New issue
Advanced search Search tips
Note: Color blocks (like or ) mean that a user may not be available. Tooltip shows the reason.

Issue 896041 link

Starred by 6 users

Issue metadata

Status: Assigned
Owner:
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: ----
Pri: 1
Type: Bug

Blocked on: View detail
issue 878274
issue 914224
issue 916885

Blocking:
issue 896897



Sign in to add a comment

Allow extensions to specify a custom CSP for content scripts.

Project Member Reported by karandeepb@chromium.org, Oct 16

Issue description

We should allow extensions to specify a custom Content security policy for content scripts. We'll be introducing a new manifest key for the same. This will only be applicable for manifest v3 extensions.

Doc (Googlers only for now) - https://docs.google.com/document/d/1_Ku4P86It4ewL_4k_YwrpNKo0YhCM1yuE1fzR673Ask/edit?usp=sharing
 
Blocking: 896897
Project Member

Comment 2 by bugdroid1@chromium.org, Oct 24

The following revision refers to this bug:
  https://chromium.googlesource.com/chromium/src.git/+/d993772b41ba2b1dd23293de2cfb47a4bda19f79

commit d993772b41ba2b1dd23293de2cfb47a4bda19f79
Author: Karan Bhatia <karandeepb@chromium.org>
Date: Wed Oct 24 02:40:15 2018

Extensions: Consolidate and simplify CSP parsing.

This CL adds a csp_validator::ParseCSP method to parse a CSP string. Existing
code doing the parsing is changed to use this new method.

This CL should have no behavior change. Also add unit tests exercising the new
method.

BUG=896041

Change-Id: Ic97e31ab23b6d21c0b3ad4b771a2fd7c37bec6d4
Reviewed-on: https://chromium-review.googlesource.com/c/1292825
Commit-Queue: Karan Bhatia <karandeepb@chromium.org>
Reviewed-by: Devlin <rdevlin.cronin@chromium.org>
Cr-Commit-Position: refs/heads/master@{#602224}
[modify] https://crrev.com/d993772b41ba2b1dd23293de2cfb47a4bda19f79/extensions/common/csp_validator.cc
[modify] https://crrev.com/d993772b41ba2b1dd23293de2cfb47a4bda19f79/extensions/common/csp_validator.h
[modify] https://crrev.com/d993772b41ba2b1dd23293de2cfb47a4bda19f79/extensions/common/csp_validator_unittest.cc

Cc: jawag@chromium.org kelvinjiang@chromium.org dbertoni@chromium.org lazyboy@chromium.org
Does anyone have opinions on what the format for the manifest key should be? We already allow extensions to specify "content_security_policy" for extension pages and also for sandboxed pages. Some options we were thinking about:

1. Have "content_security_policy" manifest key be a dictionary (it's a string today). E.g.
"content_security_policy" : {
  "extension_pages" : "",
  "content_scripts": "",
  "sandbox" : "",
  ..
}

2. Alternatively, things can remain as they are today and we can add another manifest key, something like "content_scripts_csp".

Some other ideas:
1. We can potentially have a separate CSP for extension service workers. Should we?

2. Going another step further, we can potentially allow extensions to specify a separate CSP for each extension page. Should we? 

Having a dictionary SGTM.  I would recommend the addition of a "default" entry, which could be used for any situations we don't have a separate key.  I'd also perhaps avoid introducing an "extension_pages" entry (instead using "default") for the time being, since we may or may not want finer granularity or different phrasing.

> We can potentially have a separate CSP for extension service workers. Should we?

As above, I'd recommend we hold off on this.  I can see the potential utility, but it's not clear to me that many developers would want this level of granularity (over just "default").  Or, it could be that developers want *more* granularity (and I could potentially see introducing match patterns or URLs as keys to the CSP dictionary, as you mention in 2.).  I think, until we know there's real demand, just having a default CSP to use for everything that isn't a script or a sandbox is probably okay.

> 2. Going another step further, we can potentially allow extensions to specify a separate CSP for each extension page. Should we? 

