[LayoutTests] Convert http/tests/resources/redirect.php to Python
https://bugs.webkit.org/show_bug.cgi?id=221784
<rdar://problem/74257227>
Patch by Jonathan Bedard <JonWBedard@gmail.com> on 2021-02-16
Reviewed by Dewei Zhu.
* http/tests/appcache/decide-navigation-policy-after-delay.html:
* http/tests/appcache/interrupted-update.html:
* http/tests/appcache/main-resource-redirect-with-sw.html:
* http/tests/contentextensions/main-resource-redirect-error-expected.txt:
* http/tests/contentextensions/main-resource-redirect-error.html:
* http/tests/contentextensions/sync-xhr-redirection-blocked-expected.txt:
* http/tests/contentextensions/sync-xhr-redirection-blocked.html:
* http/tests/contentfiltering/allow-after-redirect.html:
* http/tests/contentfiltering/block-after-redirect.html:
* http/tests/contentfiltering/load-substitute-data-from-appcache.html:
* http/tests/contentfiltering/modify-redirect-request-url.html:
* http/tests/cookies/same-site/fetch-after-top-level-cross-origin-redirect.html:
* http/tests/cookies/same-site/fetch-after-top-level-same-origin-redirect.html:
* http/tests/cookies/same-site/popup-same-site-via-cross-site-redirect.html:
* http/tests/cookies/same-site/popup-same-site-via-same-site-redirect.html:
* http/tests/cookies/same-site/user-load-cross-site-redirect.php:
* http/tests/css/css-imports-redirect-cycle.css:
* http/tests/css/css-imports-url-fragment.css:
* http/tests/download/anchor-download-redirect.html:
* http/tests/globalhistory/history-delegate-basic-302-redirect-expected.txt:
* http/tests/globalhistory/history-delegate-basic-302-redirect.html:
* http/tests/globalhistory/history-delegate-basic-refresh-redirect-expected.txt:
* http/tests/globalhistory/history-delegate-basic-refresh-redirect.html:
* http/tests/misc/form-submit-file-cross-site-redirect.html:
* http/tests/misc/webtiming-two-redirects.php:
* http/tests/plugins/get-url-redirect-notify.html:
* http/tests/resources/redirect.php: Removed.
* http/tests/resources/redirect.py: Added.
(addCacheControl):
* http/tests/security/beforeload-iframe-server-redirect.html:
* http/tests/security/blocked-on-redirect-expected.txt:
* http/tests/security/blocked-on-redirect.html:
* http/tests/security/cannot-read-cssrules-redirect.html:
* http/tests/security/canvas-remote-read-data-url-image-redirect.html:
* http/tests/security/canvas-remote-read-redirect-to-remote-image.html:
* http/tests/security/canvas-remote-read-remote-image-redirect.html:
* http/tests/security/canvas-remote-read-remote-video-redirect.html:
* http/tests/security/contentSecurityPolicy/audio-redirect-allowed.html:
* http/tests/security/contentSecurityPolicy/audio-redirect-allowed2.html:
* http/tests/security/contentSecurityPolicy/audio-redirect-blocked.html:
* http/tests/security/contentSecurityPolicy/block-all-mixed-content/resources/frame-with-secure-image-after-upgrade-redirect.html:
* http/tests/security/contentSecurityPolicy/embed-redirect-allowed.html:
* http/tests/security/contentSecurityPolicy/embed-redirect-allowed2.html:
* http/tests/security/contentSecurityPolicy/embed-redirect-blocked.html:
* http/tests/security/contentSecurityPolicy/embed-redirect-blocked2.html:
* http/tests/security/contentSecurityPolicy/embed-redirect-blocked3.html:
* http/tests/security/contentSecurityPolicy/font-redirect-allowed.html:
* http/tests/security/contentSecurityPolicy/font-redirect-allowed2.html:
* http/tests/security/contentSecurityPolicy/font-redirect-blocked.html:
* http/tests/security/contentSecurityPolicy/form-action-src-redirect-allowed.html:
* http/tests/security/contentSecurityPolicy/form-action-src-redirect-allowed2.html:
* http/tests/security/contentSecurityPolicy/frame-src-redirect-blocked.html:
* http/tests/security/contentSecurityPolicy/iframe-redirect-allowed-by-child-src.html:
* http/tests/security/contentSecurityPolicy/iframe-redirect-allowed-by-child-src2.html:
* http/tests/security/contentSecurityPolicy/iframe-redirect-allowed-by-frame-src.html:
* http/tests/security/contentSecurityPolicy/iframe-redirect-allowed-by-frame-src2.html:
* http/tests/security/contentSecurityPolicy/iframe-redirect-blocked-by-child-src.html:
* http/tests/security/contentSecurityPolicy/iframe-redirect-blocked-by-frame-src.html:
* http/tests/security/contentSecurityPolicy/image-redirect-allowed.html:
* http/tests/security/contentSecurityPolicy/image-redirect-allowed2.html:
* http/tests/security/contentSecurityPolicy/image-redirect-blocked.html:
* http/tests/security/contentSecurityPolicy/object-redirect-allowed.html:
* http/tests/security/contentSecurityPolicy/object-redirect-allowed2.html:
* http/tests/security/contentSecurityPolicy/object-redirect-blocked.html:
* http/tests/security/contentSecurityPolicy/object-redirect-blocked2.html:
* http/tests/security/contentSecurityPolicy/object-redirect-blocked3.html:
* http/tests/security/contentSecurityPolicy/resources/xsl-redirect-allowed.php:
* http/tests/security/contentSecurityPolicy/resources/xsl-redirect-blocked.php:
* http/tests/security/contentSecurityPolicy/script-redirect-allowed.html:
* http/tests/security/contentSecurityPolicy/script-redirect-allowed2.html:
* http/tests/security/contentSecurityPolicy/script-redirect-blocked.html:
* http/tests/security/contentSecurityPolicy/stylesheet-redirect-allowed.html:
* http/tests/security/contentSecurityPolicy/stylesheet-redirect-allowed2.html:
* http/tests/security/contentSecurityPolicy/stylesheet-redirect-blocked.html:
* http/tests/security/contentSecurityPolicy/svg-font-redirect-allowed.html:
* http/tests/security/contentSecurityPolicy/svg-font-redirect-allowed2.html:
* http/tests/security/contentSecurityPolicy/svg-font-redirect-blocked.html:
* http/tests/security/contentSecurityPolicy/svg-image-redirect-allowed.html:
* http/tests/security/contentSecurityPolicy/svg-image-redirect-allowed2.html:
* http/tests/security/contentSecurityPolicy/svg-image-redirect-blocked.html:
* http/tests/security/contentSecurityPolicy/track-redirect-allowed.html:
* http/tests/security/contentSecurityPolicy/track-redirect-allowed2.html:
* http/tests/security/contentSecurityPolicy/track-redirect-blocked.html:
* http/tests/security/contentSecurityPolicy/upgrade-insecure-requests/basic-upgrade-after-redirect.https.html:
* http/tests/security/contentSecurityPolicy/upgrade-insecure-requests/resources/frame-with-redirect-http-to-https-script.html:
* http/tests/security/contentSecurityPolicy/upgrade-insecure-requests/resources/frame-with-redirect-https-to-http-script.html:
* http/tests/security/contentSecurityPolicy/upgrade-insecure-requests/resources/insecure-sync-xhr-in-main-frame-window.html:
* http/tests/security/contentSecurityPolicy/userAgentShadowDOM/allow-image-after-redirect.html:
* http/tests/security/contentSecurityPolicy/video-redirect-allowed.html:
* http/tests/security/contentSecurityPolicy/video-redirect-allowed2.html:
* http/tests/security/contentSecurityPolicy/video-redirect-blocked.html:
* http/tests/security/contentSecurityPolicy/worker-redirect-allowed-expected.txt:
* http/tests/security/contentSecurityPolicy/worker-redirect-allowed.html:
* http/tests/security/contentSecurityPolicy/xsl-redirect-allowed.html:
* http/tests/security/contentSecurityPolicy/xsl-redirect-allowed2.html:
* http/tests/security/cors-post-redirect-301.html:
* http/tests/security/cors-post-redirect-302.html:
* http/tests/security/cors-post-redirect-303.html:
* http/tests/security/cors-post-redirect-307-pson.html:
* http/tests/security/cors-post-redirect-307.html:
* http/tests/security/cors-post-redirect-308.html:
* http/tests/security/cross-origin-css-1-expected.txt:
* http/tests/security/cross-origin-css-1.html:
* http/tests/security/cross-origin-css-2-expected.txt:
* http/tests/security/cross-origin-css-2.html:
* http/tests/security/cross-origin-css-3.html:
* http/tests/security/cross-origin-css-5-expected.txt:
* http/tests/security/cross-origin-css-5.html:
* http/tests/security/cross-origin-css-6.html:
* http/tests/security/cross-origin-css-in-quirks-1-expected.txt:
* http/tests/security/cross-origin-css-in-quirks-1.html:
* http/tests/security/cross-origin-css-in-quirks-2-expected.txt:
* http/tests/security/cross-origin-css-in-quirks-2.html:
* http/tests/security/cross-origin-css-in-quirks-3.html:
* http/tests/security/cross-origin-css-in-quirks-5-expected.txt:
* http/tests/security/cross-origin-css-in-quirks-5.html:
* http/tests/security/cross-origin-css-in-quirks-6.html:
* http/tests/security/cross-origin-script-error-event-redirected.html:
* http/tests/security/cross-origin-script-window-onerror-redirected.html:
* http/tests/security/load-image-after-redirection-2-expected.txt:
* http/tests/security/load-image-after-redirection-2.html:
* http/tests/security/load-image-after-redirection-expected.txt:
* http/tests/security/load-image-after-redirection.html:
* http/tests/security/mixedContent/insecure-image-redirects-to-basic-auth-secure-image-allowCrossOriginSubresourcesToAskForCredentials-expected.txt:
* http/tests/security/mixedContent/insecure-image-redirects-to-basic-auth-secure-image-expected.txt:
* http/tests/security/mixedContent/insecure-script-redirects-to-basic-auth-secure-script-expected.https.txt:
* http/tests/security/mixedContent/insecure-script-redirects-to-basic-auth-secure-script-expected.txt:
* http/tests/security/mixedContent/insecure-stylesheet-redirects-to-basic-auth-secure-stylesheet-expected.txt:
* http/tests/security/mixedContent/redirect-http-to-https-iframe-in-main-frame-expected.txt:
* http/tests/security/mixedContent/redirect-http-to-https-script-in-iframe-expected.txt:
* http/tests/security/mixedContent/resources/frame-with-insecure-image-redirects-to-basic-auth-secure-image.html:
* http/tests/security/mixedContent/resources/frame-with-insecure-script-redirects-to-basic-auth-secure-script.html:
* http/tests/security/mixedContent/resources/frame-with-insecure-stylesheet-redirects-to-basic-auth-secure-stylesheet.html:
* http/tests/security/mixedContent/resources/frame-with-programmatically-added-insecure-image-redirects-to-basic-auth-secure-image.html:
* http/tests/security/mixedContent/resources/frame-with-redirect-http-to-https-frame.html:
* http/tests/security/mixedContent/resources/frame-with-redirect-http-to-https-script.html:
* http/tests/security/mixedContent/resources/frame-with-redirect-https-to-http-frame.html:
* http/tests/security/mixedContent/resources/frame-with-redirect-https-to-http-image-secure-cookie-block.html:
* http/tests/security/mixedContent/resources/frame-with-redirect-https-to-http-image-secure-cookie.html:
* http/tests/security/mixedContent/resources/frame-with-redirect-https-to-http-script.html:
* http/tests/security/mixedContent/secure-page-navigates-to-basic-auth-secure-page-via-insecure-redirect.https-expected.txt:
* http/tests/security/mixedContent/secure-page-navigates-to-basic-auth-secure-page-via-insecure-redirect.https.html:
* http/tests/security/mixedContent/secure-redirect-to-insecure-redirect-to-basic-auth-secure-image-allowCrossOriginSubresourcesToAskForCredentials.https-expected.txt:
* http/tests/security/mixedContent/secure-redirect-to-insecure-redirect-to-basic-auth-secure-image-allowCrossOriginSubresourcesToAskForCredentials.https.html:
* http/tests/security/mixedContent/secure-redirect-to-insecure-redirect-to-basic-auth-secure-image.https-expected.txt:
* http/tests/security/mixedContent/secure-redirect-to-insecure-redirect-to-basic-auth-secure-image.https.html:
* http/tests/security/mixedContent/secure-redirect-to-secure-redirect-to-basic-auth-insecure-image-allowCrossOriginSubresourcesToAskForCredentials.https-expected.txt:
* http/tests/security/mixedContent/secure-redirect-to-secure-redirect-to-basic-auth-insecure-image-allowCrossOriginSubresourcesToAskForCredentials.https.html:
* http/tests/security/mixedContent/secure-redirect-to-secure-redirect-to-basic-auth-insecure-image.https.html:
* http/tests/security/mixedContent/secure-redirect-to-secure-redirect-to-basic-auth-secure-image-allowCrossOriginSubresourcesToAskForCredentials.https-expected.txt:
* http/tests/security/mixedContent/secure-redirect-to-secure-redirect-to-basic-auth-secure-image-allowCrossOriginSubresourcesToAskForCredentials.https.html:
* http/tests/security/mixedContent/secure-redirect-to-secure-redirect-to-basic-auth-secure-image.https.html:
* http/tests/security/redirect-BLOCKED-to-localURL.html:
* http/tests/security/regress-52192.html:
* http/tests/security/resources/cross-origin-xsl-redirect.xml:
* http/tests/security/resources/referrer-policy-redirect-link-downgrade.html:
* http/tests/security/resources/referrer-policy-redirect-link.html:
* http/tests/security/resources/referrer-policy-redirect.html:
* http/tests/security/resources/xsl-using-document-redirect.xsl:
* http/tests/security/resources/xsl-using-external-entity-redirect.xsl:
* http/tests/security/same-origin-css-1-expected.txt:
* http/tests/security/same-origin-css-1.html:
* http/tests/security/same-origin-css-2-expected.txt:
* http/tests/security/same-origin-css-2.html:
* http/tests/security/same-origin-css-3.html:
* http/tests/security/same-origin-css-5-expected.txt:
* http/tests/security/same-origin-css-5.html:
* http/tests/security/same-origin-css-6.html:
* http/tests/security/same-origin-css-in-quirks.html:
* http/tests/security/shape-image-cors-redirect-error-message-logging-1.html:
* http/tests/security/shape-image-cors-redirect-error-message-logging-3.html:
* http/tests/security/shape-image-cors-redirect.html:
* http/tests/security/strip-referrer-to-origin-for-third-party-redirects-in-private-mode.html:
* http/tests/security/stylesheet-href-redirect-expected.txt:
* http/tests/security/stylesheet-href-redirect.html:
* http/tests/security/worker-cross-origin-expected.txt:
* http/tests/security/worker-cross-origin.html:
* http/tests/security/worker-same-origin-expected.txt:
* http/tests/security/worker-same-origin.html:
* http/tests/security/xss-DENIED-xsl-external-entity-redirect-expected.txt:
* http/tests/security/xssAuditor/block-does-not-leak-referrer.html:
* http/tests/security/xssAuditor/script-tag-open-redirect.html:
* http/tests/security/xssAuditor/script-tag-redirect.html:
* http/tests/workers/resources/worker-importScripts-error.js:
* http/tests/workers/resources/worker-importScripts.js:
* http/tests/workers/resources/worker-redirect.js:
* http/tests/xmlhttprequest/access-control-and-redirects-async-same-origin-expected.txt:
* http/tests/xmlhttprequest/access-control-and-redirects-async-same-origin.html:
* http/tests/xmlhttprequest/access-control-and-redirects-expected.txt:
* http/tests/xmlhttprequest/access-control-and-redirects.html:
* http/tests/xmlhttprequest/cross-origin-redirect-responseURL.html:
* http/tests/xmlhttprequest/redirect-cross-origin-2.html:
* http/tests/xmlhttprequest/redirect-cross-origin-post-sync.html:
* http/tests/xmlhttprequest/redirect-cross-origin-post.html:
* http/tests/xmlhttprequest/redirect-cross-origin-sync-double.html:
* http/tests/xmlhttprequest/redirect-cross-origin-sync.html:
* http/tests/xmlhttprequest/redirect-cross-origin-tripmine.html:
* http/tests/xmlhttprequest/redirect-cross-origin.html:
* http/tests/xmlhttprequest/xmlhttprequest-unsafe-redirect.html:
* platform/gtk/http/tests/security/xss-DENIED-xsl-external-entity-redirect-expected.txt:
* platform/mac-wk1/http/tests/security/worker-cross-origin-expected.txt:
* platform/mac-wk1/http/tests/xmlhttprequest/access-control-and-redirects-expected.txt:
* platform/win/http/tests/security/mixedContent/secure-redirect-to-secure-redirect-to-basic-auth-secure-image.https-expected.txt:
* platform/win/http/tests/security/worker-cross-origin-expected.txt:
* platform/win/http/tests/xmlhttprequest/access-control-and-redirects-expected.txt:
* platform/wk2/http/tests/security/blocked-on-redirect-expected.txt:
* platform/wk2/http/tests/security/mixedContent/insecure-image-redirects-to-basic-auth-secure-image-allowCrossOriginSubresourcesToAskForCredentials-expected.txt:
* platform/wk2/http/tests/security/mixedContent/redirect-http-to-https-iframe-in-main-frame-expected.txt:
* platform/wk2/http/tests/security/mixedContent/redirect-http-to-https-script-in-iframe-expected.txt:
* platform/wk2/http/tests/security/mixedContent/secure-redirect-to-insecure-redirect-to-basic-auth-secure-image-allowCrossOriginSubresourcesToAskForCredentials.https-expected.txt:
git-svn-id: http://svn.webkit.org/repository/webkit/trunk@272981 268f45cc-cd09-0410-ab3c-d52691b4dbfc
diff --git a/LayoutTests/ChangeLog b/LayoutTests/ChangeLog
index 5fddfda..89ac370 100644
--- a/LayoutTests/ChangeLog
+++ b/LayoutTests/ChangeLog
@@ -1,3 +1,222 @@
+2021-02-16 Jonathan Bedard <JonWBedard@gmail.com>
+
+ [LayoutTests] Convert http/tests/resources/redirect.php to Python
+ https://bugs.webkit.org/show_bug.cgi?id=221784
+ <rdar://problem/74257227>
+
+ Reviewed by Dewei Zhu.
+
+ * http/tests/appcache/decide-navigation-policy-after-delay.html:
+ * http/tests/appcache/interrupted-update.html:
+ * http/tests/appcache/main-resource-redirect-with-sw.html:
+ * http/tests/contentextensions/main-resource-redirect-error-expected.txt:
+ * http/tests/contentextensions/main-resource-redirect-error.html:
+ * http/tests/contentextensions/sync-xhr-redirection-blocked-expected.txt:
+ * http/tests/contentextensions/sync-xhr-redirection-blocked.html:
+ * http/tests/contentfiltering/allow-after-redirect.html:
+ * http/tests/contentfiltering/block-after-redirect.html:
+ * http/tests/contentfiltering/load-substitute-data-from-appcache.html:
+ * http/tests/contentfiltering/modify-redirect-request-url.html:
+ * http/tests/cookies/same-site/fetch-after-top-level-cross-origin-redirect.html:
+ * http/tests/cookies/same-site/fetch-after-top-level-same-origin-redirect.html:
+ * http/tests/cookies/same-site/popup-same-site-via-cross-site-redirect.html:
+ * http/tests/cookies/same-site/popup-same-site-via-same-site-redirect.html:
+ * http/tests/cookies/same-site/user-load-cross-site-redirect.php:
+ * http/tests/css/css-imports-redirect-cycle.css:
+ * http/tests/css/css-imports-url-fragment.css:
+ * http/tests/download/anchor-download-redirect.html:
+ * http/tests/globalhistory/history-delegate-basic-302-redirect-expected.txt:
+ * http/tests/globalhistory/history-delegate-basic-302-redirect.html:
+ * http/tests/globalhistory/history-delegate-basic-refresh-redirect-expected.txt:
+ * http/tests/globalhistory/history-delegate-basic-refresh-redirect.html:
+ * http/tests/misc/form-submit-file-cross-site-redirect.html:
+ * http/tests/misc/webtiming-two-redirects.php:
+ * http/tests/plugins/get-url-redirect-notify.html:
+ * http/tests/resources/redirect.php: Removed.
+ * http/tests/resources/redirect.py: Added.
+ (addCacheControl):
+ * http/tests/security/beforeload-iframe-server-redirect.html:
+ * http/tests/security/blocked-on-redirect-expected.txt:
+ * http/tests/security/blocked-on-redirect.html:
+ * http/tests/security/cannot-read-cssrules-redirect.html:
+ * http/tests/security/canvas-remote-read-data-url-image-redirect.html:
+ * http/tests/security/canvas-remote-read-redirect-to-remote-image.html:
+ * http/tests/security/canvas-remote-read-remote-image-redirect.html:
+ * http/tests/security/canvas-remote-read-remote-video-redirect.html:
+ * http/tests/security/contentSecurityPolicy/audio-redirect-allowed.html:
+ * http/tests/security/contentSecurityPolicy/audio-redirect-allowed2.html:
+ * http/tests/security/contentSecurityPolicy/audio-redirect-blocked.html:
+ * http/tests/security/contentSecurityPolicy/block-all-mixed-content/resources/frame-with-secure-image-after-upgrade-redirect.html:
+ * http/tests/security/contentSecurityPolicy/embed-redirect-allowed.html:
+ * http/tests/security/contentSecurityPolicy/embed-redirect-allowed2.html:
+ * http/tests/security/contentSecurityPolicy/embed-redirect-blocked.html:
+ * http/tests/security/contentSecurityPolicy/embed-redirect-blocked2.html:
+ * http/tests/security/contentSecurityPolicy/embed-redirect-blocked3.html:
+ * http/tests/security/contentSecurityPolicy/font-redirect-allowed.html:
+ * http/tests/security/contentSecurityPolicy/font-redirect-allowed2.html:
+ * http/tests/security/contentSecurityPolicy/font-redirect-blocked.html:
+ * http/tests/security/contentSecurityPolicy/form-action-src-redirect-allowed.html:
+ * http/tests/security/contentSecurityPolicy/form-action-src-redirect-allowed2.html:
+ * http/tests/security/contentSecurityPolicy/frame-src-redirect-blocked.html:
+ * http/tests/security/contentSecurityPolicy/iframe-redirect-allowed-by-child-src.html:
+ * http/tests/security/contentSecurityPolicy/iframe-redirect-allowed-by-child-src2.html:
+ * http/tests/security/contentSecurityPolicy/iframe-redirect-allowed-by-frame-src.html:
+ * http/tests/security/contentSecurityPolicy/iframe-redirect-allowed-by-frame-src2.html:
+ * http/tests/security/contentSecurityPolicy/iframe-redirect-blocked-by-child-src.html:
+ * http/tests/security/contentSecurityPolicy/iframe-redirect-blocked-by-frame-src.html:
+ * http/tests/security/contentSecurityPolicy/image-redirect-allowed.html:
+ * http/tests/security/contentSecurityPolicy/image-redirect-allowed2.html:
+ * http/tests/security/contentSecurityPolicy/image-redirect-blocked.html:
+ * http/tests/security/contentSecurityPolicy/object-redirect-allowed.html:
+ * http/tests/security/contentSecurityPolicy/object-redirect-allowed2.html:
+ * http/tests/security/contentSecurityPolicy/object-redirect-blocked.html:
+ * http/tests/security/contentSecurityPolicy/object-redirect-blocked2.html:
+ * http/tests/security/contentSecurityPolicy/object-redirect-blocked3.html:
+ * http/tests/security/contentSecurityPolicy/resources/xsl-redirect-allowed.php:
+ * http/tests/security/contentSecurityPolicy/resources/xsl-redirect-blocked.php:
+ * http/tests/security/contentSecurityPolicy/script-redirect-allowed.html:
+ * http/tests/security/contentSecurityPolicy/script-redirect-allowed2.html:
+ * http/tests/security/contentSecurityPolicy/script-redirect-blocked.html:
+ * http/tests/security/contentSecurityPolicy/stylesheet-redirect-allowed.html:
+ * http/tests/security/contentSecurityPolicy/stylesheet-redirect-allowed2.html:
+ * http/tests/security/contentSecurityPolicy/stylesheet-redirect-blocked.html:
+ * http/tests/security/contentSecurityPolicy/svg-font-redirect-allowed.html:
+ * http/tests/security/contentSecurityPolicy/svg-font-redirect-allowed2.html:
+ * http/tests/security/contentSecurityPolicy/svg-font-redirect-blocked.html:
+ * http/tests/security/contentSecurityPolicy/svg-image-redirect-allowed.html:
+ * http/tests/security/contentSecurityPolicy/svg-image-redirect-allowed2.html:
+ * http/tests/security/contentSecurityPolicy/svg-image-redirect-blocked.html:
+ * http/tests/security/contentSecurityPolicy/track-redirect-allowed.html:
+ * http/tests/security/contentSecurityPolicy/track-redirect-allowed2.html:
+ * http/tests/security/contentSecurityPolicy/track-redirect-blocked.html:
+ * http/tests/security/contentSecurityPolicy/upgrade-insecure-requests/basic-upgrade-after-redirect.https.html:
+ * http/tests/security/contentSecurityPolicy/upgrade-insecure-requests/resources/frame-with-redirect-http-to-https-script.html:
+ * http/tests/security/contentSecurityPolicy/upgrade-insecure-requests/resources/frame-with-redirect-https-to-http-script.html:
+ * http/tests/security/contentSecurityPolicy/upgrade-insecure-requests/resources/insecure-sync-xhr-in-main-frame-window.html:
+ * http/tests/security/contentSecurityPolicy/userAgentShadowDOM/allow-image-after-redirect.html:
+ * http/tests/security/contentSecurityPolicy/video-redirect-allowed.html:
+ * http/tests/security/contentSecurityPolicy/video-redirect-allowed2.html:
+ * http/tests/security/contentSecurityPolicy/video-redirect-blocked.html:
+ * http/tests/security/contentSecurityPolicy/worker-redirect-allowed-expected.txt:
+ * http/tests/security/contentSecurityPolicy/worker-redirect-allowed.html:
+ * http/tests/security/contentSecurityPolicy/xsl-redirect-allowed.html:
+ * http/tests/security/contentSecurityPolicy/xsl-redirect-allowed2.html:
+ * http/tests/security/cors-post-redirect-301.html:
+ * http/tests/security/cors-post-redirect-302.html:
+ * http/tests/security/cors-post-redirect-303.html:
+ * http/tests/security/cors-post-redirect-307-pson.html:
+ * http/tests/security/cors-post-redirect-307.html:
+ * http/tests/security/cors-post-redirect-308.html:
+ * http/tests/security/cross-origin-css-1-expected.txt:
+ * http/tests/security/cross-origin-css-1.html:
+ * http/tests/security/cross-origin-css-2-expected.txt:
+ * http/tests/security/cross-origin-css-2.html:
+ * http/tests/security/cross-origin-css-3.html:
+ * http/tests/security/cross-origin-css-5-expected.txt:
+ * http/tests/security/cross-origin-css-5.html:
+ * http/tests/security/cross-origin-css-6.html:
+ * http/tests/security/cross-origin-css-in-quirks-1-expected.txt:
+ * http/tests/security/cross-origin-css-in-quirks-1.html:
+ * http/tests/security/cross-origin-css-in-quirks-2-expected.txt:
+ * http/tests/security/cross-origin-css-in-quirks-2.html:
+ * http/tests/security/cross-origin-css-in-quirks-3.html:
+ * http/tests/security/cross-origin-css-in-quirks-5-expected.txt:
+ * http/tests/security/cross-origin-css-in-quirks-5.html:
+ * http/tests/security/cross-origin-css-in-quirks-6.html:
+ * http/tests/security/cross-origin-script-error-event-redirected.html:
+ * http/tests/security/cross-origin-script-window-onerror-redirected.html:
+ * http/tests/security/load-image-after-redirection-2-expected.txt:
+ * http/tests/security/load-image-after-redirection-2.html:
+ * http/tests/security/load-image-after-redirection-expected.txt:
+ * http/tests/security/load-image-after-redirection.html:
+ * http/tests/security/mixedContent/insecure-image-redirects-to-basic-auth-secure-image-allowCrossOriginSubresourcesToAskForCredentials-expected.txt:
+ * http/tests/security/mixedContent/insecure-image-redirects-to-basic-auth-secure-image-expected.txt:
+ * http/tests/security/mixedContent/insecure-script-redirects-to-basic-auth-secure-script-expected.https.txt:
+ * http/tests/security/mixedContent/insecure-script-redirects-to-basic-auth-secure-script-expected.txt:
+ * http/tests/security/mixedContent/insecure-stylesheet-redirects-to-basic-auth-secure-stylesheet-expected.txt:
+ * http/tests/security/mixedContent/redirect-http-to-https-iframe-in-main-frame-expected.txt:
+ * http/tests/security/mixedContent/redirect-http-to-https-script-in-iframe-expected.txt:
+ * http/tests/security/mixedContent/resources/frame-with-insecure-image-redirects-to-basic-auth-secure-image.html:
+ * http/tests/security/mixedContent/resources/frame-with-insecure-script-redirects-to-basic-auth-secure-script.html:
+ * http/tests/security/mixedContent/resources/frame-with-insecure-stylesheet-redirects-to-basic-auth-secure-stylesheet.html:
+ * http/tests/security/mixedContent/resources/frame-with-programmatically-added-insecure-image-redirects-to-basic-auth-secure-image.html:
+ * http/tests/security/mixedContent/resources/frame-with-redirect-http-to-https-frame.html:
+ * http/tests/security/mixedContent/resources/frame-with-redirect-http-to-https-script.html:
+ * http/tests/security/mixedContent/resources/frame-with-redirect-https-to-http-frame.html:
+ * http/tests/security/mixedContent/resources/frame-with-redirect-https-to-http-image-secure-cookie-block.html:
+ * http/tests/security/mixedContent/resources/frame-with-redirect-https-to-http-image-secure-cookie.html:
+ * http/tests/security/mixedContent/resources/frame-with-redirect-https-to-http-script.html:
+ * http/tests/security/mixedContent/secure-page-navigates-to-basic-auth-secure-page-via-insecure-redirect.https-expected.txt:
+ * http/tests/security/mixedContent/secure-page-navigates-to-basic-auth-secure-page-via-insecure-redirect.https.html:
+ * http/tests/security/mixedContent/secure-redirect-to-insecure-redirect-to-basic-auth-secure-image-allowCrossOriginSubresourcesToAskForCredentials.https-expected.txt:
+ * http/tests/security/mixedContent/secure-redirect-to-insecure-redirect-to-basic-auth-secure-image-allowCrossOriginSubresourcesToAskForCredentials.https.html:
+ * http/tests/security/mixedContent/secure-redirect-to-insecure-redirect-to-basic-auth-secure-image.https-expected.txt:
+ * http/tests/security/mixedContent/secure-redirect-to-insecure-redirect-to-basic-auth-secure-image.https.html:
+ * http/tests/security/mixedContent/secure-redirect-to-secure-redirect-to-basic-auth-insecure-image-allowCrossOriginSubresourcesToAskForCredentials.https-expected.txt:
+ * http/tests/security/mixedContent/secure-redirect-to-secure-redirect-to-basic-auth-insecure-image-allowCrossOriginSubresourcesToAskForCredentials.https.html:
+ * http/tests/security/mixedContent/secure-redirect-to-secure-redirect-to-basic-auth-insecure-image.https.html:
+ * http/tests/security/mixedContent/secure-redirect-to-secure-redirect-to-basic-auth-secure-image-allowCrossOriginSubresourcesToAskForCredentials.https-expected.txt:
+ * http/tests/security/mixedContent/secure-redirect-to-secure-redirect-to-basic-auth-secure-image-allowCrossOriginSubresourcesToAskForCredentials.https.html:
+ * http/tests/security/mixedContent/secure-redirect-to-secure-redirect-to-basic-auth-secure-image.https.html:
+ * http/tests/security/redirect-BLOCKED-to-localURL.html:
+ * http/tests/security/regress-52192.html:
+ * http/tests/security/resources/cross-origin-xsl-redirect.xml:
+ * http/tests/security/resources/referrer-policy-redirect-link-downgrade.html:
+ * http/tests/security/resources/referrer-policy-redirect-link.html:
+ * http/tests/security/resources/referrer-policy-redirect.html:
+ * http/tests/security/resources/xsl-using-document-redirect.xsl:
+ * http/tests/security/resources/xsl-using-external-entity-redirect.xsl:
+ * http/tests/security/same-origin-css-1-expected.txt:
+ * http/tests/security/same-origin-css-1.html:
+ * http/tests/security/same-origin-css-2-expected.txt:
+ * http/tests/security/same-origin-css-2.html:
+ * http/tests/security/same-origin-css-3.html:
+ * http/tests/security/same-origin-css-5-expected.txt:
+ * http/tests/security/same-origin-css-5.html:
+ * http/tests/security/same-origin-css-6.html:
+ * http/tests/security/same-origin-css-in-quirks.html:
+ * http/tests/security/shape-image-cors-redirect-error-message-logging-1.html:
+ * http/tests/security/shape-image-cors-redirect-error-message-logging-3.html:
+ * http/tests/security/shape-image-cors-redirect.html:
+ * http/tests/security/strip-referrer-to-origin-for-third-party-redirects-in-private-mode.html:
+ * http/tests/security/stylesheet-href-redirect-expected.txt:
+ * http/tests/security/stylesheet-href-redirect.html:
+ * http/tests/security/worker-cross-origin-expected.txt:
+ * http/tests/security/worker-cross-origin.html:
+ * http/tests/security/worker-same-origin-expected.txt:
+ * http/tests/security/worker-same-origin.html:
+ * http/tests/security/xss-DENIED-xsl-external-entity-redirect-expected.txt:
+ * http/tests/security/xssAuditor/block-does-not-leak-referrer.html:
+ * http/tests/security/xssAuditor/script-tag-open-redirect.html:
+ * http/tests/security/xssAuditor/script-tag-redirect.html:
+ * http/tests/workers/resources/worker-importScripts-error.js:
+ * http/tests/workers/resources/worker-importScripts.js:
+ * http/tests/workers/resources/worker-redirect.js:
+ * http/tests/xmlhttprequest/access-control-and-redirects-async-same-origin-expected.txt:
+ * http/tests/xmlhttprequest/access-control-and-redirects-async-same-origin.html:
+ * http/tests/xmlhttprequest/access-control-and-redirects-expected.txt:
+ * http/tests/xmlhttprequest/access-control-and-redirects.html:
+ * http/tests/xmlhttprequest/cross-origin-redirect-responseURL.html:
+ * http/tests/xmlhttprequest/redirect-cross-origin-2.html:
+ * http/tests/xmlhttprequest/redirect-cross-origin-post-sync.html:
+ * http/tests/xmlhttprequest/redirect-cross-origin-post.html:
+ * http/tests/xmlhttprequest/redirect-cross-origin-sync-double.html:
+ * http/tests/xmlhttprequest/redirect-cross-origin-sync.html:
+ * http/tests/xmlhttprequest/redirect-cross-origin-tripmine.html:
+ * http/tests/xmlhttprequest/redirect-cross-origin.html:
+ * http/tests/xmlhttprequest/xmlhttprequest-unsafe-redirect.html:
+ * platform/gtk/http/tests/security/xss-DENIED-xsl-external-entity-redirect-expected.txt:
+ * platform/mac-wk1/http/tests/security/worker-cross-origin-expected.txt:
+ * platform/mac-wk1/http/tests/xmlhttprequest/access-control-and-redirects-expected.txt:
+ * platform/win/http/tests/security/mixedContent/secure-redirect-to-secure-redirect-to-basic-auth-secure-image.https-expected.txt:
+ * platform/win/http/tests/security/worker-cross-origin-expected.txt:
+ * platform/win/http/tests/xmlhttprequest/access-control-and-redirects-expected.txt:
+ * platform/wk2/http/tests/security/blocked-on-redirect-expected.txt:
+ * platform/wk2/http/tests/security/mixedContent/insecure-image-redirects-to-basic-auth-secure-image-allowCrossOriginSubresourcesToAskForCredentials-expected.txt:
+ * platform/wk2/http/tests/security/mixedContent/redirect-http-to-https-iframe-in-main-frame-expected.txt:
+ * platform/wk2/http/tests/security/mixedContent/redirect-http-to-https-script-in-iframe-expected.txt:
+ * platform/wk2/http/tests/security/mixedContent/secure-redirect-to-insecure-redirect-to-basic-auth-secure-image-allowCrossOriginSubresourcesToAskForCredentials.https-expected.txt:
+
2021-02-16 Lauro Moura <lmoura@igalia.com>
[GLIB] Gardening GTK crashes and canvas failures
diff --git a/LayoutTests/http/tests/appcache/decide-navigation-policy-after-delay.html b/LayoutTests/http/tests/appcache/decide-navigation-policy-after-delay.html
index 2dd1a53..f1660ed 100644
--- a/LayoutTests/http/tests/appcache/decide-navigation-policy-after-delay.html
+++ b/LayoutTests/http/tests/appcache/decide-navigation-policy-after-delay.html
@@ -7,7 +7,7 @@
}
window.addEventListener("message", function() {
- frames[0].location = "/resources/redirect.php?url=/appcache/resources/decide-navigation-policy-after-delay-frame.html";
+ frames[0].location = "/resources/redirect.py?url=/appcache/resources/decide-navigation-policy-after-delay-frame.html";
});
</script>
<body>
diff --git a/LayoutTests/http/tests/appcache/interrupted-update.html b/LayoutTests/http/tests/appcache/interrupted-update.html
index 1f5e86a..9af5f26 100644
--- a/LayoutTests/http/tests/appcache/interrupted-update.html
+++ b/LayoutTests/http/tests/appcache/interrupted-update.html
@@ -33,7 +33,7 @@
if (!haveReloaded && event.loaded == 2) {
reloadedLocation = window.location + "#reloaded";
- window.location = "/resources/redirect.php?url=" + encodeURIComponent(reloadedLocation);
+ window.location = "/resources/redirect.py?url=" + encodeURIComponent(reloadedLocation);
console.log("Reloading...");
}
}
diff --git a/LayoutTests/http/tests/appcache/main-resource-redirect-with-sw.html b/LayoutTests/http/tests/appcache/main-resource-redirect-with-sw.html
index a71fc55..c73a861 100644
--- a/LayoutTests/http/tests/appcache/main-resource-redirect-with-sw.html
+++ b/LayoutTests/http/tests/appcache/main-resource-redirect-with-sw.html
@@ -30,7 +30,7 @@
applicationCache.oncached = null;
applicationCache.onnoupdate = null;
var iframe = document.createElement("iframe");
- iframe.setAttribute("src", "/resources/redirect.php?url=http://127.0.0.1:8000/appcache/resources/simple.txt");
+ iframe.setAttribute("src", "/resources/redirect.py?url=http://127.0.0.1:8000/appcache/resources/simple.txt");
document.body.appendChild(iframe);
iframe.onload = done;
}
diff --git a/LayoutTests/http/tests/contentextensions/main-resource-redirect-error-expected.txt b/LayoutTests/http/tests/contentextensions/main-resource-redirect-error-expected.txt
index 3350c11..5895408 100644
--- a/LayoutTests/http/tests/contentextensions/main-resource-redirect-error-expected.txt
+++ b/LayoutTests/http/tests/contentextensions/main-resource-redirect-error-expected.txt
@@ -3,7 +3,7 @@
main frame - didFinishLoadForFrame
http://127.0.0.1:8000/contentextensions/main-resource-redirect-error.html - didFinishLoading
main frame - didStartProvisionalLoadForFrame
-http://127.0.0.1:8000/resources/redirect.php?url=should-not-load.html - willSendRequest <NSURLRequest URL http://127.0.0.1:8000/resources/redirect.php?url=should-not-load.html, main document URL http://127.0.0.1:8000/resources/redirect.php?url=should-not-load.html, http method GET> redirectResponse (null)
+http://127.0.0.1:8000/resources/redirect.py?url=should-not-load.html - willSendRequest <NSURLRequest URL http://127.0.0.1:8000/resources/redirect.py?url=should-not-load.html, main document URL http://127.0.0.1:8000/resources/redirect.py?url=should-not-load.html, http method GET> redirectResponse (null)
CONSOLE MESSAGE: Content blocker prevented frame displaying http://127.0.0.1:8000/resources/should-not-load.html from loading a resource from http://127.0.0.1:8000/resources/should-not-load.html
main frame - didFailProvisionalLoadWithError
main frame - (kWKErrorCodeFrameLoadBlockedByContentBlocker)
diff --git a/LayoutTests/http/tests/contentextensions/main-resource-redirect-error.html b/LayoutTests/http/tests/contentextensions/main-resource-redirect-error.html
index ef23588..a049d19 100644
--- a/LayoutTests/http/tests/contentextensions/main-resource-redirect-error.html
+++ b/LayoutTests/http/tests/contentextensions/main-resource-redirect-error.html
@@ -4,6 +4,6 @@
testRunner.dumpResourceLoadCallbacks();
testRunner.dumpFrameLoadCallbacks();
testRunner.dumpAsText();
- testRunner.queueLoad("/resources/redirect.php?url=should-not-load.html");
+ testRunner.queueLoad("/resources/redirect.py?url=should-not-load.html");
}
</script>
diff --git a/LayoutTests/http/tests/contentextensions/sync-xhr-redirection-blocked-expected.txt b/LayoutTests/http/tests/contentextensions/sync-xhr-redirection-blocked-expected.txt
index 16dc31d..85963d9 100644
--- a/LayoutTests/http/tests/contentextensions/sync-xhr-redirection-blocked-expected.txt
+++ b/LayoutTests/http/tests/contentextensions/sync-xhr-redirection-blocked-expected.txt
@@ -1,5 +1,5 @@
-CONSOLE MESSAGE: Content blocker prevented frame displaying http://127.0.0.1:8000/contentextensions/sync-xhr-redirection-blocked.html from loading a resource from http://127.0.0.1:8000/resources/redirect.php?url=/contentextensions/resources/url-blocking-test.js
-CONSOLE MESSAGE: XMLHttpRequest cannot load http://127.0.0.1:8000/resources/redirect.php?url=/contentextensions/resources/url-blocking-test.js.
