[Webkit-unassigned] [Bug 154522] New: CSP: Make SecurityPolicyViolationEvent more closely conform to CSP 2.0 and enable it by default

bugzilla-daemon at webkit.org bugzilla-daemon at webkit.org
Sun Feb 21 15:50:00 PST 2016


https://bugs.webkit.org/show_bug.cgi?id=154522

            Bug ID: 154522
           Summary: CSP: Make SecurityPolicyViolationEvent more closely
                    conform to CSP 2.0 and enable it by default
    Classification: Unclassified
           Product: WebKit
           Version: WebKit Local Build
          Hardware: All
                OS: All
            Status: NEW
          Keywords: WebExposed
          Severity: Normal
          Priority: P2
         Component: WebCore Misc.
          Assignee: webkit-unassigned at lists.webkit.org
          Reporter: dbates at webkit.org
                CC: webkit-bug-importer at group.apple.com

Update the SecurityPolicyViolationEvent attributes to more closely conform to the Content Security Policy 2.0 spec., <https://www.w3.org/TR/2015/CR-CSP2-20150721/>. Additionally, we should enable (by default) dispatching of a SecurityPolicyViolationEvent when a CSP violation occurs as support for this event is enabled by default in Google Chrome.

Currently the code for SecurityPolicyViolationEvent is not compiled because it is guarded by the ENABLE(CSP_NEXT) macro, which is disabled by default.

-- 
You are receiving this mail because:
You are the assignee for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.webkit.org/pipermail/webkit-unassigned/attachments/20160221/452b0a62/attachment-0001.html>


More information about the webkit-unassigned mailing list