Closed
Bug 1464078
Opened 6 years ago
Closed 6 years ago
[wpt-sync] Sync PR 11140 - Fixed CSP directive value parsing accepted character range
Categories
(Core :: DOM: Security, enhancement, P4)
Core
DOM: Security
Tracking
()
RESOLVED
FIXED
mozilla62
Tracking | Status | |
---|---|---|
firefox62 | --- | fixed |
People
(Reporter: mozilla.org, Unassigned)
References
()
Details
(Whiteboard: [wptsync downstream][domsecurity-backlog])
Sync web-platform-tests PR 11140 into mozilla-central (this bug is closed when the sync is complete). PR: https://github.com/w3c/web-platform-tests/pull/11140 Details from upstream follow. Andy Paicu <andypaicu@chromium.org> wrote: > Fixed CSP directive value parsing accepted character range > > Bug: 845961 > Change-Id: Ifc9609058cd7cbd268785db46534e3ed09da6ce3 > Reviewed-on: https://chromium-review.googlesource.com/1071510 > WPT-Export-Revision: 3ceccaa1797813deebfdd8be7bf03a41bc055321
Assignee | ||
Updated•6 years ago
|
Component: web-platform-tests → DOM: Security
Product: Testing → Core
Assignee | ||
Comment 1•6 years ago
|
||
Pushed to try https://treeherder.mozilla.org/#/jobs?repo=try&revision=1a64938b59e2400c353732c9fbad6a3663cbc324
Assignee | ||
Comment 2•6 years ago
|
||
Pushed to try (stability) https://treeherder.mozilla.org/#/jobs?repo=try&revision=9afb31cb72ead3deafb10a93b3083df482882beb
Assignee | ||
Comment 3•6 years ago
|
||
Pushed to try https://treeherder.mozilla.org/#/jobs?repo=try&revision=7943353a2d17c4f5c0dd3da427c5c05ab89122c8
Assignee | ||
Comment 4•6 years ago
|
||
Pushed to try https://treeherder.mozilla.org/#/jobs?repo=try&revision=e3e6fa4e7ca0b2ba0574b774adc7e955ec27e6c4
Assignee | ||
Comment 5•6 years ago
|
||
Ran 1 tests and 90 subtests OK : 1 PASS : 64 FAIL : 26 New tests that have failures or other problems: /content-security-policy/embedded-enforcement/required_csp-header.html Test Required-CSP value on `csp` change: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - \n character after directive name: FAIL Test Required-CSP value on `csp` change: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - \n character in directive value: FAIL Test Required-CSP value on `csp` change: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - \r\n character after directive name: FAIL Test Required-CSP value on `csp` change: Wrong value of `csp` should not trigger sending Sec-Required-CSP Header - \r\n character in directive value: FAIL
Assignee | ||
Comment 6•6 years ago
|
||
Pushed to try (stability) https://treeherder.mozilla.org/#/jobs?repo=try&revision=b66ee19433e683466a10911334adab4dd3c40f52
Updated•6 years ago
|
Whiteboard: [wptsync downstream] → [wptsync downstream][domsecurity-backlog]
Pushed by james@hoppipolla.co.uk: https://hg.mozilla.org/integration/mozilla-inbound/rev/8a717234b858 [wpt PR 11140] - Fixed CSP directive value parsing accepted character range, a=testonly https://hg.mozilla.org/integration/mozilla-inbound/rev/a9e1b4d220b1 [wpt PR 11140] - Update wpt metadata, a=testonly
Comment 8•6 years ago
|
||
bugherder |
https://hg.mozilla.org/mozilla-central/rev/8a717234b858 https://hg.mozilla.org/mozilla-central/rev/a9e1b4d220b1
Status: NEW → RESOLVED
Closed: 6 years ago
status-firefox62:
--- → fixed
Resolution: --- → FIXED
Target Milestone: --- → mozilla62
You need to log in
before you can comment on or make changes to this bug.
Description
•