Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CSP: Use PolicyContainerHost for browser checks #27774

Merged
merged 1 commit into from Mar 5, 2021

Conversation

chromium-wpt-export-bot
Copy link
Collaborator

@chromium-wpt-export-bot chromium-wpt-export-bot commented Feb 25, 2021

Content Security Policies are now synced into the
PolicyContainerHost. This CL used the policies from the
PolicyContainerHost for the CSP checks in the browser, i.e. for
'frame-src', 'form-action', 'navigate-to',
'upgrade-insecure-requests'. This CL also stops storing separately in
the RenderFrameHost the parsed Content Security Policies.

Bug: 1149272
Change-Id: I1eb3ab42138a86ae4e0c261d9e6a9b4b67124f99
Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/2684857
Commit-Queue: Antonio Sartori <antoniosartori@chromium.org>
Reviewed-by: Mike West <mkwst@chromium.org>
Reviewed-by: Arthur Sonzogni <arthursonzogni@chromium.org>
Cr-Commit-Position: refs/heads/master@{#860146}

Copy link
Collaborator

@wpt-pr-bot wpt-pr-bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The review process for this patch is being conducted in the Chromium project.

@chromium-wpt-export-bot chromium-wpt-export-bot force-pushed the chromium-export-cl-2684857 branch 3 times, most recently from 63c90b9 to 53dc7d2 Compare March 3, 2021 07:01
@chromium-wpt-export-bot chromium-wpt-export-bot force-pushed the chromium-export-cl-2684857 branch 2 times, most recently from f6de675 to 2edd4df Compare March 4, 2021 16:12
Content Security Policies are now synced into the
PolicyContainerHost. This CL used the policies from the
PolicyContainerHost for the CSP checks in the browser, i.e. for
'frame-src', 'form-action', 'navigate-to',
'upgrade-insecure-requests'. This CL also stops storing separately in
the RenderFrameHost the parsed Content Security Policies.

Bug: 1149272
Change-Id: I1eb3ab42138a86ae4e0c261d9e6a9b4b67124f99
Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/2684857
Commit-Queue: Antonio Sartori <antoniosartori@chromium.org>
Reviewed-by: Mike West <mkwst@chromium.org>
Reviewed-by: Arthur Sonzogni <arthursonzogni@chromium.org>
Cr-Commit-Position: refs/heads/master@{#860146}
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants