) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: Element.afterHTML (Element):
FAIL - Position check: Element.afterHTMLUnsafe (Element):
FAIL - Only unsafe variants should run scripts: Element.afterHTMLUnsafe (Element) (runScripts=true):
FAIL - Only unsafe variants should run scripts: Element.afterHTMLUnsafe (Element) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: Element.afterHTMLUnsafe (Element):
FAIL - Position check: Element.replaceWithHTML (Element):
FAIL - Only unsafe variants should run scripts: Element.replaceWithHTML (Element) (runScripts=true):
FAIL - Only unsafe variants should run scripts: Element.replaceWithHTML (Element) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: Element.replaceWithHTML (Element):
FAIL - Position check: Element.replaceWithHTMLUnsafe (Element):
FAIL - Only unsafe variants should run scripts: Element.replaceWithHTMLUnsafe (Element) (runScripts=true):
FAIL - Only unsafe variants should run scripts: Element.replaceWithHTMLUnsafe (Element) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: Element.replaceWithHTMLUnsafe (Element):
FAIL - Position check: Comment.beforeHTML (Element):
FAIL - Only unsafe variants should run scripts: Comment.beforeHTML (Element) (runScripts=true):
FAIL - Only unsafe variants should run scripts: Comment.beforeHTML (Element) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: Comment.beforeHTML (Element):
FAIL - Position check: Comment.beforeHTMLUnsafe (Element):
FAIL - Only unsafe variants should run scripts: Comment.beforeHTMLUnsafe (Element) (runScripts=true):
FAIL - Only unsafe variants should run scripts: Comment.beforeHTMLUnsafe (Element) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: Comment.beforeHTMLUnsafe (Element):
FAIL - Position check: Comment.afterHTML (Element):
FAIL - Only unsafe variants should run scripts: Comment.afterHTML (Element) (runScripts=true):
FAIL - Only unsafe variants should run scripts: Comment.afterHTML (Element) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: Comment.afterHTML (Element):
FAIL - Position check: Comment.afterHTMLUnsafe (Element):
FAIL - Only unsafe variants should run scripts: Comment.afterHTMLUnsafe (Element) (runScripts=true):
FAIL - Only unsafe variants should run scripts: Comment.afterHTMLUnsafe (Element) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: Comment.afterHTMLUnsafe (Element):
FAIL - Position check: Comment.replaceWithHTML (Element):
FAIL - Only unsafe variants should run scripts: Comment.replaceWithHTML (Element) (runScripts=true):
FAIL - Only unsafe variants should run scripts: Comment.replaceWithHTML (Element) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: Comment.replaceWithHTML (Element):
FAIL - Position check: Comment.replaceWithHTMLUnsafe (Element):
FAIL - Only unsafe variants should run scripts: Comment.replaceWithHTMLUnsafe (Element) (runScripts=true):
FAIL - Only unsafe variants should run scripts: Comment.replaceWithHTMLUnsafe (Element) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: Comment.replaceWithHTMLUnsafe (Element):
FAIL - Position check: Text.beforeHTML (Element):
FAIL - Only unsafe variants should run scripts: Text.beforeHTML (Element) (runScripts=true):
FAIL - Only unsafe variants should run scripts: Text.beforeHTML (Element) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: Text.beforeHTML (Element):
FAIL - Position check: Text.beforeHTMLUnsafe (Element):
FAIL - Only unsafe variants should run scripts: Text.beforeHTMLUnsafe (Element) (runScripts=true):
FAIL - Only unsafe variants should run scripts: Text.beforeHTMLUnsafe (Element) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: Text.beforeHTMLUnsafe (Element):
FAIL - Position check: Text.afterHTML (Element):
FAIL - Only unsafe variants should run scripts: Text.afterHTML (Element) (runScripts=true):
FAIL - Only unsafe variants should run scripts: Text.afterHTML (Element) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: Text.afterHTML (Element):
FAIL - Position check: Text.afterHTMLUnsafe (Element):
FAIL - Only unsafe variants should run scripts: Text.afterHTMLUnsafe (Element) (runScripts=true):
FAIL - Only unsafe variants should run scripts: Text.afterHTMLUnsafe (Element) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: Text.afterHTMLUnsafe (Element):
FAIL - Position check: Text.replaceWithHTML (Element):
FAIL - Only unsafe variants should run scripts: Text.replaceWithHTML (Element) (runScripts=true):
FAIL - Only unsafe variants should run scripts: Text.replaceWithHTML (Element) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: Text.replaceWithHTML (Element):
FAIL - Position check: Text.replaceWithHTMLUnsafe (Element):
FAIL - Only unsafe variants should run scripts: Text.replaceWithHTMLUnsafe (Element) (runScripts=true):
FAIL - Only unsafe variants should run scripts: Text.replaceWithHTMLUnsafe (Element) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: Text.replaceWithHTMLUnsafe (Element):
FAIL - Position check: ProcessingInstruction.beforeHTML (Element):
FAIL - Only unsafe variants should run scripts: ProcessingInstruction.beforeHTML (Element) (runScripts=true):
FAIL - Only unsafe variants should run scripts: ProcessingInstruction.beforeHTML (Element) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: ProcessingInstruction.beforeHTML (Element):
FAIL - Position check: ProcessingInstruction.beforeHTMLUnsafe (Element):
FAIL - Only unsafe variants should run scripts: ProcessingInstruction.beforeHTMLUnsafe (Element) (runScripts=true):
FAIL - Only unsafe variants should run scripts: ProcessingInstruction.beforeHTMLUnsafe (Element) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: ProcessingInstruction.beforeHTMLUnsafe (Element):
FAIL - Position check: ProcessingInstruction.afterHTML (Element):
FAIL - Only unsafe variants should run scripts: ProcessingInstruction.afterHTML (Element) (runScripts=true):
FAIL - Only unsafe variants should run scripts: ProcessingInstruction.afterHTML (Element) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: ProcessingInstruction.afterHTML (Element):
FAIL - Position check: ProcessingInstruction.afterHTMLUnsafe (Element):
FAIL - Only unsafe variants should run scripts: ProcessingInstruction.afterHTMLUnsafe (Element) (runScripts=true):
FAIL - Only unsafe variants should run scripts: ProcessingInstruction.afterHTMLUnsafe (Element) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: ProcessingInstruction.afterHTMLUnsafe (Element):
FAIL - Position check: ProcessingInstruction.replaceWithHTML (Element):
FAIL - Only unsafe variants should run scripts: ProcessingInstruction.replaceWithHTML (Element) (runScripts=true):
FAIL - Only unsafe variants should run scripts: ProcessingInstruction.replaceWithHTML (Element) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: ProcessingInstruction.replaceWithHTML (Element):
FAIL - Position check: ProcessingInstruction.replaceWithHTMLUnsafe (Element):
FAIL - Only unsafe variants should run scripts: ProcessingInstruction.replaceWithHTMLUnsafe (Element) (runScripts=true):
FAIL - Only unsafe variants should run scripts: ProcessingInstruction.replaceWithHTMLUnsafe (Element) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: ProcessingInstruction.replaceWithHTMLUnsafe (Element):
FAIL - Position check: Element.appendHTML (ShadowRoot):
FAIL - Only unsafe variants should run scripts: Element.appendHTML (ShadowRoot) (runScripts=true):
FAIL - Only unsafe variants should run scripts: Element.appendHTML (ShadowRoot) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: Element.appendHTML (ShadowRoot):
FAIL - Position check: Element.appendHTMLUnsafe (ShadowRoot):
FAIL - Only unsafe variants should run scripts: Element.appendHTMLUnsafe (ShadowRoot) (runScripts=true):
FAIL - Only unsafe variants should run scripts: Element.appendHTMLUnsafe (ShadowRoot) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: Element.appendHTMLUnsafe (ShadowRoot):
FAIL - Position check: Element.prependHTML (ShadowRoot):
FAIL - Only unsafe variants should run scripts: Element.prependHTML (ShadowRoot) (runScripts=true):
FAIL - Only unsafe variants should run scripts: Element.prependHTML (ShadowRoot) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: Element.prependHTML (ShadowRoot):
FAIL - Position check: Element.prependHTMLUnsafe (ShadowRoot):
FAIL - Only unsafe variants should run scripts: Element.prependHTMLUnsafe (ShadowRoot) (runScripts=true):
FAIL - Only unsafe variants should run scripts: Element.prependHTMLUnsafe (ShadowRoot) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: Element.prependHTMLUnsafe (ShadowRoot):
FAIL - Position check: Element.beforeHTML (ShadowRoot):
FAIL - Only unsafe variants should run scripts: Element.beforeHTML (ShadowRoot) (runScripts=true):