(Same as above)
>> Having a dictionary SGTM.  I would recommend the addition of a "default" entry, which could be used for any situations we don't have a separate key.  I'd also perhaps avoid introducing an "extension_pages" entry (instead using "default") for the time being, since we may or may not want finer granularity or different phrasing.

Ack

As discussed offline, allowing extensions to specify a custom CSP is also useful for manifest v2. Does using "content_scripts_csp" for manifest v2 work?
I'd prefer avoiding introducing a separate key just for mv2 extensions.  Could we look for either a dictionary or a string for the content_security_policy value, and assume that if there's just a string, it's to be used as the default?  (This could work for mv3, as well, so that extensions can choose to just specify a single CSP, and we only use separate ones if the entry is a dictionary)
A manifest key having a different "schema" for the same manifest version doesn't seem ok to me (Confusing to explain, document).

I don't see much harm in introducing a new manifest key. 

I get that the transition to manifest v3 for developers would then be more involved, but I guess that's ok.
> A manifest key having a different "schema" for the same manifest version doesn't seem ok to me (Confusing to explain, document).

I think it'd be more confusing to document two different schemas as well as two different keys.  This would mean one key (content_security_policy) would be allowed in two different manifest versions, but only with a single schema in each, and the second key (content_script_csp) would only be allowed in the old manifest version.

If we keep the same content_security_policy key, we're going to have to document that it can be either a string (for mv2) or a dictionary (for mv3).  I don't think it's too much more confusing to say it can be either a string (for mv2) or a dictionary (for mv2 or mv3).  WDYT?
I think it's a bit confusing to discuss this here. Ended up writing a doc (https://docs.google.com/document/d/1vzcRg-wc2RP5yHDz4abCjgS7uzZuQYFd0izmiMFb-mY/edit?usp=sharing) with some concerns. I think you are proposing option 2.
Thanks for putting the doc together!  Continuing the discussion there.
Project Member

Comment 11 by bugdroid1@chromium.org, Nov 29

The following revision refers to this bug:
  https://chromium.googlesource.com/chromium/src.git/+/682293b78f635638812908f3d8ef1881dfc891a7

commit 682293b78f635638812908f3d8ef1881dfc891a7
Author: Karan Bhatia <karandeepb@chromium.org>
Date: Thu Nov 29 05:07:33 2018

Remove ScriptController::ShouldBypassMainWorldCSP.

Currently call sites use both ContentSecurityPolicy::ShouldBypassMainWorld and
ScriptController::ShouldBypassMainWorldCSP to check if they should bypass the
main world CSP. This CL removes ScriptController::ShouldBypassMainWorldCSP and
consolidates all the call sites to use
ContentSecurityPolicy::ShouldBypassMainWorld.

BUG=896041

Change-Id: If8f5dda84da5ffcabb94b075173614cc5136f35b
Reviewed-on: https://chromium-review.googlesource.com/c/1331029
Reviewed-by: Kentaro Hara <haraken@chromium.org>
Commit-Queue: Karan Bhatia <karandeepb@chromium.org>
Cr-Commit-Position: refs/heads/master@{#612045}
[modify] https://crrev.com/682293b78f635638812908f3d8ef1881dfc891a7/third_party/blink/renderer/bindings/core/v8/script_controller.cc
[modify] https://crrev.com/682293b78f635638812908f3d8ef1881dfc891a7/third_party/blink/renderer/bindings/core/v8/script_controller.h
[modify] https://crrev.com/682293b78f635638812908f3d8ef1881dfc891a7/third_party/blink/renderer/core/css/style_element.cc
[modify] https://crrev.com/682293b78f635638812908f3d8ef1881dfc891a7/third_party/blink/renderer/core/dom/document.cc
[modify] https://crrev.com/682293b78f635638812908f3d8ef1881dfc891a7/third_party/blink/renderer/core/frame/csp/content_security_policy.cc
[modify] https://crrev.com/682293b78f635638812908f3d8ef1881dfc891a7/third_party/blink/renderer/core/loader/frame_fetch_context.cc
[modify] https://crrev.com/682293b78f635638812908f3d8ef1881dfc891a7/third_party/blink/renderer/core/loader/image_loader.cc
[modify] https://crrev.com/682293b78f635638812908f3d8ef1881dfc891a7/third_party/blink/renderer/core/script/pending_script.cc

Project Member

Comment 12 by bugdroid1@chromium.org, Nov 29

The following revision refers to this bug:
  https://chromium.googlesource.com/chromium/src.git/+/f166971a83325219a9a23d8a69bde3759d31b72b

commit f166971a83325219a9a23d8a69bde3759d31b72b
Author: Karan Bhatia <karandeepb@chromium.org>
Date: Thu Nov 29 21:30:28 2018

Blink: Move isolated world CSP handling to the core layer.

This CL moves the isolated world CSP handling from DOMWrapperWorld (at the
platform/bindings/layer) to the IsolatedWorldCSP singleton instance (at the
bindings/core layer). The platform/bindings layer doesn't know the concept of a
CSP, hence move it to the bindings/core/ layer. Furthermore, DOMWrapperWorld is
per world, hence it shouldn't necessarily store isolated world specific data.

This is required to store ContentSecurityPolicy instances for isolated worlds to
add CSP support for the isolated worlds. This CL should have no behavior change.

BUG=896041

Change-Id: I0ac995dbae549379934bfadeed148d4ca91c8706
Reviewed-on: https://chromium-review.googlesource.com/c/1354567
Reviewed-by: Kentaro Hara <haraken@chromium.org>
Commit-Queue: Karan Bhatia <karandeepb@chromium.org>
Cr-Commit-Position: refs/heads/master@{#612355}
[modify] https://crrev.com/f166971a83325219a9a23d8a69bde3759d31b72b/third_party/blink/renderer/bindings/DEPS
[modify] https://crrev.com/f166971a83325219a9a23d8a69bde3759d31b72b/third_party/blink/renderer/bindings/bindings.gni
[add] https://crrev.com/f166971a83325219a9a23d8a69bde3759d31b72b/third_party/blink/renderer/bindings/core/v8/isolated_world_csp.cc
[add] https://crrev.com/f166971a83325219a9a23d8a69bde3759d31b72b/third_party/blink/renderer/bindings/core/v8/isolated_world_csp.h
[modify] https://crrev.com/f166971a83325219a9a23d8a69bde3759d31b72b/third_party/blink/renderer/core/dom/document_test.cc
[modify] https://crrev.com/f166971a83325219a9a23d8a69bde3759d31b72b/third_party/blink/renderer/core/frame/csp/content_security_policy.cc
[modify] https://crrev.com/f166971a83325219a9a23d8a69bde3759d31b72b/third_party/blink/renderer/core/frame/web_local_frame_impl.cc
[modify] https://crrev.com/f166971a83325219a9a23d8a69bde3759d31b72b/third_party/blink/renderer/platform/bindings/dom_wrapper_world.cc
[modify] https://crrev.com/f166971a83325219a9a23d8a69bde3759d31b72b/third_party/blink/renderer/platform/bindings/dom_wrapper_world.h

Cc: karandeepb@chromium.org lukasza@chromium.org mkwst@chromium.org
 Issue 489855  has been merged into this issue.
Blockedon: 914224
Blockedon: 878274
Project Member

Comment 16 by bugdroid1@chromium.org, Dec 19

The following revision refers to this bug:
  https://chromium.googlesource.com/chromium/src.git/+/5761847e925fc4ec4ec989b0b8659b44bbd71434

commit 5761847e925fc4ec4ec989b0b8659b44bbd71434
Author: Karan Bhatia <karandeepb@chromium.org>
Date: Wed Dec 19 07:41:52 2018

Blink: Introduce ContentSecurityPolicyDelegate.

This CL removes the dependence of blink::ContentSecurityPolicy on it's member
ExecutionContext by introducing a Delegate interface which an ExecutionContext
wrapper (ExecutionContextCSPDelegate) implements. This is done because:

- We subsequently plan to apply CSP checks for isolated worlds. Code running in
  the context of an isolated world doesn't have it's own execution context, and
  shares its execution context with the underlying Document. Having a delegate
  interface will allow us to customize the execution context dependent behavior
  for isolated world CSPs.
- This refactoring is also needed for off-the-main-thread fetch in workers,
  which require there to be two settings objects- "insideSettings" for
  subresource requests from workers, and "outsideSettings" for worker top-level
  scripts.

BUG=896041, 878274

Change-Id: I8f52a559f6a650c5060dcecf7530a55219bb14cd
Reviewed-on: https://chromium-review.googlesource.com/c/1364298
Commit-Queue: Karan Bhatia <karandeepb@chromium.org>
Reviewed-by: Hiroshige Hayashizaki <hiroshige@chromium.org>
Reviewed-by: Yutaka Hirano <yhirano@chromium.org>
Reviewed-by: Mike West <mkwst@chromium.org>
Reviewed-by: Kouhei Ueno <kouhei@chromium.org>
Reviewed-by: Hiroki Nakagawa <nhiroki@chromium.org>
Cr-Commit-Position: refs/heads/master@{#617758}
[modify] https://crrev.com/5761847e925fc4ec4ec989b0b8659b44bbd71434/third_party/blink/renderer/core/dom/document.cc
[modify] https://crrev.com/5761847e925fc4ec4ec989b0b8659b44bbd71434/third_party/blink/renderer/core/dom/scripted_idle_task_controller_test.cc
[modify] https://crrev.com/5761847e925fc4ec4ec989b0b8659b44bbd71434/third_party/blink/renderer/core/execution_context/execution_context.cc
[modify] https://crrev.com/5761847e925fc4ec4ec989b0b8659b44bbd71434/third_party/blink/renderer/core/execution_context/execution_context.h
[modify] https://crrev.com/5761847e925fc4ec4ec989b0b8659b44bbd71434/third_party/blink/renderer/core/frame/BUILD.gn
[modify] https://crrev.com/5761847e925fc4ec4ec989b0b8659b44bbd71434/third_party/blink/renderer/core/frame/csp/content_security_policy.cc
[modify] https://crrev.com/5761847e925fc4ec4ec989b0b8659b44bbd71434/third_party/blink/renderer/core/frame/csp/content_security_policy.h
[modify] https://crrev.com/5761847e925fc4ec4ec989b0b8659b44bbd71434/third_party/blink/renderer/core/frame/csp/content_security_policy_test.cc
[modify] https://crrev.com/5761847e925fc4ec4ec989b0b8659b44bbd71434/third_party/blink/renderer/core/frame/csp/csp_directive_list.cc
[modify] https://crrev.com/5761847e925fc4ec4ec989b0b8659b44bbd71434/third_party/blink/renderer/core/frame/csp/csp_source.cc
[add] https://crrev.com/5761847e925fc4ec4ec989b0b8659b44bbd71434/third_party/blink/renderer/core/frame/csp/execution_context_csp_delegate.cc
[add] https://crrev.com/5761847e925fc4ec4ec989b0b8659b44bbd71434/third_party/blink/renderer/core/frame/csp/execution_context_csp_delegate.h
[modify] https://crrev.com/5761847e925fc4ec4ec989b0b8659b44bbd71434/third_party/blink/renderer/core/frame/csp/source_list_directive_test.cc
[modify] https://crrev.com/5761847e925fc4ec4ec989b0b8659b44bbd71434/third_party/blink/renderer/core/script/script_loader.h
[modify] https://crrev.com/5761847e925fc4ec4ec989b0b8659b44bbd71434/third_party/blink/renderer/core/testing/null_execution_context.cc
[modify] https://crrev.com/5761847e925fc4ec4ec989b0b8659b44bbd71434/third_party/blink/renderer/core/workers/worker_global_scope.cc
[modify] https://crrev.com/5761847e925fc4ec4ec989b0b8659b44bbd71434/third_party/blink/renderer/core/workers/worker_or_worklet_global_scope.cc

Blockedon: 916885
Project Member

Comment 18 by bugdroid1@chromium.org, Jan 8

The following revision refers to this bug:
  https://chromium.googlesource.com/chromium/src.git/+/1a51903a122803cd0eb4356edb84444feda25f79

commit 1a51903a122803cd0eb4356edb84444feda25f79
Author: Karan Bhatia <karandeepb@chromium.org>
Date: Tue Jan 08 04:27:24 2019

Introduce ExecutionContext::GetContentSecurityPolicyForWorld.

This CL makes the following changes:
- Introduce IsolatedWorldCSP blink runtime feature. If the feature is enabled,
  we will use the actual CSP defined by an isolated world. If it is disabled
  (default), we'll use an empty CSP for the isolated world, which will just have
  the effect of bypassing the main world CSP.
- Introduce ExecutionContext::GetContentSecurityPolicyForWorld() which
  returns the correct ContentSecurityPolicy to use based on the current world.
  No non-test usages of this method are added in this CL.
- Partially implement IsolatedWorldCSPDelegate.

This CL implements the initial pieces to support applying a custom CSP for
isolated worlds. It should have no behavior change.

In future CLs, we'll:
  - Plumb the correct security origin for isolated world csps.
  - Replace the usages of ContentSecurityPolicy::ShouldBypassMainWorld with
    ExecutionContext::GetContentSecurityPolicyForWorld to ensure we end up using
    the isolated world specified CSP when needed.

Doc=https://docs.google.com/document/d/1_Ku4P86It4ewL_4k_YwrpNKo0YhCM1yuE1fzR673Ask/edit?usp=sharing (Googlers only)
BUG=896041

Change-Id: I2542e3c8412d6ed2637ddffc20645374261b03a7
Reviewed-on: https://chromium-review.googlesource.com/c/1368663
Reviewed-by: Kentaro Hara <haraken@chromium.org>
Commit-Queue: Karan Bhatia <karandeepb@chromium.org>
Cr-Commit-Position: refs/heads/master@{#620617}
[modify] https://crrev.com/1a51903a122803cd0eb4356edb84444feda25f79/third_party/blink/renderer/bindings/core/v8/isolated_world_csp.cc
[modify] https://crrev.com/1a51903a122803cd0eb4356edb84444feda25f79/third_party/blink/renderer/bindings/core/v8/isolated_world_csp.h
[modify] https://crrev.com/1a51903a122803cd0eb4356edb84444feda25f79/third_party/blink/renderer/core/DEPS
[modify] https://crrev.com/1a51903a122803cd0eb4356edb84444feda25f79/third_party/blink/renderer/core/dom/document.cc
[modify] https://crrev.com/1a51903a122803cd0eb4356edb84444feda25f79/third_party/blink/renderer/core/dom/document.h
[modify] https://crrev.com/1a51903a122803cd0eb4356edb84444feda25f79/third_party/blink/renderer/core/dom/document_test.cc
[modify] https://crrev.com/1a51903a122803cd0eb4356edb84444feda25f79/third_party/blink/renderer/core/execution_context/execution_context.cc
[modify] https://crrev.com/1a51903a122803cd0eb4356edb84444feda25f79/third_party/blink/renderer/core/execution_context/execution_context.h
[modify] https://crrev.com/1a51903a122803cd0eb4356edb84444feda25f79/third_party/blink/renderer/core/frame/csp/content_security_policy.cc
[modify] https://crrev.com/1a51903a122803cd0eb4356edb84444feda25f79/third_party/blink/renderer/core/frame/csp/content_security_policy_test.cc
[modify] https://crrev.com/1a51903a122803cd0eb4356edb84444feda25f79/third_party/blink/renderer/platform/runtime_enabled_features.json5

Project Member

Comment 19 by bugdroid1@chromium.org, Jan 15

The following revision refers to this bug:
  https://chromium.googlesource.com/chromium/src.git/+/dc28bfbdd63cea0d685f0c10dd50190a40430a79

commit dc28bfbdd63cea0d685f0c10dd50190a40430a79
Author: Karan Bhatia <karandeepb@chromium.org>
Date: Tue Jan 15 05:36:11 2019

Blink: Plumb correct security origin for isolated world CSPs.

This CL introduces WebIsolatedWorldInfo and changes the blink public API to set
up an isolated world. The correct security origin is now plumbed for an isolated
world CSP. Also, clients can now use an empty string as the CSP for an isolated
world (Earlier this cleared the isolated world's CSP).

BUG=896041

Change-Id: I623c5fbbe678540c6474bb6db54fc287653f3689
Reviewed-on: https://chromium-review.googlesource.com/c/1395190
Commit-Queue: Karan Bhatia <karandeepb@chromium.org>
Reviewed-by: Kentaro Hara <haraken@chromium.org>
Reviewed-by: Rachel Blum <groby@chromium.org>
Reviewed-by: Dominic Mazzoni <dmazzoni@chromium.org>
Reviewed-by: Devlin <rdevlin.cronin@chromium.org>
Cr-Commit-Position: refs/heads/master@{#622746}
[modify] https://crrev.com/dc28bfbdd63cea0d685f0c10dd50190a40430a79/components/translate/content/renderer/DEPS
[modify] https://crrev.com/dc28bfbdd63cea0d685f0c10dd50190a40430a79/components/translate/content/renderer/translate_helper.cc
[modify] https://crrev.com/dc28bfbdd63cea0d685f0c10dd50190a40430a79/content/shell/test_runner/test_runner.cc
[modify] https://crrev.com/dc28bfbdd63cea0d685f0c10dd50190a40430a79/content/shell/test_runner/test_runner_for_specific_view.cc
[modify] https://crrev.com/dc28bfbdd63cea0d685f0c10dd50190a40430a79/content/shell/test_runner/test_runner_for_specific_view.h
[modify] https://crrev.com/dc28bfbdd63cea0d685f0c10dd50190a40430a79/extensions/common/manifest_handlers/csp_info.cc
[modify] https://crrev.com/dc28bfbdd63cea0d685f0c10dd50190a40430a79/extensions/common/manifest_handlers/csp_info.h
[modify] https://crrev.com/dc28bfbdd63cea0d685f0c10dd50190a40430a79/extensions/common/manifest_handlers/csp_info_unittest.cc
[modify] https://crrev.com/dc28bfbdd63cea0d685f0c10dd50190a40430a79/extensions/renderer/extension_injection_host.cc
[modify] https://crrev.com/dc28bfbdd63cea0d685f0c10dd50190a40430a79/extensions/renderer/extension_injection_host.h
[modify] https://crrev.com/dc28bfbdd63cea0d685f0c10dd50190a40430a79/extensions/renderer/injection_host.h
[modify] https://crrev.com/dc28bfbdd63cea0d685f0c10dd50190a40430a79/extensions/renderer/script_injection.cc
[modify] https://crrev.com/dc28bfbdd63cea0d685f0c10dd50190a40430a79/extensions/renderer/web_ui_injection_host.cc
[modify] https://crrev.com/dc28bfbdd63cea0d685f0c10dd50190a40430a79/extensions/renderer/web_ui_injection_host.h
[modify] https://crrev.com/dc28bfbdd63cea0d685f0c10dd50190a40430a79/third_party/blink/public/BUILD.gn
[add] https://crrev.com/dc28bfbdd63cea0d685f0c10dd50190a40430a79/third_party/blink/public/platform/web_isolated_world_info.h
[modify] https://crrev.com/dc28bfbdd63cea0d685f0c10dd50190a40430a79/third_party/blink/public/web/web_local_frame.h
[modify] https://crrev.com/dc28bfbdd63cea0d685f0c10dd50190a40430a79/third_party/blink/renderer/bindings/core/v8/isolated_world_csp.cc
[modify] https://crrev.com/dc28bfbdd63cea0d685f0c10dd50190a40430a79/third_party/blink/renderer/bindings/core/v8/isolated_world_csp.h
[modify] https://crrev.com/dc28bfbdd63cea0d685f0c10dd50190a40430a79/third_party/blink/renderer/core/dom/document_test.cc
[modify] https://crrev.com/dc28bfbdd63cea0d685f0c10dd50190a40430a79/third_party/blink/renderer/core/frame/web_local_frame_impl.cc
[modify] https://crrev.com/dc28bfbdd63cea0d685f0c10dd50190a40430a79/third_party/blink/renderer/core/frame/web_local_frame_impl.h
[modify] https://crrev.com/dc28bfbdd63cea0d685f0c10dd50190a40430a79/third_party/blink/renderer/platform/bindings/dom_wrapper_world.h
[modify] https://crrev.com/dc28bfbdd63cea0d685f0c10dd50190a40430a79/third_party/blink/web_tests/http/tests/devtools/extensions/extensions-eval-content-script.js
[modify] https://crrev.com/dc28bfbdd63cea0d685f0c10dd50190a40430a79/third_party/blink/web_tests/http/tests/security/cross-frame-access-parent-explicit-domain-isolated-world.html
[modify] https://crrev.com/dc28bfbdd63cea0d685f0c10dd50190a40430a79/third_party/blink/web_tests/http/tests/security/cross-frame-access-parent-isolated-world.html
[modify] https://crrev.com/dc28bfbdd63cea0d685f0c10dd50190a40430a79/third_party/blink/web_tests/http/tests/security/isolatedWorld/bypass-main-world-csp-for-xhr.html
[modify] https://crrev.com/dc28bfbdd63cea0d685f0c10dd50190a40430a79/third_party/blink/web_tests/http/tests/security/isolatedWorld/bypass-main-world-csp-iframes.html
[modify] https://crrev.com/dc28bfbdd63cea0d685f0c10dd50190a40430a79/third_party/blink/web_tests/http/tests/security/isolatedWorld/bypass-main-world-csp.html
[modify] https://crrev.com/dc28bfbdd63cea0d685f0c10dd50190a40430a79/third_party/blink/web_tests/http/tests/security/isolatedWorld/cross-origin-xhr.html
[modify] https://crrev.com/dc28bfbdd63cea0d685f0c10dd50190a40430a79/third_party/blink/web_tests/http/tests/security/isolatedWorld/no-bypass-main-world-csp-for-delayed-execution-expected.txt
[modify] https://crrev.com/dc28bfbdd63cea0d685f0c10dd50190a40430a79/third_party/blink/web_tests/http/tests/security/isolatedWorld/resources/bypass-main-world-csp-for-inline-script.js
[modify] https://crrev.com/dc28bfbdd63cea0d685f0c10dd50190a40430a79/third_party/blink/web_tests/http/tests/security/isolatedWorld/resources/bypass-main-world-csp-for-inline-style.js
[modify] https://crrev.com/dc28bfbdd63cea0d685f0c10dd50190a40430a79/third_party/blink/web_tests/http/tests/security/isolatedWorld/resources/font-src-bypass.js
[modify] https://crrev.com/dc28bfbdd63cea0d685f0c10dd50190a40430a79/third_party/blink/web_tests/http/tests/security/isolatedWorld/resources/javascript-url-bypass.js
[modify] https://crrev.com/dc28bfbdd63cea0d685f0c10dd50190a40430a79/third_party/blink/web_tests/http/tests/security/isolatedWorld/resources/no-bypass-main-world-csp-for-delayed-execution.js
[modify] https://crrev.com/dc28bfbdd63cea0d685f0c10dd50190a40430a79/third_party/blink/web_tests/http/tests/security/resources/cross-frame-iframe-for-parent-isolated-world.html
[modify] https://crrev.com/dc28bfbdd63cea0d685f0c10dd50190a40430a79/third_party/blink/web_tests/http/tests/xmlhttprequest/chromium/access-control-origin-header-in-isolated-world.html
[modify] https://crrev.com/dc28bfbdd63cea0d685f0c10dd50190a40430a79/third_party/blink/web_tests/http/tests/xmlhttprequest/xhr-to-blob-in-isolated-world.html

Sign in to add a comment