angler-fishThe Vulnerability History Project

2011-05-01 Adam Barth <abarth@webkit.org>

      Reviewed by Eric Seidel.

        Polish CSP host and port matching
        https://bugs.webkit.org/show_bug.cgi?id=59899

        Test two host wildcard cases.

        * http/tests/security/contentSecurityPolicy/image-full-host-wildcard-allowed-expected.txt: Added.
        * http/tests/security/contentSecurityPolicy/image-full-host-wildcard-allowed.html: Added.
        * http/tests/security/contentSecurityPolicy/image-host-wildcard-allowed-expected.txt: Added.
        * http/tests/security/contentSecurityPolicy/image-host-wildcard-allowed.html: Added.
2011-05-01  Adam Barth  <abarth@webkit.org>

        Reviewed by Eric Seidel.

        Polish CSP host and port matching
        https://bugs.webkit.org/show_bug.cgi?id=59899

        Finish last two details of host and port matching.  I don't think the
        default port handling is testable with our current testing
        infrastructure.

        Tests: http/tests/security/contentSecurityPolicy/image-full-host-wildcard-allowed.html
               http/tests/security/contentSecurityPolicy/image-host-wildcard-allowed.html

        * page/ContentSecurityPolicy.cpp:
        (WebCore::CSPSource::hostMatches):
        (WebCore::CSPSource::portMatches):

git-svn-id: svn://svn.chromium.org/blink/trunk@85453 bbb929c8-8fbe-4397-9dbb-9b2b20218538
    
commit 169331c5a83bc3287f8bd16b90b8ec0ae9054fac
-14
-2
-13
-2
-13
-18
+7 -6
expand_less