FAIL - Only unsafe variants should run scripts: Element.beforeHTML (ShadowRoot) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: Element.beforeHTML (ShadowRoot):
FAIL - Position check: Element.beforeHTMLUnsafe (ShadowRoot):
FAIL - Only unsafe variants should run scripts: Element.beforeHTMLUnsafe (ShadowRoot) (runScripts=true):
FAIL - Only unsafe variants should run scripts: Element.beforeHTMLUnsafe (ShadowRoot) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: Element.beforeHTMLUnsafe (ShadowRoot):
FAIL - Position check: Element.afterHTML (ShadowRoot):
FAIL - Only unsafe variants should run scripts: Element.afterHTML (ShadowRoot) (runScripts=true):
FAIL - Only unsafe variants should run scripts: Element.afterHTML (ShadowRoot) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: Element.afterHTML (ShadowRoot):
FAIL - Position check: Element.afterHTMLUnsafe (ShadowRoot):
FAIL - Only unsafe variants should run scripts: Element.afterHTMLUnsafe (ShadowRoot) (runScripts=true):
FAIL - Only unsafe variants should run scripts: Element.afterHTMLUnsafe (ShadowRoot) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: Element.afterHTMLUnsafe (ShadowRoot):
FAIL - Position check: Element.replaceWithHTML (ShadowRoot):
FAIL - Only unsafe variants should run scripts: Element.replaceWithHTML (ShadowRoot) (runScripts=true):
FAIL - Only unsafe variants should run scripts: Element.replaceWithHTML (ShadowRoot) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: Element.replaceWithHTML (ShadowRoot):
FAIL - Position check: Element.replaceWithHTMLUnsafe (ShadowRoot):
FAIL - Only unsafe variants should run scripts: Element.replaceWithHTMLUnsafe (ShadowRoot) (runScripts=true):
FAIL - Only unsafe variants should run scripts: Element.replaceWithHTMLUnsafe (ShadowRoot) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: Element.replaceWithHTMLUnsafe (ShadowRoot):
FAIL - Position check: Comment.beforeHTML (ShadowRoot):
FAIL - Only unsafe variants should run scripts: Comment.beforeHTML (ShadowRoot) (runScripts=true):
FAIL - Only unsafe variants should run scripts: Comment.beforeHTML (ShadowRoot) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: Comment.beforeHTML (ShadowRoot):
FAIL - Position check: Comment.beforeHTMLUnsafe (ShadowRoot):
FAIL - Only unsafe variants should run scripts: Comment.beforeHTMLUnsafe (ShadowRoot) (runScripts=true):
FAIL - Only unsafe variants should run scripts: Comment.beforeHTMLUnsafe (ShadowRoot) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: Comment.beforeHTMLUnsafe (ShadowRoot):
FAIL - Position check: Comment.afterHTML (ShadowRoot):
FAIL - Only unsafe variants should run scripts: Comment.afterHTML (ShadowRoot) (runScripts=true):
FAIL - Only unsafe variants should run scripts: Comment.afterHTML (ShadowRoot) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: Comment.afterHTML (ShadowRoot):
FAIL - Position check: Comment.afterHTMLUnsafe (ShadowRoot):
FAIL - Only unsafe variants should run scripts: Comment.afterHTMLUnsafe (ShadowRoot) (runScripts=true):
FAIL - Only unsafe variants should run scripts: Comment.afterHTMLUnsafe (ShadowRoot) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: Comment.afterHTMLUnsafe (ShadowRoot):
FAIL - Position check: Comment.replaceWithHTML (ShadowRoot):
FAIL - Only unsafe variants should run scripts: Comment.replaceWithHTML (ShadowRoot) (runScripts=true):
FAIL - Only unsafe variants should run scripts: Comment.replaceWithHTML (ShadowRoot) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: Comment.replaceWithHTML (ShadowRoot):
FAIL - Position check: Comment.replaceWithHTMLUnsafe (ShadowRoot):
FAIL - Only unsafe variants should run scripts: Comment.replaceWithHTMLUnsafe (ShadowRoot) (runScripts=true):
FAIL - Only unsafe variants should run scripts: Comment.replaceWithHTMLUnsafe (ShadowRoot) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: Comment.replaceWithHTMLUnsafe (ShadowRoot):
FAIL - Position check: Text.beforeHTML (ShadowRoot):
FAIL - Only unsafe variants should run scripts: Text.beforeHTML (ShadowRoot) (runScripts=true):
FAIL - Only unsafe variants should run scripts: Text.beforeHTML (ShadowRoot) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: Text.beforeHTML (ShadowRoot):
FAIL - Position check: Text.beforeHTMLUnsafe (ShadowRoot):
FAIL - Only unsafe variants should run scripts: Text.beforeHTMLUnsafe (ShadowRoot) (runScripts=true):
