tor-browser

The Tor Browser
git clone https://git.dasho.dev/tor-browser.git
Log | Files | Refs | README | LICENSE

commit 150c4fdbe49a8195d83185a339a7c1b7d0108347
parent 1fb4f108ab3ec45c377b7f8c61f1eb9ca1dc8e5d
Author: Noam Rosenthal <nrosenthal@chromium.org>
Date:   Wed, 19 Nov 2025 04:56:33 +0000

Bug 1998582 [wpt PR 55887] - Implement streamAppendHTMLUnsafe, a=testonly

Automatic update from web-platform-tests
Implement streamAppendHTMLUnsafe

This follows recent spec conversations
(https://github.com/whatwg/html/issues/2142, https://github.com/whatwg/html/issues/11669)

It doesn't reuse existing "patching" implementation because it's
substantially simpler. There are no events/CSS reflection, and no
conflict resolution. A stream is created on demand, and instantiates
a parser. It only accepts strings and stringifies everything else.

Note that one of the tests already shows how this works together with
<template contentmethod>.

TrustedTypes support TBD.

Bug: 431374376
Change-Id: Ib63009aac10bad2a47654431dfa8069f9d8fa083
Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/7079672
Reviewed-by: Philip Jägenstedt <foolip@chromium.org>
Commit-Queue: Noam Rosenthal <nrosenthal@google.com>
Reviewed-by: Mason Freed <masonf@chromium.org>
Cr-Commit-Position: refs/heads/main@{#1546464}

--

wpt-commits: 99cb0e0657ae5be80e8d320de86c8889078508bd
wpt-pr: 55887