Revision 3fee9e181e7c97c517c0b36b6387c04e74a02181 authored by Andy Paicu on 02 October 2018, 04:21:46 UTC, committed by wpt-autoroller on 02 October 2018, 04:21:46 UTC
Modified resource fetching to allow piping back to the ResourceClient a
struct needed for firing the securityviolationevent. This allows us
to specify the targeted element as well in the event.

CSP violation events have overly vague srcElement and path when being
triggered for an element that requires a fetch because the element is not
being passed down to where the csp check takes place and the report is
fired.

Bug: 737647
Change-Id: I944ea2ea69447c612c01b9e6f723f110fa28a1f5
1 parent 67152fd
History
File Mode Size
cookie-helper.sub.js -rw-r--r-- 7.3 KB
drop.py -rw-r--r-- 653 bytes
dropSameSite.py -rw-r--r-- 578 bytes
dropSecure.py -rw-r--r-- 495 bytes
echo-cookie.html -rw-r--r-- 775 bytes
echo-json.py -rw-r--r-- 500 bytes
helpers.py -rw-r--r-- 2.0 KB
imgIfMatch.py -rw-r--r-- 1.0 KB
list.py -rw-r--r-- 206 bytes
postToParent.py -rw-r--r-- 619 bytes
redirectWithCORSHeaders.py -rw-r--r-- 644 bytes
set-cookie.py -rw-r--r-- 840 bytes
set.py -rw-r--r-- 472 bytes
setSameSite.py -rw-r--r-- 728 bytes
setSecure.py -rw-r--r-- 556 bytes
testharness-helpers.js -rw-r--r-- 1.2 KB

back to top