FAIL - Only unsafe variants should run scripts: Text.beforeHTMLUnsafe (ShadowRoot) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: Text.beforeHTMLUnsafe (ShadowRoot):
FAIL - Position check: Text.afterHTML (ShadowRoot):
FAIL - Only unsafe variants should run scripts: Text.afterHTML (ShadowRoot) (runScripts=true):
FAIL - Only unsafe variants should run scripts: Text.afterHTML (ShadowRoot) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: Text.afterHTML (ShadowRoot):
FAIL - Position check: Text.afterHTMLUnsafe (ShadowRoot):
FAIL - Only unsafe variants should run scripts: Text.afterHTMLUnsafe (ShadowRoot) (runScripts=true):
FAIL - Only unsafe variants should run scripts: Text.afterHTMLUnsafe (ShadowRoot) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: Text.afterHTMLUnsafe (ShadowRoot):
FAIL - Position check: Text.replaceWithHTML (ShadowRoot):
FAIL - Only unsafe variants should run scripts: Text.replaceWithHTML (ShadowRoot) (runScripts=true):
FAIL - Only unsafe variants should run scripts: Text.replaceWithHTML (ShadowRoot) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: Text.replaceWithHTML (ShadowRoot):
FAIL - Position check: Text.replaceWithHTMLUnsafe (ShadowRoot):
FAIL - Only unsafe variants should run scripts: Text.replaceWithHTMLUnsafe (ShadowRoot) (runScripts=true):
FAIL - Only unsafe variants should run scripts: Text.replaceWithHTMLUnsafe (ShadowRoot) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: Text.replaceWithHTMLUnsafe (ShadowRoot):
FAIL - Position check: ProcessingInstruction.beforeHTML (ShadowRoot):
FAIL - Only unsafe variants should run scripts: ProcessingInstruction.beforeHTML (ShadowRoot) (runScripts=true):
FAIL - Only unsafe variants should run scripts: ProcessingInstruction.beforeHTML (ShadowRoot) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: ProcessingInstruction.beforeHTML (ShadowRoot):
FAIL - Position check: ProcessingInstruction.beforeHTMLUnsafe (ShadowRoot):
FAIL - Only unsafe variants should run scripts: ProcessingInstruction.beforeHTMLUnsafe (ShadowRoot) (runScripts=true):
FAIL - Only unsafe variants should run scripts: ProcessingInstruction.beforeHTMLUnsafe (ShadowRoot) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: ProcessingInstruction.beforeHTMLUnsafe (ShadowRoot):
FAIL - Position check: ProcessingInstruction.afterHTML (ShadowRoot):
FAIL - Only unsafe variants should run scripts: ProcessingInstruction.afterHTML (ShadowRoot) (runScripts=true):
FAIL - Only unsafe variants should run scripts: ProcessingInstruction.afterHTML (ShadowRoot) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: ProcessingInstruction.afterHTML (ShadowRoot):
FAIL - Position check: ProcessingInstruction.afterHTMLUnsafe (ShadowRoot):
FAIL - Only unsafe variants should run scripts: ProcessingInstruction.afterHTMLUnsafe (ShadowRoot) (runScripts=true):
FAIL - Only unsafe variants should run scripts: ProcessingInstruction.afterHTMLUnsafe (ShadowRoot) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: ProcessingInstruction.afterHTMLUnsafe (ShadowRoot):
FAIL - Position check: ProcessingInstruction.replaceWithHTML (ShadowRoot):
FAIL - Only unsafe variants should run scripts: ProcessingInstruction.replaceWithHTML (ShadowRoot) (runScripts=true):
FAIL - Only unsafe variants should run scripts: ProcessingInstruction.replaceWithHTML (ShadowRoot) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: ProcessingInstruction.replaceWithHTML (ShadowRoot):
FAIL - Position check: ProcessingInstruction.replaceWithHTMLUnsafe (ShadowRoot):
FAIL - Only unsafe variants should run scripts: ProcessingInstruction.replaceWithHTMLUnsafe (ShadowRoot) (runScripts=true):
FAIL - Only unsafe variants should run scripts: ProcessingInstruction.replaceWithHTMLUnsafe (ShadowRoot) (runScripts=false):
FAIL - Sanitizer should remove forbidden elements: ProcessingInstruction.replaceWithHTMLUnsafe (ShadowRoot):
FAIL
- Position check: Element.appendHTML (Element):
- /html/dom/partial-updates/tentative/processing-instruction-attributes.html [wpt.fyi]
- Processing instruction attribute mutation from DOM:
FAIL(Chrome:FAIL, Safari:FAIL) - Processing instruction attribute mutation from parser:
FAIL(Chrome:FAIL, Safari:FAIL) - Processing instruction attribute mutation from XML:
FAIL(Chrome:FAIL, Safari:FAIL) - Processing instruction attributes with xml-stylesheet in HTML document:
FAIL(Chrome:FAIL, Safari:FAIL) - Processing instruction attributes with xml-stylesheet in XML document:
FAIL(Chrome:FAIL, Safari:FAIL) - Processing instruction toggleAttribute:
FAIL(Chrome:FAIL, Safari:FAIL) - check attribute value: = (source: DOM):
FAIL(Chrome:FAIL, Safari:FAIL) - check attribute value: = (source: parser):
FAIL(Chrome:FAIL, Safari:FAIL) - check attribute value: = (source: xml):
FAIL(Chrome:FAIL, Safari:FAIL) - check attribute value: axx" (source: DOM):
FAIL(Chrome:FAIL, Safari:FAIL) - check attribute value: axx" (source: parser):
FAIL(Chrome:FAIL, Safari:FAIL) - check attribute value: axx" (source: xml):
FAIL(Chrome:FAIL, Safari:FAIL) - check attribute value: axx> (source: DOM):
FAIL(Chrome:FAIL, Safari:FAIL) - check attribute value: axx> (source: parser):
FAIL(Chrome:FAIL, Safari:FAIL) - check attribute value: axx> (source: xml):
FAIL(Chrome:FAIL, Safari:FAIL) - check attribute value: some<> (source: DOM):
FAIL(Chrome:FAIL, Safari:FAIL) - check attribute value: some<> (source: parser):
FAIL(Chrome:FAIL, Safari:FAIL) - check attribute value: some<> (source: xml):
FAIL(Chrome:FAIL, Safari:FAIL) - check attribute value: '""' (source: DOM):
FAIL(Chrome:FAIL, Safari:FAIL) - check attribute value: '""' (source: parser):
FAIL(Chrome:FAIL, Safari:FAIL) - check attribute value: '""' (source: xml):
FAIL(Chrome:FAIL, Safari:FAIL) - check attribute value: aa"aa" (source: DOM):
FAIL(Chrome:FAIL, Safari:FAIL) - check attribute value: aa"aa" (source: parser):
FAIL(Chrome:FAIL, Safari:FAIL) - check attribute value: aa"aa" (source: xml):
FAIL(Chrome:FAIL, Safari:FAIL) - Invalid attribute name: =:
FAIL(Chrome:FAIL, Safari:FAIL) - Invalid attribute name: a=:
FAIL(Chrome:FAIL, Safari:FAIL) - Invalid attribute name: =x:
FAIL(Chrome:FAIL, Safari:FAIL) - Invalid attribute name: b>:
FAIL(Chrome:FAIL, Safari:FAIL) - Invalid attribute name: >:
FAIL(Chrome:FAIL, Safari:FAIL) - Invalid attribute name: >x:
FAIL(Chrome:FAIL, Safari:FAIL) - Invalid attribute name: /x/:
FAIL(Chrome:FAIL, Safari:FAIL) - Invalid attribute name: /:
FAIL(Chrome:FAIL, Safari:FAIL) - Invalid attribute name: x/:
FAIL(Chrome:FAIL, Safari:FAIL) - Invalid attribute name: x :
FAIL(Chrome:FAIL, Safari:FAIL) - Invalid attribute name: x:
FAIL(Chrome:FAIL, Safari:FAIL) - Invalid attribute name: x
:FAIL(Chrome:FAIL, Safari:FAIL) - Invalid attribute name:
x:FAIL(Chrome:FAIL, Safari:FAIL) - Invalid attribute name: x
:FAIL(Chrome:FAIL, Safari:FAIL) - Invalid attribute name:
x:FAIL(Chrome:FAIL, Safari:FAIL) - Equivalent attribute name (source: DOM): ABC -> abc:
FAIL(Chrome:FAIL, Safari:FAIL) - Equivalent attribute name (source: parser): ABC -> abc:
FAIL(Chrome:FAIL, Safari:FAIL) - Equivalent attribute name (source: DOM): abC -> abc:
FAIL(Chrome:FAIL, Safari:FAIL) - Equivalent attribute name (source: parser): abC -> abc:
FAIL(Chrome:FAIL, Safari:FAIL) - Equivalent attribute name (source: DOM): x123A -> x123a:
FAIL(Chrome:FAIL, Safari:FAIL) - Equivalent attribute name (source: parser): x123A -> x123a:
FAIL(Chrome:FAIL, Safari:FAIL)
- Processing instruction attribute mutation from DOM:
- /html/dom/partial-updates/tentative/stream-append-has-invalidation.html [wpt.fyi]
- HTML partial updates - :has invalidation with streaming:
FAIL
- HTML partial updates - :has invalidation with streaming:
- /html/dom/partial-updates/tentative/stream-append-html-unsafe.html [wpt.fyi]
- piping a response into streamAppendHTMLUnsafe():
FAIL - writing a string to streamAppendHTMLUnsafe():
FAIL - streamAppendHTMLUnsafe() does not buffer until close():
FAIL - writing a Symbol to streamAppendHTMLUnsafe():
FAIL - writing numbers to streamAppendHTMLUnsafe():
FAIL - writing null or undefined to streamAppendHTMLUnsafe():
FAIL - streamAppendHTMLUnsafe() can stream into <style>:
FAIL - Aborting streamAppendHTMLUnsafe():
FAIL - Interleaved streamAppendHTMLUnsafe() writes:
FAIL - streamAppendHTMLUnsafe into a ShadowRoot:
FAIL - streamAppendHTMLUnsafe into a template:
FAIL - streamAppendHTMLUnsafe should execute scripts when connected:
FAIL - streamAppendHTMLUnsafe should not execute scripts when disconnected:
FAIL
- piping a response into streamAppendHTMLUnsafe():
- /html/dom/partial-updates/tentative/stream-append-html.html [wpt.fyi]
- piping a response into streamAppendHTML():
FAIL - writing a string to streamAppendHTML():
FAIL - streamAppendHTML() should append to existing content:
FAIL - streamAppendHTML() does not buffer until close():
