Skip to content

Commit 058d7e3

Browse files
committed
Stop passing CSP algorithms unused parameters
Follows w3c/webappsec-csp#436. Helps with #1130.
1 parent 979af15 commit 058d7e3

File tree

1 file changed

+13
-16
lines changed

1 file changed

+13
-16
lines changed

source

Lines changed: 13 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -3837,8 +3837,8 @@ a.setAttribute('href', 'https://example.com/'); // change the content attribute
38373837
<li>The <dfn data-x-href="https://w3c.github.io/webappsec-csp/#initialize-global-object-csp">Initialize a global object's CSP list</dfn> algorithm</li>
38383838
<li>The <dfn data-x-href="https://w3c.github.io/webappsec-csp/#initialize-document-csp">Initialize a Document's CSP list</dfn> algorithm</li>
38393839
<li>The <dfn data-x-href="https://w3c.github.io/webappsec-csp/#should-block-inline">Should element's inline behavior be blocked by Content Security Policy?</dfn> algorithm</li>
3840-
<li>The <dfn data-x-href="https://w3c.github.io/webappsec-csp/#should-block-navigation-request">Should navigation request of type from source in target be blocked by Content Security Policy?</dfn> algorithm</li>
3841-
<li>The <dfn data-x-href="https://w3c.github.io/webappsec-csp/#should-block-navigation-response">Should navigation response to navigation request of type from source in target be blocked by Content Security Policy?</dfn> algorithm</li>
3840+
<li>The <dfn data-x-href="https://w3c.github.io/webappsec-csp/#should-block-navigation-request">Should navigation request of type be blocked by Content Security Policy?</dfn> algorithm</li>
3841+
<li>The <dfn data-x-href="https://w3c.github.io/webappsec-csp/#should-block-navigation-response">Should navigation response to navigation request of type be blocked by Content Security Policy?</dfn> algorithm</li>
38423842
<li>The <dfn data-x-href="https://w3c.github.io/webappsec-csp/#report-uri"><code data-x="">report-uri</code> directive</dfn></li>
38433843
<li>The <dfn data-x="csp-EnsureCSPDoesNotBlockStringCompilation" data-x-href="https://w3c.github.io/webappsec-csp/#can-compile-strings">EnsureCSPDoesNotBlockStringCompilation</dfn> abstract operation</li>
38443844
<li>The <dfn data-x-href="https://w3c.github.io/webappsec-csp/#allow-base-for-document">Is base allowed for Document?</dfn> algorithm</li>
@@ -83546,11 +83546,10 @@ interface <dfn>Location</dfn> { // but see also <a href="#the-location-interface
8354683546
<li><p>Set <var>request</var>'s <span data-x="concept-request-reserved-client">reserved
8354783547
client</span> to <var>reservedEnvironment</var>.</p></li>
8354883548

83549-
<li><p>If the <span>Should navigation request of type from source in target be blocked by
83550-
Content Security Policy?</span> algorithm returns "<code data-x="">Blocked</code>" when
83551-
executed upon <var>request</var>, <var>navigationType</var>, <var>sourceBrowsingContext</var>,
83552-
and <var>browsingContext</var>, then set <var>response</var> to a <span>network error</span>
83553-
and <span>break</span>. <ref spec="CSP"></p></li>
83549+
<li><p>If the result of <span>Should navigation request of type be blocked by Content Security
83550+
Policy?</span> given <var>request</var> and <var>navigationType</var> is "<code
83551+
data-x="">Blocked</code>", then set <var>response</var> to a <span>network error</span> and
83552+
<span>break</span>. <ref spec="CSP"></p></li>
8355483553

8355583554
<li>
8355683555
<p>Otherwise:</p>
@@ -83753,11 +83752,10 @@ interface <dfn>Location</dfn> { // but see also <a href="#the-location-interface
8375383752
<p>If <var>response</var> is a <span>network error</span>, then set <var>failure</var> to
8375483753
true.</p>
8375583754

83756-
<p>Otherwise, if the result of <span>should navigation response to navigation request of type
83757-
from source in target be blocked by Content Security Policy?</span> given
83758-
<var>navigationParams</var>'s <span data-x="navigation-params-request">request</span>,
83759-
<var>response</var>, <var>navigationType</var>, <var>source</var>, and
83760-
<var>browsingContext</var> is "<code data-x="">Blocked</code>", then set <var>failure</var> to
83755+
<p>Otherwise, if the result of <span>Should navigation response to navigation request of type be
83756+
blocked by Content Security Policy?</span> given <var>navigationParams</var>'s <span
83757+
data-x="navigation-params-request">request</span>, <var>response</var>, and
83758+
<var>navigationType</var> is "<code data-x="">Blocked</code>", then set <var>failure</var> to
8376183759
true. <ref spec="CSP"></p>
8376283760

8376383761
<p>Otherwise, if the result of <span data-x="check a navigation response's adherence to its
@@ -83941,10 +83939,9 @@ interface <dfn>Location</dfn> { // but see also <a href="#the-location-interface
8394183939
#2591</a> this step does not work and presents a security issue.</p>
8394283940
</li>
8394383941

83944-
<li><p>The <span>Should navigation request of type from source in target be blocked by Content
83945-
Security Policy?</span> algorithm returns "<code data-x="">Allowed</code>" when executed upon
83946-
<var>request</var>, "<code data-x="">other</code>", <var>source</var>, and
83947-
<var>browsingContext</var>. <ref spec="CSP"></p></li>
83942+
<li><p>The result of <span>Should navigation request of type be blocked by Content Security
83943+
Policy?</span> given <var>request</var> and "<code data-x="">other</code>" is "<code
83944+
data-x="">Allowed</code>". <ref spec="CSP"></p></li>
8394883945
</ul>
8394983946

8395083947
<p>then:</p>

0 commit comments

Comments
 (0)