- From: W3C commit bot <web-platform-tests-notifications@w3.org>
- Date: Thu, 16 Mar 2017 21:26:43 GMT
- To: public-web-platform-tests-notifications@w3.org
[View the complete job log.](https://travis-ci.org/w3c/web-platform-tests/jobs/211912536) # Chrome (unstable channel) # Testing web-platform-tests at revision 5ecd8e33ac062fdb346756473aecff52ac54cb11 Using browser at version 58.0.3029.19 dev Starting 10 test iterations All results were stable ## All results ## <details> <summary>10 tests ran</summary> <details> <summary><a href="http://w3c-test.org/submissions/5163/html/browsers/history/the-location-interface/location-prototype-setting-cross-origin-domain.sub.html">/html/browsers/history/the-location-interface/location-prototype-setting-cross-origin-domain.sub.html</a></summary> | Subtest | Results | Messages | |--------------------------------------------------------------------------------------------------------------------------------------------------------------|---------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | | OK | | | `Cross-origin via document.domain: the prototype is null` | PASS | | | `Cross-origin via document.domain: setting the prototype to an empty object via Object.setPrototypeOf should throw a TypeError` | FAIL | `assert_throws: function "() => {\n Object.setPrototypeOf(target, newValue);\n }" threw object "SecurityError: Blocked a frame with origin "http://web-platform.test:8000" from accessing a cross-origin frame." ("SecurityError") expected object "TypeError" ("TypeError")` | | `Cross-origin via document.domain: setting the prototype to an empty object via __proto__ should throw a SecurityError` | PASS | | | `Cross-origin via document.domain: setting the prototype to an empty object via Reflect.setPrototypeOf should return false` | FAIL | `Blocked a frame with origin "http://web-platform.test:8000" from accessing a cross-origin frame.` | | `Cross-origin via document.domain: the prototype must still be null` | PASS | | | `Cross-origin via document.domain: setting the prototype to null via Object.setPrototypeOf should not throw` | FAIL | `Blocked a frame with origin "http://web-platform.test:8000" from accessing a cross-origin frame.` | | `Cross-origin via document.domain: setting the prototype to null via __proto__ should throw a "SecurityError" since it ends up in CrossOriginGetOwnProperty` | PASS | | | `Cross-origin via document.domain: setting the prototype to null via Reflect.setPrototypeOf should return true` | FAIL | `Blocked a frame with origin "http://web-platform.test:8000" from accessing a cross-origin frame.` | </details> <details> <summary><a href="http://w3c-test.org/submissions/5163/html/browsers/history/the-location-interface/location-prototype-setting-cross-origin.sub.html">/html/browsers/history/the-location-interface/location-prototype-setting-cross-origin.sub.html</a></summary> | Subtest | Results | Messages | |------------------------------------------------------------------------------------------------------------------------------------------|---------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | | OK | | | `Cross-origin: the prototype is null` | PASS | | | `Cross-origin: setting the prototype to an empty object via Object.setPrototypeOf should throw a TypeError` | FAIL | `assert_throws: function "() => {\n Object.setPrototypeOf(target, newValue);\n }" threw object "SecurityError: Blocked a frame with origin "http://web-platform.test:8000" from accessing a cross-origin frame." ("SecurityError") expected object "TypeError" ("TypeError")` | | `Cross-origin: setting the prototype to an empty object via __proto__ should throw a SecurityError` | PASS | | | `Cross-origin: setting the prototype to an empty object via Reflect.setPrototypeOf should return false` | FAIL | `Blocked a frame with origin "http://web-platform.test:8000" from accessing a cross-origin frame.` | | `Cross-origin: the prototype must still be null` | PASS | | | `Cross-origin: setting the prototype to null via Object.setPrototypeOf should not throw` | FAIL | `Blocked a frame with origin "http://web-platform.test:8000" from accessing a cross-origin frame.` | | `Cross-origin: setting the prototype to null via __proto__ should throw a "SecurityError" since it ends up in CrossOriginGetOwnProperty` | PASS | | | `Cross-origin: setting the prototype to null via Reflect.setPrototypeOf should return true` | FAIL | `Blocked a frame with origin "http://web-platform.test:8000" from accessing a cross-origin frame.` | </details> <details> <summary><a href="http://w3c-test.org/submissions/5163/html/browsers/history/the-location-interface/location-prototype-setting-goes-cross-origin-domain.sub.html">/html/browsers/history/the-location-interface/location-prototype-setting-goes-cross-origin-domain.sub.html</a></summary> | Subtest | Results | Messages | |--------------------------------------------------------------------------------------------------------------------------------------------------------------------------|---------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | | OK | | | `Same-origin (for now): the prototype is accessible` | PASS | | | `Became cross-origin via document.domain: the prototype is now null` | PASS | | | `Became cross-origin via document.domain: setting the prototype to an empty object via Object.setPrototypeOf should throw a TypeError` | FAIL | `assert_throws: function "() => {\n Object.setPrototypeOf(target, newValue);\n }" threw object "SecurityError: Blocked a frame with origin "http://web-platform.test:8000" from accessing a cross-origin frame." ("SecurityError") expected object "TypeError" ("TypeError")` | | `Became cross-origin via document.domain: setting the prototype to an empty object via __proto__ should throw a SecurityError` | PASS | | | `Became cross-origin via document.domain: setting the prototype to an empty object via Reflect.setPrototypeOf should return false` | FAIL | `Blocked a frame with origin "http://web-platform.test:8000" from accessing a cross-origin frame.