Closed Bug 1542858 Opened 6 years ago Closed 6 years ago

Duplicate browser_data_load_inherit_csp.js and use upgrade-insecure-requests

Categories

(Core :: DOM: Security, task, P1)

task

Tracking

()

RESOLVED FIXED
mozilla68
Tracking Status
firefox68 --- fixed

People

(Reporter: ckerschb, Assigned: ckerschb)

References

Details

(Whiteboard: [domsecurity-active])

Attachments

(1 file, 1 obsolete file)

After Bug 965637 the CSP will not hang off the Principal anymore, hence checking the resulting CSP using

let principal = channel.loadInfo.triggeringPrincipal;
let cspJSON = principal.cspJSON;

will not work anymore. Since this is the CSP for a new top-level load, we can easily rewrite the test and actually check that the scheme is updated from http to https.

Assignee: nobody → ckerschb
Status: NEW → ASSIGNED
Type: defect → task
Priority: -- → P1
Whiteboard: [domsecurity-active]
Summary: Update browser_data_load_inherit_csp.js to use upgrade-insecure-requests → Duplicate browser_data_load_inherit_csp.js and use upgrade-insecure-requests
Attachment #9056668 - Attachment is obsolete: true
Pushed by mozilla@christophkerschbaumer.com: https://hg.mozilla.org/integration/autoland/rev/1fe827432de4 Duplicate browser_data_load_inherit_csp.js and use upgrade-insecure-requests. r=Gijs
Status: ASSIGNED → RESOLVED
Closed: 6 years ago
Resolution: --- → FIXED
Target Milestone: --- → mozilla68
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: