Re: CSP: 'connect-src' should not cause exceptions. (#5205)

 [View the complete job log.](https://travis-ci.org/w3c/web-platform-tests/jobs/214011432)

# Chrome (unstable channel) #
Testing web-platform-tests at revision 17c3970a104430683b6ca550cc48f0282b254fe6
Using browser at version 59.0.3047.0 dev
Starting 10 test iterations
All results were stable
## All results ##
<details>
<summary>7 tests ran</summary>
<details>
<summary><a href="http://w3c-test.org/submissions/5205/content-security-policy/connect-src/connect-src-beacon-blocked.sub.html">/content-security-policy/connect-src/connect-src-beacon-blocked.sub.html</a></summary>


|            Subtest             | Results |                                                                                             Messages                                                                                             |
|--------------------------------|---------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
|                                | OK      |                                                                                                                                                                                                  |
| `sendBeacon should not throw.` | FAIL    | `Failed to execute 'sendBeacon' on 'Navigator': Refused to send beacon to 'http://www.web-platform.test:8000/common/text-plain.txt' because it violates the document's Content Security Policy.` |

</details>
<details>
<summary><a href="http://w3c-test.org/submissions/5205/content-security-policy/connect-src/connect-src-eventsource-blocked.sub.html">/content-security-policy/connect-src/connect-src-eventsource-blocked.sub.html</a></summary>


| Subtest | Results | Messages |
|---------|---------|----------|
|         | TIMEOUT |          |

</details>
<details>
<summary><a href="http://w3c-test.org/submissions/5205/content-security-policy/connect-src/connect-src-websocket-blocked.sub.html">/content-security-policy/connect-src/connect-src-websocket-blocked.sub.html</a></summary>


|               Subtest                | Results |                                                                           Messages                                                                          |
|--------------------------------------|---------|-------------------------------------------------------------------------------------------------------------------------------------------------------------|
|                                      | OK      |                                                                                                                                                             |
| `WebSocket should fire error event.` | FAIL    | `Failed to construct 'WebSocket': Refused to connect to 'ws://www.web-platform.test:8888/echo' because it violates the document's Content Security Policy.` |

</details>
<details>
<summary><a href="http://w3c-test.org/submissions/5205/content-security-policy/connect-src/connect-src-xmlhttprequest-blocked.sub.html">/content-security-policy/connect-src/connect-src-xmlhttprequest-blocked.sub.html</a></summary>


|                   Subtest                   | Results |                                                                                           Messages                                                                                          |
|---------------------------------------------|---------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
|                                             | OK      |                                                                                                                                                                                             |
| `XHR should fire onerror.`                  | FAIL    | `Failed to execute 'open' on 'XMLHttpRequest': Refused to connect to 'http://www.web-platform.test:8000/common/text-plain.txt' because it violates the document's Content Security Policy.` |
| `XHR should fire onerror after a redirect.` | PASS    |                                                                                                                                                                                             |

</details>
<details>
<summary><a href="http://w3c-test.org/submissions/5205/content-security-policy/inside-worker/dedicated-inheritance.html">/content-security-policy/inside-worker/dedicated-inheritance.html</a></summary>


