Skip to content

Commit e0863d9

Browse files
mikewestannevk
authored andcommitted
Add a source argument to CSP's inline behavior algorithm
To support hash-based whitelisting of inline event handlers, CSP has added a _source_ argument to the "Should _element_'s inline behavior be blocked by Content Security Policy?" (in w3c/webappsec#13). This patch adds the same argument to the four callsites in HTML.
1 parent f5a6059 commit e0863d9

File tree

1 file changed

+10
-10
lines changed

1 file changed

+10
-10
lines changed

source

+10-10
Original file line numberDiff line numberDiff line change
@@ -11343,9 +11343,9 @@ Transport Protocol">HTTP&lt;/abbr> today.&lt;/p></pre> <!-- DO NOT REWRAP THIS L
1134311343

1134411344
<p>However, if the <span>Should element's inline behavior be blocked by Content Security
1134511345
Policy?</span> algorithm returns "<code data-x="">Blocked</code>" when executed upon the
11346-
attribute's <span>element</span> and "<code data-x="">style attribute</code>", then the style
11347-
rules defined in the attribute's value must not be applied to the <span>element</span>. <ref
11348-
spec="CSP"></p>
11346+
attribute's <span>element</span>, "<code data-x="">style attribute</code>", and the attribute's
11347+
value, then the style rules defined in the attribute's value must not be applied to the
11348+
<span>element</span>. <ref spec="CSP"></p>
1134911349

1135011350
</div>
1135111351

@@ -13861,8 +13861,8 @@ own thing rather than part of the extended sentence -->
1386113861

1386213862
<li><p>If the <span>Should element's inline behavior be blocked by Content Security
1386313863
Policy?</span> algorithm returns "<code data-x="">Blocked</code>" when executed upon the
13864-
<code>style</code> element and "<code data-x="">style</code>", then abort these steps.
13865-
<ref spec="CSP"></p></li>
13864+
<code>style</code> element, "<code data-x="">style</code>", and the <code>style</code>
13865+
element's <code>style data</code>, then abort these steps. <ref spec="CSP"></p></li>
1386613866

1386713867
<!-- note that the browsing context isn't needed: http://software.hixie.ch/utilities/js/live-dom-viewer/saved/2739 -->
1386813868

@@ -58629,9 +58629,9 @@ o............A....e
5862958629
<li id="script-processing-csp"><p>If the <code>script</code> element does not have a <code
5863058630
data-x="attr-script-src">src</code> content attribute, and the <span>Should element's inline
5863158631
behavior be blocked by Content Security Policy?</span> algorithm returns "<code
58632-
data-x="">Blocked</code>" when executed upon the <code>script</code> element and "<code
58633-
data-x="">script</code>", then abort these steps. The script is not executed. <ref
58634-
spec="CSP"></p></li>
58632+
data-x="">Blocked</code>" when executed upon the <code>script</code> element, "<code
58633+
data-x="">script</code>", and the <code>script</code> element's <code>child text content</code>,
58634+
then abort these steps. The script is not executed. <ref spec="CSP"></p></li>
5863558635

5863658636
<li id="script-processing-for">
5863758637

@@ -88425,8 +88425,8 @@ dictionary <dfn>PromiseRejectionEventInit</dfn> : <span>EventInit</span> {
8842588425
<ol>
8842688426
<li><p>If the <span>Should element's inline behavior be blocked by Content Security
8842788427
Policy?</span> algorithm returns "<code data-x="">Blocked</code>" when executed upon the
88428-
attribute's <span>element</span> and "<code data-x="">script attribute</code>", then abort these
88429-
steps. <ref spec="CSP"></p></li>
88428+
attribute's <span>element</span>, "<code data-x="">script attribute</code>", and the attribute's
88429+
value, then abort these steps. <ref spec="CSP"></p></li>
8843088430

8843188431
<li><p>Set the corresponding <span data-x="event handlers">event handler</span> to an
8843288432
<span>internal raw uncompiled handler</span> consisting of the attribute's new value and the

0 commit comments

Comments
 (0)