+CONSOLE MESSAGE: Content blocker prevented frame displaying http://127.0.0.1:8000/contentextensions/sync-xhr-redirection-blocked.html from loading a resource from http://127.0.0.1:8000/resources/redirect.py?url=/contentextensions/resources/url-blocking-test.js
+CONSOLE MESSAGE: XMLHttpRequest cannot load http://127.0.0.1:8000/resources/redirect.py?url=/contentextensions/resources/url-blocking-test.js.
Synchronous status: 0, readyState:1, responseText:
Synchronous status: 0, readyState:4, responseText:
Synchronous error: NetworkError: A network error occurred.
diff --git a/LayoutTests/http/tests/contentextensions/sync-xhr-redirection-blocked.html b/LayoutTests/http/tests/contentextensions/sync-xhr-redirection-blocked.html
index 6934ae7..936410f 100644
--- a/LayoutTests/http/tests/contentextensions/sync-xhr-redirection-blocked.html
+++ b/LayoutTests/http/tests/contentextensions/sync-xhr-redirection-blocked.html
@@ -17,7 +17,7 @@
log("Synchronous status: " + xhr.status + ", readyState:" + xhr.readyState + ", responseText: " + xhr.responseText);
}
- xhr.open("GET", "/resources/redirect.php?url=/contentextensions/resources/url-blocking-test.js", false);
+ xhr.open("GET", "/resources/redirect.py?url=/contentextensions/resources/url-blocking-test.js", false);
try {
xhr.send();
} catch (error) {
diff --git a/LayoutTests/http/tests/contentfiltering/allow-after-redirect.html b/LayoutTests/http/tests/contentfiltering/allow-after-redirect.html
index ac16734..6d6a928 100644
--- a/LayoutTests/http/tests/contentfiltering/allow-after-redirect.html
+++ b/LayoutTests/http/tests/contentfiltering/allow-after-redirect.html
@@ -9,4 +9,4 @@
}
</script>
<body>
-<iframe src="/resources/redirect.php?url=/contentfiltering/resources/pass.html"></iframe>
+<iframe src="/resources/redirect.py?url=/contentfiltering/resources/pass.html"></iframe>
diff --git a/LayoutTests/http/tests/contentfiltering/block-after-redirect.html b/LayoutTests/http/tests/contentfiltering/block-after-redirect.html
index 4c7b8c6..55a9caf 100644
--- a/LayoutTests/http/tests/contentfiltering/block-after-redirect.html
+++ b/LayoutTests/http/tests/contentfiltering/block-after-redirect.html
@@ -18,5 +18,5 @@
if (window.testRunner)
testRunner.notifyDone();
}, false);
-iframe.src = "/resources/redirect.php?url=/contentfiltering/resources/fail.html";
+iframe.src = "/resources/redirect.py?url=/contentfiltering/resources/fail.html";
</script>
diff --git a/LayoutTests/http/tests/contentfiltering/load-substitute-data-from-appcache.html b/LayoutTests/http/tests/contentfiltering/load-substitute-data-from-appcache.html
index 2abb92b..2684be9 100644
--- a/LayoutTests/http/tests/contentfiltering/load-substitute-data-from-appcache.html
+++ b/LayoutTests/http/tests/contentfiltering/load-substitute-data-from-appcache.html
@@ -14,7 +14,7 @@
}
window.addEventListener("message", function() {
- frames[0].location = "/resources/redirect.php?url=/contentfiltering/resources/appcache.html";
+ frames[0].location = "/resources/redirect.py?url=/contentfiltering/resources/appcache.html";
});
</script>
<body>
diff --git a/LayoutTests/http/tests/contentfiltering/modify-redirect-request-url.html b/LayoutTests/http/tests/contentfiltering/modify-redirect-request-url.html
index 7627db8..e379390 100644
--- a/LayoutTests/http/tests/contentfiltering/modify-redirect-request-url.html
+++ b/LayoutTests/http/tests/contentfiltering/modify-redirect-request-url.html
@@ -8,4 +8,4 @@
settings.modifiedRequestURL = "pass.html";
}
</script>
-<iframe src="/resources/redirect.php?url=/contentfiltering/resources/fail.html"></iframe>
+<iframe src="/resources/redirect.py?url=/contentfiltering/resources/fail.html"></iframe>
diff --git a/LayoutTests/http/tests/cookies/same-site/fetch-after-top-level-cross-origin-redirect.html b/LayoutTests/http/tests/cookies/same-site/fetch-after-top-level-cross-origin-redirect.html
index 3ac0072..b835171 100644
--- a/LayoutTests/http/tests/cookies/same-site/fetch-after-top-level-cross-origin-redirect.html
+++ b/LayoutTests/http/tests/cookies/same-site/fetch-after-top-level-cross-origin-redirect.html
@@ -11,7 +11,7 @@
await setCookie("implicit-strict", "19", {"SameSite": null, "Max-Age": 100, "path": "/"});
await setCookie("strict-because-invalid-SameSite-value", "19", {"SameSite": "invalid", "Max-Age": 100, "path": "/"});
await setCookie("lax", "19", {"SameSite": "Lax", "Max-Age": 100, "path": "/"});
- window.location.href = "http://localhost:8000/resources/redirect.php?url=http://127.0.0.1:8000/cookies/same-site/resources/fetch-after-top-level-cross-origin-redirect.php";
+ window.location.href = "http://localhost:8000/resources/redirect.py?url=http://127.0.0.1:8000/cookies/same-site/resources/fetch-after-top-level-cross-origin-redirect.php";
}
runTest();
</script>
diff --git a/LayoutTests/http/tests/cookies/same-site/fetch-after-top-level-same-origin-redirect.html b/LayoutTests/http/tests/cookies/same-site/fetch-after-top-level-same-origin-redirect.html
index ba109a3..2121513 100644
--- a/LayoutTests/http/tests/cookies/same-site/fetch-after-top-level-same-origin-redirect.html
+++ b/LayoutTests/http/tests/cookies/same-site/fetch-after-top-level-same-origin-redirect.html
@@ -11,7 +11,7 @@
await setCookie("implicit-strict", "20", {"SameSite": null, "Max-Age": 100, "path": "/"});
await setCookie("strict-because-invalid-SameSite-value", "20", {"SameSite": "invalid", "Max-Age": 100, "path": "/"});
await setCookie("lax", "20", {"SameSite": "Lax", "Max-Age": 100, "path": "/"});
- window.location.href = "http://127.0.0.1:8000/resources/redirect.php?url=http://127.0.0.1:8000/cookies/same-site/resources/fetch-after-top-level-same-origin-redirect.php";
+ window.location.href = "http://127.0.0.1:8000/resources/redirect.py?url=http://127.0.0.1:8000/cookies/same-site/resources/fetch-after-top-level-same-origin-redirect.php";
}
runTest();
</script>
diff --git a/LayoutTests/http/tests/cookies/same-site/popup-same-site-via-cross-site-redirect.html b/LayoutTests/http/tests/cookies/same-site/popup-same-site-via-cross-site-redirect.html
index 748a4a8..ec32f5d 100644
--- a/LayoutTests/http/tests/cookies/same-site/popup-same-site-via-cross-site-redirect.html
+++ b/LayoutTests/http/tests/cookies/same-site/popup-same-site-via-cross-site-redirect.html
@@ -20,6 +20,6 @@
assert_equals(normalizeCookie(e.data.document), normalizeCookie(IMPLICIT_STRICT_DOM + "=1; " + LAX_DOM + "=1; " + NORMAL_DOM + "=1; " + STRICT_BECAUSE_INVALID_SAMESITE_VALUE + "=1"));
}));
- var i = window.open("http://localhost:8000/resources/redirect.php?url=http://127.0.0.1:8000/cookies/resources/post-cookies-to-opener.php");
+ var i = window.open("http://localhost:8000/resources/redirect.py?url=http://127.0.0.1:8000/cookies/resources/post-cookies-to-opener.php");
}, "'127.0.0.1' is same-site with itself, so samesite cookies are sent.");
</script>
diff --git a/LayoutTests/http/tests/cookies/same-site/popup-same-site-via-same-site-redirect.html b/LayoutTests/http/tests/cookies/same-site/popup-same-site-via-same-site-redirect.html
index 21528f4..5c551d8 100644
--- a/LayoutTests/http/tests/cookies/same-site/popup-same-site-via-same-site-redirect.html
+++ b/LayoutTests/http/tests/cookies/same-site/popup-same-site-via-same-site-redirect.html
@@ -20,6 +20,6 @@
assert_equals(normalizeCookie(e.data.document), normalizeCookie(STRICT_BECAUSE_INVALID_SAMESITE_VALUE + "=1; " + IMPLICIT_STRICT_DOM + "=1; " + STRICT_DOM + "=1; " + LAX_DOM + "=1; " + NORMAL_DOM + "=1"));
}));
- var i = window.open("http://127.0.0.1:8000/resources/redirect.php?url=http://127.0.0.1:8000/cookies/resources/post-cookies-to-opener.php");
+ var i = window.open("http://127.0.0.1:8000/resources/redirect.py?url=http://127.0.0.1:8000/cookies/resources/post-cookies-to-opener.php");
}, "'127.0.0.1' is same-site with itself, so samesite cookies are sent.");
</script>
diff --git a/LayoutTests/http/tests/cookies/same-site/user-load-cross-site-redirect.php b/LayoutTests/http/tests/cookies/same-site/user-load-cross-site-redirect.php
index 1e3eb62..9f01465 100644
--- a/LayoutTests/http/tests/cookies/same-site/user-load-cross-site-redirect.php
+++ b/LayoutTests/http/tests/cookies/same-site/user-load-cross-site-redirect.php
@@ -5,7 +5,7 @@
wkSetCookie("strict", "27", Array("SameSite" => "Strict", "Max-Age" => 100, "path" => "/"));
wkSetCookie("lax", "27", Array("SameSite" => "Lax", "Max-Age" => 100, "path" => "/"));
wkSetCookie("normal", "27", Array("Max-Age" => 100, "path" => "/"));
- header("Location: http://localhost:8000/resources/redirect.php?url=" . urlencode("http://127.0.0.1:8000" . $_SERVER["REQUEST_URI"] . "?check-cookies"));
+ header("Location: http://localhost:8000/resources/redirect.py?url=" . urlencode("http://127.0.0.1:8000" . $_SERVER["REQUEST_URI"] . "?check-cookies"));
exit(0);
}
?>
diff --git a/LayoutTests/http/tests/css/css-imports-redirect-cycle.css b/LayoutTests/http/tests/css/css-imports-redirect-cycle.css
index cd3f0c4..0d8fd8b 100644
--- a/LayoutTests/http/tests/css/css-imports-redirect-cycle.css
+++ b/LayoutTests/http/tests/css/css-imports-redirect-cycle.css
@@ -1 +1 @@
-@import url("../resources/redirect.php?url=../css/css-imports-redirect-cycle.css");
+@import url("../resources/redirect.py?url=../css/css-imports-redirect-cycle.css");
diff --git a/LayoutTests/http/tests/css/css-imports-url-fragment.css b/LayoutTests/http/tests/css/css-imports-url-fragment.css
index 8dfc29f..e943651 100644
--- a/LayoutTests/http/tests/css/css-imports-url-fragment.css
+++ b/LayoutTests/http/tests/css/css-imports-url-fragment.css
@@ -1,2 +1,2 @@
@import url("#foo");
-@import url("../resources/redirect.php?url=../css/css-imports-url-fragment.css#foo");
+@import url("../resources/redirect.py?url=../css/css-imports-url-fragment.css#foo");
diff --git a/LayoutTests/http/tests/download/anchor-download-redirect.html b/LayoutTests/http/tests/download/anchor-download-redirect.html
index 4e67710..aa54bf8 100644
--- a/LayoutTests/http/tests/download/anchor-download-redirect.html
+++ b/LayoutTests/http/tests/download/anchor-download-redirect.html
@@ -14,7 +14,7 @@
<body>
<p>
Tests that download redirects are reported to the client.
-<a id="dl" href="/resources/redirect.php?url=/media/resources/test.pdf" download="foo.pdf">the link</a>.
+<a id="dl" href="/resources/redirect.py?url=/media/resources/test.pdf" download="foo.pdf">the link</a>.
<p>
The suggested filename at the top should be foo.pdf and you should see a redirect to /media/resources/test.pdf.
<script>
diff --git a/LayoutTests/http/tests/globalhistory/history-delegate-basic-302-redirect-expected.txt b/LayoutTests/http/tests/globalhistory/history-delegate-basic-302-redirect-expected.txt
index 7a350cb..701a40d 100644
--- a/LayoutTests/http/tests/globalhistory/history-delegate-basic-302-redirect-expected.txt
+++ b/LayoutTests/http/tests/globalhistory/history-delegate-basic-302-redirect-expected.txt
@@ -2,11 +2,11 @@
main frame - didFinishDocumentLoadForFrame
main frame - didHandleOnloadEventsForFrame
main frame - didFinishLoadForFrame
-main frame - willPerformClientRedirectToURL: http://127.0.0.1:8000/resources/redirect.php?url=notify-done.html
+main frame - willPerformClientRedirectToURL: http://127.0.0.1:8000/resources/redirect.py?url=notify-done.html
main frame - didStartProvisionalLoadForFrame
main frame - didReceiveServerRedirectForProvisionalLoadForFrame
-WebView performed a client redirect from "http://127.0.0.1:8000/globalhistory/history-delegate-basic-302-redirect.html" to "http://127.0.0.1:8000/resources/redirect.php?url=notify-done.html".
-WebView performed a server redirect from "http://127.0.0.1:8000/resources/redirect.php?url=notify-done.html" to "http://127.0.0.1:8000/resources/notify-done.html".
+WebView performed a client redirect from "http://127.0.0.1:8000/globalhistory/history-delegate-basic-302-redirect.html" to "http://127.0.0.1:8000/resources/redirect.py?url=notify-done.html".
+WebView performed a server redirect from "http://127.0.0.1:8000/resources/redirect.py?url=notify-done.html" to "http://127.0.0.1:8000/resources/notify-done.html".
main frame - didCancelClientRedirectForFrame
main frame - didCommitLoadForFrame
main frame - didFinishDocumentLoadForFrame
diff --git a/LayoutTests/http/tests/globalhistory/history-delegate-basic-302-redirect.html b/LayoutTests/http/tests/globalhistory/history-delegate-basic-302-redirect.html
index b23b446..12ebca4 100644
--- a/LayoutTests/http/tests/globalhistory/history-delegate-basic-302-redirect.html
+++ b/LayoutTests/http/tests/globalhistory/history-delegate-basic-302-redirect.html
@@ -7,7 +7,7 @@
}
function runTest() {
- window.location.replace('http://127.0.0.1:8000/resources/redirect.php?url=notify-done.html');
+ window.location.replace('http://127.0.0.1:8000/resources/redirect.py?url=notify-done.html');
}
</script>
diff --git a/LayoutTests/http/tests/globalhistory/history-delegate-basic-refresh-redirect-expected.txt b/LayoutTests/http/tests/globalhistory/history-delegate-basic-refresh-redirect-expected.txt
index 8c94790..0a7fd97 100644
--- a/LayoutTests/http/tests/globalhistory/history-delegate-basic-refresh-redirect-expected.txt
+++ b/LayoutTests/http/tests/globalhistory/history-delegate-basic-refresh-redirect-expected.txt
@@ -2,9 +2,9 @@
main frame - didFinishDocumentLoadForFrame
main frame - didHandleOnloadEventsForFrame
main frame - didFinishLoadForFrame
-main frame - willPerformClientRedirectToURL: http://127.0.0.1:8000/resources/redirect.php?url=notify-done.html&refresh=0
+main frame - willPerformClientRedirectToURL: http://127.0.0.1:8000/resources/redirect.py?url=notify-done.html&refresh=0
main frame - didStartProvisionalLoadForFrame
-WebView performed a client redirect from "http://127.0.0.1:8000/globalhistory/history-delegate-basic-refresh-redirect.html" to "http://127.0.0.1:8000/resources/redirect.php?url=notify-done.html&refresh=0".
+WebView performed a client redirect from "http://127.0.0.1:8000/globalhistory/history-delegate-basic-refresh-redirect.html" to "http://127.0.0.1:8000/resources/redirect.py?url=notify-done.html&refresh=0".
main frame - didCancelClientRedirectForFrame
main frame - didCommitLoadForFrame
main frame - didFinishDocumentLoadForFrame
@@ -12,7 +12,7 @@
main frame - willPerformClientRedirectToURL: http://127.0.0.1:8000/resources/notify-done.html
main frame - didFinishLoadForFrame
main frame - didStartProvisionalLoadForFrame
-WebView performed a client redirect from "http://127.0.0.1:8000/resources/redirect.php?url=notify-done.html&refresh=0" to "http://127.0.0.1:8000/resources/notify-done.html".
+WebView performed a client redirect from "http://127.0.0.1:8000/resources/redirect.py?url=notify-done.html&refresh=0" to "http://127.0.0.1:8000/resources/notify-done.html".
main frame - didCancelClientRedirectForFrame
main frame - didCommitLoadForFrame
main frame - didFinishDocumentLoadForFrame
diff --git a/LayoutTests/http/tests/globalhistory/history-delegate-basic-refresh-redirect.html b/LayoutTests/http/tests/globalhistory/history-delegate-basic-refresh-redirect.html
index 03d7ed7..367b017 100644
--- a/LayoutTests/http/tests/globalhistory/history-delegate-basic-refresh-redirect.html
+++ b/LayoutTests/http/tests/globalhistory/history-delegate-basic-refresh-redirect.html
@@ -7,7 +7,7 @@
}
function runTest() {
- window.location.replace('http://127.0.0.1:8000/resources/redirect.php?url=notify-done.html&refresh=0');
+ window.location.replace('http://127.0.0.1:8000/resources/redirect.py?url=notify-done.html&refresh=0');
}
</script>
diff --git a/LayoutTests/http/tests/misc/form-submit-file-cross-site-redirect.html b/LayoutTests/http/tests/misc/form-submit-file-cross-site-redirect.html
index ca9873a..48d65c6 100644
--- a/LayoutTests/http/tests/misc/form-submit-file-cross-site-redirect.html
+++ b/LayoutTests/http/tests/misc/form-submit-file-cross-site-redirect.html
@@ -34,7 +34,7 @@
</script>
</head>
<body>
-<form enctype="multipart/form-data" method="POST" action="/resources/redirect.php?code=307&url=http%3A%2F%2Flocalhost%3A8000%2Fmisc%2Fresources%2Fcheck-test-file.php">
+<form enctype="multipart/form-data" method="POST" action="/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000%2Fmisc%2Fresources%2Fcheck-test-file.php">
<input name="data" type="file"></input>
</form>
</body>
diff --git a/LayoutTests/http/tests/misc/webtiming-two-redirects.php b/LayoutTests/http/tests/misc/webtiming-two-redirects.php
index 8df6bac..8399dbb 100644
--- a/LayoutTests/http/tests/misc/webtiming-two-redirects.php
+++ b/LayoutTests/http/tests/misc/webtiming-two-redirects.php
@@ -1,4 +1,4 @@
<?php
- header('Location: ../resources/redirect.php?url=../misc/resources/webtiming-two-redirects.html');
+ header('Location: ../resources/redirect.py?url=../misc/resources/webtiming-two-redirects.html');
header('HTTP/1.0 302 Found');
?>
diff --git a/LayoutTests/http/tests/plugins/get-url-redirect-notify.html b/LayoutTests/http/tests/plugins/get-url-redirect-notify.html
index 124d19e..79b350f 100644
--- a/LayoutTests/http/tests/plugins/get-url-redirect-notify.html
+++ b/LayoutTests/http/tests/plugins/get-url-redirect-notify.html
@@ -72,7 +72,7 @@
testRunner.waitUntilDone();
}
- var baseURL = "http://127.0.0.1:8000/resources/redirect.php";
+ var baseURL = "http://127.0.0.1:8000/resources/redirect.py";
var redirectURL = "http://127.0.0.1:8000/dummy";
var singleRedirect = baseURL + "?code=307&url=" + encodeURIComponent(redirectURL);
var doubleRedirect = baseURL + "?code=307&url=" + encodeURIComponent(singleRedirect);
diff --git a/LayoutTests/http/tests/resources/redirect.php b/LayoutTests/http/tests/resources/redirect.php
deleted file mode 100644
index 2705b1c..0000000
--- a/LayoutTests/http/tests/resources/redirect.php
+++ /dev/null
@@ -1,32 +0,0 @@
-<?php
- function addCacheControl($allowCache) {
- if ($allowCache)
- header("Cache-Control: public, max-age=86400");
- else {
- # Workaround for https://bugs.webkit.org/show_bug.cgi?id=77538
- # Caching redirects results in flakiness in tests that dump loader delegates.
- header("Cache-Control: no-store");
- }
- }
-
- $url = $_GET['url'];
-
- $allowCache = isset($_GET['allowCache']);
-
- if (isset($_GET['refresh'])) {
- header("HTTP/1.1 200");
- header("Refresh: " . $_GET['refresh'] . "; url=$url");
- addCacheControl($allowCache);
- return;
- }
-
- if (!isset($_GET['code']))
- header("HTTP/1.1 302 Found");
- elseif ($_GET['code'] == 308) {
- # Apache 2.2 (and possibly some newer versions) cannot generate a reason string for code 308, and sends a 500 error instead.
- header("HTTP/1.1 308 Permanent Redirect");
- } else
- header("HTTP/1.1 " . $_GET['code']);
- header("Location: $url");
- addCacheControl($allowCache);
-?>
diff --git a/LayoutTests/http/tests/resources/redirect.py b/LayoutTests/http/tests/resources/redirect.py
new file mode 100755
index 0000000..a3c8250
--- /dev/null
+++ b/LayoutTests/http/tests/resources/redirect.py
@@ -0,0 +1,40 @@
+#!/usr/bin/env python3
+import os
+import sys
+
+from urllib.parse import unquote
+
+
+def addCacheControl(allowCache=True):
+ if allowCache:
+ sys.stdout.write('Cache-Control: public, max-age=86400\r\n')
+ else:
+ sys.stdout.write('Cache-Control: no-store\r\n')
+
+sys.stdout.write('Content-Type: text/html\r\n')
+
+query = {}
+for part in os.environ.get('QUERY_STRING', '').split('&'):
+ if not part:
+ continue
+ query[part.split('=')[0]] = '='.join(part.split('=')[1:])
+
+url = unquote(query.get('url', None))
+allowCache = True if query.get('allowCache', None) is not None else False
+refresh = query.get('refresh', None)
+code = query.get('code', '302')
+
+if refresh:
+ sys.stdout.write(
+ 'status: 200\r\n'
+ 'Refresh: {}; url={}\r\n'.format(refresh, url)
+ )
+ addCacheControl(allowCache)
+ sys.stdout.write('\r\n')
+ sys.exit(0)
+
+sys.stdout.write('status: {}\r\n'.format(code))
+sys.stdout.write('Location: {}\r\n'.format(url))
+addCacheControl(allowCache)
+sys.stdout.write('\r\n')
+
diff --git a/LayoutTests/http/tests/security/beforeload-iframe-server-redirect.html b/LayoutTests/http/tests/security/beforeload-iframe-server-redirect.html
index fb00f99..b02991e 100644
--- a/LayoutTests/http/tests/security/beforeload-iframe-server-redirect.html
+++ b/LayoutTests/http/tests/security/beforeload-iframe-server-redirect.html
@@ -11,6 +11,6 @@
</script>
This test produces output in the console. Only the initial URL should be logged.
<iframe
- src="http://127.0.0.1:8000/resources/redirect.php?url=http://localhost:8000/security/resources/post-done.html"
+ src="http://127.0.0.1:8000/resources/redirect.py?url=http://localhost:8000/security/resources/post-done.html"
onbeforeload="console.log(event.url)">
</iframe>
diff --git a/LayoutTests/http/tests/security/blocked-on-redirect-expected.txt b/LayoutTests/http/tests/security/blocked-on-redirect-expected.txt
index 89408b4..ff562aa 100644
--- a/LayoutTests/http/tests/security/blocked-on-redirect-expected.txt
+++ b/LayoutTests/http/tests/security/blocked-on-redirect-expected.txt
@@ -1,5 +1,5 @@
-http://127.0.0.1:8000/resources/redirect.php?code=307&url=http://localhost:25/security/resources/post-done.html - willSendRequest <NSURLRequest URL http://127.0.0.1:8000/resources/redirect.php?code=307&url=http://localhost:25/security/resources/post-done.html, main document URL http://127.0.0.1:8000/security/blocked-on-redirect.html, http method GET> redirectResponse (null)
+http://127.0.0.1:8000/resources/redirect.py?code=307&url=http://localhost:25/security/resources/post-done.html - willSendRequest <NSURLRequest URL http://127.0.0.1:8000/resources/redirect.py?code=307&url=http://localhost:25/security/resources/post-done.html, main document URL http://127.0.0.1:8000/security/blocked-on-redirect.html, http method GET> redirectResponse (null)
http://127.0.0.1:8000/security/blocked-on-redirect.html - didFinishLoading
CONSOLE MESSAGE: Not allowed to use restricted network port: http://localhost:25/security/resources/post-done.html
-http://127.0.0.1:8000/resources/redirect.php?code=307&url=http://localhost:25/security/resources/post-done.html - didFailLoadingWithError: <NSError domain WebKitErrorDomain, code 103, failing URL "http://localhost:25/security/resources/post-done.html">
+http://127.0.0.1:8000/resources/redirect.py?code=307&url=http://localhost:25/security/resources/post-done.html - didFailLoadingWithError: <NSError domain WebKitErrorDomain, code 103, failing URL "http://localhost:25/security/resources/post-done.html">
This test produces output in the console. Only the initial URL should be logged.
diff --git a/LayoutTests/http/tests/security/blocked-on-redirect.html b/LayoutTests/http/tests/security/blocked-on-redirect.html
index 722beaa..a8f274d96 100644
--- a/LayoutTests/http/tests/security/blocked-on-redirect.html
+++ b/LayoutTests/http/tests/security/blocked-on-redirect.html
@@ -7,4 +7,4 @@
This test produces output in the console. Only the initial URL should be logged.