` | | `Became cross-origin via document.domain: the prototype must still be null` | PASS | | | `Became cross-origin via document.domain: setting the prototype to null via Object.setPrototypeOf should not throw` | FAIL | `Blocked a frame with origin "http://web-platform.test:8000" from accessing a cross-origin frame.` | | `Became cross-origin via document.domain: setting the prototype to null via __proto__ should throw a "SecurityError" since it ends up in CrossOriginGetOwnProperty` | PASS | | | `Became cross-origin via document.domain: setting the prototype to null via Reflect.setPrototypeOf should return true` | FAIL | `Blocked a frame with origin "http://web-platform.test:8000" from accessing a cross-origin frame.` | | `Became cross-origin via document.domain: setting the prototype to the original value from before going cross-origin via Object.setPrototypeOf should throw a TypeError` | FAIL | `assert_throws: function "() => {\n Object.setPrototypeOf(target, newValue);\n }" threw object "SecurityError: Blocked a frame with origin "http://web-platform.test:8000" from accessing a cross-origin frame." ("SecurityError") expected object "TypeError" ("TypeError")` | | `Became cross-origin via document.domain: setting the prototype to the original value from before going cross-origin via __proto__ should throw a SecurityError` | PASS | | | `Became cross-origin via document.domain: setting the prototype to the original value from before going cross-origin via Reflect.setPrototypeOf should return false` | FAIL | `Blocked a frame with origin "http://web-platform.test:8000" from accessing a cross-origin frame.` | </details> <details> <summary><a href="http://w3c-test.org/submissions/5163/html/browsers/history/the-location-interface/location-prototype-setting-same-origin-domain.sub.html">/html/browsers/history/the-location-interface/location-prototype-setting-same-origin-domain.sub.html</a></summary> | Subtest | Results | Messages | |-------------------------------------------------------------------------------------------------------------------|---------|----------------------------------------------------------------------------------------------------------| | | OK | | | `Same-origin-domain prerequisite check: the original prototype is accessible` | PASS | | | `Same-origin-domain: setting the prototype to an empty object via Object.setPrototypeOf should throw a TypeError` | FAIL | `assert_throws: function "() => {\n Object.setPrototypeOf(target, newValue);\n }" did not throw` | | `Same-origin-domain: setting the prototype to an empty object via __proto__ should throw a TypeError` | FAIL | `assert_throws: function "function () {\n target.__proto__ = newValue;\n }" did not throw` | | `Same-origin-domain: setting the prototype to an empty object via Reflect.setPrototypeOf should return false` | FAIL | `assert_false: expected false got true` | | `Same-origin-domain: the prototype must still be its original value` | FAIL | `assert_equals: expected object "[object Location]" but got object "[object Object]"` | | `Same-origin-domain: setting the prototype to its original value via Object.setPrototypeOf should not throw` | PASS | | | `Same-origin-domain: setting the prototype to its original value via __proto__ should not throw` | PASS | | | `Same-origin-domain: setting the prototype to its original value via Reflect.setPrototypeOf should return true` | PASS | | </details> <details> <summary><a href="http://w3c-test.org/submissions/5163/html/browsers/history/the-location-interface/location-prototype-setting-same-origin.html">/html/browsers/history/the-location-interface/location-prototype-setting-same-origin.html</a></summary> | Subtest | Results | Messages | |------------------------------------------------------------------------------------------------------------|---------|----------------------------------------------------------------------------------------------------------| | | OK | | | `Same-origin prerequisite check: the original prototype is accessible` | PASS | | | `Same-origin: setting the prototype to an empty object via Object.setPrototypeOf should throw a TypeError` | FAIL | `assert_throws: function "() => {\n Object.setPrototypeOf(target, newValue);\n }" did not throw` | | `Same-origin: setting the prototype to an empty object via __proto__ should throw a TypeError` | FAIL | `assert_throws: function "function () {\n target.