Frédéric Wang

Results 151 comments of Frédéric Wang

@Josh-Cena right, I'm not really aware of other use cases.

See also https://github.com/w3c/webappsec-csp/pull/363 for the general issue. Mirko commented about `trusted-types` too in https://github.com/w3c/webappsec-csp/pull/363#issuecomment-2160193577

So another case considered invalid by tests is "'script''script'" (missing required-ascii-whitespace). But it seems Chromium and WebKit are forgiving for that case too and after my changes at https://phabricator.services.mozilla.com/D243259 I...

Another inconsistency: the CSP spec relies on the "report-sample" script-src to determine whether or not to clip violation's sample, but the Trusted Type spec do that unconditionally.

@smaug---- @annevk @otherdaniel I wonder what you think about this? If that's ok, I guess I can send a spec PR.

We have a couple of instances of "instance of": ``` grep 'instance of' spec/index.bs :: Returns true if value is an instance of {{TrustedHTML}} and has an associated [=TrustedHTML/data=] value...

cc @otherdaniel @koto I'm trying to write more WPT tests at https://bugzilla.mozilla.org/show_bug.cgi?id=1958311 for pre-navigation check, as current set is limited. This is still WIP but I noticed a couple of...

What's the status of this? I tried adding some tests for invalid CSP names there https://github.com/web-platform-tests/wpt/pull/50872/files#diff-675a0a46e4fbc7fce1b72d1f48cdf824e55fa0a123f8105df01b3c53f3946161 but probably it's not possible until we clarify this.

The tests I added for invalid/valid policy names were for use in the CSP trusted-types directive. We still need to check valid/invalid policy names passed to (I can't really find...

I opened a PR with a tentative test and none of the browsers are rejecting policy names that are not CSP tt-policy-name: https://github.com/web-platform-tests/wpt/pull/51718