-<iframe src = "http://127.0.0.1:8000/resources/redirect.php?code=307&url=http://localhost:25/security/resources/post-done.html"></iframe>
+<iframe src = "http://127.0.0.1:8000/resources/redirect.py?code=307&url=http://localhost:25/security/resources/post-done.html"></iframe>
diff --git a/LayoutTests/http/tests/security/cannot-read-cssrules-redirect.html b/LayoutTests/http/tests/security/cannot-read-cssrules-redirect.html
index cfef9b5..22dc5a9 100644
--- a/LayoutTests/http/tests/security/cannot-read-cssrules-redirect.html
+++ b/LayoutTests/http/tests/security/cannot-read-cssrules-redirect.html
@@ -2,15 +2,15 @@
<html>
<head>
<link rel="stylesheet"
- href="/resources/redirect.php?url=http://localhost:8000/security/resources/cssStyle.css">
+ href="/resources/redirect.py?url=http://localhost:8000/security/resources/cssStyle.css">
<link rel="stylesheet"
- href="http://localhost:8000/resources/redirect.php?url=http://127.0.0.1:8000/security/resources/cssStyle.css">
+ href="http://localhost:8000/resources/redirect.py?url=http://127.0.0.1:8000/security/resources/cssStyle.css">
<link rel="stylesheet"
- href="/resources/redirect.php?url=http://127.0.0.1:8000/security/resources/cssStyle.css" crossorigin="">
+ href="/resources/redirect.py?url=http://127.0.0.1:8000/security/resources/cssStyle.css" crossorigin="">
<link rel="stylesheet"
href="http://localhost:8000/security/resources/redirect-allow-star.php?url=http://127.0.0.1:8000/security/resources/xorigincss1-allow-star.php" crossorigin="">
<link rel="stylesheet"
- href="http://localhost:8000/resources/redirect.php?url=http://127.0.0.1:8000/security/resources/xorigincss1.css" crossorigin="">
+ href="http://localhost:8000/resources/redirect.py?url=http://127.0.0.1:8000/security/resources/xorigincss1.css" crossorigin="">
<script>
if (window.testRunner)
testRunner.dumpAsText();
diff --git a/LayoutTests/http/tests/security/canvas-remote-read-data-url-image-redirect.html b/LayoutTests/http/tests/security/canvas-remote-read-data-url-image-redirect.html
index b093a36..94c4144 100644
--- a/LayoutTests/http/tests/security/canvas-remote-read-data-url-image-redirect.html
+++ b/LayoutTests/http/tests/security/canvas-remote-read-data-url-image-redirect.html
@@ -65,5 +65,5 @@
testRunner.notifyDone();
}
-image.src = "http://localhost:8000/resources/redirect.php?url=data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVR42mP4%2F58BAAT%2FAf9jgNErAAAAAElFTkSuQmCC";
+image.src = "http://localhost:8000/resources/redirect.py?url=data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVR42mP4%2F58BAAT%2FAf9jgNErAAAAAElFTkSuQmCC";
</script>
diff --git a/LayoutTests/http/tests/security/canvas-remote-read-redirect-to-remote-image.html b/LayoutTests/http/tests/security/canvas-remote-read-redirect-to-remote-image.html
index 1f7660c..e7fe153 100644
--- a/LayoutTests/http/tests/security/canvas-remote-read-redirect-to-remote-image.html
+++ b/LayoutTests/http/tests/security/canvas-remote-read-redirect-to-remote-image.html
@@ -28,6 +28,6 @@
<p>This tests that drawing an image that redirects to a remote image to a canvas taints the canvas</p>
<pre id="console"></pre>
<canvas id="canvas" width="330" height="115"></canvas>
-<img id="img" onload="draw()" src="/resources/redirect.php?url=http://localhost:8000/security/resources/abe.png">
+<img id="img" onload="draw()" src="/resources/redirect.py?url=http://localhost:8000/security/resources/abe.png">
</body>
</html>
diff --git a/LayoutTests/http/tests/security/canvas-remote-read-remote-image-redirect.html b/LayoutTests/http/tests/security/canvas-remote-read-remote-image-redirect.html
index 839b661..d1e9382 100644
--- a/LayoutTests/http/tests/security/canvas-remote-read-remote-image-redirect.html
+++ b/LayoutTests/http/tests/security/canvas-remote-read-remote-image-redirect.html
@@ -103,5 +103,5 @@
if (window.testRunner)
testRunner.notifyDone();
}
-image.src = "/resources/redirect.php?url=http://localhost:8000/security/resources/abe.png";
+image.src = "/resources/redirect.py?url=http://localhost:8000/security/resources/abe.png";
</script>
diff --git a/LayoutTests/http/tests/security/canvas-remote-read-remote-video-redirect.html b/LayoutTests/http/tests/security/canvas-remote-read-remote-video-redirect.html
index 4ab95ec..5a749bf 100644
--- a/LayoutTests/http/tests/security/canvas-remote-read-remote-video-redirect.html
+++ b/LayoutTests/http/tests/security/canvas-remote-read-remote-video-redirect.html
@@ -18,7 +18,7 @@
var video = document.createElement("video");
video.addEventListener("loadeddata", test);
- video.src = `/resources/redirect.php?url=http://localhost:8000/${findMediaFile("video", "resources/test")}`;
+ video.src = `/resources/redirect.py?url=http://localhost:8000/${findMediaFile("video", "resources/test")}`;
window.jsTestIsAsync = true;
</script>
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/audio-redirect-allowed.html b/LayoutTests/http/tests/security/contentSecurityPolicy/audio-redirect-allowed.html
index 7cedcfb..cb869ed 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/audio-redirect-allowed.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/audio-redirect-allowed.html
@@ -3,9 +3,9 @@
<head>
<script src="resources/dump-as-text.js"></script>
<script src="resources/wait-until-done.js"></script>
-<meta http-equiv="Content-Security-Policy" content="media-src http://127.0.0.1:8000/resources/redirect.php http://localhost:8000">
+<meta http-equiv="Content-Security-Policy" content="media-src http://127.0.0.1:8000/resources/redirect.py http://localhost:8000">
</head>
<body>
-<audio src="http://127.0.0.1:8000/resources/redirect.php?code=307&url=http%3A%2F%2Flocalhost%3A8000/resources/balls-of-the-orient.aif" onloadedmetadata="alertAndDone('PASS')" onerror="alertAndDone('FAIL')"></audio>
+<audio src="http://127.0.0.1:8000/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000/resources/balls-of-the-orient.aif" onloadedmetadata="alertAndDone('PASS')" onerror="alertAndDone('FAIL')"></audio>
</body>
</html>
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/audio-redirect-allowed2.html b/LayoutTests/http/tests/security/contentSecurityPolicy/audio-redirect-allowed2.html
index 40a8a7d..e7526ab 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/audio-redirect-allowed2.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/audio-redirect-allowed2.html
@@ -3,9 +3,9 @@
<head>
<script src="resources/dump-as-text.js"></script>
<script src="resources/wait-until-done.js"></script>
-<meta http-equiv="Content-Security-Policy" content="media-src http://127.0.0.1:8000/resources/redirect.php http://localhost:8000/this-path-should-be-ignored-when-matching-a-redirected-request">
+<meta http-equiv="Content-Security-Policy" content="media-src http://127.0.0.1:8000/resources/redirect.py http://localhost:8000/this-path-should-be-ignored-when-matching-a-redirected-request">
</head>
<body>
-<audio src="http://127.0.0.1:8000/resources/redirect.php?code=307&url=http%3A%2F%2Flocalhost%3A8000/resources/balls-of-the-orient.aif" onloadedmetadata="alertAndDone('PASS')" onerror="alertAndDone('FAIL')"></audio>
+<audio src="http://127.0.0.1:8000/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000/resources/balls-of-the-orient.aif" onloadedmetadata="alertAndDone('PASS')" onerror="alertAndDone('FAIL')"></audio>
</body>
</html>
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/audio-redirect-blocked.html b/LayoutTests/http/tests/security/contentSecurityPolicy/audio-redirect-blocked.html
index 8c420c3..76b5cbd 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/audio-redirect-blocked.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/audio-redirect-blocked.html
@@ -3,9 +3,9 @@
<head>
<script src="resources/dump-as-text.js"></script>
<script src="resources/wait-until-done.js"></script>
-<meta http-equiv="Content-Security-Policy" content="media-src http://127.0.0.1:8000/resources/redirect.php">
+<meta http-equiv="Content-Security-Policy" content="media-src http://127.0.0.1:8000/resources/redirect.py">
</head>
<body>
-<audio src="http://127.0.0.1:8000/resources/redirect.php?code=307&url=http%3A%2F%2Flocalhost%3A8000/resources/balls-of-the-orient.aif" onloadedmetadata="alertAndDone('FAIL')" onerror="alertAndDone('PASS')"></audio>
+<audio src="http://127.0.0.1:8000/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000/resources/balls-of-the-orient.aif" onloadedmetadata="alertAndDone('FAIL')" onerror="alertAndDone('PASS')"></audio>
</body>
</html>
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/block-all-mixed-content/resources/frame-with-secure-image-after-upgrade-redirect.html b/LayoutTests/http/tests/security/contentSecurityPolicy/block-all-mixed-content/resources/frame-with-secure-image-after-upgrade-redirect.html
index 446de82f..1531b65 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/block-all-mixed-content/resources/frame-with-secure-image-after-upgrade-redirect.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/block-all-mixed-content/resources/frame-with-secure-image-after-upgrade-redirect.html
@@ -22,7 +22,7 @@
</script>
</head>
<body>
-<img src="https://127.0.0.1:8443/resources/redirect.php?url=http://127.0.0.1:8443/security/resources/compass.jpg" onload="testPassed()" onerror="testFailed()">
+<img src="https://127.0.0.1:8443/resources/redirect.py?url=http://127.0.0.1:8443/security/resources/compass.jpg" onload="testPassed()" onerror="testFailed()">
<pre id="result"></pre>
</body>
</html>
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/embed-redirect-allowed.html b/LayoutTests/http/tests/security/contentSecurityPolicy/embed-redirect-allowed.html
index 97c7232..40c568c 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/embed-redirect-allowed.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/embed-redirect-allowed.html
@@ -5,9 +5,9 @@
if (window.testRunner)
testRunner.dumpAsText();
</script>
-<meta http-equiv="Content-Security-Policy" content="object-src http://127.0.0.1:8000/resources/redirect.php http://localhost:8000">
+<meta http-equiv="Content-Security-Policy" content="object-src http://127.0.0.1:8000/resources/redirect.py http://localhost:8000">
</head>
<body>
-<embed type="text/html" src="http://127.0.0.1:8000/resources/redirect.php?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/alert-pass.html">
+<embed type="text/html" src="http://127.0.0.1:8000/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/alert-pass.html">
</body>
</html>
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/embed-redirect-allowed2.html b/LayoutTests/http/tests/security/contentSecurityPolicy/embed-redirect-allowed2.html
index 29e242d..020420d 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/embed-redirect-allowed2.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/embed-redirect-allowed2.html
@@ -5,9 +5,9 @@
if (window.testRunner)
testRunner.dumpAsText();
</script>
-<meta http-equiv="Content-Security-Policy" content="object-src http://127.0.0.1:8000/resources/redirect.php http://localhost:8000/this-path-should-be-ignored-when-matching-a-redirect-request">
+<meta http-equiv="Content-Security-Policy" content="object-src http://127.0.0.1:8000/resources/redirect.py http://localhost:8000/this-path-should-be-ignored-when-matching-a-redirect-request">
</head>
<body>
-<embed type="text/html" src="http://127.0.0.1:8000/resources/redirect.php?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/alert-pass.html">
+<embed type="text/html" src="http://127.0.0.1:8000/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/alert-pass.html">
</body>
</html>
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/embed-redirect-blocked.html b/LayoutTests/http/tests/security/contentSecurityPolicy/embed-redirect-blocked.html
index cb5761b..f30d7cf 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/embed-redirect-blocked.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/embed-redirect-blocked.html
@@ -5,9 +5,9 @@
if (window.testRunner)
testRunner.dumpAsText();
</script>
-<meta http-equiv="Content-Security-Policy" content="object-src http://127.0.0.1:8000/resources/redirect.php">
+<meta http-equiv="Content-Security-Policy" content="object-src http://127.0.0.1:8000/resources/redirect.py">
</head>
<body>
-<embed type="text/html" src="http://127.0.0.1:8000/resources/redirect.php?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/alert-fail.html">
+<embed type="text/html" src="http://127.0.0.1:8000/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/alert-fail.html">
</body>
</html>
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/embed-redirect-blocked2.html b/LayoutTests/http/tests/security/contentSecurityPolicy/embed-redirect-blocked2.html
index fc2ede6..bf214d6 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/embed-redirect-blocked2.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/embed-redirect-blocked2.html
@@ -5,9 +5,9 @@
if (window.testRunner)
testRunner.dumpAsText();
</script>
-<meta http-equiv="Content-Security-Policy" content="object-src http://127.0.0.1:8000/resources/redirect.php">
+<meta http-equiv="Content-Security-Policy" content="object-src http://127.0.0.1:8000/resources/redirect.py">
</head>
<body>
-<embed type="text/html" src="http://127.0.0.1:8000/resources/redirect.php?code=307&url=http%3A%2F%2Flocalhost%3A8000/plugins/resources/mock-plugin.pl">
+<embed type="text/html" src="http://127.0.0.1:8000/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000/plugins/resources/mock-plugin.pl">
</body>
</html>
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/embed-redirect-blocked3.html b/LayoutTests/http/tests/security/contentSecurityPolicy/embed-redirect-blocked3.html
index 3c65dc6..3f52f3c 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/embed-redirect-blocked3.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/embed-redirect-blocked3.html
@@ -5,9 +5,9 @@
if (window.testRunner)
testRunner.dumpAsText();
</script>
-<meta http-equiv="Content-Security-Policy" content="object-src http://127.0.0.1:8000/resources/redirect.php">
+<meta http-equiv="Content-Security-Policy" content="object-src http://127.0.0.1:8000/resources/redirect.py">
</head>
<body>
-<embed src="http://127.0.0.1:8000/resources/redirect.php?code=307&url=http%3A%2F%2Flocalhost%3A8000/plugins/resources/mock-plugin.pl">
+<embed src="http://127.0.0.1:8000/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000/plugins/resources/mock-plugin.pl">
</body>
</html>
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/font-redirect-allowed.html b/LayoutTests/http/tests/security/contentSecurityPolicy/font-redirect-allowed.html
index 6e7797e..94dedda 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/font-redirect-allowed.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/font-redirect-allowed.html
@@ -3,11 +3,11 @@
<head>
<script src="resources/dump-as-text.js"></script>
<script src="resources/wait-until-done.js"></script>
-<meta http-equiv="Content-Security-Policy" content="font-src http://127.0.0.1:8000/resources/redirect.php http://localhost:8000">
+<meta http-equiv="Content-Security-Policy" content="font-src http://127.0.0.1:8000/resources/redirect.py http://localhost:8000">
<style>
@font-face {
font-family: "Ahem";
- src: url("http://127.0.0.1:8000/resources/redirect.php?code=307&url=http%3A%2F%2Flocalhost%3A8000/resources/Ahem.woff") format("woff");
+ src: url("http://127.0.0.1:8000/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000/resources/Ahem.woff") format("woff");
}
</style>
</head>
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/font-redirect-allowed2.html b/LayoutTests/http/tests/security/contentSecurityPolicy/font-redirect-allowed2.html
index f7d2031..cbd41cf 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/font-redirect-allowed2.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/font-redirect-allowed2.html
@@ -3,11 +3,11 @@
<head>
<script src="resources/dump-as-text.js"></script>
<script src="resources/wait-until-done.js"></script>
-<meta http-equiv="Content-Security-Policy" content="font-src http://127.0.0.1:8000/resources/redirect.php http://localhost:8000/this-path-should-be-ignored-when-matching-a-redirected-request">
+<meta http-equiv="Content-Security-Policy" content="font-src http://127.0.0.1:8000/resources/redirect.py http://localhost:8000/this-path-should-be-ignored-when-matching-a-redirected-request">
<style>
@font-face {
font-family: "Ahem";
- src: url("http://127.0.0.1:8000/resources/redirect.php?code=307&url=http%3A%2F%2Flocalhost%3A8000/resources/Ahem.woff") format("woff");
+ src: url("http://127.0.0.1:8000/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000/resources/Ahem.woff") format("woff");
}
</style>
</head>
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/font-redirect-blocked.html b/LayoutTests/http/tests/security/contentSecurityPolicy/font-redirect-blocked.html
index 47bcc32..f7b26a6 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/font-redirect-blocked.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/font-redirect-blocked.html
@@ -3,11 +3,11 @@
<head>
<script src="resources/dump-as-text.js"></script>
<script src="resources/wait-until-done.js"></script>
-<meta http-equiv="Content-Security-Policy" content="font-src http://127.0.0.1:8000/resources/redirect.php">
+<meta http-equiv="Content-Security-Policy" content="font-src http://127.0.0.1:8000/resources/redirect.py">
<style>
@font-face {
font-family: "Ahem";
- src: url("http://127.0.0.1:8000/resources/redirect.php?code=307&url=http%3A%2F%2Flocalhost%3A8000/resources/Ahem.woff") format("woff");
+ src: url("http://127.0.0.1:8000/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000/resources/Ahem.woff") format("woff");
}
</style>
</head>
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/form-action-src-redirect-allowed.html b/LayoutTests/http/tests/security/contentSecurityPolicy/form-action-src-redirect-allowed.html
index c72eb4a..fbc8bfd 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/form-action-src-redirect-allowed.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/form-action-src-redirect-allowed.html
@@ -6,10 +6,10 @@
if (window.testRunner)
testRunner.waitUntilDone();
</script>
-<meta http-equiv="Content-Security-Policy" content="form-action http://127.0.0.1:8000/resources/redirect.php http://localhost:8000">
+<meta http-equiv="Content-Security-Policy" content="form-action http://127.0.0.1:8000/resources/redirect.py http://localhost:8000">
</head>
<body>
-<form action="http://127.0.0.1:8000/resources/redirect.php?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/alert-pass.html%3FnotifyDone%3D1" method="post"></form>
+<form action="http://127.0.0.1:8000/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/alert-pass.html%3FnotifyDone%3D1" method="post"></form>
<script>document.querySelector("form").submit()</script>
</body>
</html>
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/form-action-src-redirect-allowed2.html b/LayoutTests/http/tests/security/contentSecurityPolicy/form-action-src-redirect-allowed2.html
index 5c5db8b..829971e 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/form-action-src-redirect-allowed2.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/form-action-src-redirect-allowed2.html
@@ -6,10 +6,10 @@
if (window.testRunner)
testRunner.waitUntilDone();
</script>
-<meta http-equiv="Content-Security-Policy" content="form-action http://127.0.0.1:8000/resources/redirect.php http://localhost:8000/this-path-should-be-ignored-when-matching-a-redirected-request">
+<meta http-equiv="Content-Security-Policy" content="form-action http://127.0.0.1:8000/resources/redirect.py http://localhost:8000/this-path-should-be-ignored-when-matching-a-redirected-request">
</head>
<body>
-<form action="http://127.0.0.1:8000/resources/redirect.php?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/alert-pass.html%3FnotifyDone%3D1" method="post"></form>
+<form action="http://127.0.0.1:8000/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/alert-pass.html%3FnotifyDone%3D1" method="post"></form>
<script>document.querySelector("form").submit()</script>
</body>
</html>
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/frame-src-redirect-blocked.html b/LayoutTests/http/tests/security/contentSecurityPolicy/frame-src-redirect-blocked.html
index 70f5321..1655ff0 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/frame-src-redirect-blocked.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/frame-src-redirect-blocked.html
@@ -1,3 +1,3 @@
<meta http-equiv="Content-Security-Policy" content="frame-src 127.0.0.1:8000">
<script src="resources/dump-as-text.js"></script>
-<iframe src="/resources/redirect.php?url=http://localhost:8000/security/contentSecurityPolicy/resources/alert-fail.html"></iframe>
+<iframe src="/resources/redirect.py?url=http://localhost:8000/security/contentSecurityPolicy/resources/alert-fail.html"></iframe>
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/iframe-redirect-allowed-by-child-src.html b/LayoutTests/http/tests/security/contentSecurityPolicy/iframe-redirect-allowed-by-child-src.html
index 717f4a7..317310b 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/iframe-redirect-allowed-by-child-src.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/iframe-redirect-allowed-by-child-src.html
@@ -2,9 +2,9 @@
<html>
<head>
<script src="resources/dump-as-text.js"></script>
-<meta http-equiv="Content-Security-Policy" content="child-src http://127.0.0.1:8000/resources/redirect.php http://localhost:8000">
+<meta http-equiv="Content-Security-Policy" content="child-src http://127.0.0.1:8000/resources/redirect.py http://localhost:8000">
</head>
<body>
-<iframe src="http://127.0.0.1:8000/resources/redirect.php?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/alert-pass.html"></iframe>
+<iframe src="http://127.0.0.1:8000/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/alert-pass.html"></iframe>
</body>
</html>
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/iframe-redirect-allowed-by-child-src2.html b/LayoutTests/http/tests/security/contentSecurityPolicy/iframe-redirect-allowed-by-child-src2.html
index fd0a8a1..ad7cedf 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/iframe-redirect-allowed-by-child-src2.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/iframe-redirect-allowed-by-child-src2.html
@@ -2,9 +2,9 @@
<html>
<head>
<script src="resources/dump-as-text.js"></script>
-<meta http-equiv="Content-Security-Policy" content="child-src http://127.0.0.1:8000/resources/redirect.php http://localhost:8000/this-path-should-be-ignored-when-matching-a-redirected-request">
+<meta http-equiv="Content-Security-Policy" content="child-src http://127.0.0.1:8000/resources/redirect.py http://localhost:8000/this-path-should-be-ignored-when-matching-a-redirected-request">
</head>
<body>
-<iframe src="http://127.0.0.1:8000/resources/redirect.php?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/alert-pass.html"></iframe>
+<iframe src="http://127.0.0.1:8000/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/alert-pass.html"></iframe>
</body>
</html>
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/iframe-redirect-allowed-by-frame-src.html b/LayoutTests/http/tests/security/contentSecurityPolicy/iframe-redirect-allowed-by-frame-src.html
index 99c1824..adb0ec7 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/iframe-redirect-allowed-by-frame-src.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/iframe-redirect-allowed-by-frame-src.html
@@ -2,9 +2,9 @@
<html>
<head>
<script src="resources/dump-as-text.js"></script>
-<meta http-equiv="Content-Security-Policy" content="frame-src http://127.0.0.1:8000/resources/redirect.php http://localhost:8000">
+<meta http-equiv="Content-Security-Policy" content="frame-src http://127.0.0.1:8000/resources/redirect.py http://localhost:8000">
</head>
<body>
-<iframe src="http://127.0.0.1:8000/resources/redirect.php?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/alert-pass.html"></iframe>
+<iframe src="http://127.0.0.1:8000/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/alert-pass.html"></iframe>
</body>
</html>
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/iframe-redirect-allowed-by-frame-src2.html b/LayoutTests/http/tests/security/contentSecurityPolicy/iframe-redirect-allowed-by-frame-src2.html
index db02041d..d455f14 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/iframe-redirect-allowed-by-frame-src2.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/iframe-redirect-allowed-by-frame-src2.html
@@ -2,9 +2,9 @@
<html>
<head>
<script src="resources/dump-as-text.js"></script>
-<meta http-equiv="Content-Security-Policy" content="frame-src http://127.0.0.1:8000/resources/redirect.php http://localhost:8000/this-path-should-be-ignored-when-matching-a-redirected-request">
+<meta http-equiv="Content-Security-Policy" content="frame-src http://127.0.0.1:8000/resources/redirect.py http://localhost:8000/this-path-should-be-ignored-when-matching-a-redirected-request">
</head>
<body>
-<iframe src="http://127.0.0.1:8000/resources/redirect.php?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/alert-pass.html"></iframe>
+<iframe src="http://127.0.0.1:8000/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/alert-pass.html"></iframe>
</body>
</html>
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/iframe-redirect-blocked-by-child-src.html b/LayoutTests/http/tests/security/contentSecurityPolicy/iframe-redirect-blocked-by-child-src.html
index d711f80..53d934c 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/iframe-redirect-blocked-by-child-src.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/iframe-redirect-blocked-by-child-src.html
@@ -2,10 +2,10 @@
<html>
<head>
<script src="resources/dump-as-text.js"></script>
-<meta http-equiv="Content-Security-Policy" content="child-src http://127.0.0.1:8000/resources/redirect.php">
+<meta http-equiv="Content-Security-Policy" content="child-src http://127.0.0.1:8000/resources/redirect.py">
</head>
<body>
<p>Tests that an <iframe> that loads a cross-origin page via a redirect is blocked by the Content Security Policy <code>child-src</code> directive. This test PASSED if there is a console warning message.</p>
-<iframe src="http://127.0.0.1:8000/resources/redirect.php?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/alert-fail.html"></iframe>
+<iframe src="http://127.0.0.1:8000/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/alert-fail.html"></iframe>
</body>
</html>
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/iframe-redirect-blocked-by-frame-src.html b/LayoutTests/http/tests/security/contentSecurityPolicy/iframe-redirect-blocked-by-frame-src.html
index 88ede7d..e7347ba 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/iframe-redirect-blocked-by-frame-src.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/iframe-redirect-blocked-by-frame-src.html
@@ -2,10 +2,10 @@
<html>
<head>
<script src="resources/dump-as-text.js"></script>
-<meta http-equiv="Content-Security-Policy" content="frame-src http://127.0.0.1:8000/resources/redirect.php">
+<meta http-equiv="Content-Security-Policy" content="frame-src http://127.0.0.1:8000/resources/redirect.py">
</head>
<body>
<p>Tests that an <iframe> that loads a cross-origin page via a redirect is blocked by the Content Security Policy <code>frame-src</code> directive. This test PASSED if there is a console warning message.</p>
-<iframe src="http://127.0.0.1:8000/resources/redirect.php?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/alert-fail.html"></iframe>
+<iframe src="http://127.0.0.1:8000/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/alert-fail.html"></iframe>
</body>
</html>
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/image-redirect-allowed.html b/LayoutTests/http/tests/security/contentSecurityPolicy/image-redirect-allowed.html
index a426d55..5c85916 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/image-redirect-allowed.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/image-redirect-allowed.html
@@ -2,10 +2,10 @@
<html>
<head>
<script src="resources/dump-as-text.js"></script>
-<meta http-equiv="Content-Security-Policy" content="img-src http://127.0.0.1:8000/resources/redirect.php http://localhost:8000">
+<meta http-equiv="Content-Security-Policy" content="img-src http://127.0.0.1:8000/resources/redirect.py http://localhost:8000">
</head>
<body>
<p>Tests that a cross-origin image loaded via a redirect is allowed by the Content Security Policy. This test PASSED if there are no console warning messages.</p>
-<img src="http://127.0.0.1:8000/resources/redirect.php?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/resources/abe.png" width="128" height="128">
+<img src="http://127.0.0.1:8000/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/resources/abe.png" width="128" height="128">
</body>
</html>
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/image-redirect-allowed2.html b/LayoutTests/http/tests/security/contentSecurityPolicy/image-redirect-allowed2.html
index 8647a89..12b6432 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/image-redirect-allowed2.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/image-redirect-allowed2.html
@@ -2,10 +2,10 @@
<html>
<head>
<script src="resources/dump-as-text.js"></script>
-<meta http-equiv="Content-Security-Policy" content="img-src http://127.0.0.1:8000/resources/redirect.php http://localhost:8000/this-path-should-be-ignored-when-matching-a-redirected-request">
+<meta http-equiv="Content-Security-Policy" content="img-src http://127.0.0.1:8000/resources/redirect.py http://localhost:8000/this-path-should-be-ignored-when-matching-a-redirected-request">
</head>
<body>
<p>Tests that a cross-origin image loaded via a redirect is allowed by the Content Security Policy even though the policy does not contain a source expression that is an exact match of the redirected URL. This test PASSED if there are no console warning messages.</p>
-<img src="http://127.0.0.1:8000/resources/redirect.php?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/resources/abe.png" width="128" height="128">
+<img src="http://127.0.0.1:8000/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/resources/abe.png" width="128" height="128">
</body>
</html>
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/image-redirect-blocked.html b/LayoutTests/http/tests/security/contentSecurityPolicy/image-redirect-blocked.html
index 9f40554..97282a7 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/image-redirect-blocked.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/image-redirect-blocked.html
@@ -2,10 +2,10 @@
<html>
<head>
<script src="resources/dump-as-text.js"></script>
-<meta http-equiv="Content-Security-Policy" content="img-src http://127.0.0.1:8000/resources/redirect.php">
+<meta http-equiv="Content-Security-Policy" content="img-src http://127.0.0.1:8000/resources/redirect.py">
</head>
<body>
<p>Tests that a cross-origin image loaded via a redirect is blocked by the Content Security Policy. This test PASSED if there is a console warning message.</p>
-<img src="http://127.0.0.1:8000/resources/redirect.php?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/resources/abe.png" width="128" height="128">
+<img src="http://127.0.0.1:8000/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/resources/abe.png" width="128" height="128">
</body>
</html>
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/object-redirect-allowed.html b/LayoutTests/http/tests/security/contentSecurityPolicy/object-redirect-allowed.html
index d5387b4..6c5ed46 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/object-redirect-allowed.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/object-redirect-allowed.html
@@ -5,9 +5,9 @@
if (window.testRunner)
testRunner.dumpAsText();
</script>
-<meta http-equiv="Content-Security-Policy" content="object-src http://127.0.0.1:8000/resources/redirect.php http://localhost:8000">
+<meta http-equiv="Content-Security-Policy" content="object-src http://127.0.0.1:8000/resources/redirect.py http://localhost:8000">
</head>
<body>
-<object type="text/html" data="http://127.0.0.1:8000/resources/redirect.php?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/alert-pass.html"></object>
+<object type="text/html" data="http://127.0.0.1:8000/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/alert-pass.html"></object>
</body>
</html>
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/object-redirect-allowed2.html b/LayoutTests/http/tests/security/contentSecurityPolicy/object-redirect-allowed2.html
index b9f1509..c5534d4 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/object-redirect-allowed2.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/object-redirect-allowed2.html
@@ -5,9 +5,9 @@
if (window.testRunner)
testRunner.dumpAsText();
</script>
-<meta http-equiv="Content-Security-Policy" content="object-src http://127.0.0.1:8000/resources/redirect.php http://localhost:8000/this-path-should-be-ignored-when-matching-a-redirect-request">
+<meta http-equiv="Content-Security-Policy" content="object-src http://127.0.0.1:8000/resources/redirect.py http://localhost:8000/this-path-should-be-ignored-when-matching-a-redirect-request">
</head>
<body>
-<object type="text/html" data="http://127.0.0.1:8000/resources/redirect.php?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/alert-pass.html"></object>
+<object type="text/html" data="http://127.0.0.1:8000/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/alert-pass.html"></object>
</body>
</html>
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/object-redirect-blocked.html b/LayoutTests/http/tests/security/contentSecurityPolicy/object-redirect-blocked.html
index ac44031..2dc312f 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/object-redirect-blocked.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/object-redirect-blocked.html
@@ -5,9 +5,9 @@
if (window.testRunner)
testRunner.dumpAsText();
</script>
-<meta http-equiv="Content-Security-Policy" content="object-src http://127.0.0.1:8000/resources/redirect.php">
+<meta http-equiv="Content-Security-Policy" content="object-src http://127.0.0.1:8000/resources/redirect.py">
</head>
<body>
-<object type="text/html" data="http://127.0.0.1:8000/resources/redirect.php?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/alert-fail.html"></object>
+<object type="text/html" data="http://127.0.0.1:8000/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/alert-fail.html"></object>
</body>
</html>
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/object-redirect-blocked2.html b/LayoutTests/http/tests/security/contentSecurityPolicy/object-redirect-blocked2.html
index 04b8d03..55e328d 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/object-redirect-blocked2.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/object-redirect-blocked2.html
@@ -5,9 +5,9 @@
if (window.testRunner)
testRunner.dumpAsText();
</script>
-<meta http-equiv="Content-Security-Policy" content="object-src http://127.0.0.1:8000/resources/redirect.php">
+<meta http-equiv="Content-Security-Policy" content="object-src http://127.0.0.1:8000/resources/redirect.py">
</head>
<body>
-<object type="text/html" data="http://127.0.0.1:8000/resources/redirect.php?code=307&url=http%3A%2F%2Flocalhost%3A8000/plugins/resources/mock-plugin.pl"></object>
+<object type="text/html" data="http://127.0.0.1:8000/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000/plugins/resources/mock-plugin.pl"></object>
</body>
</html>
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/object-redirect-blocked3.html b/LayoutTests/http/tests/security/contentSecurityPolicy/object-redirect-blocked3.html
index 414b4ce..88b1b21 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/object-redirect-blocked3.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/object-redirect-blocked3.html
@@ -5,9 +5,9 @@
if (window.testRunner)
testRunner.dumpAsText();
</script>
-<meta http-equiv="Content-Security-Policy" content="object-src http://127.0.0.1:8000/resources/redirect.php">
+<meta http-equiv="Content-Security-Policy" content="object-src http://127.0.0.1:8000/resources/redirect.py">
</head>
<body>
-<object data="http://127.0.0.1:8000/resources/redirect.php?code=307&url=http%3A%2F%2Flocalhost%3A8000/plugins/resources/mock-plugin.pl"></object>
+<object data="http://127.0.0.1:8000/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000/plugins/resources/mock-plugin.pl"></object>
</body>
</html>
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/resources/xsl-redirect-allowed.php b/LayoutTests/http/tests/security/contentSecurityPolicy/resources/xsl-redirect-allowed.php
index 19c828f..a9fd352 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/resources/xsl-redirect-allowed.php
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/resources/xsl-redirect-allowed.php
@@ -3,7 +3,7 @@
header("Content-Type: application/xhtml+xml");
echo '<?xml version="1.0" encoding="UTF-8"?>' . "\n";
-echo '<?xml-stylesheet type="text/xsl" href="http://127.0.0.1:8000/resources/redirect.php?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/alert-pass.xsl"?>' . "\n";
+echo '<?xml-stylesheet type="text/xsl" href="http://127.0.0.1:8000/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/alert-pass.xsl"?>' . "\n";
?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/resources/xsl-redirect-blocked.php b/LayoutTests/http/tests/security/contentSecurityPolicy/resources/xsl-redirect-blocked.php
index 4ee4735..1df760f 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/resources/xsl-redirect-blocked.php
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/resources/xsl-redirect-blocked.php
@@ -1,8 +1,8 @@
<?php
header("Content-Type: application/xhtml+xml");
