RESOLVED FIXED Bug 231751
CSP: Implement src-elem and src-attr directives
https://bugs.webkit.org/show_bug.cgi?id=231751
Summary CSP: Implement src-elem and src-attr directives
Kate Cheney
Reported 2021-10-14 10:58:10 PDT
CSP: Implement src-elem and src-attr directives
Attachments
Patch (140.89 KB, patch)
2021-10-14 10:59 PDT, Kate Cheney
no flags
Patch (151.51 KB, patch)
2021-10-14 14:06 PDT, Kate Cheney
no flags
Kate Cheney
Comment 1 2021-10-14 10:59:34 PDT
Brent Fulgham
Comment 2 2021-10-14 11:43:53 PDT
Comment on attachment 441240 [details] Patch View in context: https://bugs.webkit.org/attachment.cgi?id=441240&action=review > Source/WebCore/page/csp/ContentSecurityPolicyDirective.cpp:33 > +ContentSecurityPolicyDirective::~ContentSecurityPolicyDirective() Do we need this dummy implementation if the declaration in the header is for a pure virtual? Or maybe (if this is the only destructor you really need) the declaration should just be for a virtual method (not pure virtual).
Brent Fulgham
Comment 3 2021-10-14 11:45:55 PDT
Comment on attachment 441240 [details] Patch View in context: https://bugs.webkit.org/attachment.cgi?id=441240&action=review r=me > LayoutTests/TestExpectations:-911 > -imported/w3c/web-platform-tests/content-security-policy/style-src-attr-elem/ [ Skip ] Nice! > LayoutTests/http/tests/security/contentSecurityPolicy/report-uri-scheme-relative-expected.txt:9 > +{"csp-report":{"document-uri":"http://127.0.0.1:8000/security/contentSecurityPolicy/report-uri-scheme-relative.py","referrer":"","violated-directive":"script-src-elem","effective-directive":"script-src","original-policy":"script-src 'self'; report-uri //127.0.0.1:8080/security/contentSecurityPolicy/resources/save-report.py","blocked-uri":"inline","status-code":200}} I wonder if we could consider removing any of these WebKit-specific tests now that we pass the official WPT tests? > LayoutTests/imported/w3c/web-platform-tests/content-security-policy/script-src-attr-elem/script-src-attr-allowed-src-blocked-expected.txt:3 > +PASS Should not fire a security policy violation event So good to see these timeouts go away. This will help speed up our WPT runs, too.
Kate Cheney
Comment 4 2021-10-14 12:06:47 PDT
(In reply to Brent Fulgham from comment #3) > Comment on attachment 441240 [details] > Patch > > View in context: > https://bugs.webkit.org/attachment.cgi?id=441240&action=review > > r=me Looks like there are more newly passing tests that I missed. I will update those expectations and wait on EWS before landing. > > > LayoutTests/TestExpectations:-911 > > -imported/w3c/web-platform-tests/content-security-policy/style-src-attr-elem/ [ Skip ] > > Nice! > > > LayoutTests/http/tests/security/contentSecurityPolicy/report-uri-scheme-relative-expected.txt:9 > > +{"csp-report":{"document-uri":"http://127.0.0.1:8000/security/contentSecurityPolicy/report-uri-scheme-relative.py","referrer":"","violated-directive":"script-src-elem","effective-directive":"script-src","original-policy":"script-src 'self'; report-uri //127.0.0.1:8080/security/contentSecurityPolicy/resources/save-report.py","blocked-uri":"inline","status-code":200}} > > I wonder if we could consider removing any of these WebKit-specific tests > now that we pass the official WPT tests? > I think maybe we can. In another patch I will go through and see if any of them are repeats and remove them. > > LayoutTests/imported/w3c/web-platform-tests/content-security-policy/script-src-attr-elem/script-src-attr-allowed-src-blocked-expected.txt:3 > > +PASS Should not fire a security policy violation event > > So good to see these timeouts go away. This will help speed up our WPT runs, > too.
Kate Cheney
Comment 5 2021-10-14 14:06:04 PDT
Kate Cheney
Comment 6 2021-10-15 09:16:49 PDT
Comment on attachment 441279 [details] Patch iOS failure is unrelated.
Kate Cheney
Comment 7 2021-10-15 09:53:12 PDT
EWS
Comment 8 2021-10-15 10:39:47 PDT
Committed r284254 (243063@main): <https://commits.webkit.org/243063@main> All reviewed patches have been landed. Closing bug and clearing flags on attachment 441279 [details].
Note You need to log in before you can comment on or make changes to this bug.