Propagate parent policy container to local iframes (#36710)

This follows the rules as defined in
https://w3c.github.io/webappsec-csp/#security-inherit-csp
where local iframes (about:blank and about:srcdoc) should
initially start with the CSP rules of the parent. After
that, all new CSP headers should only be set on the
policy container of the iframe.

Part of #36437

Signed-off-by: Tim van der Lippe <tvanderlippe@gmail.com>

Signed-off-by: Tim van der Lippe <tvanderlippe@gmail.com>
This commit is contained in:
Tim van der Lippe 2025-05-03 10:47:40 +02:00 committed by GitHub
parent 4164f76769
commit 539ca27284
No known key found for this signature in database
GPG key ID: B5690EEEBB952194
11 changed files with 45 additions and 47 deletions

View file

@ -1,30 +1,6 @@
[iframe-all-local-schemes.sub.html]
[<iframe>'s about:blank inherits policy.]
expected: FAIL
[window about:blank inherits policy.]
expected: FAIL
[<iframe srcdoc>'s inherits policy.]
expected: FAIL
[<iframe src='blob:...'>'s inherits policy.]
expected: FAIL
[window url='blob:...' inherits policy.]
expected: FAIL
[<iframe src='data:...'>'s inherits policy.]
expected: FAIL
[<iframe src='javascript:...'>'s inherits policy (static <img> is blocked)]
expected: FAIL
[window url='javascript:...'>'s inherits policy (static <img> is blocked)]
expected: FAIL
[<iframe src='javascript:...'>'s inherits policy (dynamically inserted <img> is blocked)]
expected: FAIL
[<iframe sandbox src='blob:...'>'s inherits policy. (opaque origin sandbox)]
expected: FAIL