-header("Content-Security-Policy: script-src http://127.0.0.1:8000/resources/redirect.php 'unsafe-inline'");
+header("Content-Security-Policy: script-src http://127.0.0.1:8000/resources/redirect.py 'unsafe-inline'");
echo '<?xml version="1.0" encoding="UTF-8"?>' . "\n";
-echo '<?xml-stylesheet type="text/xsl" href="http://127.0.0.1:8000/resources/redirect.php?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/alert-fail.xsl"?>' . "\n";
+echo '<?xml-stylesheet type="text/xsl" href="http://127.0.0.1:8000/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/alert-fail.xsl"?>' . "\n";
?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/script-redirect-allowed.html b/LayoutTests/http/tests/security/contentSecurityPolicy/script-redirect-allowed.html
index 1832f4a..a6779c8 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/script-redirect-allowed.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/script-redirect-allowed.html
@@ -3,8 +3,8 @@
<head>
<script src="resources/dump-as-text.js"></script>
<script src="resources/wait-until-done.js"></script>
-<meta http-equiv="Content-Security-Policy" content="script-src http://127.0.0.1:8000/resources/redirect.php http://localhost:8000 'unsafe-inline'">
-<script src="http://127.0.0.1:8000/resources/redirect.php?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/alert-pass-and-notify-done.js" onerror="alertAndDone('FAIL')"></script>
+<meta http-equiv="Content-Security-Policy" content="script-src http://127.0.0.1:8000/resources/redirect.py http://localhost:8000 'unsafe-inline'">
+<script src="http://127.0.0.1:8000/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/alert-pass-and-notify-done.js" onerror="alertAndDone('FAIL')"></script>
</head>
<body>
</body>
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/script-redirect-allowed2.html b/LayoutTests/http/tests/security/contentSecurityPolicy/script-redirect-allowed2.html
index 8eebf49..6277a3a 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/script-redirect-allowed2.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/script-redirect-allowed2.html
@@ -3,8 +3,8 @@
<head>
<script src="resources/dump-as-text.js"></script>
<script src="resources/wait-until-done.js"></script>
-<meta http-equiv="Content-Security-Policy" content="script-src http://127.0.0.1:8000/resources/redirect.php http://localhost:8000/this-path-should-be-ignored-when-matching-a-redirected-request 'unsafe-inline'">
-<script src="http://127.0.0.1:8000/resources/redirect.php?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/alert-pass-and-notify-done.js" onerror="alertAndDone('FAIL')"></script>
+<meta http-equiv="Content-Security-Policy" content="script-src http://127.0.0.1:8000/resources/redirect.py http://localhost:8000/this-path-should-be-ignored-when-matching-a-redirected-request 'unsafe-inline'">
+<script src="http://127.0.0.1:8000/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/alert-pass-and-notify-done.js" onerror="alertAndDone('FAIL')"></script>
</head>
<body>
</body>
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/script-redirect-blocked.html b/LayoutTests/http/tests/security/contentSecurityPolicy/script-redirect-blocked.html
index 722a7a4..b2adf7b 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/script-redirect-blocked.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/script-redirect-blocked.html
@@ -3,8 +3,8 @@
<head>
<script src="resources/dump-as-text.js"></script>
<script src="resources/wait-until-done.js"></script>
-<meta http-equiv="Content-Security-Policy" content="script-src http://127.0.0.1:8000/resources/redirect.php 'unsafe-inline'">
-<script src="http://127.0.0.1:8000/resources/redirect.php?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/alert-fail.js" onerror="alertAndDone('PASS')"></script>
+<meta http-equiv="Content-Security-Policy" content="script-src http://127.0.0.1:8000/resources/redirect.py 'unsafe-inline'">
+<script src="http://127.0.0.1:8000/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/alert-fail.js" onerror="alertAndDone('PASS')"></script>
</head>
<body>
</body>
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/stylesheet-redirect-allowed.html b/LayoutTests/http/tests/security/contentSecurityPolicy/stylesheet-redirect-allowed.html
index b49b8ee..c757b21 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/stylesheet-redirect-allowed.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/stylesheet-redirect-allowed.html
@@ -3,7 +3,7 @@
<head>
<script src="resources/dump-as-text.js"></script>
<script src="resources/wait-until-done.js"></script>
-<meta http-equiv="Content-Security-Policy" content="style-src http://127.0.0.1:8000/resources/redirect.php http://localhost:8000">
-<link rel="stylesheet" href="http://127.0.0.1:8000/resources/redirect.php?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/blue.css" onload="alertAndDone('PASS')" onerror="alertAndDone('FAIL')">
+<meta http-equiv="Content-Security-Policy" content="style-src http://127.0.0.1:8000/resources/redirect.py http://localhost:8000">
+<link rel="stylesheet" href="http://127.0.0.1:8000/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/blue.css" onload="alertAndDone('PASS')" onerror="alertAndDone('FAIL')">
</head>
</html>
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/stylesheet-redirect-allowed2.html b/LayoutTests/http/tests/security/contentSecurityPolicy/stylesheet-redirect-allowed2.html
index e6280c7..8ae4d108 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/stylesheet-redirect-allowed2.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/stylesheet-redirect-allowed2.html
@@ -3,7 +3,7 @@
<head>
<script src="resources/dump-as-text.js"></script>
<script src="resources/wait-until-done.js"></script>
-<meta http-equiv="Content-Security-Policy" content="style-src http://127.0.0.1:8000/resources/redirect.php http://localhost:8000/this-path-should-be-ignored-when-matching-a-redirected-request">
-<link rel="stylesheet" href="http://127.0.0.1:8000/resources/redirect.php?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/blue.css" onload="alertAndDone('PASS')" onerror="alertAndDone('FAIL')">
+<meta http-equiv="Content-Security-Policy" content="style-src http://127.0.0.1:8000/resources/redirect.py http://localhost:8000/this-path-should-be-ignored-when-matching-a-redirected-request">
+<link rel="stylesheet" href="http://127.0.0.1:8000/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/blue.css" onload="alertAndDone('PASS')" onerror="alertAndDone('FAIL')">
</head>
</html>
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/stylesheet-redirect-blocked.html b/LayoutTests/http/tests/security/contentSecurityPolicy/stylesheet-redirect-blocked.html
index 00025c7..eb756be 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/stylesheet-redirect-blocked.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/stylesheet-redirect-blocked.html
@@ -3,7 +3,7 @@
<head>
<script src="resources/dump-as-text.js"></script>
<script src="resources/wait-until-done.js"></script>
-<meta http-equiv="Content-Security-Policy" content="style-src http://127.0.0.1:8000/resources/redirect.php">
-<link rel="stylesheet" href="http://127.0.0.1:8000/resources/redirect.php?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/blue.css" onload="alertAndDone('FAIL')" onerror="alertAndDone('PASS')">
+<meta http-equiv="Content-Security-Policy" content="style-src http://127.0.0.1:8000/resources/redirect.py">
+<link rel="stylesheet" href="http://127.0.0.1:8000/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/blue.css" onload="alertAndDone('FAIL')" onerror="alertAndDone('PASS')">
</head>
</html>
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/svg-font-redirect-allowed.html b/LayoutTests/http/tests/security/contentSecurityPolicy/svg-font-redirect-allowed.html
index 6aacafd..8d47a58 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/svg-font-redirect-allowed.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/svg-font-redirect-allowed.html
@@ -2,14 +2,14 @@
<html>
<head>
<script src="resources/dump-as-text.js"></script>
-<meta http-equiv="Content-Security-Policy" content="font-src http://127.0.0.1:8000/resources/redirect.php http://localhost:8000">
+<meta http-equiv="Content-Security-Policy" content="font-src http://127.0.0.1:8000/resources/redirect.py http://localhost:8000">
</head>
<body>
<p>Tests that a SVG font-face element is allowed to load a cross-origin external SVG font via a redirect by the Content Security Policy. This test PASSED if there are no console warning messages.</p>
<svg viewBox="0 0 100 100">
<font-face>
<font-face-src>
- <font-face-uri font-family="ABCFont" xlink:href="http://127.0.0.1:8000/resources/redirect.php?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/ABCFont.svg#ABCFont"></font-face-uri>
+ <font-face-uri font-family="ABCFont" xlink:href="http://127.0.0.1:8000/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/ABCFont.svg#ABCFont"></font-face-uri>
</font-face-src>
</font-face>
</svg>
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/svg-font-redirect-allowed2.html b/LayoutTests/http/tests/security/contentSecurityPolicy/svg-font-redirect-allowed2.html
index aa59729..55e4945 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/svg-font-redirect-allowed2.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/svg-font-redirect-allowed2.html
@@ -2,14 +2,14 @@
<html>
<head>
<script src="resources/dump-as-text.js"></script>
-<meta http-equiv="Content-Security-Policy" content="font-src http://127.0.0.1:8000/resources/redirect.php http://localhost:8000/this-path-should-be-ignored-when-matching-a-redirected-request">
+<meta http-equiv="Content-Security-Policy" content="font-src http://127.0.0.1:8000/resources/redirect.py http://localhost:8000/this-path-should-be-ignored-when-matching-a-redirected-request">
</head>
<body>
<p>Tests that a SVG font-face element is allowed to load a cross-origin external SVG font via a redirect by the Content Security Policy even though the policy does not contain a source expression that is an exact match of the redirected URL. This test PASSED if there are no console warning messages. This test PASSED if there are no console warning messages.</p>
<svg viewBox="0 0 100 100">
<font-face>
<font-face-src>
- <font-face-uri font-family="ABCFont" xlink:href="http://127.0.0.1:8000/resources/redirect.php?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/ABCFont.svg#ABCFont"></font-face-uri>
+ <font-face-uri font-family="ABCFont" xlink:href="http://127.0.0.1:8000/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/ABCFont.svg#ABCFont"></font-face-uri>
</font-face-src>
</font-face>
</svg>
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/svg-font-redirect-blocked.html b/LayoutTests/http/tests/security/contentSecurityPolicy/svg-font-redirect-blocked.html
index 9441991..98cb330 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/svg-font-redirect-blocked.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/svg-font-redirect-blocked.html
@@ -2,14 +2,14 @@
<html>
<head>
<script src="resources/dump-as-text.js"></script>
-<meta http-equiv="Content-Security-Policy" content="font-src http://127.0.0.1:8000/resources/redirect.php">
+<meta http-equiv="Content-Security-Policy" content="font-src http://127.0.0.1:8000/resources/redirect.py">
</head>
<body>
<p>Tests that a SVG font-face element is blocked from loading a cross-origin external SVG font via a redirect by the Content Security Policy. This test PASSED if there is a console warning message.</p>
<svg viewBox="0 0 100 100">
<font-face>
<font-face-src>
- <font-face-uri font-family="ABCFont" xlink:href="http://127.0.0.1:8000/resources/redirect.php?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/ABCFont.svg"></font-face-uri>
+ <font-face-uri font-family="ABCFont" xlink:href="http://127.0.0.1:8000/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/ABCFont.svg"></font-face-uri>
</font-face-src>
</font-face>
</svg>
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/svg-image-redirect-allowed.html b/LayoutTests/http/tests/security/contentSecurityPolicy/svg-image-redirect-allowed.html
index e93c86f..712da78 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/svg-image-redirect-allowed.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/svg-image-redirect-allowed.html
@@ -2,10 +2,10 @@
<html>
<head>
<script src="resources/dump-as-text.js"></script>
-<meta http-equiv="Content-Security-Policy" content="img-src http://127.0.0.1:8000/resources/redirect.php http://localhost:8000">
+<meta http-equiv="Content-Security-Policy" content="img-src http://127.0.0.1:8000/resources/redirect.py http://localhost:8000">
</head>
<body>
<p>Tests that a cross-origin SVG image loaded via a redirect is allowed by the Content Security Policy. This test PASSED if there are no console warning messages.</p>
-<img src="http://127.0.0.1:8000/resources/redirect.php?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/green-square.svg" width="128" height="128">
+<img src="http://127.0.0.1:8000/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/green-square.svg" width="128" height="128">
</body>
</html>
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/svg-image-redirect-allowed2.html b/LayoutTests/http/tests/security/contentSecurityPolicy/svg-image-redirect-allowed2.html
index 0668dca..7bfc95e 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/svg-image-redirect-allowed2.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/svg-image-redirect-allowed2.html
@@ -2,10 +2,10 @@
<html>
<head>
<script src="resources/dump-as-text.js"></script>
-<meta http-equiv="Content-Security-Policy" content="img-src http://127.0.0.1:8000/resources/redirect.php http://localhost:8000/this-path-should-be-ignored-when-matching-a-redirected-request">
+<meta http-equiv="Content-Security-Policy" content="img-src http://127.0.0.1:8000/resources/redirect.py http://localhost:8000/this-path-should-be-ignored-when-matching-a-redirected-request">
</head>
<body>
<p>Tests that a cross-origin SVG image loaded via a redirect is allowed by the Content Security Policy even though the policy does not contain a source expression that is an exact match of the redirected URL. This test PASSED if there are no console warning messages. This test PASSED if there are no console warning messages.</p>
-<img src="http://127.0.0.1:8000/resources/redirect.php?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/green-square.svg" width="128" height="128">
+<img src="http://127.0.0.1:8000/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/green-square.svg" width="128" height="128">
</body>
</html>
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/svg-image-redirect-blocked.html b/LayoutTests/http/tests/security/contentSecurityPolicy/svg-image-redirect-blocked.html
index 9213688..e768554 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/svg-image-redirect-blocked.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/svg-image-redirect-blocked.html
@@ -2,10 +2,10 @@
<html>
<head>
<script src="resources/dump-as-text.js"></script>
-<meta http-equiv="Content-Security-Policy" content="img-src http://127.0.0.1:8000/resources/redirect.php">
+<meta http-equiv="Content-Security-Policy" content="img-src http://127.0.0.1:8000/resources/redirect.py">
</head>
<body>
<p>Tests that a cross-origin SVG image loaded via a redirect is blocked by the Content Security Policy. This test PASSED if there is a console warning message.</p>
-<img src="http://127.0.0.1:8000/resources/redirect.php?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/red-square.svg" width="128" height="128">
+<img src="http://127.0.0.1:8000/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/red-square.svg" width="128" height="128">
</body>
</html>
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/track-redirect-allowed.html b/LayoutTests/http/tests/security/contentSecurityPolicy/track-redirect-allowed.html
index 195782e..41895bd 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/track-redirect-allowed.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/track-redirect-allowed.html
@@ -3,11 +3,11 @@
<head>
<script src="resources/dump-as-text.js"></script>
<script src="resources/wait-until-done.js"></script>
-<meta http-equiv="Content-Security-Policy" content="media-src http://127.0.0.1:8000/resources/redirect.php http://localhost:8000">
+<meta http-equiv="Content-Security-Policy" content="media-src http://127.0.0.1:8000/resources/redirect.py http://localhost:8000">
</head>
<body>
<video>
- <track src="http://127.0.0.1:8000/resources/redirect.php?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/track.vtt" kind="captions" onload="alertAndDone('PASS')" onerror="alertAndDone('FAIL')">
+ <track src="http://127.0.0.1:8000/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/track.vtt" kind="captions" onload="alertAndDone('PASS')" onerror="alertAndDone('FAIL')">
</video>
<script>
document.querySelector("track").track.mode = "hidden"; // Load the track
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/track-redirect-allowed2.html b/LayoutTests/http/tests/security/contentSecurityPolicy/track-redirect-allowed2.html
index 6d0b618..177e057 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/track-redirect-allowed2.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/track-redirect-allowed2.html
@@ -3,11 +3,11 @@
<head>
<script src="resources/dump-as-text.js"></script>
<script src="resources/wait-until-done.js"></script>
-<meta http-equiv="Content-Security-Policy" content="media-src http://127.0.0.1:8000/resources/redirect.php http://localhost:8000/this-path-should-be-ignored-when-matching-a-redirected-request">
+<meta http-equiv="Content-Security-Policy" content="media-src http://127.0.0.1:8000/resources/redirect.py http://localhost:8000/this-path-should-be-ignored-when-matching-a-redirected-request">
</head>
<body>
<video>
- <track src="http://127.0.0.1:8000/resources/redirect.php?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/track.vtt" kind="captions" onload="alertAndDone('PASS')" onerror="alertAndDone('FAIL')">
+ <track src="http://127.0.0.1:8000/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/track.vtt" kind="captions" onload="alertAndDone('PASS')" onerror="alertAndDone('FAIL')">
</video>
<script>
document.querySelector("track").track.mode = "hidden"; // Load the track
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/track-redirect-blocked.html b/LayoutTests/http/tests/security/contentSecurityPolicy/track-redirect-blocked.html
index aa23efb..9a5d70a 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/track-redirect-blocked.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/track-redirect-blocked.html
@@ -3,11 +3,11 @@
<head>
<script src="resources/dump-as-text.js"></script>
<script src="resources/wait-until-done.js"></script>
-<meta http-equiv="Content-Security-Policy" content="media-src http://127.0.0.1:8000/resources/redirect.php">
+<meta http-equiv="Content-Security-Policy" content="media-src http://127.0.0.1:8000/resources/redirect.py">
</head>
<body>
<video>
- <track src="http://127.0.0.1:8000/resources/redirect.php?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/track.vtt" kind="captions" onload="alertAndDone('FAIL')" onerror="alertAndDone('PASS')">
+ <track src="http://127.0.0.1:8000/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000/security/contentSecurityPolicy/resources/track.vtt" kind="captions" onload="alertAndDone('FAIL')" onerror="alertAndDone('PASS')">
</video>
<script>
document.querySelector("track").track.mode = "hidden"; // Load the track
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/upgrade-insecure-requests/basic-upgrade-after-redirect.https.html b/LayoutTests/http/tests/security/contentSecurityPolicy/upgrade-insecure-requests/basic-upgrade-after-redirect.https.html
index 365a6be..30bfff2 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/upgrade-insecure-requests/basic-upgrade-after-redirect.https.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/upgrade-insecure-requests/basic-upgrade-after-redirect.https.html
@@ -11,7 +11,7 @@
// This is a bit of a hack. UPGRADE doesn't upgrade the port number, so we
// specify this non-existent URL ('http' over port 8443). If UPGRADE doesn't
// work, it won't load.
-var insecureImage = "http://127.0.0.1:8443/resources/redirect.php?url=http://127.0.0.1:8443/security/resources/abe.png";
+var insecureImage = "http://127.0.0.1:8443/resources/redirect.py?url=http://127.0.0.1:8443/security/resources/abe.png";
(function() {
var t = async_test("Verify that images are upgraded after a redirection.");
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/upgrade-insecure-requests/resources/frame-with-redirect-http-to-https-script.html b/LayoutTests/http/tests/security/contentSecurityPolicy/upgrade-insecure-requests/resources/frame-with-redirect-http-to-https-script.html
index fbd3992..d3b366e 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/upgrade-insecure-requests/resources/frame-with-redirect-http-to-https-script.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/upgrade-insecure-requests/resources/frame-with-redirect-http-to-https-script.html
@@ -1,2 +1,2 @@
<meta http-equiv="Content-Security-Policy" content="upgrade-insecure-requests">
-<script src="http://127.0.0.1:8443/resources/redirect.php?url=https://127.0.0.1:8443/security/mixedContent/resources/script.js"></script>
+<script src="http://127.0.0.1:8443/resources/redirect.py?url=https://127.0.0.1:8443/security/mixedContent/resources/script.js"></script>
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/upgrade-insecure-requests/resources/frame-with-redirect-https-to-http-script.html b/LayoutTests/http/tests/security/contentSecurityPolicy/upgrade-insecure-requests/resources/frame-with-redirect-https-to-http-script.html
index 6dc7d52..8957fca 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/upgrade-insecure-requests/resources/frame-with-redirect-https-to-http-script.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/upgrade-insecure-requests/resources/frame-with-redirect-https-to-http-script.html
@@ -1,2 +1,2 @@
<meta http-equiv="Content-Security-Policy" content="upgrade-insecure-requests">
-<script src="hTtpS://127.0.0.1:8443/resources/redirect.php?url=hTtP://127.0.0.1:8080/security/mixedContent/resources/script.js"></script>
+<script src="hTtpS://127.0.0.1:8443/resources/redirect.py?url=hTtP://127.0.0.1:8080/security/mixedContent/resources/script.js"></script>
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/upgrade-insecure-requests/resources/insecure-sync-xhr-in-main-frame-window.html b/LayoutTests/http/tests/security/contentSecurityPolicy/upgrade-insecure-requests/resources/insecure-sync-xhr-in-main-frame-window.html
index c37973b..cd6435e 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/upgrade-insecure-requests/resources/insecure-sync-xhr-in-main-frame-window.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/upgrade-insecure-requests/resources/insecure-sync-xhr-in-main-frame-window.html
@@ -7,7 +7,7 @@
<script>
window.onload = function() {
const xhr = new XMLHttpRequest();
- xhr.open("GET", "/resources/redirect.php?url=http://127.0.0.1:8443/", false);
+ xhr.open("GET", "/resources/redirect.py?url=http://127.0.0.1:8443/", false);
xhr.send();
alert("PASS: upgraded sync XHR after redirection");
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/userAgentShadowDOM/allow-image-after-redirect.html b/LayoutTests/http/tests/security/contentSecurityPolicy/userAgentShadowDOM/allow-image-after-redirect.html
index c262c79..664565c 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/userAgentShadowDOM/allow-image-after-redirect.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/userAgentShadowDOM/allow-image-after-redirect.html
@@ -37,7 +37,7 @@
testRunner.notifyDone();
}
// HTTP 307 temporary redirect to <http://127.0.0.1:8000/security/resources/abe.png>.
- image.src = "http://localhost:8000/resources/redirect.php?code=307&url=/security/resources/abe.png";
+ image.src = "http://localhost:8000/resources/redirect.py?code=307&url=/security/resources/abe.png";
}
runTest();
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/video-redirect-allowed.html b/LayoutTests/http/tests/security/contentSecurityPolicy/video-redirect-allowed.html
index 4d87ff2..d3370ec 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/video-redirect-allowed.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/video-redirect-allowed.html
@@ -3,9 +3,9 @@
<head>
<script src="resources/dump-as-text.js"></script>
<script src="resources/wait-until-done.js"></script>
-<meta http-equiv="Content-Security-Policy" content="media-src http://127.0.0.1:8000/resources/redirect.php http://localhost:8000">
+<meta http-equiv="Content-Security-Policy" content="media-src http://127.0.0.1:8000/resources/redirect.py http://localhost:8000">
</head>
<body>
-<video src="http://127.0.0.1:8000/resources/redirect.php?code=307&url=http%3A%2F%2Flocalhost%3A8000/resources/test.mp4" onloadedmetadata="alertAndDone('PASS')" onerror="alertAndDone('FAIL')"></video>
+<video src="http://127.0.0.1:8000/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000/resources/test.mp4" onloadedmetadata="alertAndDone('PASS')" onerror="alertAndDone('FAIL')"></video>
</body>
</html>
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/video-redirect-allowed2.html b/LayoutTests/http/tests/security/contentSecurityPolicy/video-redirect-allowed2.html
index 6657942..af904be 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/video-redirect-allowed2.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/video-redirect-allowed2.html
@@ -3,9 +3,9 @@
<head>
<script src="resources/dump-as-text.js"></script>
<script src="resources/wait-until-done.js"></script>
-<meta http-equiv="Content-Security-Policy" content="media-src http://127.0.0.1:8000/resources/redirect.php http://localhost:8000/this-path-should-be-ignored-when-matching-a-redirected-request">
+<meta http-equiv="Content-Security-Policy" content="media-src http://127.0.0.1:8000/resources/redirect.py http://localhost:8000/this-path-should-be-ignored-when-matching-a-redirected-request">
</head>
<body>
-<video src="http://127.0.0.1:8000/resources/redirect.php?code=307&url=http%3A%2F%2Flocalhost%3A8000/resources/test.mp4" onloadedmetadata="alertAndDone('PASS')" onerror="alertAndDone('FAIL')"></video>
+<video src="http://127.0.0.1:8000/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000/resources/test.mp4" onloadedmetadata="alertAndDone('PASS')" onerror="alertAndDone('FAIL')"></video>
</body>
</html>
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/video-redirect-blocked.html b/LayoutTests/http/tests/security/contentSecurityPolicy/video-redirect-blocked.html
index f3724b7..7f00936 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/video-redirect-blocked.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/video-redirect-blocked.html
@@ -3,9 +3,9 @@
<head>
<script src="resources/dump-as-text.js"></script>
<script src="resources/wait-until-done.js"></script>
-<meta http-equiv="Content-Security-Policy" content="media-src http://127.0.0.1:8000/resources/redirect.php">
+<meta http-equiv="Content-Security-Policy" content="media-src http://127.0.0.1:8000/resources/redirect.py">
</head>
<body>
-<video src="http://127.0.0.1:8000/resources/redirect.php?code=307&url=http%3A%2F%2Flocalhost%3A8000/resources/test.mp4" onloadedmetadata="alertAndDone('FAIL')" onerror="alertAndDone('PASS')"></video>
+<video src="http://127.0.0.1:8000/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000/resources/test.mp4" onloadedmetadata="alertAndDone('FAIL')" onerror="alertAndDone('PASS')"></video>
</body>
</html>
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/worker-redirect-allowed-expected.txt b/LayoutTests/http/tests/security/contentSecurityPolicy/worker-redirect-allowed-expected.txt
index 3dd65d2..ea3f9a5 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/worker-redirect-allowed-expected.txt
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/worker-redirect-allowed-expected.txt
@@ -3,7 +3,7 @@
On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE".
-PASS worker = new Worker("http://127.0.0.1:8000/resources/redirect.php?url=http://127.0.0.1:8000/security/resources/worker-message-pass.js") did not throw exception.
+PASS worker = new Worker("http://127.0.0.1:8000/resources/redirect.py?url=http://127.0.0.1:8000/security/resources/worker-message-pass.js") did not throw exception.
PASS PASS: Worker loaded and sent message
PASS successfullyParsed is true
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/worker-redirect-allowed.html b/LayoutTests/http/tests/security/contentSecurityPolicy/worker-redirect-allowed.html
index ee92f30..424f828 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/worker-redirect-allowed.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/worker-redirect-allowed.html
@@ -1,7 +1,7 @@
<!DOCTYPE html>
<html>
<head>
-<meta http-equiv="Content-Security-Policy" content="child-src http://127.0.0.1:8000/resources/redirect.php">
+<meta http-equiv="Content-Security-Policy" content="child-src http://127.0.0.1:8000/resources/redirect.py">
<script src="/js-test-resources/js-test-pre.js"></script>
</head>
<body>
@@ -11,7 +11,7 @@
description("This tests that the Content Security Policy of the page allows loading a Web Worker's script redirected on the same origin.");
var worker;
-shouldNotThrow('worker = new Worker("http://127.0.0.1:8000/resources/redirect.php?url=http://127.0.0.1:8000/security/resources/worker-message-pass.js")');
+shouldNotThrow('worker = new Worker("http://127.0.0.1:8000/resources/redirect.py?url=http://127.0.0.1:8000/security/resources/worker-message-pass.js")');
worker.onmessage = function(event) {
testPassed(event.data);
finishJSTest();
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/xsl-redirect-allowed.html b/LayoutTests/http/tests/security/contentSecurityPolicy/xsl-redirect-allowed.html
index 0666a5f..9b02d22 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/xsl-redirect-allowed.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/xsl-redirect-allowed.html
@@ -12,6 +12,6 @@
</script>
</head>
<body>
-<iframe src="resources/xsl-redirect-allowed.php?csp=script-src+http%3A//127.0.0.1%3A8000/resources/redirect.php+http%3A//localhost%3A8000+%27unsafe-inline%27"></iframe>
+<iframe src="resources/xsl-redirect-allowed.php?csp=script-src+http%3A//127.0.0.1%3A8000/resources/redirect.py+http%3A//localhost%3A8000+%27unsafe-inline%27"></iframe>
</body>
</html>
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/xsl-redirect-allowed2.html b/LayoutTests/http/tests/security/contentSecurityPolicy/xsl-redirect-allowed2.html
index 2908895..1714318 100644
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/xsl-redirect-allowed2.html
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/xsl-redirect-allowed2.html
@@ -12,6 +12,6 @@
</script>
</head>
<body>
-<iframe src="resources/xsl-redirect-allowed.php?csp=script-src+http%3A//127.0.0.1%3A8000/resources/redirect.php+http%3A//localhost%3A8000/this-path-should-be-ignored-when-matching-a-redirected-request+%27unsafe-inline%27"></iframe>
+<iframe src="resources/xsl-redirect-allowed.php?csp=script-src+http%3A//127.0.0.1%3A8000/resources/redirect.py+http%3A//localhost%3A8000/this-path-should-be-ignored-when-matching-a-redirected-request+%27unsafe-inline%27"></iframe>
</body>
</html>
diff --git a/LayoutTests/http/tests/security/cors-post-redirect-301.html b/LayoutTests/http/tests/security/cors-post-redirect-301.html
index 926b308..1aa5e3f 100644
--- a/LayoutTests/http/tests/security/cors-post-redirect-301.html
+++ b/LayoutTests/http/tests/security/cors-post-redirect-301.html
@@ -17,7 +17,7 @@
<script>
var form = document.getElementById('testForm');
-form.action = "/resources/redirect.php?code=301&url=http://localhost:8000/security/resources/cors-post-redirect-target.php";
+form.action = "/resources/redirect.py?code=301&url=http://localhost:8000/security/resources/cors-post-redirect-target.php";
form.submit();
</script>
diff --git a/LayoutTests/http/tests/security/cors-post-redirect-302.html b/LayoutTests/http/tests/security/cors-post-redirect-302.html
index 2bea243..45049c3 100644
--- a/LayoutTests/http/tests/security/cors-post-redirect-302.html
+++ b/LayoutTests/http/tests/security/cors-post-redirect-302.html
@@ -17,7 +17,7 @@
<script>
var form = document.getElementById('testForm');
-form.action = "/resources/redirect.php?code=302&url=http://localhost:8000/security/resources/cors-post-redirect-target.php";
+form.action = "/resources/redirect.py?code=302&url=http://localhost:8000/security/resources/cors-post-redirect-target.php";
form.submit();
</script>
diff --git a/LayoutTests/http/tests/security/cors-post-redirect-303.html b/LayoutTests/http/tests/security/cors-post-redirect-303.html
index 2bea243..45049c3 100644
--- a/LayoutTests/http/tests/security/cors-post-redirect-303.html
+++ b/LayoutTests/http/tests/security/cors-post-redirect-303.html
@@ -17,7 +17,7 @@
<script>
var form = document.getElementById('testForm');
-form.action = "/resources/redirect.php?code=302&url=http://localhost:8000/security/resources/cors-post-redirect-target.php";
+form.action = "/resources/redirect.py?code=302&url=http://localhost:8000/security/resources/cors-post-redirect-target.php";
form.submit();
</script>
diff --git a/LayoutTests/http/tests/security/cors-post-redirect-307-pson.html b/LayoutTests/http/tests/security/cors-post-redirect-307-pson.html
index 133ff75..7a9ef0d 100644
--- a/LayoutTests/http/tests/security/cors-post-redirect-307-pson.html
+++ b/LayoutTests/http/tests/security/cors-post-redirect-307-pson.html
@@ -18,7 +18,7 @@
<script>
var form = document.getElementById('testForm');
-form.action = "/resources/redirect.php?code=307&url=http://localhost:8000/security/resources/cors-post-redirect-target.php";
+form.action = "/resources/redirect.py?code=307&url=http://localhost:8000/security/resources/cors-post-redirect-target.php";
form.submit();
</script>
diff --git a/LayoutTests/http/tests/security/cors-post-redirect-307.html b/LayoutTests/http/tests/security/cors-post-redirect-307.html
index 56ecc35..6dbfba9 100644
--- a/LayoutTests/http/tests/security/cors-post-redirect-307.html
+++ b/LayoutTests/http/tests/security/cors-post-redirect-307.html
@@ -17,7 +17,7 @@
<script>
var form = document.getElementById('testForm');
-form.action = "/resources/redirect.php?code=307&url=http://localhost:8000/security/resources/cors-post-redirect-target.php";
+form.action = "/resources/redirect.py?code=307&url=http://localhost:8000/security/resources/cors-post-redirect-target.php";
form.submit();
</script>
diff --git a/LayoutTests/http/tests/security/cors-post-redirect-308.html b/LayoutTests/http/tests/security/cors-post-redirect-308.html
index b0fdf1e..41ebe30 100644
--- a/LayoutTests/http/tests/security/cors-post-redirect-308.html
+++ b/LayoutTests/http/tests/security/cors-post-redirect-308.html
@@ -17,7 +17,7 @@
<script>
var form = document.getElementById('testForm');
-form.action = "/resources/redirect.php?code=308&url=http://localhost:8000/security/resources/cors-post-redirect-target.php";
+form.action = "/resources/redirect.py?code=308&url=http://localhost:8000/security/resources/cors-post-redirect-target.php";
form.submit();
</script>
diff --git a/LayoutTests/http/tests/security/cross-origin-css-1-expected.txt b/LayoutTests/http/tests/security/cross-origin-css-1-expected.txt
index 1d71fa3..ce1dcf2 100644
--- a/LayoutTests/http/tests/security/cross-origin-css-1-expected.txt
+++ b/LayoutTests/http/tests/security/cross-origin-css-1-expected.txt
@@ -1,4 +1,4 @@
-CONSOLE MESSAGE: Did not parse stylesheet at 'http://127.0.0.1:8000/resources/redirect.php?url=http://localhost:8000/security/resources/xorigincss1.html' because non CSS MIME types are not allowed in strict mode.
+CONSOLE MESSAGE: Did not parse stylesheet at 'http://127.0.0.1:8000/resources/redirect.py?url=http://localhost:8000/security/resources/xorigincss1.html' because non CSS MIME types are not allowed in strict mode.
PASS Testing cross-origin and MIME behavior for CSS.
PASS xorigincss1.html should not be loaded via <link>.
diff --git a/LayoutTests/http/tests/security/cross-origin-css-1.html b/LayoutTests/http/tests/security/cross-origin-css-1.html
index a816e06..44fdad0 100644
--- a/LayoutTests/http/tests/security/cross-origin-css-1.html
+++ b/LayoutTests/http/tests/security/cross-origin-css-1.html
@@ -11,7 +11,7 @@
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
-<link rel="stylesheet" href="/resources/redirect.php?url=http://localhost:8000/security/resources/xorigincss1.html"></link>
+<link rel="stylesheet" href="/resources/redirect.py?url=http://localhost:8000/security/resources/xorigincss1.html"></link>
<script>
function getBackgroundColorForId(id) {
diff --git a/LayoutTests/http/tests/security/cross-origin-css-2-expected.txt b/LayoutTests/http/tests/security/cross-origin-css-2-expected.txt
index 2367752..248f688 100644
--- a/LayoutTests/http/tests/security/cross-origin-css-2-expected.txt
+++ b/LayoutTests/http/tests/security/cross-origin-css-2-expected.txt
@@ -1,4 +1,4 @@
-CONSOLE MESSAGE: Did not parse stylesheet at 'http://127.0.0.1:8000/resources/redirect.php?url=http://localhost:8000/security/resources/xorigincss2.html' because non CSS MIME types are not allowed in strict mode.
+CONSOLE MESSAGE: Did not parse stylesheet at 'http://127.0.0.1:8000/resources/redirect.py?url=http://localhost:8000/security/resources/xorigincss2.html' because non CSS MIME types are not allowed in strict mode.
PASS Testing cross-origin and MIME behavior for CSS.
