[Webkit-unassigned] [Bug 154522] New: CSP: Make SecurityPolicyViolationEvent more closely conform to CSP 2.0 and enable it by default
bugzilla-daemon at webkit.org
bugzilla-daemon at webkit.org
Sun Feb 21 15:50:00 PST 2016
https://bugs.webkit.org/show_bug.cgi?id=154522
Bug ID: 154522
Summary: CSP: Make SecurityPolicyViolationEvent more closely
conform to CSP 2.0 and enable it by default
Classification: Unclassified
Product: WebKit
Version: WebKit Local Build
Hardware: All
OS: All
Status: NEW
Keywords: WebExposed
Severity: Normal
Priority: P2
Component: WebCore Misc.
Assignee: webkit-unassigned at lists.webkit.org
Reporter: dbates at webkit.org
CC: webkit-bug-importer at group.apple.com
Update the SecurityPolicyViolationEvent attributes to more closely conform to the Content Security Policy 2.0 spec., <https://www.w3.org/TR/2015/CR-CSP2-20150721/>. Additionally, we should enable (by default) dispatching of a SecurityPolicyViolationEvent when a CSP violation occurs as support for this event is enabled by default in Google Chrome.
Currently the code for SecurityPolicyViolationEvent is not compiled because it is guarded by the ENABLE(CSP_NEXT) macro, which is disabled by default.
--
You are receiving this mail because:
You are the assignee for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.webkit.org/pipermail/webkit-unassigned/attachments/20160221/452b0a62/attachment-0001.html>
More information about the webkit-unassigned
mailing list