FAIL - writing a Symbol to streamAppendHTML():
FAIL - writing numbers to streamAppendHTML():
FAIL - writing null or undefined to streamAppendHTML():
FAIL - streamAppendHTML() can stream into <style>:
FAIL - streamAppendHTML() can stream into a non-empty <style>:
FAIL - Aborting streamAppendHTML():
FAIL - Interleaved streamAppendHTML() writes:
FAIL - streamAppendHTML should not execute scripts when connected:
FAIL - streamAppendHTML should pass sanitizer options:
FAIL - streamAppendHTML on ShadowRoot:
FAIL - streamAppendHTML uses safe sanitizer:
FAIL - streamAppendHTML on ShadowRoot uses safe sanitizer:
FAIL
- piping a response into streamAppendHTML():
- /html/dom/partial-updates/tentative/stream-append-with-template-for.html [wpt.fyi]
- streamHTML methods can apply template with for:
FAIL
- streamHTML methods can apply template with for:
- /html/dom/partial-updates/tentative/stream-html-custom-element.html [wpt.fyi]
- streamHTMLUnsafe should trigger CE reactions:
FAIL - streamHTMLUnsafe should use scoped custom element registry:
FAIL - streamAppendHTMLUnsafe should trigger CE reactions:
FAIL - streamAppendHTMLUnsafe should use scoped custom element registry:
FAIL
- streamHTMLUnsafe should trigger CE reactions:
- /html/dom/partial-updates/tentative/stream-html-run-scripts-option.html [wpt.fyi]
- element.streamAppendHTMLUnsafe with runScripts: true:
FAIL - element.streamAppendHTMLUnsafe with runScripts: false:
FAIL - shadowRoot.streamAppendHTMLUnsafe with runScripts: false:
FAIL - shadowRoot.streamAppendHTMLUnsafe with runScripts: true:
FAIL - element.streamHTMLUnsafe with runScripts: true:
FAIL - element.streamHTMLUnsafe with runScripts: false:
FAIL - shadowRoot.streamHTMLUnsafe with runScripts: false:
FAIL - shadowRoot.streamHTMLUnsafe with runScripts: true:
FAIL
- element.streamAppendHTMLUnsafe with runScripts: true:
- /html/dom/partial-updates/tentative/stream-html-sanitizer.html [wpt.fyi]
- element.streamHTMLUnsafe with sanitizer {removeElements}:
FAIL - element.streamHTMLUnsafe with sanitizer {elements}:
FAIL - element.streamHTMLUnsafe with sanitizer {replaceWithChildrenElements}:
FAIL - element.streamHTMLUnsafe with sanitizer {replaceWithChildrenElements} and text:
FAIL - element.streamHTMLUnsafe with sanitizer {attributes}:
FAIL - element.streamHTMLUnsafe with sanitizer {removeAttributes}:
FAIL - element.streamHTMLUnsafe with sanitizer {element: [{removeAttributes}]}:
FAIL - element.streamHTMLUnsafe with sanitizer {element: [{attributes}]}:
FAIL - element.streamHTMLUnsafe with sanitizer should sanitize template contents:
FAIL - element.streamHTMLUnsafe: sanitizer shouldn't allow escaping template:
FAIL - element.streamHTMLUnsafe: sanitizer takes effect after foster parenting:
FAIL - element.streamHTMLUnsafe: sanitizer with foster parenting: <table><p><p>:
FAIL - element.streamHTMLUnsafe: sanitizer takes effect after adoption agency:
FAIL - element.streamHTMLUnsafe: mutating the sanitizer while streaming does not effect the originally given sanitizer:
FAIL - element.streamAppendHTMLUnsafe with sanitizer {removeElements}:
FAIL - element.streamAppendHTMLUnsafe with sanitizer {elements}:
FAIL - element.streamAppendHTMLUnsafe with sanitizer {replaceWithChildrenElements}:
FAIL - element.streamAppendHTMLUnsafe with sanitizer {replaceWithChildrenElements} and text:
FAIL - element.streamAppendHTMLUnsafe with sanitizer {attributes}:
FAIL - element.streamAppendHTMLUnsafe with sanitizer {removeAttributes}:
FAIL - element.streamAppendHTMLUnsafe with sanitizer {element: [{removeAttributes}]}:
FAIL - element.streamAppendHTMLUnsafe with sanitizer {element: [{attributes}]}:
FAIL - element.streamAppendHTMLUnsafe with sanitizer should sanitize template contents:
FAIL - element.streamAppendHTMLUnsafe: sanitizer shouldn't allow escaping template:
FAIL - element.streamAppendHTMLUnsafe: sanitizer takes effect after foster parenting:
FAIL - element.streamAppendHTMLUnsafe: sanitizer with foster parenting: <table><p><p>:
FAIL - element.streamAppendHTMLUnsafe: sanitizer takes effect after adoption agency:
FAIL - element.streamAppendHTMLUnsafe: mutating the sanitizer while streaming does not effect the originally given sanitizer:
FAIL
- element.streamHTMLUnsafe with sanitizer {removeElements}:
- /html/dom/partial-updates/tentative/stream-html-unsafe.html [wpt.fyi]
- piping a response into streamHTMLUnsafe():
FAIL - writing a string to streamHTMLUnsafe():