PASS xorigincss2.html should not be loaded either via <link> or @import.
diff --git a/LayoutTests/http/tests/security/cross-origin-css-2.html b/LayoutTests/http/tests/security/cross-origin-css-2.html
index 733d16e..45978e2 100644
--- a/LayoutTests/http/tests/security/cross-origin-css-2.html
+++ b/LayoutTests/http/tests/security/cross-origin-css-2.html
@@ -11,7 +11,7 @@
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
-<link rel="stylesheet" type="text/css" href="/resources/redirect.php?url=http://localhost:8000/security/resources/xorigincss2.html"></link>
+<link rel="stylesheet" type="text/css" href="/resources/redirect.py?url=http://localhost:8000/security/resources/xorigincss2.html"></link>
<script>
function getBackgroundColorForId(id) {
return window.getComputedStyle(document.getElementById(id), null).getPropertyValue('background-color')
diff --git a/LayoutTests/http/tests/security/cross-origin-css-3.html b/LayoutTests/http/tests/security/cross-origin-css-3.html
index 9cf40ad..033e557 100644
--- a/LayoutTests/http/tests/security/cross-origin-css-3.html
+++ b/LayoutTests/http/tests/security/cross-origin-css-3.html
@@ -12,7 +12,7 @@
<script src="/resources/testharnessreport.js"></script>
<link rel="stylesheet"
- href="/resources/redirect.php?url=http://localhost:8000/security/resources/xorigincss1.css"></link>
+ href="/resources/redirect.py?url=http://localhost:8000/security/resources/xorigincss1.css"></link>
<script>
function getBackgroundColorForId(id) {
diff --git a/LayoutTests/http/tests/security/cross-origin-css-5-expected.txt b/LayoutTests/http/tests/security/cross-origin-css-5-expected.txt
index 82dd895..d77385a 100644
--- a/LayoutTests/http/tests/security/cross-origin-css-5-expected.txt
+++ b/LayoutTests/http/tests/security/cross-origin-css-5-expected.txt
@@ -1,4 +1,4 @@
-CONSOLE MESSAGE: Did not parse stylesheet at 'http://127.0.0.1:8000/resources/redirect.php?url=http://localhost:8000/security/resources/xorigincss4.html' because non CSS MIME types are not allowed in strict mode.
+CONSOLE MESSAGE: Did not parse stylesheet at 'http://127.0.0.1:8000/resources/redirect.py?url=http://localhost:8000/security/resources/xorigincss4.html' because non CSS MIME types are not allowed in strict mode.
PASS Testing cross-origin and MIME behavior for CSS.
PASS xorigincss4.html should not be loaded via @import.
diff --git a/LayoutTests/http/tests/security/cross-origin-css-5.html b/LayoutTests/http/tests/security/cross-origin-css-5.html
index e3236d2..355c040 100644
--- a/LayoutTests/http/tests/security/cross-origin-css-5.html
+++ b/LayoutTests/http/tests/security/cross-origin-css-5.html
@@ -12,7 +12,7 @@
<script src="/resources/testharnessreport.js"></script>
<style>
-@import "/resources/redirect.php?url=http://localhost:8000/security/resources/xorigincss4.html";
+@import "/resources/redirect.py?url=http://localhost:8000/security/resources/xorigincss4.html";
</style>
<script>
function getBackgroundColorForId(id) {
diff --git a/LayoutTests/http/tests/security/cross-origin-css-6.html b/LayoutTests/http/tests/security/cross-origin-css-6.html
index e73bc55..9ad0793 100644
--- a/LayoutTests/http/tests/security/cross-origin-css-6.html
+++ b/LayoutTests/http/tests/security/cross-origin-css-6.html
@@ -12,7 +12,7 @@
<script src="/resources/testharnessreport.js"></script>
<style>
-@import "/resources/redirect.php?url=http://localhost:8000/security/resources/xorigincss2.css";
+@import "/resources/redirect.py?url=http://localhost:8000/security/resources/xorigincss2.css";
</style>
<script>
function getBackgroundColorForId(id) {
diff --git a/LayoutTests/http/tests/security/cross-origin-css-in-quirks-1-expected.txt b/LayoutTests/http/tests/security/cross-origin-css-in-quirks-1-expected.txt
index 32ddf17..49e63b8 100644
--- a/LayoutTests/http/tests/security/cross-origin-css-in-quirks-1-expected.txt
+++ b/LayoutTests/http/tests/security/cross-origin-css-in-quirks-1-expected.txt
@@ -1,4 +1,4 @@
-CONSOLE MESSAGE: Did not parse stylesheet at 'http://127.0.0.1:8000/resources/redirect.php?url=http://localhost:8000/security/resources/xorigincss1.html' because non CSS MIME types are not allowed for cross-origin stylesheets.
+CONSOLE MESSAGE: Did not parse stylesheet at 'http://127.0.0.1:8000/resources/redirect.py?url=http://localhost:8000/security/resources/xorigincss1.html' because non CSS MIME types are not allowed for cross-origin stylesheets.
PASS Testing cross-origin and MIME behavior for CSS.
PASS xorigincss1.html should not be loaded via <link>.
diff --git a/LayoutTests/http/tests/security/cross-origin-css-in-quirks-1.html b/LayoutTests/http/tests/security/cross-origin-css-in-quirks-1.html
index 91d0d8f..400bdb0 100644
--- a/LayoutTests/http/tests/security/cross-origin-css-in-quirks-1.html
+++ b/LayoutTests/http/tests/security/cross-origin-css-in-quirks-1.html
@@ -14,7 +14,7 @@
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
-<link rel="stylesheet" href="/resources/redirect.php?url=http://localhost:8000/security/resources/xorigincss1.html"></link>
+<link rel="stylesheet" href="/resources/redirect.py?url=http://localhost:8000/security/resources/xorigincss1.html"></link>
<script>
function getBackgroundColorForId(id) {
diff --git a/LayoutTests/http/tests/security/cross-origin-css-in-quirks-2-expected.txt b/LayoutTests/http/tests/security/cross-origin-css-in-quirks-2-expected.txt
index d5d04ec..a5ba4de 100644
--- a/LayoutTests/http/tests/security/cross-origin-css-in-quirks-2-expected.txt
+++ b/LayoutTests/http/tests/security/cross-origin-css-in-quirks-2-expected.txt
@@ -1,4 +1,4 @@
-CONSOLE MESSAGE: Did not parse stylesheet at 'http://127.0.0.1:8000/resources/redirect.php?url=http://localhost:8000/security/resources/xorigincss2.html' because non CSS MIME types are not allowed for cross-origin stylesheets.
+CONSOLE MESSAGE: Did not parse stylesheet at 'http://127.0.0.1:8000/resources/redirect.py?url=http://localhost:8000/security/resources/xorigincss2.html' because non CSS MIME types are not allowed for cross-origin stylesheets.
PASS Testing cross-origin and MIME behavior for CSS.
PASS xorigincss2.html should not be loaded either via <link> or @import.
diff --git a/LayoutTests/http/tests/security/cross-origin-css-in-quirks-2.html b/LayoutTests/http/tests/security/cross-origin-css-in-quirks-2.html
index fadb804..71dab08 100644
--- a/LayoutTests/http/tests/security/cross-origin-css-in-quirks-2.html
+++ b/LayoutTests/http/tests/security/cross-origin-css-in-quirks-2.html
@@ -14,7 +14,7 @@
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
-<link rel="stylesheet" type="text/css" href="/resources/redirect.php?url=http://localhost:8000/security/resources/xorigincss2.html"></link>
+<link rel="stylesheet" type="text/css" href="/resources/redirect.py?url=http://localhost:8000/security/resources/xorigincss2.html"></link>
<script>
function getBackgroundColorForId(id) {
return window.getComputedStyle(document.getElementById(id), null).getPropertyValue('background-color')
diff --git a/LayoutTests/http/tests/security/cross-origin-css-in-quirks-3.html b/LayoutTests/http/tests/security/cross-origin-css-in-quirks-3.html
index b55c0a1..e4dfc00 100644
--- a/LayoutTests/http/tests/security/cross-origin-css-in-quirks-3.html
+++ b/LayoutTests/http/tests/security/cross-origin-css-in-quirks-3.html
@@ -15,7 +15,7 @@
<script src="/resources/testharnessreport.js"></script>
<link rel="stylesheet"
- href="/resources/redirect.php?url=http://localhost:8000/security/resources/xorigincss1.css"></link>
+ href="/resources/redirect.py?url=http://localhost:8000/security/resources/xorigincss1.css"></link>
<script>
function getBackgroundColorForId(id) {
diff --git a/LayoutTests/http/tests/security/cross-origin-css-in-quirks-5-expected.txt b/LayoutTests/http/tests/security/cross-origin-css-in-quirks-5-expected.txt
index 8821589..286fd17 100644
--- a/LayoutTests/http/tests/security/cross-origin-css-in-quirks-5-expected.txt
+++ b/LayoutTests/http/tests/security/cross-origin-css-in-quirks-5-expected.txt
@@ -1,4 +1,4 @@
-CONSOLE MESSAGE: Did not parse stylesheet at 'http://127.0.0.1:8000/resources/redirect.php?url=http://localhost:8000/security/resources/xorigincss4.html' because non CSS MIME types are not allowed for cross-origin stylesheets.
+CONSOLE MESSAGE: Did not parse stylesheet at 'http://127.0.0.1:8000/resources/redirect.py?url=http://localhost:8000/security/resources/xorigincss4.html' because non CSS MIME types are not allowed for cross-origin stylesheets.
PASS Testing cross-origin and MIME behavior for CSS.
PASS xorigincss4.html should not be loaded via @import.
diff --git a/LayoutTests/http/tests/security/cross-origin-css-in-quirks-5.html b/LayoutTests/http/tests/security/cross-origin-css-in-quirks-5.html
index 9ad5d7b..43154e7 100644
--- a/LayoutTests/http/tests/security/cross-origin-css-in-quirks-5.html
+++ b/LayoutTests/http/tests/security/cross-origin-css-in-quirks-5.html
@@ -15,7 +15,7 @@
<script src="/resources/testharnessreport.js"></script>
<style>
-@import "/resources/redirect.php?url=http://localhost:8000/security/resources/xorigincss4.html";
+@import "/resources/redirect.py?url=http://localhost:8000/security/resources/xorigincss4.html";
</style>
<script>
function getBackgroundColorForId(id) {
diff --git a/LayoutTests/http/tests/security/cross-origin-css-in-quirks-6.html b/LayoutTests/http/tests/security/cross-origin-css-in-quirks-6.html
index 87145db..7449f36 100644
--- a/LayoutTests/http/tests/security/cross-origin-css-in-quirks-6.html
+++ b/LayoutTests/http/tests/security/cross-origin-css-in-quirks-6.html
@@ -15,7 +15,7 @@
<script src="/resources/testharnessreport.js"></script>
<style>
-@import "/resources/redirect.php?url=http://localhost:8000/security/resources/xorigincss2.css";
+@import "/resources/redirect.py?url=http://localhost:8000/security/resources/xorigincss2.css";
</style>
<script>
function getBackgroundColorForId(id) {
diff --git a/LayoutTests/http/tests/security/cross-origin-script-error-event-redirected.html b/LayoutTests/http/tests/security/cross-origin-script-error-event-redirected.html
index 7bd4a70..dc190b5 100644
--- a/LayoutTests/http/tests/security/cross-origin-script-error-event-redirected.html
+++ b/LayoutTests/http/tests/security/cross-origin-script-error-event-redirected.html
@@ -17,6 +17,6 @@
return true;
});
</script>
-<script src="/resources/redirect.php?url=http://localhost:8000/security/resources/cross-origin-script.txt"></script>
+<script src="/resources/redirect.py?url=http://localhost:8000/security/resources/cross-origin-script.txt"></script>
</body>
</html>
diff --git a/LayoutTests/http/tests/security/cross-origin-script-window-onerror-redirected.html b/LayoutTests/http/tests/security/cross-origin-script-window-onerror-redirected.html
index 06ff632..57d2733 100644
--- a/LayoutTests/http/tests/security/cross-origin-script-window-onerror-redirected.html
+++ b/LayoutTests/http/tests/security/cross-origin-script-window-onerror-redirected.html
@@ -17,7 +17,7 @@
return true;
}
</script>
-<script src="/resources/redirect.php?url=http://localhost:8000/security/resources/cross-origin-script.txt">
+<script src="/resources/redirect.py?url=http://localhost:8000/security/resources/cross-origin-script.txt">
</script>
</body>
</html>
diff --git a/LayoutTests/http/tests/security/load-image-after-redirection-2-expected.txt b/LayoutTests/http/tests/security/load-image-after-redirection-2-expected.txt
index f626485..f7afd9bfa 100644
--- a/LayoutTests/http/tests/security/load-image-after-redirection-2-expected.txt
+++ b/LayoutTests/http/tests/security/load-image-after-redirection-2-expected.txt
@@ -1,5 +1,5 @@
CONSOLE MESSAGE: Cross-origin redirection to http://127.0.0.1:8000/security/resources/allow-if-origin.php denied by Cross-Origin Resource Sharing policy: Origin http://127.0.0.1:8000 is not allowed by Access-Control-Allow-Origin.
-CONSOLE MESSAGE: Cannot load image http://localhost:8000/resources/redirect.php?url=http://127.0.0.1:8000/security/resources/allow-if-origin.php&allowCache due to access control checks.
+CONSOLE MESSAGE: Cannot load image http://localhost:8000/resources/redirect.py?url=http://127.0.0.1:8000/security/resources/allow-if-origin.php&allowCache due to access control checks.
PASS Loading an image in no-cors mode after a CORS invalid redirection is ok
PASS Loading an image in cors mode after a CORS invalid redirection is stopped
diff --git a/LayoutTests/http/tests/security/load-image-after-redirection-2.html b/LayoutTests/http/tests/security/load-image-after-redirection-2.html
index c144a25..480ece9 100644
--- a/LayoutTests/http/tests/security/load-image-after-redirection-2.html
+++ b/LayoutTests/http/tests/security/load-image-after-redirection-2.html
@@ -9,7 +9,7 @@
<body>
<img id="image1" style="visibility:hidden"></img><img id="image2" crossorigin="use-credentials" style="visibility:hidden"></img>
<script type="text/javascript">
-var imageURLAfterCORSInvalidRedirection = "http://localhost:8000/resources/redirect.php?url=http://127.0.0.1:8000/security/resources/allow-if-origin.php&allowCache";
+var imageURLAfterCORSInvalidRedirection = "http://localhost:8000/resources/redirect.py?url=http://127.0.0.1:8000/security/resources/allow-if-origin.php&allowCache";
promise_test((test) => {
return new Promise((resolve, reject) => {
var image = document.getElementById("image1");
diff --git a/LayoutTests/http/tests/security/load-image-after-redirection-expected.txt b/LayoutTests/http/tests/security/load-image-after-redirection-expected.txt
index eab8c56..4a8e864 100644
--- a/LayoutTests/http/tests/security/load-image-after-redirection-expected.txt
+++ b/LayoutTests/http/tests/security/load-image-after-redirection-expected.txt
@@ -1,5 +1,5 @@
CONSOLE MESSAGE: Cross-origin redirection to http://127.0.0.1:8000/security/resources/abe-allow-star.php denied by Cross-Origin Resource Sharing policy: Origin http://127.0.0.1:8000 is not allowed by Access-Control-Allow-Origin.
-CONSOLE MESSAGE: Cannot load image http://localhost:8000/resources/redirect.php?url=http://127.0.0.1:8000/security/resources/abe-allow-star.php due to access control checks.
+CONSOLE MESSAGE: Cannot load image http://localhost:8000/resources/redirect.py?url=http://127.0.0.1:8000/security/resources/abe-allow-star.php due to access control checks.
PASS Loading an image in no-cors mode after a CORS invalid redirection is ok
PASS Loading an image in cors mode after a CORS invalid redirection is stopped
diff --git a/LayoutTests/http/tests/security/load-image-after-redirection.html b/LayoutTests/http/tests/security/load-image-after-redirection.html
index 876e85e..ae7fe3b 100644
--- a/LayoutTests/http/tests/security/load-image-after-redirection.html
+++ b/LayoutTests/http/tests/security/load-image-after-redirection.html
@@ -9,7 +9,7 @@
<body>
<img id="image1" style="visibility:hidden"></img><img id="image2"crossorigin="anonymous" style="visibility:hidden"></img>
<script type="text/javascript">
-var imageURLAfterCORSInvalidRedirection = "http://localhost:8000/resources/redirect.php?url=http://127.0.0.1:8000/security/resources/abe-allow-star.php";
+var imageURLAfterCORSInvalidRedirection = "http://localhost:8000/resources/redirect.py?url=http://127.0.0.1:8000/security/resources/abe-allow-star.php";
promise_test((test) => {
return new Promise((resolve, reject) => {
var image = document.getElementById("image1");
diff --git a/LayoutTests/http/tests/security/mixedContent/insecure-image-redirects-to-basic-auth-secure-image-allowCrossOriginSubresourcesToAskForCredentials-expected.txt b/LayoutTests/http/tests/security/mixedContent/insecure-image-redirects-to-basic-auth-secure-image-allowCrossOriginSubresourcesToAskForCredentials-expected.txt
index cf208dd..4f233e7 100644
--- a/LayoutTests/http/tests/security/mixedContent/insecure-image-redirects-to-basic-auth-secure-image-allowCrossOriginSubresourcesToAskForCredentials-expected.txt
+++ b/LayoutTests/http/tests/security/mixedContent/insecure-image-redirects-to-basic-auth-secure-image-allowCrossOriginSubresourcesToAskForCredentials-expected.txt
@@ -1,6 +1,6 @@
-CONSOLE MESSAGE: The page at https://127.0.0.1:8443/security/mixedContent/resources/frame-with-insecure-image-redirects-to-basic-auth-secure-image.html?allowCrossOriginSubresourcesToAskForCredentials=1 was allowed to display insecure content from http://127.0.0.1:8080/resources/redirect.php?url=https://localhost:8443/security/mixedContent/resources/subresource/protected-image.php.
+CONSOLE MESSAGE: The page at https://127.0.0.1:8443/security/mixedContent/resources/frame-with-insecure-image-redirects-to-basic-auth-secure-image.html?allowCrossOriginSubresourcesToAskForCredentials=1 was allowed to display insecure content from http://127.0.0.1:8080/resources/redirect.py?url=https://localhost:8443/security/mixedContent/resources/subresource/protected-image.php.
-http://127.0.0.1:8080/resources/redirect.php?url=https://localhost:8443/security/mixedContent/resources/subresource/protected-image.php - didReceiveAuthenticationChallenge - Responding with testUser:testPassword
+http://127.0.0.1:8080/resources/redirect.py?url=https://localhost:8443/security/mixedContent/resources/subresource/protected-image.php - didReceiveAuthenticationChallenge - Responding with testUser:testPassword
This test opens a new window to a secure page that loads an insecure image that redirects to a secure image guarded by basic authentication. The image should load.
PASS did load image.
diff --git a/LayoutTests/http/tests/security/mixedContent/insecure-image-redirects-to-basic-auth-secure-image-expected.txt b/LayoutTests/http/tests/security/mixedContent/insecure-image-redirects-to-basic-auth-secure-image-expected.txt
index 5f5040d..b92a1ec 100644
--- a/LayoutTests/http/tests/security/mixedContent/insecure-image-redirects-to-basic-auth-secure-image-expected.txt
+++ b/LayoutTests/http/tests/security/mixedContent/insecure-image-redirects-to-basic-auth-secure-image-expected.txt
@@ -1,4 +1,4 @@
-CONSOLE MESSAGE: The page at https://127.0.0.1:8443/security/mixedContent/resources/frame-with-insecure-image-redirects-to-basic-auth-secure-image.html was allowed to display insecure content from http://127.0.0.1:8080/resources/redirect.php?url=https://localhost:8443/security/mixedContent/resources/subresource/protected-image.php.
+CONSOLE MESSAGE: The page at https://127.0.0.1:8443/security/mixedContent/resources/frame-with-insecure-image-redirects-to-basic-auth-secure-image.html was allowed to display insecure content from http://127.0.0.1:8080/resources/redirect.py?url=https://localhost:8443/security/mixedContent/resources/subresource/protected-image.php.
CONSOLE MESSAGE: Blocked https://localhost:8443/security/mixedContent/resources/subresource/protected-image.php from asking for credentials because it is a cross-origin request.
This test opens a new window to a secure page that loads an insecure image that redirects to a secure image guarded by basic authentication. The secure image should be blocked because it requires credentials and was loaded via an insecure redirect.
diff --git a/LayoutTests/http/tests/security/mixedContent/insecure-script-redirects-to-basic-auth-secure-script-expected.https.txt b/LayoutTests/http/tests/security/mixedContent/insecure-script-redirects-to-basic-auth-secure-script-expected.https.txt
index 53df79a..c64477b 100644
--- a/LayoutTests/http/tests/security/mixedContent/insecure-script-redirects-to-basic-auth-secure-script-expected.https.txt
+++ b/LayoutTests/http/tests/security/mixedContent/insecure-script-redirects-to-basic-auth-secure-script-expected.https.txt
@@ -1,4 +1,4 @@
-CONSOLE MESSAGE: [blocked] The page at https://127.0.0.1:8443/security/mixedContent/resources/frame-with-insecure-script-redirects-to-basic-auth-secure-script.html was not allowed to run insecure content from http://127.0.0.1:8080/resources/redirect.php?url=https://localhost:8443/security/mixedContent/resources/subresource/protected-script.php.
+CONSOLE MESSAGE: [blocked] The page at https://127.0.0.1:8443/security/mixedContent/resources/frame-with-insecure-script-redirects-to-basic-auth-secure-script.html was not allowed to run insecure content from http://127.0.0.1:8080/resources/redirect.py?url=https://localhost:8443/security/mixedContent/resources/subresource/protected-script.php.
This test opens a new window to a secure page that loads an insecure script that redirects to a secure script guarded by basic authentication. The secure script should be blocked because it requires credentials and was loaded via an insecure redirect.
diff --git a/LayoutTests/http/tests/security/mixedContent/insecure-script-redirects-to-basic-auth-secure-script-expected.txt b/LayoutTests/http/tests/security/mixedContent/insecure-script-redirects-to-basic-auth-secure-script-expected.txt
index 53df79a..c64477b 100644
--- a/LayoutTests/http/tests/security/mixedContent/insecure-script-redirects-to-basic-auth-secure-script-expected.txt
+++ b/LayoutTests/http/tests/security/mixedContent/insecure-script-redirects-to-basic-auth-secure-script-expected.txt
@@ -1,4 +1,4 @@
-CONSOLE MESSAGE: [blocked] The page at https://127.0.0.1:8443/security/mixedContent/resources/frame-with-insecure-script-redirects-to-basic-auth-secure-script.html was not allowed to run insecure content from http://127.0.0.1:8080/resources/redirect.php?url=https://localhost:8443/security/mixedContent/resources/subresource/protected-script.php.
+CONSOLE MESSAGE: [blocked] The page at https://127.0.0.1:8443/security/mixedContent/resources/frame-with-insecure-script-redirects-to-basic-auth-secure-script.html was not allowed to run insecure content from http://127.0.0.1:8080/resources/redirect.py?url=https://localhost:8443/security/mixedContent/resources/subresource/protected-script.php.
This test opens a new window to a secure page that loads an insecure script that redirects to a secure script guarded by basic authentication. The secure script should be blocked because it requires credentials and was loaded via an insecure redirect.
diff --git a/LayoutTests/http/tests/security/mixedContent/insecure-stylesheet-redirects-to-basic-auth-secure-stylesheet-expected.txt b/LayoutTests/http/tests/security/mixedContent/insecure-stylesheet-redirects-to-basic-auth-secure-stylesheet-expected.txt
index 15f4f60..7d0c146 100644
--- a/LayoutTests/http/tests/security/mixedContent/insecure-stylesheet-redirects-to-basic-auth-secure-stylesheet-expected.txt
+++ b/LayoutTests/http/tests/security/mixedContent/insecure-stylesheet-redirects-to-basic-auth-secure-stylesheet-expected.txt
@@ -1,4 +1,4 @@
-CONSOLE MESSAGE: [blocked] The page at https://127.0.0.1:8443/security/mixedContent/resources/frame-with-insecure-stylesheet-redirects-to-basic-auth-secure-stylesheet.html was not allowed to run insecure content from http://127.0.0.1:8080/resources/redirect.php?url=https://localhost:8443/security/mixedContent/resources/subresource/protected-stylesheet.php.
+CONSOLE MESSAGE: [blocked] The page at https://127.0.0.1:8443/security/mixedContent/resources/frame-with-insecure-stylesheet-redirects-to-basic-auth-secure-stylesheet.html was not allowed to run insecure content from http://127.0.0.1:8080/resources/redirect.py?url=https://localhost:8443/security/mixedContent/resources/subresource/protected-stylesheet.php.
This test opens a new window to a secure page that loads an insecure stylesheet that redirects to a secure stylesheet guarded by basic authentication. The secure script should be blocked because it requires credentials and was loaded via an insecure redirect.
diff --git a/LayoutTests/http/tests/security/mixedContent/redirect-http-to-https-iframe-in-main-frame-expected.txt b/LayoutTests/http/tests/security/mixedContent/redirect-http-to-https-iframe-in-main-frame-expected.txt
index 5a1bd4a..a0bf7c6 100644
--- a/LayoutTests/http/tests/security/mixedContent/redirect-http-to-https-iframe-in-main-frame-expected.txt
+++ b/LayoutTests/http/tests/security/mixedContent/redirect-http-to-https-iframe-in-main-frame-expected.txt
@@ -4,7 +4,7 @@
main frame - didFinishLoadForFrame
main frame - didCommitLoadForFrame
frame "<!--frame1-->" - didStartProvisionalLoadForFrame
-CONSOLE MESSAGE: [blocked] The page at about:blank was not allowed to display insecure content from http://127.0.0.1:8080/resources/redirect.php?url=https://127.0.0.1:8443/security/mixedContent/resources/boring.html.
+CONSOLE MESSAGE: [blocked] The page at about:blank was not allowed to display insecure content from http://127.0.0.1:8080/resources/redirect.py?url=https://127.0.0.1:8443/security/mixedContent/resources/boring.html.
frame "<!--frame1-->" - didFailProvisionalLoadWithError
main frame - didFinishDocumentLoadForFrame
diff --git a/LayoutTests/http/tests/security/mixedContent/redirect-http-to-https-script-in-iframe-expected.txt b/LayoutTests/http/tests/security/mixedContent/redirect-http-to-https-script-in-iframe-expected.txt
index b84844c..73b413a 100644
--- a/LayoutTests/http/tests/security/mixedContent/redirect-http-to-https-script-in-iframe-expected.txt
+++ b/LayoutTests/http/tests/security/mixedContent/redirect-http-to-https-script-in-iframe-expected.txt
@@ -1,7 +1,7 @@
frame "<!--frame1-->" - didStartProvisionalLoadForFrame
main frame - didFinishDocumentLoadForFrame
frame "<!--frame1-->" - didCommitLoadForFrame
-CONSOLE MESSAGE: [blocked] The page at https://127.0.0.1:8443/security/mixedContent/resources/frame-with-redirect-http-to-https-script.html was not allowed to run insecure content from http://127.0.0.1:8080/resources/redirect.php?url=https://127.0.0.1:8443/security/mixedContent/resources/script.js.
+CONSOLE MESSAGE: [blocked] The page at https://127.0.0.1:8443/security/mixedContent/resources/frame-with-redirect-http-to-https-script.html was not allowed to run insecure content from http://127.0.0.1:8080/resources/redirect.py?url=https://127.0.0.1:8443/security/mixedContent/resources/script.js.
frame "<!--frame1-->" - didFinishDocumentLoadForFrame
frame "<!--frame1-->" - didHandleOnloadEventsForFrame
diff --git a/LayoutTests/http/tests/security/mixedContent/resources/frame-with-insecure-image-redirects-to-basic-auth-secure-image.html b/LayoutTests/http/tests/security/mixedContent/resources/frame-with-insecure-image-redirects-to-basic-auth-secure-image.html
index ead7f55..0a2285b 100644
--- a/LayoutTests/http/tests/security/mixedContent/resources/frame-with-insecure-image-redirects-to-basic-auth-secure-image.html
+++ b/LayoutTests/http/tests/security/mixedContent/resources/frame-with-insecure-image-redirects-to-basic-auth-secure-image.html
@@ -15,6 +15,6 @@
</script>
</head>
<body>
-<img src="http://127.0.0.1:8080/resources/redirect.php?url=https://localhost:8443/security/mixedContent/resources/subresource/protected-image.php" onerror="checkResult(event)" onload="checkResult(event)">
+<img src="http://127.0.0.1:8080/resources/redirect.py?url=https://localhost:8443/security/mixedContent/resources/subresource/protected-image.php" onerror="checkResult(event)" onload="checkResult(event)">
</body>
</html>
diff --git a/LayoutTests/http/tests/security/mixedContent/resources/frame-with-insecure-script-redirects-to-basic-auth-secure-script.html b/LayoutTests/http/tests/security/mixedContent/resources/frame-with-insecure-script-redirects-to-basic-auth-secure-script.html
index 5682b4b..972fbae 100644
--- a/LayoutTests/http/tests/security/mixedContent/resources/frame-with-insecure-script-redirects-to-basic-auth-secure-script.html
+++ b/LayoutTests/http/tests/security/mixedContent/resources/frame-with-insecure-script-redirects-to-basic-auth-secure-script.html
@@ -14,6 +14,6 @@
</script>
</head>
<body>
-<script src="http://127.0.0.1:8080/resources/redirect.php?url=https://localhost:8443/security/mixedContent/resources/subresource/protected-script.php" onerror="pass()" onload="fail()"></script>
+<script src="http://127.0.0.1:8080/resources/redirect.py?url=https://localhost:8443/security/mixedContent/resources/subresource/protected-script.php" onerror="pass()" onload="fail()"></script>
</body>
</html>
diff --git a/LayoutTests/http/tests/security/mixedContent/resources/frame-with-insecure-stylesheet-redirects-to-basic-auth-secure-stylesheet.html b/LayoutTests/http/tests/security/mixedContent/resources/frame-with-insecure-stylesheet-redirects-to-basic-auth-secure-stylesheet.html
index 7298afe..f2bd03e 100644
--- a/LayoutTests/http/tests/security/mixedContent/resources/frame-with-insecure-stylesheet-redirects-to-basic-auth-secure-stylesheet.html
+++ b/LayoutTests/http/tests/security/mixedContent/resources/frame-with-insecure-stylesheet-redirects-to-basic-auth-secure-stylesheet.html
@@ -10,7 +10,7 @@
window.opener.postMessage("PASS did not load stylesheet.", "*");
}
</script>
-<link rel="stylesheet" href="http://127.0.0.1:8080/resources/redirect.php?url=https://localhost:8443/security/mixedContent/resources/subresource/protected-stylesheet.php" onerror="checkDidLoadStylesheet()">
+<link rel="stylesheet" href="http://127.0.0.1:8080/resources/redirect.py?url=https://localhost:8443/security/mixedContent/resources/subresource/protected-stylesheet.php" onerror="checkDidLoadStylesheet()">
</head>
<body>
</body>
diff --git a/LayoutTests/http/tests/security/mixedContent/resources/frame-with-programmatically-added-insecure-image-redirects-to-basic-auth-secure-image.html b/LayoutTests/http/tests/security/mixedContent/resources/frame-with-programmatically-added-insecure-image-redirects-to-basic-auth-secure-image.html
index 31fe947..aa4b88c 100644
--- a/LayoutTests/http/tests/security/mixedContent/resources/frame-with-programmatically-added-insecure-image-redirects-to-basic-auth-secure-image.html
+++ b/LayoutTests/http/tests/security/mixedContent/resources/frame-with-programmatically-added-insecure-image-redirects-to-basic-auth-secure-image.html
@@ -17,7 +17,7 @@
var image = new Image;
image.onerror = pass;
image.onload = fail;
- image.src = "http://127.0.0.1:8080/resources/redirect.php?url=https://localhost:8443/security/mixedContent/resources/subresource/protected-image.php";
+ image.src = "http://127.0.0.1:8080/resources/redirect.py?url=https://localhost:8443/security/mixedContent/resources/subresource/protected-image.php";
document.body.appendChild(image);
}
</script>
diff --git a/LayoutTests/http/tests/security/mixedContent/resources/frame-with-redirect-http-to-https-frame.html b/LayoutTests/http/tests/security/mixedContent/resources/frame-with-redirect-http-to-https-frame.html
index 0a859bd..6829350 100644
--- a/LayoutTests/http/tests/security/mixedContent/resources/frame-with-redirect-http-to-https-frame.html
+++ b/LayoutTests/http/tests/security/mixedContent/resources/frame-with-redirect-http-to-https-frame.html
@@ -8,4 +8,4 @@
}
</script>
<iframe onload="window.frameDidLoad = true"
- src="http://127.0.0.1:8080/resources/redirect.php?url=https://127.0.0.1:8443/security/mixedContent/resources/boring.html"></iframe>
+ src="http://127.0.0.1:8080/resources/redirect.py?url=https://127.0.0.1:8443/security/mixedContent/resources/boring.html"></iframe>
diff --git a/LayoutTests/http/tests/security/mixedContent/resources/frame-with-redirect-http-to-https-script.html b/LayoutTests/http/tests/security/mixedContent/resources/frame-with-redirect-http-to-https-script.html
index 4552d99..7f2aa4e 100644
--- a/LayoutTests/http/tests/security/mixedContent/resources/frame-with-redirect-http-to-https-script.html
+++ b/LayoutTests/http/tests/security/mixedContent/resources/frame-with-redirect-http-to-https-script.html
@@ -1 +1 @@
-<script src="http://127.0.0.1:8080/resources/redirect.php?url=https://127.0.0.1:8443/security/mixedContent/resources/script.js"></script>
+<script src="http://127.0.0.1:8080/resources/redirect.py?url=https://127.0.0.1:8443/security/mixedContent/resources/script.js"></script>
diff --git a/LayoutTests/http/tests/security/mixedContent/resources/frame-with-redirect-https-to-http-frame.html b/LayoutTests/http/tests/security/mixedContent/resources/frame-with-redirect-https-to-http-frame.html
index db8a3c9..8a69c4c 100644
--- a/LayoutTests/http/tests/security/mixedContent/resources/frame-with-redirect-https-to-http-frame.html
+++ b/LayoutTests/http/tests/security/mixedContent/resources/frame-with-redirect-https-to-http-frame.html
@@ -9,4 +9,4 @@
</script>
<iframe onload="window.frameDidLoad = true"
- src="https://127.0.0.1:8443/resources/redirect.php?url=http://127.0.0.1:8080/security/mixedContent/resources/boring.html"></iframe>
+ src="https://127.0.0.1:8443/resources/redirect.py?url=http://127.0.0.1:8080/security/mixedContent/resources/boring.html"></iframe>
diff --git a/LayoutTests/http/tests/security/mixedContent/resources/frame-with-redirect-https-to-http-image-secure-cookie-block.html b/LayoutTests/http/tests/security/mixedContent/resources/frame-with-redirect-https-to-http-image-secure-cookie-block.html
index ea47c7b..8483bc9 100644
--- a/LayoutTests/http/tests/security/mixedContent/resources/frame-with-redirect-https-to-http-image-secure-cookie-block.html
+++ b/LayoutTests/http/tests/security/mixedContent/resources/frame-with-redirect-https-to-http-image-secure-cookie-block.html
@@ -10,4 +10,4 @@
window.opener.postMessage(frameDidLoad ? 'done' : 'blocked', '*');
}
</script>
-<img onload="window.frameDidLoad = true" src="https://127.0.0.1:8443/resources/redirect.php?url=http://127.0.0.1:8080/security/resources/compass.jpg">
+<img onload="window.frameDidLoad = true" src="https://127.0.0.1:8443/resources/redirect.py?url=http://127.0.0.1:8080/security/resources/compass.jpg">
diff --git a/LayoutTests/http/tests/security/mixedContent/resources/frame-with-redirect-https-to-http-image-secure-cookie.html b/LayoutTests/http/tests/security/mixedContent/resources/frame-with-redirect-https-to-http-image-secure-cookie.html
index 5e9e487..752c51d 100644
--- a/LayoutTests/http/tests/security/mixedContent/resources/frame-with-redirect-https-to-http-image-secure-cookie.html
+++ b/LayoutTests/http/tests/security/mixedContent/resources/frame-with-redirect-https-to-http-image-secure-cookie.html
@@ -8,4 +8,4 @@
window.opener.postMessage(frameDidLoad ? 'done' : 'blocked', '*');
}
</script>
-<img onload="window.frameDidLoad = true" src="https://127.0.0.1:8443/resources/redirect.php?url=http://127.0.0.1:8080/security/resources/compass.jpg">
+<img onload="window.frameDidLoad = true" src="https://127.0.0.1:8443/resources/redirect.py?url=http://127.0.0.1:8080/security/resources/compass.jpg">
diff --git a/LayoutTests/http/tests/security/mixedContent/resources/frame-with-redirect-https-to-http-script.html b/LayoutTests/http/tests/security/mixedContent/resources/frame-with-redirect-https-to-http-script.html
index d3f62bc..fc296b1 100644
--- a/LayoutTests/http/tests/security/mixedContent/resources/frame-with-redirect-https-to-http-script.html
+++ b/LayoutTests/http/tests/security/mixedContent/resources/frame-with-redirect-https-to-http-script.html
@@ -1 +1 @@
-<script src="https://127.0.0.1:8443/resources/redirect.php?url=http://127.0.0.1:8080/security/mixedContent/resources/script.js"></script>
+<script src="https://127.0.0.1:8443/resources/redirect.py?url=http://127.0.0.1:8080/security/mixedContent/resources/script.js"></script>
diff --git a/LayoutTests/http/tests/security/mixedContent/secure-page-navigates-to-basic-auth-secure-page-via-insecure-redirect.https-expected.txt b/LayoutTests/http/tests/security/mixedContent/secure-page-navigates-to-basic-auth-secure-page-via-insecure-redirect.https-expected.txt
index 5f5aa7f..c770eda 100644
--- a/LayoutTests/http/tests/security/mixedContent/secure-page-navigates-to-basic-auth-secure-page-via-insecure-redirect.https-expected.txt
+++ b/LayoutTests/http/tests/security/mixedContent/secure-page-navigates-to-basic-auth-secure-page-via-insecure-redirect.https-expected.txt
@@ -1,2 +1,2 @@
-http://127.0.0.1:8000/resources/redirect.php?url=https://127.0.0.1:8443/security/mixedContent/resources/subresource/protected-page.php - didReceiveAuthenticationChallenge - Responding with testUser:testPassword
+http://127.0.0.1:8000/resources/redirect.py?url=https://127.0.0.1:8443/security/mixedContent/resources/subresource/protected-page.php - didReceiveAuthenticationChallenge - Responding with testUser:testPassword
Authenticated with username testUser.