__proto__ = newValue;\n }" did not throw` | | `Same-origin: setting the prototype to an empty object via Reflect.setPrototypeOf should return false` | FAIL | `assert_false: expected false got true` | | `Same-origin: the prototype must still be its original value` | FAIL | `assert_equals: expected object "[object Location]" but got object "[object Object]"` | | `Same-origin: setting the prototype to its original value via Object.setPrototypeOf should not throw` | PASS | | | `Same-origin: setting the prototype to its original value via __proto__ should not throw` | PASS | | | `Same-origin: setting the prototype to its original value via Reflect.setPrototypeOf should return true` | PASS | | </details> <details> <summary><a href="http://w3c-test.org/submissions/5163/html/browsers/the-windowproxy-exotic-object/windowproxy-prototype-setting-cross-origin-domain.sub.html">/html/browsers/the-windowproxy-exotic-object/windowproxy-prototype-setting-cross-origin-domain.sub.html</a></summary> | Subtest | Results | Messages | |--------------------------------------------------------------------------------------------------------------------------------------------------------------|---------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | | OK | | | `Cross-origin via document.domain: the prototype is null` | PASS | | | `Cross-origin via document.domain: setting the prototype to an empty object via Object.setPrototypeOf should throw a TypeError` | FAIL | `assert_throws: function "() => {\n Object.setPrototypeOf(target, newValue);\n }" threw object "SecurityError: Blocked a frame with origin "http://web-platform.test:8000" from accessing a cross-origin frame." ("SecurityError") expected object "TypeError" ("TypeError")` | | `Cross-origin via document.domain: setting the prototype to an empty object via __proto__ should throw a SecurityError` | PASS | | | `Cross-origin via document.domain: setting the prototype to an empty object via Reflect.setPrototypeOf should return false` | FAIL | `Blocked a frame with origin "http://web-platform.test:8000" from accessing a cross-origin frame.` | | `Cross-origin via document.domain: the prototype must still be null` | PASS | | | `Cross-origin via document.domain: setting the prototype to null via Object.setPrototypeOf should not throw` | FAIL | `Blocked a frame with origin "http://web-platform.test:8000" from accessing a cross-origin frame.` | | `Cross-origin via document.domain: setting the prototype to null via __proto__ should throw a "SecurityError" since it ends up in CrossOriginGetOwnProperty` | PASS | | | `Cross-origin via document.domain: setting the prototype to null via Reflect.setPrototypeOf should return true` | FAIL | `Blocked a frame with origin "http://web-platform.test:8000" from accessing a cross-origin frame.` | </details> <details> <summary><a href="http://w3c-test.org/submissions/5163/html/browsers/the-windowproxy-exotic-object/windowproxy-prototype-setting-cross-origin.sub.html">/html/browsers/the-windowproxy-exotic-object/windowproxy-prototype-setting-cross-origin.sub.html</a></summary> | Subtest | Results | Messages | |------------------------------------------------------------------------------------------------------------------------------------------|---------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | | OK | | | `Cross-origin: the prototype is null` | PASS | | | `Cross-origin: setting the prototype to an empty object via Object.setPrototypeOf should throw a TypeError` | FAIL | `assert_throws: function "() => {\n Object.setPrototypeOf(target, newValue);\n }" threw object "SecurityError: Blocked a frame with origin "http://web-platform.test:8000" from accessing a cross-origin frame." ("SecurityError") expected object "TypeError" ("TypeError")` | | `Cross-origin: setting the prototype to an empty object via __proto__ should throw a SecurityError` | PASS | | | `Cross-origin: setting the prototype to an empty object via Reflect.setPrototypeOf should return false` | FAIL | `Blocked a frame with origin "http://web-platform.test:8000" from accessing a cross-origin frame.` | | `Cross-origin: the prototype must still be null` | PASS | | | `Cross-origin: setting the prototype to null via Object.setPrototypeOf should not throw` | FAIL | `Blocked a frame with origin "http://web-platform.test:8000" from accessing a cross-origin frame.` | | `Cross-origin: setting the prototype to null via __proto__ should throw a "SecurityError" since it ends up in CrossOriginGetOwnProperty` | PASS | | | `Cross-origin: setting the prototype to null via Reflect.setPrototypeOf should return true` | FAIL | `Blocked a frame with origin "http://web-platform.test:8000" from accessing a cross-origin frame.` | </details> <details> <summary><a href="http://w3c-test.org/submissions/5163/html/browsers/the-windowproxy-exotic-object/windowproxy-prototype-setting-goes-cross-origin-domain.sub.html">/html/browsers/the-windowproxy-exotic-object/windowproxy-prototype-setting-goes-cross-origin-domain.sub.html</a></summary> | Subtest | Results | Messages | |--------------------------------------------------------------------------------------------------------------------------------------------------------------------------|---------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | | OK | | | `Same-origin (for now): the prototype is accessible` | PASS | | | `Became cross-origin via document.domain: the prototype is now null` | PASS | | | `Became cross-origin via document.domain: setting the prototype to an empty object via Object.setPrototypeOf should throw a TypeError` | FAIL | `assert_throws: function "() => {\n Object.setPrototypeOf(target, newValue);\n }" threw object "SecurityError: Blocked a frame with origin "http://web-platform.test:8000" from accessing a cross-origin frame." ("SecurityError") expected object "TypeError" ("TypeError")` | | `Became cross-origin via document.domain: setting the prototype to an empty object via __proto__ should throw a SecurityError` | PASS | | | `Became cross-origin via document.domain: setting the prototype to an empty object via Reflect.setPrototypeOf should return false` | FAIL | `Blocked a frame with origin "http://web-platform.test:8000" from accessing a cross-origin frame.` | | `Became cross-origin via document.domain: the prototype must still be null` | PASS | | | `Became cross-origin via document.domain: setting the prototype to null via Object.setPrototypeOf should not throw` | FAIL | `Blocked a frame with origin "http://web-platform.test:8000" from accessing a cross-origin frame.` | | `Became cross-origin via document.domain: setting the prototype to null via __proto__ should throw a "SecurityError" since it ends up in CrossOriginGetOwnProperty` | PASS | | | `Became cross-origin via document.domain: setting the prototype to null via Reflect.setPrototypeOf should return true` | FAIL | `Blocked a frame with origin "http://web-platform.test:8000" from accessing a cross-origin frame.` | | `Became cross-origin via document.domain: setting the prototype to the original value from before going cross-origin via Object.setPrototypeOf should throw a TypeError` | FAIL | `assert_throws: function "() => {\n Object.setPrototypeOf(target, newValue);\n }" threw object "SecurityError: Blocked a frame with origin "http://web-platform.test:8000" from accessing a cross-origin frame." ("SecurityError") expected object "TypeError" ("TypeError")` | | `Became cross-origin via document.domain: setting the prototype to the original value from before going cross-origin via __proto__ should throw a SecurityError` | PASS | | | `Became cross-origin via document.domain: setting the prototype to the original value from before going cross-origin via Reflect.setPrototypeOf should return false` | FAIL | `Blocked a frame with origin "http://web-platform.test:8000" from accessing a cross-origin frame.` | </details> <details> <summary><a href="http://w3c-test.org/submissions/5163/html/browsers/the-windowproxy-exotic-object/windowproxy-prototype-setting-same-origin-domain.sub.html">/html/browsers/the-windowproxy-exotic-object/windowproxy-prototype-setting-same-origin-domain.sub.html</a></summary> | Subtest | Results | Messages | |-------------------------------------------------------------------------------------------------------------------|---------|----------| | | OK | | | `Same-origin-domain prerequisite check: the original prototype is accessible` | PASS | | | `Same-origin-domain: setting the prototype to an empty object via Object.setPrototypeOf should throw a TypeError` | PASS | | | `Same-origin-domain: setting the prototype to an empty object via __proto__ should throw a TypeError` | PASS | | | `Same-origin-domain: setting the prototype to an empty object via Reflect.setPrototypeOf should return false` | PASS | | | `Same-origin-domain: the prototype must still be its original value` | PASS | | | `Same-origin-domain: setting the prototype to its original value via Object.setPrototypeOf should not throw` | PASS | | | `Same-origin-domain: setting the prototype to its original value via __proto__ should not throw` | PASS | | | `Same-origin-domain: setting the prototype to its original value via Reflect.setPrototypeOf should return true` | PASS | | </details> <details> <summary><a href="http://w3c-test.org/submissions/5163/html/browsers/the-windowproxy-exotic-object/windowproxy-prototype-setting-same-origin.html">/html/browsers/the-windowproxy-exotic-object/windowproxy-prototype-setting-same-origin.html</a></summary> | Subtest | Results | Messages | |------------------------------------------------------------------------------------------------------------|---------|----------| | | OK | | | `Same-origin prerequisite check: the original prototype is accessible` | PASS | | | `Same-origin: setting the prototype to an empty object via Object.setPrototypeOf should throw a TypeError` | PASS | | | `Same-origin: setting the prototype to an empty object via __proto__ should throw a TypeError` | PASS | | | `Same-origin: setting the prototype to an empty object via Reflect.setPrototypeOf should return false` | PASS | | | `Same-origin: the prototype must still be its original value` | PASS | | | `Same-origin: setting the prototype to its original value via Object.setPrototypeOf should not throw` | PASS | | | `Same-origin: setting the prototype to its original value via __proto__ should not throw` | PASS | | | `Same-origin: setting the prototype to its original value via Reflect.setPrototypeOf should return true` | PASS | | </details> </details> View on GitHub: https://github.com/w3c/web-platform-tests/pull/5163#issuecomment-287196135
Received on Thursday, 16 March 2017 21:26:55 UTC