Closed
Bug 1542858
Opened 6 years ago
Closed 6 years ago
Duplicate browser_data_load_inherit_csp.js and use upgrade-insecure-requests
Categories
(Core :: DOM: Security, task, P1)
Core
DOM: Security
Tracking
()
RESOLVED
FIXED
mozilla68
Tracking | Status | |
---|---|---|
firefox68 | --- | fixed |
People
(Reporter: ckerschb, Assigned: ckerschb)
References
Details
(Whiteboard: [domsecurity-active])
Attachments
(1 file, 1 obsolete file)
After Bug 965637 the CSP will not hang off the Principal anymore, hence checking the resulting CSP using
let principal = channel.loadInfo.triggeringPrincipal;
let cspJSON = principal.cspJSON;
will not work anymore. Since this is the CSP for a new top-level load, we can easily rewrite the test and actually check that the scheme is updated from http to https.
Assignee | ||
Updated•6 years ago
|
Assignee: nobody → ckerschb
Status: NEW → ASSIGNED
Type: defect → task
Priority: -- → P1
Whiteboard: [domsecurity-active]
Assignee | ||
Comment 1•6 years ago
|
||
Assignee | ||
Updated•6 years ago
|
Summary: Update browser_data_load_inherit_csp.js to use upgrade-insecure-requests → Duplicate browser_data_load_inherit_csp.js and use upgrade-insecure-requests
Updated•6 years ago
|
Attachment #9056668 -
Attachment is obsolete: true
Assignee | ||
Comment 2•6 years ago
|
||
Pushed by mozilla@christophkerschbaumer.com:
https://hg.mozilla.org/integration/autoland/rev/1fe827432de4
Duplicate browser_data_load_inherit_csp.js and use upgrade-insecure-requests. r=Gijs
Comment 4•6 years ago
|
||
bugherder |
Status: ASSIGNED → RESOLVED
Closed: 6 years ago
status-firefox68:
--- → fixed
Resolution: --- → FIXED
Target Milestone: --- → mozilla68
You need to log in
before you can comment on or make changes to this bug.
Description
•