diff --git a/LayoutTests/http/tests/security/mixedContent/secure-page-navigates-to-basic-auth-secure-page-via-insecure-redirect.https.html b/LayoutTests/http/tests/security/mixedContent/secure-page-navigates-to-basic-auth-secure-page-via-insecure-redirect.https.html
index 63c5153..6b3a2bf 100644
--- a/LayoutTests/http/tests/security/mixedContent/secure-page-navigates-to-basic-auth-secure-page-via-insecure-redirect.https.html
+++ b/LayoutTests/http/tests/security/mixedContent/secure-page-navigates-to-basic-auth-secure-page-via-insecure-redirect.https.html
@@ -9,7 +9,7 @@
testRunner.setAuthenticationPassword("testPassword");
testRunner.waitUntilDone();
}
-window.location.href = "http://127.0.0.1:8000/resources/redirect.php?url=https://127.0.0.1:8443/security/mixedContent/resources/subresource/protected-page.php";
+window.location.href = "http://127.0.0.1:8000/resources/redirect.py?url=https://127.0.0.1:8443/security/mixedContent/resources/subresource/protected-page.php";
</script>
</head>
</html>
diff --git a/LayoutTests/http/tests/security/mixedContent/secure-redirect-to-insecure-redirect-to-basic-auth-secure-image-allowCrossOriginSubresourcesToAskForCredentials.https-expected.txt b/LayoutTests/http/tests/security/mixedContent/secure-redirect-to-insecure-redirect-to-basic-auth-secure-image-allowCrossOriginSubresourcesToAskForCredentials.https-expected.txt
index 2ce5bd9..db6704a 100644
--- a/LayoutTests/http/tests/security/mixedContent/secure-redirect-to-insecure-redirect-to-basic-auth-secure-image-allowCrossOriginSubresourcesToAskForCredentials.https-expected.txt
+++ b/LayoutTests/http/tests/security/mixedContent/secure-redirect-to-insecure-redirect-to-basic-auth-secure-image-allowCrossOriginSubresourcesToAskForCredentials.https-expected.txt
@@ -1,6 +1,6 @@
-CONSOLE MESSAGE: The page at https://127.0.0.1:8443/security/mixedContent/secure-redirect-to-insecure-redirect-to-basic-auth-secure-image-allowCrossOriginSubresourcesToAskForCredentials.https.html was allowed to display insecure content from http://127.0.0.1:8080/resources/redirect.php?url=https://localhost:8443/security/mixedContent/resources/subresource/protected-image.php.
+CONSOLE MESSAGE: The page at https://127.0.0.1:8443/security/mixedContent/secure-redirect-to-insecure-redirect-to-basic-auth-secure-image-allowCrossOriginSubresourcesToAskForCredentials.https.html was allowed to display insecure content from http://127.0.0.1:8080/resources/redirect.py?url=https://localhost:8443/security/mixedContent/resources/subresource/protected-image.php.
-https://127.0.0.1:8443/resources/redirect.php?url=http%3A//127.0.0.1%3A8080/resources/redirect.php%3Furl%3Dhttps%3A//localhost%3A8443/security/mixedContent/resources/subresource/protected-image.php - didReceiveAuthenticationChallenge - Responding with testUser:testPassword
+https://127.0.0.1:8443/resources/redirect.py?url=http%3A//127.0.0.1%3A8080/resources/redirect.py%3Furl%3Dhttps%3A//localhost%3A8443/security/mixedContent/resources/subresource/protected-image.php - didReceiveAuthenticationChallenge - Responding with testUser:testPassword
This test loads a secure image that redirects to an insecure image that redirects to a secure image guarded by basic authentication. The image should load.
On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE".
diff --git a/LayoutTests/http/tests/security/mixedContent/secure-redirect-to-insecure-redirect-to-basic-auth-secure-image-allowCrossOriginSubresourcesToAskForCredentials.https.html b/LayoutTests/http/tests/security/mixedContent/secure-redirect-to-insecure-redirect-to-basic-auth-secure-image-allowCrossOriginSubresourcesToAskForCredentials.https.html
index f7de669..76960d7 100644
--- a/LayoutTests/http/tests/security/mixedContent/secure-redirect-to-insecure-redirect-to-basic-auth-secure-image-allowCrossOriginSubresourcesToAskForCredentials.https.html
+++ b/LayoutTests/http/tests/security/mixedContent/secure-redirect-to-insecure-redirect-to-basic-auth-secure-image-allowCrossOriginSubresourcesToAskForCredentials.https.html
@@ -30,7 +30,7 @@
let image = new Image;
image.onload = pass;
image.onerror = fail;
- image.src = "https://127.0.0.1:8443/resources/redirect.php?url=http%3A//127.0.0.1%3A8080/resources/redirect.php%3Furl%3Dhttps%3A//localhost%3A8443/security/mixedContent/resources/subresource/protected-image.php";
+ image.src = "https://127.0.0.1:8443/resources/redirect.py?url=http%3A//127.0.0.1%3A8080/resources/redirect.py%3Furl%3Dhttps%3A//localhost%3A8443/security/mixedContent/resources/subresource/protected-image.php";
document.body.appendChild(image);
}
diff --git a/LayoutTests/http/tests/security/mixedContent/secure-redirect-to-insecure-redirect-to-basic-auth-secure-image.https-expected.txt b/LayoutTests/http/tests/security/mixedContent/secure-redirect-to-insecure-redirect-to-basic-auth-secure-image.https-expected.txt
index 2107b1c..f9bcc00 100644
--- a/LayoutTests/http/tests/security/mixedContent/secure-redirect-to-insecure-redirect-to-basic-auth-secure-image.https-expected.txt
+++ b/LayoutTests/http/tests/security/mixedContent/secure-redirect-to-insecure-redirect-to-basic-auth-secure-image.https-expected.txt
@@ -1,4 +1,4 @@
-CONSOLE MESSAGE: The page at https://127.0.0.1:8443/security/mixedContent/secure-redirect-to-insecure-redirect-to-basic-auth-secure-image.https.html was allowed to display insecure content from http://127.0.0.1:8080/resources/redirect.php?url=https://localhost:8443/security/mixedContent/resources/subresource/protected-image.php.
+CONSOLE MESSAGE: The page at https://127.0.0.1:8443/security/mixedContent/secure-redirect-to-insecure-redirect-to-basic-auth-secure-image.https.html was allowed to display insecure content from http://127.0.0.1:8080/resources/redirect.py?url=https://localhost:8443/security/mixedContent/resources/subresource/protected-image.php.
CONSOLE MESSAGE: Blocked https://localhost:8443/security/mixedContent/resources/subresource/protected-image.php from asking for credentials because it is a cross-origin request.
This test loads a secure image that redirects to an insecure image that redirects to a secure image guarded by basic authentication. The secure image should be blocked because it requires credentials and was loaded via an insecure redirect.
diff --git a/LayoutTests/http/tests/security/mixedContent/secure-redirect-to-insecure-redirect-to-basic-auth-secure-image.https.html b/LayoutTests/http/tests/security/mixedContent/secure-redirect-to-insecure-redirect-to-basic-auth-secure-image.https.html
index ecb69f3..78bf411 100644
--- a/LayoutTests/http/tests/security/mixedContent/secure-redirect-to-insecure-redirect-to-basic-auth-secure-image.https.html
+++ b/LayoutTests/http/tests/security/mixedContent/secure-redirect-to-insecure-redirect-to-basic-auth-secure-image.https.html
@@ -30,7 +30,7 @@
let image = new Image;
image.onload = fail;
image.onerror = pass;
- image.src = "https://127.0.0.1:8443/resources/redirect.php?url=http%3A//127.0.0.1%3A8080/resources/redirect.php%3Furl%3Dhttps%3A//localhost%3A8443/security/mixedContent/resources/subresource/protected-image.php";
+ image.src = "https://127.0.0.1:8443/resources/redirect.py?url=http%3A//127.0.0.1%3A8080/resources/redirect.py%3Furl%3Dhttps%3A//localhost%3A8443/security/mixedContent/resources/subresource/protected-image.php";
document.body.appendChild(image);
}
diff --git a/LayoutTests/http/tests/security/mixedContent/secure-redirect-to-secure-redirect-to-basic-auth-insecure-image-allowCrossOriginSubresourcesToAskForCredentials.https-expected.txt b/LayoutTests/http/tests/security/mixedContent/secure-redirect-to-secure-redirect-to-basic-auth-insecure-image-allowCrossOriginSubresourcesToAskForCredentials.https-expected.txt
index 2068868..fe04e67 100644
--- a/LayoutTests/http/tests/security/mixedContent/secure-redirect-to-secure-redirect-to-basic-auth-insecure-image-allowCrossOriginSubresourcesToAskForCredentials.https-expected.txt
+++ b/LayoutTests/http/tests/security/mixedContent/secure-redirect-to-secure-redirect-to-basic-auth-insecure-image-allowCrossOriginSubresourcesToAskForCredentials.https-expected.txt
@@ -1,6 +1,6 @@
CONSOLE MESSAGE: The page at https://127.0.0.1:8443/security/mixedContent/secure-redirect-to-secure-redirect-to-basic-auth-insecure-image-allowCrossOriginSubresourcesToAskForCredentials.https.html was allowed to display insecure content from http://localhost:8080/security/mixedContent/resources/subresource/protected-image.php.
-https://127.0.0.1:8443/resources/redirect.php?url=https%3A//localhost%3A8443/resources/redirect.php%3Furl%3Dhttp%3A//localhost%3A8080/security/mixedContent/resources/subresource/protected-image.php - didReceiveAuthenticationChallenge - Responding with testUser:testPassword
+https://127.0.0.1:8443/resources/redirect.py?url=https%3A//localhost%3A8443/resources/redirect.py%3Furl%3Dhttp%3A//localhost%3A8080/security/mixedContent/resources/subresource/protected-image.php - didReceiveAuthenticationChallenge - Responding with testUser:testPassword
This test loads a secure image that redirects to an secure image that redirects to an insecure image guarded by basic authentication. The image should load.
On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE".
diff --git a/LayoutTests/http/tests/security/mixedContent/secure-redirect-to-secure-redirect-to-basic-auth-insecure-image-allowCrossOriginSubresourcesToAskForCredentials.https.html b/LayoutTests/http/tests/security/mixedContent/secure-redirect-to-secure-redirect-to-basic-auth-insecure-image-allowCrossOriginSubresourcesToAskForCredentials.https.html
index 8385b64..5832717 100644
--- a/LayoutTests/http/tests/security/mixedContent/secure-redirect-to-secure-redirect-to-basic-auth-insecure-image-allowCrossOriginSubresourcesToAskForCredentials.https.html
+++ b/LayoutTests/http/tests/security/mixedContent/secure-redirect-to-secure-redirect-to-basic-auth-insecure-image-allowCrossOriginSubresourcesToAskForCredentials.https.html
@@ -30,7 +30,7 @@
let image = new Image;
image.onload = pass;
image.onerror = fail;
- image.src = "https://127.0.0.1:8443/resources/redirect.php?url=https%3A//localhost%3A8443/resources/redirect.php%3Furl%3Dhttp%3A//localhost%3A8080/security/mixedContent/resources/subresource/protected-image.php";
+ image.src = "https://127.0.0.1:8443/resources/redirect.py?url=https%3A//localhost%3A8443/resources/redirect.py%3Furl%3Dhttp%3A//localhost%3A8080/security/mixedContent/resources/subresource/protected-image.php";
document.body.appendChild(image);
}
diff --git a/LayoutTests/http/tests/security/mixedContent/secure-redirect-to-secure-redirect-to-basic-auth-insecure-image.https.html b/LayoutTests/http/tests/security/mixedContent/secure-redirect-to-secure-redirect-to-basic-auth-insecure-image.https.html
index 30ccc60..42a97d1 100644
--- a/LayoutTests/http/tests/security/mixedContent/secure-redirect-to-secure-redirect-to-basic-auth-insecure-image.https.html
+++ b/LayoutTests/http/tests/security/mixedContent/secure-redirect-to-secure-redirect-to-basic-auth-insecure-image.https.html
@@ -30,7 +30,7 @@
let image = new Image;
image.onload = fail;
image.onerror = pass;
- image.src = "https://127.0.0.1:8443/resources/redirect.php?url=https%3A//localhost%3A8443/resources/redirect.php%3Furl%3Dhttp%3A//localhost%3A8080/security/mixedContent/resources/subresource/protected-image.php";
+ image.src = "https://127.0.0.1:8443/resources/redirect.py?url=https%3A//localhost%3A8443/resources/redirect.py%3Furl%3Dhttp%3A//localhost%3A8080/security/mixedContent/resources/subresource/protected-image.php";
document.body.appendChild(image);
}
diff --git a/LayoutTests/http/tests/security/mixedContent/secure-redirect-to-secure-redirect-to-basic-auth-secure-image-allowCrossOriginSubresourcesToAskForCredentials.https-expected.txt b/LayoutTests/http/tests/security/mixedContent/secure-redirect-to-secure-redirect-to-basic-auth-secure-image-allowCrossOriginSubresourcesToAskForCredentials.https-expected.txt
index 41f5e42..5fa5fff 100644
--- a/LayoutTests/http/tests/security/mixedContent/secure-redirect-to-secure-redirect-to-basic-auth-secure-image-allowCrossOriginSubresourcesToAskForCredentials.https-expected.txt
+++ b/LayoutTests/http/tests/security/mixedContent/secure-redirect-to-secure-redirect-to-basic-auth-secure-image-allowCrossOriginSubresourcesToAskForCredentials.https-expected.txt
@@ -1,4 +1,4 @@
-https://127.0.0.1:8443/resources/redirect.php?url=https%3A//127.0.0.1%3A8443/resources/redirect.php%3Furl%3Dhttps%3A//localhost%3A8443/security/mixedContent/resources/subresource/protected-image.php - didReceiveAuthenticationChallenge - Responding with testUser:testPassword
+https://127.0.0.1:8443/resources/redirect.py?url=https%3A//127.0.0.1%3A8443/resources/redirect.py%3Furl%3Dhttps%3A//localhost%3A8443/security/mixedContent/resources/subresource/protected-image.php - didReceiveAuthenticationChallenge - Responding with testUser:testPassword
This test loads a secure image that redirects to a secure image that redirects to a secure image guarded by basic authentication. The secure image should load.
On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE".
diff --git a/LayoutTests/http/tests/security/mixedContent/secure-redirect-to-secure-redirect-to-basic-auth-secure-image-allowCrossOriginSubresourcesToAskForCredentials.https.html b/LayoutTests/http/tests/security/mixedContent/secure-redirect-to-secure-redirect-to-basic-auth-secure-image-allowCrossOriginSubresourcesToAskForCredentials.https.html
index 07a98e0..d201bf8 100644
--- a/LayoutTests/http/tests/security/mixedContent/secure-redirect-to-secure-redirect-to-basic-auth-secure-image-allowCrossOriginSubresourcesToAskForCredentials.https.html
+++ b/LayoutTests/http/tests/security/mixedContent/secure-redirect-to-secure-redirect-to-basic-auth-secure-image-allowCrossOriginSubresourcesToAskForCredentials.https.html
@@ -30,7 +30,7 @@
let image = new Image;
image.onload = pass;
image.onerror = fail;
- image.src = "https://127.0.0.1:8443/resources/redirect.php?url=https%3A//127.0.0.1%3A8443/resources/redirect.php%3Furl%3Dhttps%3A//localhost%3A8443/security/mixedContent/resources/subresource/protected-image.php";
+ image.src = "https://127.0.0.1:8443/resources/redirect.py?url=https%3A//127.0.0.1%3A8443/resources/redirect.py%3Furl%3Dhttps%3A//localhost%3A8443/security/mixedContent/resources/subresource/protected-image.php";
document.body.appendChild(image);
}
diff --git a/LayoutTests/http/tests/security/mixedContent/secure-redirect-to-secure-redirect-to-basic-auth-secure-image.https.html b/LayoutTests/http/tests/security/mixedContent/secure-redirect-to-secure-redirect-to-basic-auth-secure-image.https.html
index 6b2d133..39d4f81 100644
--- a/LayoutTests/http/tests/security/mixedContent/secure-redirect-to-secure-redirect-to-basic-auth-secure-image.https.html
+++ b/LayoutTests/http/tests/security/mixedContent/secure-redirect-to-secure-redirect-to-basic-auth-secure-image.https.html
@@ -30,7 +30,7 @@
let image = new Image;
image.onload = fail;
image.onerror = pass;
- image.src = "https://127.0.0.1:8443/resources/redirect.php?url=https%3A//127.0.0.1%3A8443/resources/redirect.php%3Furl%3Dhttps%3A//localhost%3A8443/security/mixedContent/resources/subresource/protected-image.php";
+ image.src = "https://127.0.0.1:8443/resources/redirect.py?url=https%3A//127.0.0.1%3A8443/resources/redirect.py%3Furl%3Dhttps%3A//localhost%3A8443/security/mixedContent/resources/subresource/protected-image.php";
document.body.appendChild(image);
}
diff --git a/LayoutTests/http/tests/security/redirect-BLOCKED-to-localURL.html b/LayoutTests/http/tests/security/redirect-BLOCKED-to-localURL.html
index 8840aa1..3ce4a76 100644
--- a/LayoutTests/http/tests/security/redirect-BLOCKED-to-localURL.html
+++ b/LayoutTests/http/tests/security/redirect-BLOCKED-to-localURL.html
@@ -1,6 +1,6 @@
<html>
<body>
-<iframe src="http://127.0.0.1:8000/resources/redirect.php?url=file:///tmp/LayoutTests/http/tests/security/resources/file-redirect-target.html"></iframe></br>
+<iframe src="http://127.0.0.1:8000/resources/redirect.py?url=file:///tmp/LayoutTests/http/tests/security/resources/file-redirect-target.html"></iframe></br>
<script>
if (window.testRunner) {
testRunner.dumpAsText();
diff --git a/LayoutTests/http/tests/security/regress-52192.html b/LayoutTests/http/tests/security/regress-52192.html
index 906624f..a77b904 100644
--- a/LayoutTests/http/tests/security/regress-52192.html
+++ b/LayoutTests/http/tests/security/regress-52192.html
@@ -239,7 +239,7 @@
logTitle("Test uncaught error from a script from another domain");
incCaseIndex();
</script>
-<script src="../../resources/redirect.php?url=http://localhost:8000/security/resources/regress-52192-syntax-error.js"></script/>
+<script src="../../resources/redirect.py?url=http://localhost:8000/security/resources/regress-52192-syntax-error.js"></script/>
<script>
// Test loading a document from another domain that has a SyntaxError with 'name' getters installed.
@@ -247,7 +247,7 @@
incCaseIndex();
installNameGettersToCheckErrorMessageForSecrets();
</script>
-<script src="../../resources/redirect.php?url=http://localhost:8000/security/resources/regress-52192-syntax-error.js"></script/>
+<script src="../../resources/redirect.py?url=http://localhost:8000/security/resources/regress-52192-syntax-error.js"></script/>
<script>
resetNameGetters();
</script>
@@ -258,7 +258,7 @@
incCaseIndex();
installToStringGettersToCheckErrorMessageForSecrets();
</script>
-<script src="../../resources/redirect.php?url=http://localhost:8000/security/resources/regress-52192-syntax-error.js"></script/>
+<script src="../../resources/redirect.py?url=http://localhost:8000/security/resources/regress-52192-syntax-error.js"></script/>
<script>
resetToStringGetters();
</script>
@@ -267,38 +267,38 @@
// Test throwing from other domain script with no getters installed.
</script>
<script> errorTypeIndexToTest = 0; </script>
-<script src="../../resources/redirect.php?url=http://localhost:8000/security/resources/regress-52192-throw-error.js"></script/>
+<script src="../../resources/redirect.py?url=http://localhost:8000/security/resources/regress-52192-throw-error.js"></script/>
<script> errorTypeIndexToTest = 1; </script>
-<script src="../../resources/redirect.php?url=http://localhost:8000/security/resources/regress-52192-throw-error.js"></script/>
+<script src="../../resources/redirect.py?url=http://localhost:8000/security/resources/regress-52192-throw-error.js"></script/>
<script> errorTypeIndexToTest = 2; </script>
-<script src="../../resources/redirect.php?url=http://localhost:8000/security/resources/regress-52192-throw-error.js"></script/>
+<script src="../../resources/redirect.py?url=http://localhost:8000/security/resources/regress-52192-throw-error.js"></script/>
<script> errorTypeIndexToTest = 3; </script>
-<script src="../../resources/redirect.php?url=http://localhost:8000/security/resources/regress-52192-throw-error.js"></script/>
+<script src="../../resources/redirect.py?url=http://localhost:8000/security/resources/regress-52192-throw-error.js"></script/>
<script> errorTypeIndexToTest = 4; </script>
-<script src="../../resources/redirect.php?url=http://localhost:8000/security/resources/regress-52192-throw-error.js"></script/>
+<script src="../../resources/redirect.py?url=http://localhost:8000/security/resources/regress-52192-throw-error.js"></script/>
<script> errorTypeIndexToTest = 5; </script>
-<script src="../../resources/redirect.php?url=http://localhost:8000/security/resources/regress-52192-throw-error.js"></script/>
+<script src="../../resources/redirect.py?url=http://localhost:8000/security/resources/regress-52192-throw-error.js"></script/>
<script> errorTypeIndexToTest = 6; </script>
-<script src="../../resources/redirect.php?url=http://localhost:8000/security/resources/regress-52192-throw-error.js"></script/>
+<script src="../../resources/redirect.py?url=http://localhost:8000/security/resources/regress-52192-throw-error.js"></script/>
<script>
// Test throwing from other domain script when Error.prototype has a 'name' getter.
installNameGettersToCheckErrorMessageForSecrets();
</script>
<script> errorTypeIndexToTest = 0; </script>
-<script src="../../resources/redirect.php?url=http://localhost:8000/security/resources/regress-52192-throw-error.js"></script/>
+<script src="../../resources/redirect.py?url=http://localhost:8000/security/resources/regress-52192-throw-error.js"></script/>
<script> errorTypeIndexToTest = 1; </script>
-<script src="../../resources/redirect.php?url=http://localhost:8000/security/resources/regress-52192-throw-error.js"></script/>
+<script src="../../resources/redirect.py?url=http://localhost:8000/security/resources/regress-52192-throw-error.js"></script/>
<script> errorTypeIndexToTest = 2; </script>
-<script src="../../resources/redirect.php?url=http://localhost:8000/security/resources/regress-52192-throw-error.js"></script/>
+<script src="../../resources/redirect.py?url=http://localhost:8000/security/resources/regress-52192-throw-error.js"></script/>
<script> errorTypeIndexToTest = 3; </script>
-<script src="../../resources/redirect.php?url=http://localhost:8000/security/resources/regress-52192-throw-error.js"></script/>
+<script src="../../resources/redirect.py?url=http://localhost:8000/security/resources/regress-52192-throw-error.js"></script/>
<script> errorTypeIndexToTest = 4; </script>
-<script src="../../resources/redirect.php?url=http://localhost:8000/security/resources/regress-52192-throw-error.js"></script/>
+<script src="../../resources/redirect.py?url=http://localhost:8000/security/resources/regress-52192-throw-error.js"></script/>
<script> errorTypeIndexToTest = 5; </script>
-<script src="../../resources/redirect.php?url=http://localhost:8000/security/resources/regress-52192-throw-error.js"></script/>
+<script src="../../resources/redirect.py?url=http://localhost:8000/security/resources/regress-52192-throw-error.js"></script/>
<script> errorTypeIndexToTest = 6; </script>
-<script src="../../resources/redirect.php?url=http://localhost:8000/security/resources/regress-52192-throw-error.js"></script/>
+<script src="../../resources/redirect.py?url=http://localhost:8000/security/resources/regress-52192-throw-error.js"></script/>
<script> resetNameGetters(); </script>
<script>
@@ -306,19 +306,19 @@
installToStringGettersToCheckErrorMessageForSecrets();
</script>
<script> errorTypeIndexToTest = 0; </script>
-<script src="../../resources/redirect.php?url=http://localhost:8000/security/resources/regress-52192-throw-error.js"></script/>
+<script src="../../resources/redirect.py?url=http://localhost:8000/security/resources/regress-52192-throw-error.js"></script/>
<script> errorTypeIndexToTest = 1; </script>
-<script src="../../resources/redirect.php?url=http://localhost:8000/security/resources/regress-52192-throw-error.js"></script/>
+<script src="../../resources/redirect.py?url=http://localhost:8000/security/resources/regress-52192-throw-error.js"></script/>
<script> errorTypeIndexToTest = 2; </script>
-<script src="../../resources/redirect.php?url=http://localhost:8000/security/resources/regress-52192-throw-error.js"></script/>
+<script src="../../resources/redirect.py?url=http://localhost:8000/security/resources/regress-52192-throw-error.js"></script/>
<script> errorTypeIndexToTest = 3; </script>
-<script src="../../resources/redirect.php?url=http://localhost:8000/security/resources/regress-52192-throw-error.js"></script/>
+<script src="../../resources/redirect.py?url=http://localhost:8000/security/resources/regress-52192-throw-error.js"></script/>
<script> errorTypeIndexToTest = 4; </script>
-<script src="../../resources/redirect.php?url=http://localhost:8000/security/resources/regress-52192-throw-error.js"></script/>
+<script src="../../resources/redirect.py?url=http://localhost:8000/security/resources/regress-52192-throw-error.js"></script/>
<script> errorTypeIndexToTest = 5; </script>
-<script src="../../resources/redirect.php?url=http://localhost:8000/security/resources/regress-52192-throw-error.js"></script/>
+<script src="../../resources/redirect.py?url=http://localhost:8000/security/resources/regress-52192-throw-error.js"></script/>
<script> errorTypeIndexToTest = 6; </script>
-<script src="../../resources/redirect.php?url=http://localhost:8000/security/resources/regress-52192-throw-error.js"></script/>
+<script src="../../resources/redirect.py?url=http://localhost:8000/security/resources/regress-52192-throw-error.js"></script/>
<script> resetToStringGetters(); </script>
<script>
diff --git a/LayoutTests/http/tests/security/resources/cross-origin-xsl-redirect.xml b/LayoutTests/http/tests/security/resources/cross-origin-xsl-redirect.xml
index f2b359e..db4f619 100644
--- a/LayoutTests/http/tests/security/resources/cross-origin-xsl-redirect.xml
+++ b/LayoutTests/http/tests/security/resources/cross-origin-xsl-redirect.xml
@@ -1,5 +1,5 @@
<?xml version="1.0" encoding="UTF-8"?>
-<?xml-stylesheet type="text/xsl" href="http://127.0.0.1:8000/resources/redirect.php?url=http://localhost:8000/security/resources/forbidden-stylesheet.xsl"?>
+<?xml-stylesheet type="text/xsl" href="http://127.0.0.1:8000/resources/redirect.py?url=http://localhost:8000/security/resources/forbidden-stylesheet.xsl"?>
<html xmlns="http://www.w3.org/1999/xhtml">
<body>
<script>
diff --git a/LayoutTests/http/tests/security/resources/referrer-policy-redirect-link-downgrade.html b/LayoutTests/http/tests/security/resources/referrer-policy-redirect-link-downgrade.html
index fb1bf33..a190408 100644
--- a/LayoutTests/http/tests/security/resources/referrer-policy-redirect-link-downgrade.html
+++ b/LayoutTests/http/tests/security/resources/referrer-policy-redirect-link-downgrade.html
@@ -21,7 +21,7 @@
</script>
</head>
<body>
-<a id="link" target="_blank" href="https://127.0.0.1:8443/resources/redirect.php?url=http://127.0.0.1:8000/security/resources/referrer-policy-postmessage.php" rel="opener">If not running in DumpRenderTree, click this link</a>
+<a id="link" target="_blank" href="https://127.0.0.1:8443/resources/redirect.py?url=http://127.0.0.1:8000/security/resources/referrer-policy-postmessage.php" rel="opener">If not running in DumpRenderTree, click this link</a>
<div id="log"></div>
</body>
</html>
diff --git a/LayoutTests/http/tests/security/resources/referrer-policy-redirect-link.html b/LayoutTests/http/tests/security/resources/referrer-policy-redirect-link.html
index 23dd526..948a576 100644
--- a/LayoutTests/http/tests/security/resources/referrer-policy-redirect-link.html
+++ b/LayoutTests/http/tests/security/resources/referrer-policy-redirect-link.html
@@ -21,7 +21,7 @@
</script>
</head>
<body>
-<a id="link" target="_blank" href="https://127.0.0.1:8443/resources/redirect.php?url=https://127.0.0.1:8443/security/resources/referrer-policy-postmessage.php" rel="opener">If not running in DumpRenderTree, click this link</a>
+<a id="link" target="_blank" href="https://127.0.0.1:8443/resources/redirect.py?url=https://127.0.0.1:8443/security/resources/referrer-policy-postmessage.php" rel="opener">If not running in DumpRenderTree, click this link</a>
<div id="log"></div>
</body>
</html>
diff --git a/LayoutTests/http/tests/security/resources/referrer-policy-redirect.html b/LayoutTests/http/tests/security/resources/referrer-policy-redirect.html
index e19abd1..53b2386 100644
--- a/LayoutTests/http/tests/security/resources/referrer-policy-redirect.html
+++ b/LayoutTests/http/tests/security/resources/referrer-policy-redirect.html
@@ -3,7 +3,7 @@
<meta name="referrer" content="origin" />
<script>
function runTest() {
- document.location = "https://127.0.0.1:8443/resources/redirect.php?url=" +
+ document.location = "https://127.0.0.1:8443/resources/redirect.py?url=" +
"http://127.0.0.1:8000/security/resources/referrer-policy-log.php";
}
</script>
diff --git a/LayoutTests/http/tests/security/resources/xsl-using-document-redirect.xsl b/LayoutTests/http/tests/security/resources/xsl-using-document-redirect.xsl
index 89c540e..5304eef 100644
--- a/LayoutTests/http/tests/security/resources/xsl-using-document-redirect.xsl
+++ b/LayoutTests/http/tests/security/resources/xsl-using-document-redirect.xsl
@@ -9,7 +9,7 @@
</script>
<div>This test includes content via a cross-origin document() command. It
passes if the load fails and thus there is no text below this line.</div>
-<xsl:value-of select="document('/resources/redirect.php?url=http://localhost:8000/security/resources/target.xml')"/>
+<xsl:value-of select="document('/resources/redirect.py?url=http://localhost:8000/security/resources/target.xml')"/>
</body>
</html>
</xsl:template>
diff --git a/LayoutTests/http/tests/security/resources/xsl-using-external-entity-redirect.xsl b/LayoutTests/http/tests/security/resources/xsl-using-external-entity-redirect.xsl
index 6be35dc..88b51ec 100644
--- a/LayoutTests/http/tests/security/resources/xsl-using-external-entity-redirect.xsl
+++ b/LayoutTests/http/tests/security/resources/xsl-using-external-entity-redirect.xsl
@@ -1,5 +1,5 @@
<?xml version="1.0" encoding="UTF-8"?>
-<!DOCTYPE doc [ <!ENTITY ent SYSTEM "/resources/redirect.php?url=http://localhost:8000/security/resources/target.xml"> ]>
+<!DOCTYPE doc [ <!ENTITY ent SYSTEM "/resources/redirect.py?url=http://localhost:8000/security/resources/target.xml"> ]>
<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform">
<xsl:template match="*">
<html>
diff --git a/LayoutTests/http/tests/security/same-origin-css-1-expected.txt b/LayoutTests/http/tests/security/same-origin-css-1-expected.txt
index 5096ddc..6a95f77 100644
--- a/LayoutTests/http/tests/security/same-origin-css-1-expected.txt
+++ b/LayoutTests/http/tests/security/same-origin-css-1-expected.txt
@@ -1,4 +1,4 @@
-CONSOLE MESSAGE: Did not parse stylesheet at 'http://127.0.0.1:8000/resources/redirect.php?url=/security/resources/xorigincss1.html' because non CSS MIME types are not allowed in strict mode.