|                                                      Subtest                                                       | Results |     Messages     |
|--------------------------------------------------------------------------------------------------------------------|---------|------------------|
|                                                                                                                    | TIMEOUT |                  |
| `Filesystem and blob.`                                                                                             | PASS    |                  |
| `Same-origin 'fetch()' in http:?pipe=sub|header(Content-Security-Policy,connect-src%20%27none%27)`                 | PASS    | `{}`             |
| `Same-origin XHR in http:?pipe=sub|header(Content-Security-Policy,connect-src%20%27none%27)`                       | PASS    | `{}`             |
| `Cross-origin 'fetch()' in http:?pipe=sub|header(Content-Security-Policy,connect-src%20%27none%27)`                | PASS    | `{}`             |
| `Cross-origin XHR in http:?pipe=sub|header(Content-Security-Policy,connect-src%20%27none%27)`                      | TIMEOUT | `Test timed out` |
| `Same-origin => cross-origin 'fetch()' in http:?pipe=sub|header(Content-Security-Policy,connect-src%20%27none%27)` | PASS    | `{}`             |
| `Same-origin 'fetch()' in http:?pipe=sub|header(Content-Security-Policy,default-src%20%27none%27)`                 | PASS    | `{}`             |
| `Same-origin 'fetch()' in http:?pipe=sub|header(Content-Security-Policy,default-src%20*)`                          | PASS    | `{}`             |
| `Same-origin XHR in http:?pipe=sub|header(Content-Security-Policy,default-src%20*)`                                | PASS    | `{}`             |
| `Cross-origin 'fetch()' in http:?pipe=sub|header(Content-Security-Policy,default-src%20*)`                         | PASS    | `{}`             |
| `Same-origin XHR in http:?pipe=sub|header(Content-Security-Policy,default-src%20%27none%27)`                       | PASS    | `{}`             |
| `Cross-origin XHR in http:?pipe=sub|header(Content-Security-Policy,default-src%20*)`                               | TIMEOUT | `Test timed out` |
| `Same-origin => cross-origin 'fetch()' in http:?pipe=sub|header(Content-Security-Policy,default-src%20*)`          | PASS    | `{}`             |
| `Cross-origin 'fetch()' in http:?pipe=sub|header(Content-Security-Policy,default-src%20%27none%27)`                | PASS    | `{}`             |
| `Cross-origin XHR in http:?pipe=sub|header(Content-Security-Policy,default-src%20%27none%27)`                      | TIMEOUT | `Test timed out` |
| `Same-origin => cross-origin 'fetch()' in http:?pipe=sub|header(Content-Security-Policy,default-src%20%27none%27)` | PASS    | `{}`             |
| `Same-origin 'fetch()' in http:`                                                                                   | PASS    | `{}`             |
| `Same-origin XHR in http:`                                                                                         | PASS    | `{}`             |
| `Cross-origin 'fetch()' in http:`                                                                                  | PASS    | `{}`             |
| `Cross-origin XHR in http:`                                                                                        | TIMEOUT | `Test timed out` |
| `Same-origin => cross-origin 'fetch()' in http:`                                                                   | PASS    | `{}`             |
| `Same-origin 'fetch()' in http:?pipe=sub|header(Content-Security-Policy,connect-src%20*)`                          | PASS    | `{}`             |
| `Same-origin XHR in http:?pipe=sub|header(Content-Security-Policy,connect-src%20*)`                                | PASS    | `{}`             |
| `Cross-origin 'fetch()' in http:?pipe=sub|header(Content-Security-Policy,connect-src%20*)`                         | PASS    | `{}`             |
| `Cross-origin XHR in http:?pipe=sub|header(Content-Security-Policy,connect-src%20*)`                               | TIMEOUT | `Test timed out` |
| `Same-origin => cross-origin 'fetch()' in http:?pipe=sub|header(Content-Security-Policy,connect-src%20*)`          | PASS    | `{}`             |
| `Same-origin 'fetch()' in blob:`                                                                                   | PASS    | `{}`             |
| `Same-origin XHR in blob:`                                                                                         | PASS    | `{}`             |
| `Cross-origin 'fetch()' in blob:`                                                                                  | PASS    | `{}`             |
| `Cross-origin XHR in blob:`                                                                                        | TIMEOUT | `Test timed out` |
| `Same-origin => cross-origin 'fetch()' in blob:`                                                                   | PASS    | `{}`             |
| `Same-origin 'fetch()' in filesystem:`                                                                             | PASS    | `{}`             |
| `Same-origin XHR in filesystem:`                                                                                   | PASS    | `{}`             |
| `Cross-origin 'fetch()' in filesystem:`                                                                            | PASS    | `{}`             |
| `Cross-origin XHR in filesystem:`                                                                                  | TIMEOUT | `Test timed out` |
| `Same-origin => cross-origin 'fetch()' in filesystem:`                                                             | PASS    | `{}`             |

</details>
<details>
<summary><a href="http://w3c-test.org/submissions/5205/content-security-policy/inside-worker/shared-inheritance.html">/content-security-policy/inside-worker/shared-inheritance.html</a></summary>


|                                                      Subtest                                                       | Results |     Messages     |
|--------------------------------------------------------------------------------------------------------------------|---------|------------------|
|                                                                                                                    | TIMEOUT |                  |
| `Same-origin 'fetch()' in http:?pipe=sub|header(Content-Security-Policy,default-src%20%27self%27)`                 | PASS    | `{}`             |
| `Same-origin XHR in http:?pipe=sub|header(Content-Security-Policy,default-src%20%27self%27)`                       | PASS    | `{}`             |
| `Cross-origin 'fetch()' in http:?pipe=sub|header(Content-Security-Policy,default-src%20%27self%27)`                | PASS    | `{}`             |
| `Cross-origin XHR in http:?pipe=sub|header(Content-Security-Policy,default-src%20%27self%27)`                      | TIMEOUT | `Test timed out` |
| `Same-origin => cross-origin 'fetch()' in http:?pipe=sub|header(Content-Security-Policy,default-src%20%27self%27)` | PASS    | `{}`             |
| `Same-origin 'fetch()' in http:`                                                                                   | PASS    | `{}`             |
| `Same-origin XHR in http:`                                                                                         | PASS    | `{}`             |
| `Cross-origin 'fetch()' in http:`                                                                                  | PASS    | `{}`             |
| `Cross-origin XHR in http:`                                                                                        | PASS    | `{}`             |
| `Same-origin => cross-origin 'fetch()' in http:`                                                                   | PASS    | `{}`             |
| `Same-origin 'fetch()' in http:?pipe=sub|header(Content-Security-Policy,connect-src%20%27self%27)`                 | PASS    | `{}`             |
| `Same-origin XHR in http:?pipe=sub|header(Content-Security-Policy,connect-src%20%27self%27)`                       | PASS    | `{}`             |
| `Cross-origin 'fetch()' in http:?pipe=sub|header(Content-Security-Policy,connect-src%20%27self%27)`                | PASS    | `{}`             |
| `Cross-origin XHR in http:?pipe=sub|header(Content-Security-Policy,connect-src%20%27self%27)`                      | TIMEOUT | `Test timed out` |
| `Same-origin => cross-origin 'fetch()' in http:?pipe=sub|header(Content-Security-Policy,connect-src%20%27self%27)` | PASS    | `{}`             |

</details>
<details>
<summary><a href="http://w3c-test.org/submissions/5205/webrtc/rtcpeerconnection/rtcconfiguration-icecandidatepoolsize.html">/webrtc/rtcpeerconnection/rtcconfiguration-icecandidatepoolsize.html</a></summary>


|                          Subtest                           | Results |                 Messages                |
|------------------------------------------------------------|---------|-----------------------------------------|
|                                                            | OK      |                                         |
| `Setting iceCandidatePoolSize to a valid value: 10`        | FAIL    | `pc.getConfiguration is not a function` |
| `Setting iceCandidatePoolSize to a valid value: 0`         | FAIL    | `pc.getConfiguration is not a function` |
| `Setting iceCandidatePoolSize to a valid value: null`      | FAIL    | `pc.getConfiguration is not a function` |
| `Setting iceCandidatePoolSize to a valid value: undefined` | FAIL    | `pc.getConfiguration is not a function` |
| `Setting iceCandidatePoolSize to an invalid value: -1`     | PASS    |                                         |
| `Setting iceCandidatePoolSize to an invalid value: 1000`   | PASS    |                                         |
| `Setting iceCandidatePoolSize to an invalid value: string` | PASS    |                                         |

</details>
</details>

View on GitHub: https://github.com/w3c/web-platform-tests/pull/5205#issuecomment-288547098

Received on Wednesday, 22 March 2017 21:34:58 UTC