- aac6418 CSP: Improve compatibility of source matching by pgriffis@igalia.com · 3 years ago
- 623c3a5 CSP: WASM fails to execute after window.open by katherine_cheney@apple.com · 3 years ago
- 25ee0b9 Migrate manifest version content security policy filtering for extensions into WebKit by katherine_cheney@apple.com · 3 years ago
- 83f608c about:blank iframes do not always inherit parent CSP by katherine_cheney@apple.com · 3 years, 1 month ago
- efdc8890 Update CSP handling of javascript URLs by katherine_cheney@apple.com · 3 years, 1 month ago
- d831865 Use more StringView during CSP parsing by cdumez@apple.com · 3 years, 1 month ago
- fac23d1 CSP: Properly block image content in object elements by pgriffis@igalia.com · 3 years, 2 months ago
- afd8e4ef "Unrecognized Content-Security-Policy directive 'worker-src'." by katherine_cheney@apple.com · 3 years, 2 months ago
- d237297 CSP: Clean up effective-violation handling in reports by pgriffis@igalia.com · 3 years, 2 months ago
- c4848f2 CSP: Improve handling of multiple policies by pgriffis@igalia.com · 3 years, 3 months ago
- 6d83049 CSP: strict-dynamic is causing incorrect and unexpected behavior by katherine_cheney@apple.com · 3 years, 3 months ago
- 36e8257 Implement CSP strict-dynamic for module scripts by katherine_cheney@apple.com · 3 years, 3 months ago
- bdb3701f CSP: Include the sample in eval violation reports by carlosgc@webkit.org · 3 years, 3 months ago
- 7658fd6 CSP: Allow external scripts with SRI hashes matching CSP by pgriffis@igalia.com · 3 years, 4 months ago
- 4602fe8 Move TextCodec files from WebCore/platform/text to WebCore/PAL/text by don.olmstead@sony.com · 3 years, 4 months ago
- ea4b29d CSP: Update URL stripping in reports to match other implementations by pgriffis@igalia.com · 3 years, 4 months ago
- 5df2f63 CSP: Implement submitting samples in violation reports by pgriffis@igalia.com · 3 years, 4 months ago
- 11c4120 CSP: security policy violation event is always using document as target by carlosgc@webkit.org · 3 years, 4 months ago
- 21dfe61 Report the initiating url instead of the redirected one by commit-queue@webkit.org · 3 years, 4 months ago
- 4f0701e Implement nonce-hiding https://bugs.webkit.org/show_bug.cgi?id=179728 by pgriffis@igalia.com · 3 years, 5 months ago
- b5af993 Form action with a redirect should report correct blocked URI by katherine_cheney@apple.com · 3 years, 5 months ago
- 6e2fa9f [WebCore] Remove unneeded WTF:: namespace prefix by Hironori.Fujii@sony.com · 3 years, 5 months ago
- ea59827 CSP: Implement unsafe-hashes by katherine_cheney@apple.com · 3 years, 6 months ago
- a1b0b16 CSP: unsafe-eval tests timing out or failing by katherine_cheney@apple.com · 3 years, 6 months ago
- 59ef42c CSP: Implement 'strict-dynamic' source expression by katherine_cheney@apple.com · 3 years, 6 months ago
- 4ac584e [COOP] html/cross-origin-opener-policy/coop-navigate-same-origin-csp-sandbox.html WPT test is failing by cdumez@apple.com · 3 years, 7 months ago
- 3ebfbd5 Report correct blocked URI in CSP violation report by katherine_cheney@apple.com · 3 years, 7 months ago
- 0e7ff91 Avoid some calls to StringView::toString() / StringView::toStringWithoutCopying() by cdumez@apple.com · 3 years, 10 months ago
- a4ddc78 Remove WTF::Optional synonym for std::optional, using that class template directly instead by darin@apple.com · 3 years, 10 months ago
- 8fbd825 Blob URLs should use for their owner origin for CSP checks by youenn@apple.com · 4 years ago
- f1a8b00 Report the correct document uri in the case of a ContentSecurityPolicyClient by katherine_cheney@apple.com · 4 years, 1 month ago
- 0aca62b Unreviewed, rolling out r251861. by repstein@apple.com · 5 years ago
- b6952eda Use SecurityOriginData in NetworkProcess where possible without other changes by achristensen@apple.com · 5 years ago
- 52e98bb [JSC] Thread JSGlobalObject* instead of ExecState* by ysuzuki@apple.com · 5 years ago
- 622e869 [JSC] Change signature of HostFunction to (JSGlobalObject*, CallFrame*) by ysuzuki@apple.com · 5 years ago
- 123b1af Improve CSP inheritance semantics by dbates@webkit.org · 6 years ago
- b795b72 X-Frame-Options header should be ignored when frame-ancestors CSP directive is present by cdumez@apple.com · 6 years ago
- 267ddd4 ContentSecurityPolicy::logToConsole should include line/column number and source location by drousso@apple.com · 6 years ago
- 8b7a022 wtf/Optional.h: move-constructor and move-assignment operator should disengage the value being moved from by cdumez@apple.com · 6 years ago
- bb2f61c Move URL from WebCore to WTF https://bugs.webkit.org/show_bug.cgi?id=190234 by keith_miller@apple.com · 6 years ago
- 9223bcc Replace OptionSet |= and -= operators with add() and remove() functions by antti@apple.com · 7 years ago
- 5cea751 Cannot view PDF's on my.gov.au: "Refused to load https://my.gov.au/attachment/viewAttachment because it by dbates@webkit.org · 7 years ago
- a248f14 NetworkLoadChecker should not need to hard ref NetworkConnectionToWebProcess by youenn@apple.com · 7 years ago
- bf0182f Apply CSP checks before Content blocker checks in NetworkLoadChecker as done by CachedResourceLoader by youenn@apple.com · 7 years ago
- ae77ef4 REGRESSION (r231107): CSP report-only policies are ignored for beacon, importScripts, fetch(), EventSource, and XHR by dbates@webkit.org · 7 years ago
- 247e2f4 Check X-Frame-Options and CSP frame-ancestors in network process by dbates@webkit.org · 7 years ago
- e18740d Abstract logic to log console messages and send CSP violation reports into a client by dbates@webkit.org · 7 years ago
- 6f7aa39 CSP status-code incorrect for document blocked due to violation of its frame-ancestors directive by dbates@webkit.org · 7 years ago
- 41f504e CSP should be passed the referrer https://bugs.webkit.org/show_bug.cgi?id=185367 by dbates@webkit.org · 7 years ago
- 1295fb77 Rename JSDOMWindowProxy to JSWindowProxy by cdumez@apple.com · 7 years ago
- 4524dae NetworkLoadChecker should upgrade redirects if needed by youenn@apple.com · 7 years ago
- 1a2b4e3 Make it possible to call ContentSecurityPolicy::upgradeInsecureRequestIfNeeded() from non-main threads by cdumez@apple.com · 7 years ago
- 38d28fe [Web App Manifest] Support fetching the app manifest by commit-queue@webkit.org · 7 years ago
- 44fc687 [Beacon] Do connect-src CSP check on redirects as well by cdumez@apple.com · 8 years ago
- 7b29cef WebAssembly: disable some APIs under CSP by jfbastien@apple.com · 8 years ago
- 91d960b Missing <functional> includes make builds fail with GCC 7.x by aperez@igalia.com · 8 years ago
- 52f675f Rename JSDOMWindowShell to JSDOMWindowProxy to match the HTML5 spec. by commit-queue@webkit.org · 8 years ago
- 214daa3 Split cryptographic digest computation and parsing out of CSP code so it can be reused by weinig@apple.com · 8 years ago
- 8d002e7 [Mac][WK2] Add SPI to override the Content Security Policy of a page by dbates@webkit.org · 8 years ago
- 0aa713b Remove outdated ENABLE(CSP_NEXT) build flag by commit-queue@webkit.org · 8 years ago
- 2abec1b Implement Strict Mixed Content Checking by dbates@webkit.org · 8 years ago
- c4b09d1 [iOS] Sandbox QuickLook previews by dbates@webkit.org · 8 years ago
- 03af195 Refactor ContentSecurityPolicy::allow* methods by commit-queue@webkit.org · 9 years ago
- 01c956f Upgrade-Insecure-Request state is improperly retained between navigations by bfulgham@apple.com · 9 years ago
- a321639 CSP: object-src and plugin-types directives are not respected for plugin replacements by dbates@webkit.org · 9 years ago
- 927579e CSP: Improve support for multiple policies to more closely conform to the CSP Level 2 spec. by dbates@webkit.org · 9 years ago
- b30d7f8 CSP: Content Security Policy directive, upgrade-insecure-requests (UIR) by bfulgham@apple.com · 9 years ago
- 48b098a Unreviewed, rolling out r201679. https://bugs.webkit.org/show_bug.cgi?id=158464 by commit-queue@webkit.org · 9 years ago
- 7a950d4 CSP: Content Security Policy directive, upgrade-insecure-requests (UIR) by bfulgham@apple.com · 9 years ago
- 710d2ff CSP: Add app-specific workaround for Ecobee and Quora by dbates@webkit.org · 9 years ago
- 12b0904 REGRESSION (r196012): Subresource may be blocked by Content Security Policy if it only matches 'self' by dbates@webkit.org · 9 years ago
- 2e1bfea Remove more uses of Deprecated::ScriptXXX by darin@apple.com · 9 years ago
- 28db74a CSP: Ignore paths in CSP matching after redirects by dbates@webkit.org · 9 years ago
- 6d15f94 CSP: Remove experimental directive reflected-xss by dbates@webkit.org · 9 years ago
- 580f559 CSP: Move logic for reporting a violation from ContentSecurityPolicyDirectiveList to ContentSecurityPolicy by dbates@webkit.org · 9 years ago
- 153a0ad CSP: Simplify logic for checking policies by dbates@webkit.org · 9 years ago
- ebcf3d5 Cleanup: Remove the need to pass reporting status to ContentSecurityPolicy functions by dbates@webkit.org · 9 years ago
- 261b2dc CSP: Implement frame-ancestors directive by dbates@webkit.org · 9 years ago
- 5417dbd CSP: Implement support for script and style nonces by dbates@webkit.org · 9 years ago
- b5a87bf CSP: Implement support for inline script and inline style hashes by dbates@webkit.org · 9 years ago
- 8986cfc CSP: sandbox directive should be ignored when contained in a policy defined via a meta element by dbates@webkit.org · 9 years ago
- ac7a9e9 CSP: 'sandbox' should be ignored in report-only mode by dbates@webkit.org · 9 years ago
- 8c34a38 CSP: Implement child-src directive by dbates@webkit.org · 9 years ago
- 279cc4f CSP: Extract helper classes into their own files by dbates@webkit.org · 9 years ago
- 19e19f0 CSP: Allow Web Workers initiated from an isolated world to bypass the main world Content Security Policy by dbates@webkit.org · 9 years ago
- 869446a CSP: Support checking content security policy without a script execution context by dbates@webkit.org · 9 years ago
- e5b53f1 CSP: Use the served CSP header for dedicated workers by dbates@webkit.org · 9 years ago
- 5751965 Move ContentSecurityPolicy.{cpp, h} to its own directory by dbates@webkit.org · 9 years ago[Renamed from Source/WebCore/page/ContentSecurityPolicy.h]
- ae1ea97 Fix null pointer dereference in WebSocket::connect() by commit-queue@webkit.org · 9 years ago
- c1f8b3e Cleanup: Make ContentSecurityPolicy::ReportingStatus an enum class by dbates@webkit.org · 10 years ago
- 264add7 Isolated worlds should respect Content Security Policy; User Agent Shadow DOM by dbates@webkit.org · 10 years ago
- 7ee9b0d Replace 0 with nullptr in WebCore/Page. by commit-queue@webkit.org · 10 years ago
- ac92bae CSP: Drop 'script-nonce' directive. by mkwst@chromium.org · 11 years ago
- 66c8786 Move cross-port Source/WebCore/page/ code to std::unique_ptr by zandobersek@gmail.com · 11 years ago
- 9204733 .: Replace "Apple Computer, Inc." with "Apple Inc." in copyright headers by mjs@apple.com · 11 years ago
- c3523f8 Remove spaces between template angle brackets by andersca@apple.com · 11 years ago
- 5ffbb5c rename KURL to URL https://bugs.webkit.org/show_bug.cgi?id=16214 by darin@apple.com · 12 years ago
- 4da3e8d Replace ScriptState with JSC::ExecState by weinig@apple.com · 12 years ago
- 5b0379f CSP 1.1: Experiment with 'base-uri' directive. by mkwst@chromium.org · 12 years ago
- 39158bd CSP 1.1: Add 'effective-directive' to violation reports. by mkwst@chromium.org · 12 years ago