+CONSOLE MESSAGE: Did not parse stylesheet at 'http://127.0.0.1:8000/resources/redirect.py?url=/security/resources/xorigincss1.html' because non CSS MIME types are not allowed in strict mode.
PASS Testing same-origin and MIME behavior for CSS.
PASS xorigincss1.html should not be loaded via <link>.
diff --git a/LayoutTests/http/tests/security/same-origin-css-1.html b/LayoutTests/http/tests/security/same-origin-css-1.html
index b91b201..45d9731 100644
--- a/LayoutTests/http/tests/security/same-origin-css-1.html
+++ b/LayoutTests/http/tests/security/same-origin-css-1.html
@@ -11,7 +11,7 @@
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
-<link rel="stylesheet" href="/resources/redirect.php?url=/security/resources/xorigincss1.html"></link>
+<link rel="stylesheet" href="/resources/redirect.py?url=/security/resources/xorigincss1.html"></link>
<script>
function getBackgroundColorForId(id) {
diff --git a/LayoutTests/http/tests/security/same-origin-css-2-expected.txt b/LayoutTests/http/tests/security/same-origin-css-2-expected.txt
index 15b801e..e0bf40e 100644
--- a/LayoutTests/http/tests/security/same-origin-css-2-expected.txt
+++ b/LayoutTests/http/tests/security/same-origin-css-2-expected.txt
@@ -1,4 +1,4 @@
-CONSOLE MESSAGE: Did not parse stylesheet at 'http://127.0.0.1:8000/resources/redirect.php?url=/security/resources/xorigincss2.html' because non CSS MIME types are not allowed in strict mode.
+CONSOLE MESSAGE: Did not parse stylesheet at 'http://127.0.0.1:8000/resources/redirect.py?url=/security/resources/xorigincss2.html' because non CSS MIME types are not allowed in strict mode.
PASS Testing same-origin and MIME behavior for CSS.
PASS xorigincss2.html should not be loaded either via <link> or @import.
diff --git a/LayoutTests/http/tests/security/same-origin-css-2.html b/LayoutTests/http/tests/security/same-origin-css-2.html
index dba7885..9d04db5 100644
--- a/LayoutTests/http/tests/security/same-origin-css-2.html
+++ b/LayoutTests/http/tests/security/same-origin-css-2.html
@@ -11,7 +11,7 @@
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
-<link rel="stylesheet" type="text/css" href="/resources/redirect.php?url=/security/resources/xorigincss2.html"></link>
+<link rel="stylesheet" type="text/css" href="/resources/redirect.py?url=/security/resources/xorigincss2.html"></link>
<script>
function getBackgroundColorForId(id) {
return window.getComputedStyle(document.getElementById(id), null).getPropertyValue('background-color')
diff --git a/LayoutTests/http/tests/security/same-origin-css-3.html b/LayoutTests/http/tests/security/same-origin-css-3.html
index b9e091a..d4e38df 100644
--- a/LayoutTests/http/tests/security/same-origin-css-3.html
+++ b/LayoutTests/http/tests/security/same-origin-css-3.html
@@ -12,7 +12,7 @@
<script src="/resources/testharnessreport.js"></script>
<link rel="stylesheet"
- href="/resources/redirect.php?url=/security/resources/xorigincss1.css"></link>
+ href="/resources/redirect.py?url=/security/resources/xorigincss1.css"></link>
<script>
function getBackgroundColorForId(id) {
diff --git a/LayoutTests/http/tests/security/same-origin-css-5-expected.txt b/LayoutTests/http/tests/security/same-origin-css-5-expected.txt
index 7b9ca46..84b4cca 100644
--- a/LayoutTests/http/tests/security/same-origin-css-5-expected.txt
+++ b/LayoutTests/http/tests/security/same-origin-css-5-expected.txt
@@ -1,4 +1,4 @@
-CONSOLE MESSAGE: Did not parse stylesheet at 'http://127.0.0.1:8000/resources/redirect.php?url=/security/resources/xorigincss4.html' because non CSS MIME types are not allowed in strict mode.
+CONSOLE MESSAGE: Did not parse stylesheet at 'http://127.0.0.1:8000/resources/redirect.py?url=/security/resources/xorigincss4.html' because non CSS MIME types are not allowed in strict mode.
PASS Testing same-origin and MIME behavior for CSS.
PASS xorigincss4.html should not be loaded via @import.
diff --git a/LayoutTests/http/tests/security/same-origin-css-5.html b/LayoutTests/http/tests/security/same-origin-css-5.html
index 92fd293..2f7f75e 100644
--- a/LayoutTests/http/tests/security/same-origin-css-5.html
+++ b/LayoutTests/http/tests/security/same-origin-css-5.html
@@ -12,7 +12,7 @@
<script src="/resources/testharnessreport.js"></script>
<style>
-@import "/resources/redirect.php?url=/security/resources/xorigincss4.html";
+@import "/resources/redirect.py?url=/security/resources/xorigincss4.html";
</style>
<script>
function getBackgroundColorForId(id) {
diff --git a/LayoutTests/http/tests/security/same-origin-css-6.html b/LayoutTests/http/tests/security/same-origin-css-6.html
index 01aed38..2f22f63 100644
--- a/LayoutTests/http/tests/security/same-origin-css-6.html
+++ b/LayoutTests/http/tests/security/same-origin-css-6.html
@@ -12,7 +12,7 @@
<script src="/resources/testharnessreport.js"></script>
<style>
-@import "/resources/redirect.php?url=/security/resources/xorigincss2.css";
+@import "/resources/redirect.py?url=/security/resources/xorigincss2.css";
</style>
<script>
function getBackgroundColorForId(id) {
diff --git a/LayoutTests/http/tests/security/same-origin-css-in-quirks.html b/LayoutTests/http/tests/security/same-origin-css-in-quirks.html
index 9a262c5..3c61e99 100644
--- a/LayoutTests/http/tests/security/same-origin-css-in-quirks.html
+++ b/LayoutTests/http/tests/security/same-origin-css-in-quirks.html
@@ -15,19 +15,19 @@
<script src="/resources/testharnessreport.js"></script>
<link rel="stylesheet"
- href="/resources/redirect.php?url=/security/resources/xorigincss1.html"></link>
+ href="/resources/redirect.py?url=/security/resources/xorigincss1.html"></link>
<link rel="stylesheet"
type="text/css"
- href="/resources/redirect.php?url=/security/resources/xorigincss2.html"></link>
+ href="/resources/redirect.py?url=/security/resources/xorigincss2.html"></link>
<link rel="stylesheet"
- href="/resources/redirect.php?url=/security/resources/xorigincss1.css"></link>
+ href="/resources/redirect.py?url=/security/resources/xorigincss1.css"></link>
<link rel="stylesheet"
href="resources/xorigincss3.html"></link>
<style>
/* Deliberately reuse the same file / class / id on this first one */
-@import "/resources/redirect.php?url=/security/resources/xorigincss2.html";
-@import "/resources/redirect.php?url=/security/resources/xorigincss4.html";
-@import "/resources/redirect.php?url=/security/resources/xorigincss2.css";
+@import "/resources/redirect.py?url=/security/resources/xorigincss2.html";
+@import "/resources/redirect.py?url=/security/resources/xorigincss4.html";
+@import "/resources/redirect.py?url=/security/resources/xorigincss2.css";
@import "resources/xorigincss5.html";
/* Check that data: is still allowed for non-CORS cross-origin image fetches. */
diff --git a/LayoutTests/http/tests/security/shape-image-cors-redirect-error-message-logging-1.html b/LayoutTests/http/tests/security/shape-image-cors-redirect-error-message-logging-1.html
index 7d86a12..69708d1 100644
--- a/LayoutTests/http/tests/security/shape-image-cors-redirect-error-message-logging-1.html
+++ b/LayoutTests/http/tests/security/shape-image-cors-redirect-error-message-logging-1.html
@@ -13,7 +13,7 @@
float: left;
width: 200px;
height: 20px;
- -webkit-shape-outside: url("/resources/redirect.php?url=http%3A%2F%2Flocalhost%3A8080%2Fsecurity%2Fresources%2Fimage-access-control.php%3Ffile%3D..%2F..%2Fresources%2Fsquare100.png%26allow%3Dfalse");
+ -webkit-shape-outside: url("/resources/redirect.py?url=http%3A%2F%2Flocalhost%3A8080%2Fsecurity%2Fresources%2Fimage-access-control.php%3Ffile%3D..%2F..%2Fresources%2Fsquare100.png%26allow%3Dfalse");
}
</style>
</head>
diff --git a/LayoutTests/http/tests/security/shape-image-cors-redirect-error-message-logging-3.html b/LayoutTests/http/tests/security/shape-image-cors-redirect-error-message-logging-3.html
index 813e134..bf763a5 100644
--- a/LayoutTests/http/tests/security/shape-image-cors-redirect-error-message-logging-3.html
+++ b/LayoutTests/http/tests/security/shape-image-cors-redirect-error-message-logging-3.html
@@ -12,7 +12,7 @@
float: left;
width: 200px;
height: 20px;
- -webkit-shape-outside: url("http://localhost:8080/resources/redirect.php?url=http%3A%2F%2Flocalhost%3A8080%2Fsecurity%2Fresources%2Fimage-access-control.php%3Ffile%3D..%2F..%2Fresources%2Fsquare100.png%26allow%3Dtrue");
+ -webkit-shape-outside: url("http://localhost:8080/resources/redirect.py?url=http%3A%2F%2Flocalhost%3A8080%2Fsecurity%2Fresources%2Fimage-access-control.php%3Ffile%3D..%2F..%2Fresources%2Fsquare100.png%26allow%3Dtrue");
}
</style>
diff --git a/LayoutTests/http/tests/security/shape-image-cors-redirect.html b/LayoutTests/http/tests/security/shape-image-cors-redirect.html
index b4d342c..a6e634d 100644
--- a/LayoutTests/http/tests/security/shape-image-cors-redirect.html
+++ b/LayoutTests/http/tests/security/shape-image-cors-redirect.html
@@ -22,7 +22,7 @@
/* Cross-origin request is OK because the "Access-Control-Allow-Origin: *" is returned for the final resource and the redirection is same origin. */
#ok-shape-outside-same-origin-redirection-allow-url {
- -webkit-shape-outside: url("/resources/redirect.php?url=http%3A%2F%2Flocalhost%3A8080%2Fsecurity%2Fresources%2Fimage-access-control.php%3Ffile%3D..%2F..%2Fresources%2Fsquare100.png%26allow%3Dtrue");
+ -webkit-shape-outside: url("/resources/redirect.py?url=http%3A%2F%2Flocalhost%3A8080%2Fsecurity%2Fresources%2Fimage-access-control.php%3Ffile%3D..%2F..%2Fresources%2Fsquare100.png%26allow%3Dtrue");
}
/* Cross-origin request is OK because the "Access-Control-Allow-Origin: *" is returned for both redirection and final resource. */
@@ -33,7 +33,7 @@
/* Not OK Tests: image resource loading should fail */
/* Cross-origin request is not OK because the HTTP header "Access-Control-Allow-Origin:" header is not returned for the final resource when the redirection was initiated from the same origin as the page. */
#notok-shape-outside-same-origin-redirection-disallow-url {
- -webkit-shape-outside: url("/resources/redirect.php?url=http%3A%2F%2Flocalhost%3A8080%2Fsecurity%2Fresources%2Fimage-access-control.php%3Ffile%3D..%2F..%2Fresources%2Fsquare100.png%26allow%3Dfalse");
+ -webkit-shape-outside: url("/resources/redirect.py?url=http%3A%2F%2Flocalhost%3A8080%2Fsecurity%2Fresources%2Fimage-access-control.php%3Ffile%3D..%2F..%2Fresources%2Fsquare100.png%26allow%3Dfalse");
}
/* Cross-origin request is not OK because a "Access-Control-Allow-Origin:" header is not returned for the final resource. */
@@ -43,7 +43,7 @@
/* Cross-origin request is not OK because the "Access-Control-Allow-Origin: *" is not returned for the redirection */
#notok-shape-outside-disallow-redirection-allow-url {
- -webkit-shape-outside: url("http://localhost:8080/resources/redirect.php?url=http%3A%2F%2Flocalhost%3A8080%2Fsecurity%2Fresources%2Fimage-access-control.php%3Ffile%3D..%2F..%2Fresources%2Fsquare100.png%26allow%3Dtrue");
+ -webkit-shape-outside: url("http://localhost:8080/resources/redirect.py?url=http%3A%2F%2Flocalhost%3A8080%2Fsecurity%2Fresources%2Fimage-access-control.php%3Ffile%3D..%2F..%2Fresources%2Fsquare100.png%26allow%3Dtrue");
}
</style>
</head>
diff --git a/LayoutTests/http/tests/security/strip-referrer-to-origin-for-third-party-redirects-in-private-mode.html b/LayoutTests/http/tests/security/strip-referrer-to-origin-for-third-party-redirects-in-private-mode.html
index f815054..a8d234c 100644
--- a/LayoutTests/http/tests/security/strip-referrer-to-origin-for-third-party-redirects-in-private-mode.html
+++ b/LayoutTests/http/tests/security/strip-referrer-to-origin-for-third-party-redirects-in-private-mode.html
@@ -27,7 +27,7 @@
referrer = data;
shouldBeEqualToString("referrer", "http://127.0.0.1:8000/security/strip-referrer-to-origin-for-third-party-redirects-in-private-mode.html");
- openIframe("resources/redirect.php?redirectTo=http://localhost:8000/security/resources/echo-referrer.php", finishJSTest);
+ openIframe("resources/redirect.py?redirectTo=http://localhost:8000/security/resources/echo-referrer.php", finishJSTest);
}).catch(function(error) {
console.log(error.message);
diff --git a/LayoutTests/http/tests/security/stylesheet-href-redirect-expected.txt b/LayoutTests/http/tests/security/stylesheet-href-redirect-expected.txt
index 01b8b7e..1abd3ad 100644
--- a/LayoutTests/http/tests/security/stylesheet-href-redirect-expected.txt
+++ b/LayoutTests/http/tests/security/stylesheet-href-redirect-expected.txt
@@ -1,2 +1,2 @@
A style sheet's href should be the original URL, not the final URL, of the redirect chain:
-http://localhost:8000/resources/redirect.php?url=http://localhost:8000/security/resources/cssStyle.css
+http://localhost:8000/resources/redirect.py?url=http://localhost:8000/security/resources/cssStyle.css
diff --git a/LayoutTests/http/tests/security/stylesheet-href-redirect.html b/LayoutTests/http/tests/security/stylesheet-href-redirect.html
index 2d8f594..ab44ac9 100644
--- a/LayoutTests/http/tests/security/stylesheet-href-redirect.html
+++ b/LayoutTests/http/tests/security/stylesheet-href-redirect.html
@@ -1,7 +1,7 @@
<html>
<head>
<link rel="stylesheet" type="text/css"
- href="http://localhost:8000/resources/redirect.php?url=http://localhost:8000/security/resources/cssStyle.css">
+ href="http://localhost:8000/resources/redirect.py?url=http://localhost:8000/security/resources/cssStyle.css">
<script>
if (window.testRunner)
testRunner.dumpAsText();
diff --git a/LayoutTests/http/tests/security/worker-cross-origin-expected.txt b/LayoutTests/http/tests/security/worker-cross-origin-expected.txt
index dc3a9e7..17584f0 100644
--- a/LayoutTests/http/tests/security/worker-cross-origin-expected.txt
+++ b/LayoutTests/http/tests/security/worker-cross-origin-expected.txt
@@ -6,7 +6,7 @@
On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE".
-PASS worker = new Worker("http://127.0.0.1:8000/resources/redirect.php?url=http://localhost:8000/security/resources/worker-message-pass.js") did not throw exception.
+PASS worker = new Worker("http://127.0.0.1:8000/resources/redirect.py?url=http://localhost:8000/security/resources/worker-message-pass.js") did not throw exception.
PASS Blocked cross origin Worker script load
PASS successfullyParsed is true
diff --git a/LayoutTests/http/tests/security/worker-cross-origin.html b/LayoutTests/http/tests/security/worker-cross-origin.html
index 194c3b9..02e7489 100644
--- a/LayoutTests/http/tests/security/worker-cross-origin.html
+++ b/LayoutTests/http/tests/security/worker-cross-origin.html
@@ -10,7 +10,7 @@
description("This tests that Web Worker script redirects are blocked if cross origin.");
var worker;
-shouldNotThrow('worker = new Worker("http://127.0.0.1:8000/resources/redirect.php?url=http://localhost:8000/security/resources/worker-message-pass.js")');
+shouldNotThrow('worker = new Worker("http://127.0.0.1:8000/resources/redirect.py?url=http://localhost:8000/security/resources/worker-message-pass.js")');
worker.onmessage = function(event) {
testFailed("Should have blocked cross origin Worker script load");
finishJSTest();
diff --git a/LayoutTests/http/tests/security/worker-same-origin-expected.txt b/LayoutTests/http/tests/security/worker-same-origin-expected.txt
index f56384e..1495eda 100644
--- a/LayoutTests/http/tests/security/worker-same-origin-expected.txt
+++ b/LayoutTests/http/tests/security/worker-same-origin-expected.txt
@@ -3,7 +3,7 @@
On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE".
-PASS worker = new Worker("http://127.0.0.1:8000/resources/redirect.php?url=http://127.0.0.1:8000/security/resources/worker-message-pass.js") did not throw exception.
+PASS worker = new Worker("http://127.0.0.1:8000/resources/redirect.py?url=http://127.0.0.1:8000/security/resources/worker-message-pass.js") did not throw exception.
PASS Allowed same origin Worker script load
PASS successfullyParsed is true
diff --git a/LayoutTests/http/tests/security/worker-same-origin.html b/LayoutTests/http/tests/security/worker-same-origin.html
index 1e911d7..b2d893a 100644
--- a/LayoutTests/http/tests/security/worker-same-origin.html
+++ b/LayoutTests/http/tests/security/worker-same-origin.html
@@ -10,7 +10,7 @@
description("This tests that Web Worker script redirects are loaded if same origin.");
var worker;
-shouldNotThrow('worker = new Worker("http://127.0.0.1:8000/resources/redirect.php?url=http://127.0.0.1:8000/security/resources/worker-message-pass.js")');
+shouldNotThrow('worker = new Worker("http://127.0.0.1:8000/resources/redirect.py?url=http://127.0.0.1:8000/security/resources/worker-message-pass.js")');
worker.onmessage = function(event) {
testPassed("Allowed same origin Worker script load");
finishJSTest();
diff --git a/LayoutTests/http/tests/security/xss-DENIED-xsl-external-entity-redirect-expected.txt b/LayoutTests/http/tests/security/xss-DENIED-xsl-external-entity-redirect-expected.txt
index 33a9fab..877228f 100644
--- a/LayoutTests/http/tests/security/xss-DENIED-xsl-external-entity-redirect-expected.txt
+++ b/LayoutTests/http/tests/security/xss-DENIED-xsl-external-entity-redirect-expected.txt
@@ -1,4 +1,4 @@
-CONSOLE MESSAGE: Did not parse external entity resource at 'http://127.0.0.1:8000/resources/redirect.php?url=http://localhost:8000/security/resources/target.xml' because cross-origin loads are not allowed.
-CONSOLE MESSAGE: Did not parse external entity resource at 'http://127.0.0.1:8000/resources/redirect.php?url=http://localhost:8000/security/resources/target.xml' because cross-origin loads are not allowed.
+CONSOLE MESSAGE: Did not parse external entity resource at 'http://127.0.0.1:8000/resources/redirect.py?url=http://localhost:8000/security/resources/target.xml' because cross-origin loads are not allowed.
+CONSOLE MESSAGE: Did not parse external entity resource at 'http://127.0.0.1:8000/resources/redirect.py?url=http://localhost:8000/security/resources/target.xml' because cross-origin loads are not allowed.
This test includes a cross-origin external entity. It passes if the load fails and thus there is no text below this line.
diff --git a/LayoutTests/http/tests/security/xssAuditor/block-does-not-leak-referrer.html b/LayoutTests/http/tests/security/xssAuditor/block-does-not-leak-referrer.html
index 0ee55d4..15a2040 100644
--- a/LayoutTests/http/tests/security/xssAuditor/block-does-not-leak-referrer.html
+++ b/LayoutTests/http/tests/security/xssAuditor/block-does-not-leak-referrer.html
@@ -14,7 +14,7 @@
window.onload = function () {
var i = document.querySelector('iframe');
i.onload = checkReferer;
- i.src = 'http://localhost:8000/resources/redirect.php?test=/security/xssAuditor/block-does-not-leak-referrer.html&url=http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?enable-full-block=1%26q=<script>alert(String.fromCharCode(0x58,0x53,0x53))<' + '/script>';
+ i.src = 'http://localhost:8000/resources/redirect.py?test=/security/xssAuditor/block-does-not-leak-referrer.html&url=http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?enable-full-block=1%26q=<script>alert(String.fromCharCode(0x58,0x53,0x53))<' + '/script>';
};
</script>
<script src="/resources/js-test-post.js"></script>
diff --git a/LayoutTests/http/tests/security/xssAuditor/script-tag-open-redirect.html b/LayoutTests/http/tests/security/xssAuditor/script-tag-open-redirect.html
index 9526b239..3c256f6 100644
--- a/LayoutTests/http/tests/security/xssAuditor/script-tag-open-redirect.html
+++ b/LayoutTests/http/tests/security/xssAuditor/script-tag-open-redirect.html
@@ -8,7 +8,7 @@
</script>
</head>
<body>
-<iframe src="http://localhost:8000/resources/redirect.php?url=http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?test=/security/xssAuditor/script-tag-open-redirect.html&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script>">
+<iframe src="http://localhost:8000/resources/redirect.py?url=http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?test=/security/xssAuditor/script-tag-open-redirect.html&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script>">
</iframe>
</body>
</html>
diff --git a/LayoutTests/http/tests/security/xssAuditor/script-tag-redirect.html b/LayoutTests/http/tests/security/xssAuditor/script-tag-redirect.html
index ed1c924..65994da 100644
--- a/LayoutTests/http/tests/security/xssAuditor/script-tag-redirect.html
+++ b/LayoutTests/http/tests/security/xssAuditor/script-tag-redirect.html
@@ -8,7 +8,7 @@
</script>
</head>
<body>
-<iframe src="/resources/redirect.php?url=http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?test=/security/xssAuditor/script-tag-redirect.html&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script>">
+<iframe src="/resources/redirect.py?url=http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?test=/security/xssAuditor/script-tag-redirect.html&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script>">
</iframe>
</body>
</html>
diff --git a/LayoutTests/http/tests/workers/resources/worker-importScripts-error.js b/LayoutTests/http/tests/workers/resources/worker-importScripts-error.js
index 816352e..a1291c5 100644
--- a/LayoutTests/http/tests/workers/resources/worker-importScripts-error.js
+++ b/LayoutTests/http/tests/workers/resources/worker-importScripts-error.js
@@ -1,2 +1,2 @@
-var differentRedirectOrigin = "/resources/redirect.php?url=http://localhost:8000/workers/resources/worker-importScripts-throw.js";
+var differentRedirectOrigin = "/resources/redirect.py?url=http://localhost:8000/workers/resources/worker-importScripts-throw.js";
importScripts(differentRedirectOrigin)
diff --git a/LayoutTests/http/tests/workers/resources/worker-importScripts.js b/LayoutTests/http/tests/workers/resources/worker-importScripts.js
index 8417f49..4819793 100644
--- a/LayoutTests/http/tests/workers/resources/worker-importScripts.js
+++ b/LayoutTests/http/tests/workers/resources/worker-importScripts.js
@@ -21,7 +21,7 @@
var source1 = "worker-importScripts-source1.js";
var source2 = "worker-importScripts-source2.js";
var differentOrigin = "http://localhost:8000/workers/resources/worker-importScripts-differentOrigin.js";
- var differentRedirectOrigin = "/resources/redirect.php?url=http://localhost:8000/workers/resources/worker-importScripts-differentOrigin.js";
+ var differentRedirectOrigin = "/resources/redirect.py?url=http://localhost:8000/workers/resources/worker-importScripts-differentOrigin.js";
var syntaxErrorSource = "worker-importScripts-syntaxError.js";
var fakeSource = "nonexistant";
loadedSource1 = false;
diff --git a/LayoutTests/http/tests/workers/resources/worker-redirect.js b/LayoutTests/http/tests/workers/resources/worker-redirect.js
index 54888e8..5bded90 100644
--- a/LayoutTests/http/tests/workers/resources/worker-redirect.js
+++ b/LayoutTests/http/tests/workers/resources/worker-redirect.js
@@ -43,7 +43,7 @@
function testCrossOriginRedirectedLoad()
{
try {
- var worker = createWorker('/resources/redirect.php?url=http://localhost:8000/workers/resources/worker-redirect-target.js');
+ var worker = createWorker('/resources/redirect.py?url=http://localhost:8000/workers/resources/worker-redirect-target.js');
worker.onerror = function(evt) {
log("SUCCESS: threw error when attempting to redirected cross origin while loading the worker script.");
runNextTest();
diff --git a/LayoutTests/http/tests/xmlhttprequest/access-control-and-redirects-async-same-origin-expected.txt b/LayoutTests/http/tests/xmlhttprequest/access-control-and-redirects-async-same-origin-expected.txt
index 60838e7..4599f03 100644
--- a/LayoutTests/http/tests/xmlhttprequest/access-control-and-redirects-async-same-origin-expected.txt
+++ b/LayoutTests/http/tests/xmlhttprequest/access-control-and-redirects-async-same-origin-expected.txt
@@ -4,26 +4,26 @@
CONSOLE MESSAGE: XMLHttpRequest cannot load http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow-no-credentials.cgi due to access control checks.
Tests that asynchronous XMLHttpRequests handle redirects according to the CORS standard.
-Testing ../resources/redirect.php?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow-star.cgi without credentials
+Testing ../resources/redirect.py?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow-star.cgi without credentials
Expecting success: true
PASS: PASS: Cross-domain access allowed.
-Testing ../resources/redirect.php?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow-star.cgi with credentials
+Testing ../resources/redirect.py?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow-star.cgi with credentials
Expecting success: false
PASS: 0
-Testing ../resources/redirect.php?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow.cgi without credentials
+Testing ../resources/redirect.py?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow.cgi without credentials
Expecting success: true
PASS: PASS: Cross-domain access allowed.
-Testing ../resources/redirect.php?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow.cgi with credentials
+Testing ../resources/redirect.py?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow.cgi with credentials
Expecting success: true
PASS: PASS: Cross-domain access allowed.
-Testing ../resources/redirect.php?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow-no-credentials.cgi without credentials
+Testing ../resources/redirect.py?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow-no-credentials.cgi without credentials
Expecting success: true
PASS: PASS: Cross-domain access allowed.
-Testing ../resources/redirect.php?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow-no-credentials.cgi with credentials
+Testing ../resources/redirect.py?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow-no-credentials.cgi with credentials
Expecting success: false
PASS: 0
diff --git a/LayoutTests/http/tests/xmlhttprequest/access-control-and-redirects-async-same-origin.html b/LayoutTests/http/tests/xmlhttprequest/access-control-and-redirects-async-same-origin.html
index 5dfd8cd..74ca7cd 100644
--- a/LayoutTests/http/tests/xmlhttprequest/access-control-and-redirects-async-same-origin.html
+++ b/LayoutTests/http/tests/xmlhttprequest/access-control-and-redirects-async-same-origin.html
@@ -45,32 +45,32 @@
// Request without credentials is redirected to a cross-origin response with Access-Control-Allow-Origin=*.
// The redirect response passes the access check.
-["../resources/redirect.php?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow-star.cgi",
+["../resources/redirect.py?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow-star.cgi",
withoutCredentials, noCustomHeader, succeeds],
// Request with credentials is redirected to a cross-origin response with Access-Control-Allow-Origin=*.
// The redirect response fails the access check because credentials were sent.
-["../resources/redirect.php?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow-star.cgi",
+["../resources/redirect.py?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow-star.cgi",
withCredentials, noCustomHeader, fails],
// Request without credentials is redirected to a cross-origin response with a specific Access-Control-Allow-Origin.
// The redirect response passes the access check.
-["../resources/redirect.php?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow.cgi",
+["../resources/redirect.py?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow.cgi",
withoutCredentials, noCustomHeader, succeeds],
// Request with credentials is redirected to a cross-origin response with a specific Access-Control-Allow-Origin.
// The redirect response passes the access check.
-["../resources/redirect.php?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow.cgi",
+["../resources/redirect.py?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow.cgi",
withCredentials, noCustomHeader, succeeds],
// Request without credentials is redirected to a cross-origin response with a specific Access-Control-Allow-Origin
// forbidding credentials. The redirect response passes the access check.
-["../resources/redirect.php?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow-no-credentials.cgi",
+["../resources/redirect.py?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow-no-credentials.cgi",
withoutCredentials, noCustomHeader, succeeds],
// Request with credentials is redirected to a cross-origin response with a specific Access-Control-Allow-Origin
// forbidding credentials. The redirect response fails the access check.
-["../resources/redirect.php?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow-no-credentials.cgi",
+["../resources/redirect.py?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow-no-credentials.cgi",
withCredentials, noCustomHeader, fails],
]
diff --git a/LayoutTests/http/tests/xmlhttprequest/access-control-and-redirects-expected.txt b/LayoutTests/http/tests/xmlhttprequest/access-control-and-redirects-expected.txt
index 6bb8ece..fd7d1da 100644
--- a/LayoutTests/http/tests/xmlhttprequest/access-control-and-redirects-expected.txt
+++ b/LayoutTests/http/tests/xmlhttprequest/access-control-and-redirects-expected.txt
@@ -1,33 +1,33 @@
CONSOLE MESSAGE: Cross-origin redirection to http://127.0.0.1:8000/xmlhttprequest/resources/access-control-basic-allow.cgi denied by Cross-Origin Resource Sharing policy: Origin http://127.0.0.1:8000 is not allowed by Access-Control-Allow-Origin.
-CONSOLE MESSAGE: XMLHttpRequest cannot load http://localhost:8000/resources/redirect.php?url=http://127.0.0.1:8000/xmlhttprequest/resources/access-control-basic-allow.cgi due to access control checks.
+CONSOLE MESSAGE: XMLHttpRequest cannot load http://localhost:8000/resources/redirect.py?url=http://127.0.0.1:8000/xmlhttprequest/resources/access-control-basic-allow.cgi due to access control checks.
CONSOLE MESSAGE: Cross-origin redirection to http://127.0.0.1:8000/xmlhttprequest/resources/access-control-basic-allow.cgi denied by Cross-Origin Resource Sharing policy: Origin http://127.0.0.1:8000 is not allowed by Access-Control-Allow-Origin.
-CONSOLE MESSAGE: XMLHttpRequest cannot load http://localhost:8000/resources/redirect.php?url=http://127.0.0.1:8000/xmlhttprequest/resources/access-control-basic-allow.cgi due to access control checks.
+CONSOLE MESSAGE: XMLHttpRequest cannot load http://localhost:8000/resources/redirect.py?url=http://127.0.0.1:8000/xmlhttprequest/resources/access-control-basic-allow.cgi due to access control checks.
CONSOLE MESSAGE: Cross-origin redirection to http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow.cgi denied by Cross-Origin Resource Sharing policy: Origin http://127.0.0.1:8000 is not allowed by Access-Control-Allow-Origin.
-CONSOLE MESSAGE: XMLHttpRequest cannot load http://localhost:8000/resources/redirect.php?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow.cgi due to access control checks.
+CONSOLE MESSAGE: XMLHttpRequest cannot load http://localhost:8000/resources/redirect.py?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow.cgi due to access control checks.
CONSOLE MESSAGE: Cross-origin redirection to http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow.cgi denied by Cross-Origin Resource Sharing policy: Origin http://127.0.0.1:8000 is not allowed by Access-Control-Allow-Origin.
-CONSOLE MESSAGE: XMLHttpRequest cannot load http://localhost:8000/resources/redirect.php?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow.cgi due to access control checks.
+CONSOLE MESSAGE: XMLHttpRequest cannot load http://localhost:8000/resources/redirect.py?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow.cgi due to access control checks.
Tests that redirects between origins are never allowed, even when access control is involved.
Per the spec, these test cases should be allowed, but cross-origin redirects are currently unsupported in WebCore.
-Testing /resources/redirect.php?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow.cgi (sync)
+Testing /resources/redirect.py?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow.cgi (sync)
Expecting success: true
PASS: PASS: Cross-domain access allowed.
-Testing /resources/redirect.php?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow.cgi(async)
+Testing /resources/redirect.py?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow.cgi(async)
Expecting success: true
PASS: PASS: Cross-domain access allowed.
-Testing http://localhost:8000/resources/redirect.php?url=http://127.0.0.1:8000/xmlhttprequest/resources/access-control-basic-allow.cgi (sync)
+Testing http://localhost:8000/resources/redirect.py?url=http://127.0.0.1:8000/xmlhttprequest/resources/access-control-basic-allow.cgi (sync)
Expecting success: false
PASS: NetworkError: A network error occurred.
-Testing http://localhost:8000/resources/redirect.php?url=http://127.0.0.1:8000/xmlhttprequest/resources/access-control-basic-allow.cgi(async)
+Testing http://localhost:8000/resources/redirect.py?url=http://127.0.0.1:8000/xmlhttprequest/resources/access-control-basic-allow.cgi(async)
Expecting success: false
PASS: 0
-Testing http://localhost:8000/resources/redirect.php?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow.cgi (sync)
+Testing http://localhost:8000/resources/redirect.py?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow.cgi (sync)
Expecting success: false
PASS: NetworkError: A network error occurred.