FAIL - streamHTMLUnsafe() should remove existing content immediately:
FAIL - streamHTMLUnsafe() does not buffer until close():
FAIL - writing a Symbol to streamHTMLUnsafe():
FAIL - writing numbers to streamHTMLUnsafe():
FAIL - writing null or undefined to streamHTMLUnsafe():
FAIL - streamHTMLUnsafe() can stream into <style>:
FAIL - Aborting streamHTMLUnsafe():
FAIL - Interleaved streamHTMLUnsafe() writes:
FAIL - streamHTMLUnsafe into a ShadowRoot:
FAIL - streamHTMLUnsafe into a template:
FAIL - streamHTMLUnsafe should execute scripts when connected:
FAIL - streamHTMLUnsafe should not execute scripts when disconnected:
FAIL
- piping a response into streamHTMLUnsafe():
- /html/dom/partial-updates/tentative/stream-html-with-trusted-types-error-in-policy.html [wpt.fyi]
- error in createParserOptions is rethrown from default policy:
FAIL - error in createParserOptions is rethrown from named policy:
FAIL
- error in createParserOptions is rethrown from default policy:
- /html/dom/partial-updates/tentative/stream-html-with-trusted-types-pass-trusted.html [wpt.fyi]
- A given TrustedParserOptions can override default policy's runScript:
FAIL - A given TrustedParserOptions can override default policy's sanitizer:
FAIL
- A given TrustedParserOptions can override default policy's runScript:
- /html/dom/partial-updates/tentative/stream-html-with-trusted-types-runScripts-cannot-be-turned-on.html [wpt.fyi]
- The default TT policy cannot turn runScripts on if they are off in the options:
FAIL
- The default TT policy cannot turn runScripts on if they are off in the options:
- /html/dom/partial-updates/tentative/stream-html-with-trusted-types-runScripts-off.html [wpt.fyi]
- The default TT policy can turn runScripts off:
FAIL
- The default TT policy can turn runScripts off:
- /html/dom/partial-updates/tentative/stream-html-with-trusted-types-sanitizer.html [wpt.fyi]
- createParserOptions can inject a sanitizer config:
FAIL - createParserOptions can inject a sanitizer:
FAIL - createParserOptions can override a sanitizer config:
FAIL - createParserOptions can remove a sanitizer:
FAIL
- createParserOptions can inject a sanitizer config:
- /html/dom/partial-updates/tentative/stream-html.html [wpt.fyi]
- piping a response into streamHTML():
FAIL - writing a string to streamHTML():
FAIL - streamHTML() should remove existing content immediately:
FAIL - streamHTML() does not buffer until close():
FAIL - writing a Symbol to streamHTML():
FAIL - writing numbers to streamHTML():
FAIL - writing null or undefined to streamHTML():
FAIL - streamHTML() can stream into <style>:
FAIL - Aborting streamHTML():
FAIL - Interleaved streamHTML() writes:
FAIL - streamHTML should not execute scripts when connected:
FAIL - streamHTML should pass sanitizer options:
FAIL - streamHTML uses safe sanitizer:
FAIL - streamHTML on ShadowRoot:
FAIL - streamHTML on ShadowRoot uses safe sanitizer:
FAIL
- piping a response into streamHTML():
- /html/dom/partial-updates/tentative/template-for-append-element.html [wpt.fyi]
- <template for> appending element:
FAIL
- <template for> appending element:
- /html/dom/partial-updates/tentative/template-for-append-text-and-element.html [wpt.fyi]
- <template for> with text:
FAIL
- <template for> with text:
- /html/dom/partial-updates/tentative/template-for-append-to-head.html [wpt.fyi]
- HTML partial updates - append to head:
FAIL
- HTML partial updates - append to head:
- /html/dom/partial-updates/tentative/template-for-gradual-append.html [wpt.fyi]
- Multiple <template for>:
FAIL
- Multiple <template for>:
- /html/dom/partial-updates/tentative/template-for-ignores-case.html [wpt.fyi]
- marker/end/start PI targets are case-insensitive:
FAIL
- marker/end/start PI targets are case-insensitive:
- /html/dom/partial-updates/tentative/template-for-innerHTML-ambiguous.html [wpt.fyi]
- <template for> in innerHTML patching inner element:
FAIL
- <template for> in innerHTML patching inner element:
- /html/dom/partial-updates/tentative/template-for-innerHTML-within.html [wpt.fyi]
- <template for> in innerHTML patching inner element:
FAIL
- <template for> in innerHTML patching inner element:
- /html/dom/partial-updates/tentative/template-for-move-end-while-appending.html [wpt.fyi]
- Multiple <template for>:
FAIL
- Multiple <template for>:
- /html/dom/partial-updates/tentative/template-for-move-marker-while-appending.html [wpt.fyi]
- Multiple <template for>:
FAIL
- Multiple <template for>:
- /html/dom/partial-updates/tentative/template-for-move-start-while-appending.html [wpt.fyi]
- HTML partial updates - move <?start> while appending has no effect:
FAIL
- HTML partial updates - move <?start> while appending has no effect:
- /html/dom/partial-updates/tentative/template-for-move-while-appending.html [wpt.fyi]
- Multiple <template for>:
FAIL
- Multiple <template for>:
- /html/dom/partial-updates/tentative/template-for-multiple.html [wpt.fyi]
- Multiple <template for>:
FAIL
- Multiple <template for>:
- /html/dom/partial-updates/tentative/template-for-mutation-records.html [wpt.fyi]
- HTML partial updates - mutation records for removal:
FAIL
- HTML partial updates - mutation records for removal:
- /html/dom/partial-updates/tentative/template-for-prepend-element.html [wpt.fyi]
- <template for> prepend element:
FAIL
- <template for> prepend element:
- /html/dom/partial-updates/tentative/template-for-prepend-invalid-ref.html [wpt.fyi]
- Prepending works even when element after the range is removed:
FAIL
- Prepending works even when element after the range is removed:
- /html/dom/partial-updates/tentative/template-for-prepend-text.html [wpt.fyi]
- <template for> prepend text:
FAIL
- <template for> prepend text:
- /html/dom/partial-updates/tentative/template-for-replace-children-with-element.html [wpt.fyi]
- <template for> replace children with element:
FAIL
- <template for> replace children with element:
- /html/dom/partial-updates/tentative/template-for-replace-children-with-text.html [wpt.fyi]
- <template for> replace children with text:
FAIL
- <template for> replace children with text:
- /html/dom/partial-updates/tentative/template-for-replace-invalid-ref.html [wpt.fyi]
- <template for> replace:
FAIL
- <template for> replace:
- /html/dom/partial-updates/tentative/template-for-replace.html [wpt.fyi]
- <template for> replace:
FAIL
- <template for> replace:
- /html/dom/partial-updates/tentative/template-for-script-children.html [wpt.fyi]
- HTML partial updates - a script inside a patch should execute:
FAIL
- HTML partial updates - a script inside a patch should execute:
- /html/dom/partial-updates/tentative/template-for-script-eval.html [wpt.fyi]
- HTML partial updates - template for can create a new executable script:
FAIL
- HTML partial updates - template for can create a new executable script:
- /html/dom/partial-updates/tentative/template-for-script-replace.html [wpt.fyi]
- HTML partial updates - a script replaced with a patch should execute:
FAIL
- HTML partial updates - a script replaced with a patch should execute:
- /html/dom/partial-updates/tentative/template-for-shadow-nested.html [wpt.fyi]
- <template contentmethod> inside a <template shadowrootmode><div> should apply directly to its target:
FAIL
- <template contentmethod> inside a <template shadowrootmode><div> should apply directly to its target:
- /html/dom/partial-updates/tentative/template-for-shadow-root.html [wpt.fyi]
- markers are respected in declarative shadow root:
FAIL - markers are respected in imperative shadow root with streaming:
FAIL
- markers are respected in declarative shadow root:
- /html/dom/partial-updates/tentative/template-for-shadow.html [wpt.fyi]
- <template contentmethod> inside a <template shadowrootmode> should apply directly to its target:
FAIL
- <template contentmethod> inside a <template shadowrootmode> should apply directly to its target:
- /html/dom/partial-updates/tentative/template-for-style-in-head.html [wpt.fyi]
- HTML partial updates - patch updates style with plain text:
FAIL
- HTML partial updates - patch updates style with plain text:
- /html/dom/partial-updates/tentative/template-for-style.html [wpt.fyi]
- HTML partial updates - patch updates style with plain text:
FAIL
- HTML partial updates - patch updates style with plain text:
- /html/dom/partial-updates/tentative/template-for-supersedes-invalid-shadowrootmode.html [wpt.fyi]
- HTML partial updates: invalid shadowrootmode superseded by for:
FAIL
- HTML partial updates: invalid shadowrootmode superseded by for:
- /html/dom/partial-updates/tentative/template-for-title.html [wpt.fyi]
- HTML partial updates - update title:
FAIL
- HTML partial updates - update title:
https://hg.mozilla.org/mozilla-central/rev/ee8dcbe55f77
https://hg.mozilla.org/mozilla-central/rev/0f67538fa16d
Description
•