-Testing http://localhost:8000/resources/redirect.php?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow.cgi(async)
+Testing http://localhost:8000/resources/redirect.py?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow.cgi(async)
Expecting success: false
PASS: 0
diff --git a/LayoutTests/http/tests/xmlhttprequest/access-control-and-redirects.html b/LayoutTests/http/tests/xmlhttprequest/access-control-and-redirects.html
index 220a0d4..4a8f495 100644
--- a/LayoutTests/http/tests/xmlhttprequest/access-control-and-redirects.html
+++ b/LayoutTests/http/tests/xmlhttprequest/access-control-and-redirects.html
@@ -45,9 +45,9 @@
}
var tests = [
- ["/resources/redirect.php?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow.cgi", true, true],
- ["http://localhost:8000/resources/redirect.php?url=http://127.0.0.1:8000/xmlhttprequest/resources/access-control-basic-allow.cgi", false, false],
- ["http://localhost:8000/resources/redirect.php?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow.cgi", false, false]
+ ["/resources/redirect.py?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow.cgi", true, true],
+ ["http://localhost:8000/resources/redirect.py?url=http://127.0.0.1:8000/xmlhttprequest/resources/access-control-basic-allow.cgi", false, false],
+ ["http://localhost:8000/resources/redirect.py?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow.cgi", false, false]
]
var currentTest = 0;
diff --git a/LayoutTests/http/tests/xmlhttprequest/cross-origin-redirect-responseURL.html b/LayoutTests/http/tests/xmlhttprequest/cross-origin-redirect-responseURL.html
index 1eec338..813eb7e 100644
--- a/LayoutTests/http/tests/xmlhttprequest/cross-origin-redirect-responseURL.html
+++ b/LayoutTests/http/tests/xmlhttprequest/cross-origin-redirect-responseURL.html
@@ -34,16 +34,16 @@
});
}
-runTest('/resources/redirect.php?url=http://127.0.0.1:8000/xmlhttprequest/resources/access-control-basic-allow.cgi', 'text').then(function(req) {
+runTest('/resources/redirect.py?url=http://127.0.0.1:8000/xmlhttprequest/resources/access-control-basic-allow.cgi', 'text').then(function(req) {
window.responseURL = req.responseURL;
shouldBeEqualToString('responseURL', 'http://127.0.0.1:8000/xmlhttprequest/resources/access-control-basic-allow.cgi');
- return runTest('/resources/redirect.php?url=http://localhost:7/', 'document');
+ return runTest('/resources/redirect.py?url=http://localhost:7/', 'document');
}).then(function(req) {
window.responseURL = req.responseURL;
shouldBeEqualToString('responseURL', '');
- return runTest('/resources/redirect.php?url=http://localhost:22/', 'text');
+ return runTest('/resources/redirect.py?url=http://localhost:22/', 'text');
}).then(function(req) {
window.responseURL = req.responseURL;
shouldBeEqualToString('responseURL', '');
diff --git a/LayoutTests/http/tests/xmlhttprequest/redirect-cross-origin-2.html b/LayoutTests/http/tests/xmlhttprequest/redirect-cross-origin-2.html
index c20ec19..0e82cce 100644
--- a/LayoutTests/http/tests/xmlhttprequest/redirect-cross-origin-2.html
+++ b/LayoutTests/http/tests/xmlhttprequest/redirect-cross-origin-2.html
@@ -31,7 +31,7 @@
xhr.onloadstart = function() { log("onloadstart") }
xhr.onprogress = function() { log("onprogress") }
xhr.onerror = function() { log("onerror"); setTimeout(doneMissing, 100); }
- xhr.open("GET", "/resources/redirect.php?url=http://localhost:22/", true); // A non-HTTP port that is likely to be listening.
+ xhr.open("GET", "/resources/redirect.py?url=http://localhost:22/", true); // A non-HTTP port that is likely to be listening.
xhr.send();
}
@@ -61,7 +61,7 @@
xhr.onloadstart = function() { log("onloadstart") }
xhr.onprogress = function() { log("onprogress") }
xhr.onerror = function() { log("onerror"); setTimeout(doneExisting, 100); }
- xhr.open("GET", "/resources/redirect.php?url=http://localhost:8000/xmlhttprequest/resources/reply.xml", true);
+ xhr.open("GET", "/resources/redirect.py?url=http://localhost:8000/xmlhttprequest/resources/reply.xml", true);
xhr.send();
</script>
diff --git a/LayoutTests/http/tests/xmlhttprequest/redirect-cross-origin-post-sync.html b/LayoutTests/http/tests/xmlhttprequest/redirect-cross-origin-post-sync.html
index bc59f77..11d636c 100644
--- a/LayoutTests/http/tests/xmlhttprequest/redirect-cross-origin-post-sync.html
+++ b/LayoutTests/http/tests/xmlhttprequest/redirect-cross-origin-post-sync.html
@@ -27,7 +27,7 @@
xhr.upload.onloadstart = function() { log("upload.onloadstart") }
xhr.upload.onprogress = function() { log("upload.onprogress") }
try {
- xhr.open("POST", "/resources/redirect.php?url=http://localhost:8000/xmlhttprequest/resources/reply.xml", false);
+ xhr.open("POST", "/resources/redirect.py?url=http://localhost:8000/xmlhttprequest/resources/reply.xml", false);
xhr.send("Text");
} catch (ex) {
log(ex);
@@ -51,7 +51,7 @@
xhr.upload.onloadstart = function() { log("upload.onloadstart") }
xhr.upload.onprogress = function() { log("upload.onprogress") }
try {
- xhr.open("POST", "/resources/redirect.php?url=http://localhost:7/", false); // A port that will likely refuse the connection.
+ xhr.open("POST", "/resources/redirect.py?url=http://localhost:7/", false); // A port that will likely refuse the connection.
xhr.send("Text");
} catch (ex) {
log(ex);
diff --git a/LayoutTests/http/tests/xmlhttprequest/redirect-cross-origin-post.html b/LayoutTests/http/tests/xmlhttprequest/redirect-cross-origin-post.html
index 1b29ece..3770ebe 100644
--- a/LayoutTests/http/tests/xmlhttprequest/redirect-cross-origin-post.html
+++ b/LayoutTests/http/tests/xmlhttprequest/redirect-cross-origin-post.html
@@ -36,7 +36,7 @@
xhr.upload.onload = function() { log("upload.onload") }
xhr.upload.onloadstart = function() { log("upload.onloadstart") }
xhr.upload.onprogress = function() { log("upload.onprogress") }
- xhr.open("POST", "/resources/redirect.php?url=http://localhost:7/", true); // A port that will likely refuse the connection.
+ xhr.open("POST", "/resources/redirect.py?url=http://localhost:7/", true); // A port that will likely refuse the connection.
xhr.send("Text");
}
@@ -71,7 +71,7 @@
xhr.upload.onload = function() { log("upload.onload") }
xhr.upload.onloadstart = function() { log("upload.onloadstart") }
xhr.upload.onprogress = function() { log("upload.onprogress") }
- xhr.open("POST", "/resources/redirect.php?url=http://localhost:8000/xmlhttprequest/resources/reply.xml", true);
+ xhr.open("POST", "/resources/redirect.py?url=http://localhost:8000/xmlhttprequest/resources/reply.xml", true);
xhr.send("Text");
</script>
diff --git a/LayoutTests/http/tests/xmlhttprequest/redirect-cross-origin-sync-double.html b/LayoutTests/http/tests/xmlhttprequest/redirect-cross-origin-sync-double.html
index 46e9904..6dc0bc7 100644
--- a/LayoutTests/http/tests/xmlhttprequest/redirect-cross-origin-sync-double.html
+++ b/LayoutTests/http/tests/xmlhttprequest/redirect-cross-origin-sync-double.html
@@ -23,7 +23,7 @@
xhr.onprogress = function() { log("onprogress") }
xhr.onerror = function() { log("onerror") }
try {
- xhr.open("GET", "/resources/redirect.php?url=http://localhost:8000/resources/redirect.php?url=/xmlhttprequest/resources/reply.xml", false);
+ xhr.open("GET", "/resources/redirect.py?url=http://localhost:8000/resources/redirect.py?url=/xmlhttprequest/resources/reply.xml", false);
xhr.send();
} catch (ex) {
log(ex);
@@ -42,7 +42,7 @@
xhr.onprogress = function() { log("onprogress") }
xhr.onerror = function() { log("onerror"); }
try {
- xhr.open("GET", "/resources/redirect.php?url=http://localhost:7/", false); // A port that will likely refuse the connection.
+ xhr.open("GET", "/resources/redirect.py?url=http://localhost:7/", false); // A port that will likely refuse the connection.
xhr.send();
} catch (ex) {
log(ex);
diff --git a/LayoutTests/http/tests/xmlhttprequest/redirect-cross-origin-sync.html b/LayoutTests/http/tests/xmlhttprequest/redirect-cross-origin-sync.html
index 3f60071..1e5431f 100644
--- a/LayoutTests/http/tests/xmlhttprequest/redirect-cross-origin-sync.html
+++ b/LayoutTests/http/tests/xmlhttprequest/redirect-cross-origin-sync.html
@@ -22,7 +22,7 @@
xhr.onprogress = function() { log("onprogress") }
xhr.onerror = function() { log("onerror") }
try {
- xhr.open("GET", "/resources/redirect.php?url=http://localhost:8000/xmlhttprequest/resources/reply.xml", false);
+ xhr.open("GET", "/resources/redirect.py?url=http://localhost:8000/xmlhttprequest/resources/reply.xml", false);
xhr.send();
} catch (ex) {
log(ex);
@@ -41,7 +41,7 @@
xhr.onprogress = function() { log("onprogress") }
xhr.onerror = function() { log("onerror"); }
try {
- xhr.open("GET", "/resources/redirect.php?url=http://localhost:7/", false); // A port that will likely refuse the connection.
+ xhr.open("GET", "/resources/redirect.py?url=http://localhost:7/", false); // A port that will likely refuse the connection.
xhr.send();
} catch (ex) {
log(ex);
diff --git a/LayoutTests/http/tests/xmlhttprequest/redirect-cross-origin-tripmine.html b/LayoutTests/http/tests/xmlhttprequest/redirect-cross-origin-tripmine.html
index 344e5a9..9ec52f2 100644
--- a/LayoutTests/http/tests/xmlhttprequest/redirect-cross-origin-tripmine.html
+++ b/LayoutTests/http/tests/xmlhttprequest/redirect-cross-origin-tripmine.html
@@ -41,7 +41,7 @@
resetTripmine();
var req = new XMLHttpRequest;
- req.open(method, "/resources/redirect.php?code=" + code + "&url=http://localhost:8000/xmlhttprequest/resources/redirect-cross-origin-tripmine.py", true);
+ req.open(method, "/resources/redirect.py?code=" + code + "&url=http://localhost:8000/xmlhttprequest/resources/redirect-cross-origin-tripmine.py", true);
req.setRequestHeader("X-WebKit-Test", "*");
req.setRequestHeader("Content-Type", "application/xml");
req.send("data");
@@ -55,7 +55,7 @@
resetTripmine();
var req = new XMLHttpRequest;
- req.open(method, "/resources/redirect.php?code=" + code + "&url=http://localhost:8000/xmlhttprequest/resources/redirect-cross-origin-tripmine.py", false);
+ req.open(method, "/resources/redirect.py?code=" + code + "&url=http://localhost:8000/xmlhttprequest/resources/redirect-cross-origin-tripmine.py", false);
req.setRequestHeader("X-WebKit-Test", "*");
req.setRequestHeader("Content-Type", "application/xml");
try {
diff --git a/LayoutTests/http/tests/xmlhttprequest/redirect-cross-origin.html b/LayoutTests/http/tests/xmlhttprequest/redirect-cross-origin.html
index ff35f0b..b09b39b 100644
--- a/LayoutTests/http/tests/xmlhttprequest/redirect-cross-origin.html
+++ b/LayoutTests/http/tests/xmlhttprequest/redirect-cross-origin.html
@@ -31,7 +31,7 @@
xhr.onloadstart = function() { log("onloadstart") }
xhr.onprogress = function() { log("onprogress") }
xhr.onerror = function() { log("onerror"); setTimeout(doneMissing, 100); }
- xhr.open("GET", "/resources/redirect.php?url=http://localhost:7/", true); // A port that will likely refuse the connection.
+ xhr.open("GET", "/resources/redirect.py?url=http://localhost:7/", true); // A port that will likely refuse the connection.
xhr.send();
}
@@ -61,7 +61,7 @@
xhr.onloadstart = function() { log("onloadstart") }
xhr.onprogress = function() { log("onprogress") }
xhr.onerror = function() { log("onerror"); setTimeout(doneExisting, 100); }
- xhr.open("GET", "/resources/redirect.php?url=http://localhost:8000/xmlhttprequest/resources/reply.xml", true);
+ xhr.open("GET", "/resources/redirect.py?url=http://localhost:8000/xmlhttprequest/resources/reply.xml", true);
xhr.send();
</script>
diff --git a/LayoutTests/http/tests/xmlhttprequest/xmlhttprequest-unsafe-redirect.html b/LayoutTests/http/tests/xmlhttprequest/xmlhttprequest-unsafe-redirect.html
index 855ef5c..665175c 100644
--- a/LayoutTests/http/tests/xmlhttprequest/xmlhttprequest-unsafe-redirect.html
+++ b/LayoutTests/http/tests/xmlhttprequest/xmlhttprequest-unsafe-redirect.html
@@ -49,7 +49,7 @@
req.onreadystatechange = onReqreadystatechange;
req.onerror = onSyncReqError;
req.onabort = onReqAbort;
- req.open('GET', '/resources/redirect.php?url=http://localhost:8080/xmlhttprequest/resources/forbidden.txt', false);
+ req.open('GET', '/resources/redirect.py?url=http://localhost:8080/xmlhttprequest/resources/forbidden.txt', false);
try {
req.send(null);
} catch (e) {
@@ -67,7 +67,7 @@
req.onload = didReadFile;
req.onerror = onReqError;
req.onabort = onReqAbort;
- req.open('GET', '/resources/redirect.php?url=http://localhost:8080/xmlhttprequest/resources/forbidden.txt');
+ req.open('GET', '/resources/redirect.py?url=http://localhost:8080/xmlhttprequest/resources/forbidden.txt');
req.send(null);
}
</script>
diff --git a/LayoutTests/platform/gtk/http/tests/security/xss-DENIED-xsl-external-entity-redirect-expected.txt b/LayoutTests/platform/gtk/http/tests/security/xss-DENIED-xsl-external-entity-redirect-expected.txt
index 1a7e292..90b535a 100644
--- a/LayoutTests/platform/gtk/http/tests/security/xss-DENIED-xsl-external-entity-redirect-expected.txt
+++ b/LayoutTests/platform/gtk/http/tests/security/xss-DENIED-xsl-external-entity-redirect-expected.txt
@@ -1,6 +1,6 @@
CONSOLE MESSAGE: Document is empty
-CONSOLE MESSAGE: Did not parse external entity resource at 'http://127.0.0.1:8000/resources/redirect.php?url=http://localhost:8000/security/resources/target.xml' because cross-origin loads are not allowed.
-CONSOLE MESSAGE: Did not parse external entity resource at 'http://127.0.0.1:8000/resources/redirect.php?url=http://localhost:8000/security/resources/target.xml' because cross-origin loads are not allowed.
+CONSOLE MESSAGE: Did not parse external entity resource at 'http://127.0.0.1:8000/resources/redirect.py?url=http://localhost:8000/security/resources/target.xml' because cross-origin loads are not allowed.
+CONSOLE MESSAGE: Did not parse external entity resource at 'http://127.0.0.1:8000/resources/redirect.py?url=http://localhost:8000/security/resources/target.xml' because cross-origin loads are not allowed.
This test includes a cross-origin external entity. It passes if the load fails and thus there is no text below this line.
diff --git a/LayoutTests/platform/mac-wk1/http/tests/security/worker-cross-origin-expected.txt b/LayoutTests/platform/mac-wk1/http/tests/security/worker-cross-origin-expected.txt
index 096addb..410b066 100644
--- a/LayoutTests/platform/mac-wk1/http/tests/security/worker-cross-origin-expected.txt
+++ b/LayoutTests/platform/mac-wk1/http/tests/security/worker-cross-origin-expected.txt
@@ -5,7 +5,7 @@
On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE".
-PASS worker = new Worker("http://127.0.0.1:8000/resources/redirect.php?url=http://localhost:8000/security/resources/worker-message-pass.js") did not throw exception.
+PASS worker = new Worker("http://127.0.0.1:8000/resources/redirect.py?url=http://localhost:8000/security/resources/worker-message-pass.js") did not throw exception.
PASS Blocked cross origin Worker script load
PASS successfullyParsed is true
diff --git a/LayoutTests/platform/mac-wk1/http/tests/xmlhttprequest/access-control-and-redirects-expected.txt b/LayoutTests/platform/mac-wk1/http/tests/xmlhttprequest/access-control-and-redirects-expected.txt
index a48a581..dd80b97 100644
--- a/LayoutTests/platform/mac-wk1/http/tests/xmlhttprequest/access-control-and-redirects-expected.txt
+++ b/LayoutTests/platform/mac-wk1/http/tests/xmlhttprequest/access-control-and-redirects-expected.txt
@@ -1,30 +1,30 @@
CONSOLE MESSAGE: Cross-origin redirection to http://127.0.0.1:8000/xmlhttprequest/resources/access-control-basic-allow.cgi denied by Cross-Origin Resource Sharing policy: Origin http://127.0.0.1:8000 is not allowed by Access-Control-Allow-Origin.
-CONSOLE MESSAGE: XMLHttpRequest cannot load http://localhost:8000/resources/redirect.php?url=http://127.0.0.1:8000/xmlhttprequest/resources/access-control-basic-allow.cgi due to access control checks.
+CONSOLE MESSAGE: XMLHttpRequest cannot load http://localhost:8000/resources/redirect.py?url=http://127.0.0.1:8000/xmlhttprequest/resources/access-control-basic-allow.cgi due to access control checks.
CONSOLE MESSAGE: Cross-origin redirection denied by Cross-Origin Resource Sharing policy.
-CONSOLE MESSAGE: XMLHttpRequest cannot load http://localhost:8000/resources/redirect.php?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow.cgi due to access control checks.
+CONSOLE MESSAGE: XMLHttpRequest cannot load http://localhost:8000/resources/redirect.py?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow.cgi due to access control checks.
CONSOLE MESSAGE: Cross-origin redirection to http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow.cgi denied by Cross-Origin Resource Sharing policy: Origin http://127.0.0.1:8000 is not allowed by Access-Control-Allow-Origin.
-CONSOLE MESSAGE: XMLHttpRequest cannot load http://localhost:8000/resources/redirect.php?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow.cgi due to access control checks.
+CONSOLE MESSAGE: XMLHttpRequest cannot load http://localhost:8000/resources/redirect.py?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow.cgi due to access control checks.
Tests that redirects between origins are never allowed, even when access control is involved.
Per the spec, these test cases should be allowed, but cross-origin redirects are currently unsupported in WebCore.
-Testing /resources/redirect.php?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow.cgi (sync)
+Testing /resources/redirect.py?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow.cgi (sync)
Expecting success: true
FAIL: NetworkError: A network error occurred.
-Testing /resources/redirect.php?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow.cgi(async)
+Testing /resources/redirect.py?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow.cgi(async)
Expecting success: true
PASS: PASS: Cross-domain access allowed.
-Testing http://localhost:8000/resources/redirect.php?url=http://127.0.0.1:8000/xmlhttprequest/resources/access-control-basic-allow.cgi (sync)
+Testing http://localhost:8000/resources/redirect.py?url=http://127.0.0.1:8000/xmlhttprequest/resources/access-control-basic-allow.cgi (sync)
Expecting success: false
PASS: NetworkError: A network error occurred.
-Testing http://localhost:8000/resources/redirect.php?url=http://127.0.0.1:8000/xmlhttprequest/resources/access-control-basic-allow.cgi(async)
+Testing http://localhost:8000/resources/redirect.py?url=http://127.0.0.1:8000/xmlhttprequest/resources/access-control-basic-allow.cgi(async)
Expecting success: false
PASS: 0
-Testing http://localhost:8000/resources/redirect.php?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow.cgi (sync)
+Testing http://localhost:8000/resources/redirect.py?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow.cgi (sync)
Expecting success: false
PASS: NetworkError: A network error occurred.
-Testing http://localhost:8000/resources/redirect.php?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow.cgi(async)
+Testing http://localhost:8000/resources/redirect.py?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow.cgi(async)
Expecting success: false
PASS: 0
diff --git a/LayoutTests/platform/win/http/tests/security/mixedContent/secure-redirect-to-secure-redirect-to-basic-auth-secure-image.https-expected.txt b/LayoutTests/platform/win/http/tests/security/mixedContent/secure-redirect-to-secure-redirect-to-basic-auth-secure-image.https-expected.txt
index 41f5e42..a6ae17a 100644
--- a/LayoutTests/platform/win/http/tests/security/mixedContent/secure-redirect-to-secure-redirect-to-basic-auth-secure-image.https-expected.txt
+++ b/LayoutTests/platform/win/http/tests/security/mixedContent/secure-redirect-to-secure-redirect-to-basic-auth-secure-image.https-expected.txt
@@ -1,4 +1,4 @@
-https://127.0.0.1:8443/resources/redirect.php?url=https%3A//127.0.0.1%3A8443/resources/redirect.php%3Furl%3Dhttps%3A//localhost%3A8443/security/mixedContent/resources/subresource/protected-image.php - didReceiveAuthenticationChallenge - Responding with testUser:testPassword
+https://127.0.0.1:8443/resources/redirect.py?url=https%3A//127.0.0.1%3A8443/resources/redirect.py%3Furl%3Dhttps%3A//localhost%3A8443/security/mixedContent/resources/subresource/protected-image.py - didReceiveAuthenticationChallenge - Responding with testUser:testPassword
This test loads a secure image that redirects to a secure image that redirects to a secure image guarded by basic authentication. The secure image should load.
On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE".
diff --git a/LayoutTests/platform/win/http/tests/security/worker-cross-origin-expected.txt b/LayoutTests/platform/win/http/tests/security/worker-cross-origin-expected.txt
index 096addb..410b066 100644
--- a/LayoutTests/platform/win/http/tests/security/worker-cross-origin-expected.txt
+++ b/LayoutTests/platform/win/http/tests/security/worker-cross-origin-expected.txt
@@ -5,7 +5,7 @@
On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE".
-PASS worker = new Worker("http://127.0.0.1:8000/resources/redirect.php?url=http://localhost:8000/security/resources/worker-message-pass.js") did not throw exception.
+PASS worker = new Worker("http://127.0.0.1:8000/resources/redirect.py?url=http://localhost:8000/security/resources/worker-message-pass.js") did not throw exception.
PASS Blocked cross origin Worker script load
PASS successfullyParsed is true
diff --git a/LayoutTests/platform/win/http/tests/xmlhttprequest/access-control-and-redirects-expected.txt b/LayoutTests/platform/win/http/tests/xmlhttprequest/access-control-and-redirects-expected.txt
index a48a581..72cb8c9 100644
--- a/LayoutTests/platform/win/http/tests/xmlhttprequest/access-control-and-redirects-expected.txt
+++ b/LayoutTests/platform/win/http/tests/xmlhttprequest/access-control-and-redirects-expected.txt
@@ -1,9 +1,9 @@
CONSOLE MESSAGE: Cross-origin redirection to http://127.0.0.1:8000/xmlhttprequest/resources/access-control-basic-allow.cgi denied by Cross-Origin Resource Sharing policy: Origin http://127.0.0.1:8000 is not allowed by Access-Control-Allow-Origin.
-CONSOLE MESSAGE: XMLHttpRequest cannot load http://localhost:8000/resources/redirect.php?url=http://127.0.0.1:8000/xmlhttprequest/resources/access-control-basic-allow.cgi due to access control checks.
+CONSOLE MESSAGE: XMLHttpRequest cannot load http://localhost:8000/resources/redirect.py?url=http://127.0.0.1:8000/xmlhttprequest/resources/access-control-basic-allow.cgi due to access control checks.
CONSOLE MESSAGE: Cross-origin redirection denied by Cross-Origin Resource Sharing policy.
-CONSOLE MESSAGE: XMLHttpRequest cannot load http://localhost:8000/resources/redirect.php?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow.cgi due to access control checks.
+CONSOLE MESSAGE: XMLHttpRequest cannot load http://localhost:8000/resources/redirect.py?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow.cgi due to access control checks.
CONSOLE MESSAGE: Cross-origin redirection to http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow.cgi denied by Cross-Origin Resource Sharing policy: Origin http://127.0.0.1:8000 is not allowed by Access-Control-Allow-Origin.
-CONSOLE MESSAGE: XMLHttpRequest cannot load http://localhost:8000/resources/redirect.php?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow.cgi due to access control checks.
+CONSOLE MESSAGE: XMLHttpRequest cannot load http://localhost:8000/resources/redirect.py?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow.cgi due to access control checks.
Tests that redirects between origins are never allowed, even when access control is involved.
Per the spec, these test cases should be allowed, but cross-origin redirects are currently unsupported in WebCore.
@@ -15,16 +15,16 @@
Expecting success: true
PASS: PASS: Cross-domain access allowed.
-Testing http://localhost:8000/resources/redirect.php?url=http://127.0.0.1:8000/xmlhttprequest/resources/access-control-basic-allow.cgi (sync)
+Testing http://localhost:8000/resources/redirect.py?url=http://127.0.0.1:8000/xmlhttprequest/resources/access-control-basic-allow.cgi (sync)
Expecting success: false
PASS: NetworkError: A network error occurred.
-Testing http://localhost:8000/resources/redirect.php?url=http://127.0.0.1:8000/xmlhttprequest/resources/access-control-basic-allow.cgi(async)
+Testing http://localhost:8000/resources/redirect.py?url=http://127.0.0.1:8000/xmlhttprequest/resources/access-control-basic-allow.cgi(async)
Expecting success: false
PASS: 0
-Testing http://localhost:8000/resources/redirect.php?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow.cgi (sync)
+Testing http://localhost:8000/resources/redirect.py?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow.cgi (sync)
Expecting success: false
PASS: NetworkError: A network error occurred.
-Testing http://localhost:8000/resources/redirect.php?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow.cgi(async)
+Testing http://localhost:8000/resources/redirect.py?url=http://localhost:8000/xmlhttprequest/resources/access-control-basic-allow.cgi(async)
Expecting success: false
PASS: 0
diff --git a/LayoutTests/platform/wk2/http/tests/security/blocked-on-redirect-expected.txt b/LayoutTests/platform/wk2/http/tests/security/blocked-on-redirect-expected.txt
index e17e1e4..43c25d5 100644
--- a/LayoutTests/platform/wk2/http/tests/security/blocked-on-redirect-expected.txt
+++ b/LayoutTests/platform/wk2/http/tests/security/blocked-on-redirect-expected.txt
@@ -1,5 +1,5 @@
http://127.0.0.1:8000/security/blocked-on-redirect.html - didFinishLoading
-http://127.0.0.1:8000/resources/redirect.php?code=307&url=http://localhost:25/security/resources/post-done.html - willSendRequest <NSURLRequest URL http://127.0.0.1:8000/resources/redirect.php?code=307&url=http://localhost:25/security/resources/post-done.html, main document URL http://127.0.0.1:8000/security/blocked-on-redirect.html, http method GET> redirectResponse (null)
+http://127.0.0.1:8000/resources/redirect.py?code=307&url=http://localhost:25/security/resources/post-done.html - willSendRequest <NSURLRequest URL http://127.0.0.1:8000/resources/redirect.py?code=307&url=http://localhost:25/security/resources/post-done.html, main document URL http://127.0.0.1:8000/security/blocked-on-redirect.html, http method GET> redirectResponse (null)
CONSOLE MESSAGE: Not allowed to use restricted network port: http://localhost:25/security/resources/post-done.html
-http://127.0.0.1:8000/resources/redirect.php?code=307&url=http://localhost:25/security/resources/post-done.html - didFailLoadingWithError: <NSError domain WebKitErrorDomain, code 103, failing URL "http://localhost:25/security/resources/post-done.html">
+http://127.0.0.1:8000/resources/redirect.py?code=307&url=http://localhost:25/security/resources/post-done.html - didFailLoadingWithError: <NSError domain WebKitErrorDomain, code 103, failing URL "http://localhost:25/security/resources/post-done.html">
This test produces output in the console. Only the initial URL should be logged.
diff --git a/LayoutTests/platform/wk2/http/tests/security/mixedContent/insecure-image-redirects-to-basic-auth-secure-image-allowCrossOriginSubresourcesToAskForCredentials-expected.txt b/LayoutTests/platform/wk2/http/tests/security/mixedContent/insecure-image-redirects-to-basic-auth-secure-image-allowCrossOriginSubresourcesToAskForCredentials-expected.txt
index 8b14421..4082fde 100644
--- a/LayoutTests/platform/wk2/http/tests/security/mixedContent/insecure-image-redirects-to-basic-auth-secure-image-allowCrossOriginSubresourcesToAskForCredentials-expected.txt
+++ b/LayoutTests/platform/wk2/http/tests/security/mixedContent/insecure-image-redirects-to-basic-auth-secure-image-allowCrossOriginSubresourcesToAskForCredentials-expected.txt
@@ -1,4 +1,4 @@
-CONSOLE MESSAGE: The page at https://127.0.0.1:8443/security/mixedContent/resources/frame-with-insecure-image-redirects-to-basic-auth-secure-image.html?allowCrossOriginSubresourcesToAskForCredentials=1 was allowed to display insecure content from http://127.0.0.1:8080/resources/redirect.php?url=https://localhost:8443/security/mixedContent/resources/subresource/protected-image.php.
+CONSOLE MESSAGE: The page at https://127.0.0.1:8443/security/mixedContent/resources/frame-with-insecure-image-redirects-to-basic-auth-secure-image.html?allowCrossOriginSubresourcesToAskForCredentials=1 was allowed to display insecure content from http://127.0.0.1:8080/resources/redirect.py?url=https://localhost:8443/security/mixedContent/resources/subresource/protected-image.php.
localhost:8443 - didReceiveAuthenticationChallenge - ProtectionSpaceAuthenticationSchemeHTTPBasic - Responding with testUser:testPassword
This test opens a new window to a secure page that loads an insecure image that redirects to a secure image guarded by basic authentication. The image should load.
diff --git a/LayoutTests/platform/wk2/http/tests/security/mixedContent/redirect-http-to-https-iframe-in-main-frame-expected.txt b/LayoutTests/platform/wk2/http/tests/security/mixedContent/redirect-http-to-https-iframe-in-main-frame-expected.txt
index 0a40926..611a7ec 100644
--- a/LayoutTests/platform/wk2/http/tests/security/mixedContent/redirect-http-to-https-iframe-in-main-frame-expected.txt
+++ b/LayoutTests/platform/wk2/http/tests/security/mixedContent/redirect-http-to-https-iframe-in-main-frame-expected.txt
@@ -5,7 +5,7 @@
main frame - didCommitLoadForFrame
main frame - didFinishDocumentLoadForFrame
frame "<!--frame1-->" - didStartProvisionalLoadForFrame
-CONSOLE MESSAGE: [blocked] The page at about:blank was not allowed to display insecure content from http://127.0.0.1:8080/resources/redirect.php?url=https://127.0.0.1:8443/security/mixedContent/resources/boring.html.
+CONSOLE MESSAGE: [blocked] The page at about:blank was not allowed to display insecure content from http://127.0.0.1:8080/resources/redirect.py?url=https://127.0.0.1:8443/security/mixedContent/resources/boring.html.
main frame - didHandleOnloadEventsForFrame
frame "<!--frame1-->" - didFailProvisionalLoadWithError
diff --git a/LayoutTests/platform/wk2/http/tests/security/mixedContent/redirect-http-to-https-script-in-iframe-expected.txt b/LayoutTests/platform/wk2/http/tests/security/mixedContent/redirect-http-to-https-script-in-iframe-expected.txt
index 8de0eef..11185a1 100644
--- a/LayoutTests/platform/wk2/http/tests/security/mixedContent/redirect-http-to-https-script-in-iframe-expected.txt
+++ b/LayoutTests/platform/wk2/http/tests/security/mixedContent/redirect-http-to-https-script-in-iframe-expected.txt
@@ -1,7 +1,7 @@
main frame - didFinishDocumentLoadForFrame
frame "<!--frame1-->" - didStartProvisionalLoadForFrame
frame "<!--frame1-->" - didCommitLoadForFrame
-CONSOLE MESSAGE: [blocked] The page at https://127.0.0.1:8443/security/mixedContent/resources/frame-with-redirect-http-to-https-script.html was not allowed to run insecure content from http://127.0.0.1:8080/resources/redirect.php?url=https://127.0.0.1:8443/security/mixedContent/resources/script.js.
+CONSOLE MESSAGE: [blocked] The page at https://127.0.0.1:8443/security/mixedContent/resources/frame-with-redirect-http-to-https-script.html was not allowed to run insecure content from http://127.0.0.1:8080/resources/redirect.py?url=https://127.0.0.1:8443/security/mixedContent/resources/script.js.
frame "<!--frame1-->" - didFinishDocumentLoadForFrame
frame "<!--frame1-->" - didHandleOnloadEventsForFrame
diff --git a/LayoutTests/platform/wk2/http/tests/security/mixedContent/secure-redirect-to-insecure-redirect-to-basic-auth-secure-image-allowCrossOriginSubresourcesToAskForCredentials.https-expected.txt b/LayoutTests/platform/wk2/http/tests/security/mixedContent/secure-redirect-to-insecure-redirect-to-basic-auth-secure-image-allowCrossOriginSubresourcesToAskForCredentials.https-expected.txt
index 42d674b..1858f55 100644
--- a/LayoutTests/platform/wk2/http/tests/security/mixedContent/secure-redirect-to-insecure-redirect-to-basic-auth-secure-image-allowCrossOriginSubresourcesToAskForCredentials.https-expected.txt
+++ b/LayoutTests/platform/wk2/http/tests/security/mixedContent/secure-redirect-to-insecure-redirect-to-basic-auth-secure-image-allowCrossOriginSubresourcesToAskForCredentials.https-expected.txt
@@ -1,4 +1,4 @@
-CONSOLE MESSAGE: The page at https://127.0.0.1:8443/security/mixedContent/secure-redirect-to-insecure-redirect-to-basic-auth-secure-image-allowCrossOriginSubresourcesToAskForCredentials.https.html was allowed to display insecure content from http://127.0.0.1:8080/resources/redirect.php?url=https://localhost:8443/security/mixedContent/resources/subresource/protected-image.php.
+CONSOLE MESSAGE: The page at https://127.0.0.1:8443/security/mixedContent/secure-redirect-to-insecure-redirect-to-basic-auth-secure-image-allowCrossOriginSubresourcesToAskForCredentials.https.html was allowed to display insecure content from http://127.0.0.1:8080/resources/redirect.py?url=https://localhost:8443/security/mixedContent/resources/subresource/protected-image.php.
localhost:8443 - didReceiveAuthenticationChallenge - ProtectionSpaceAuthenticationSchemeHTTPBasic - Responding with testUser:testPassword
This test loads a secure image that redirects to an insecure image that redirects to a secure image guarded by basic authentication. The image should load.