servo/tests/wpt/meta/content-security-policy/unsafe-hashes
Tim van der Lippe d0de4e64d2
Add CSP check for inline style attribute (#36923)
To be able to abort the update, extract the functionality into a
separate method. Otherwise, we don't run the `node.rev_version` at the
end, which according to the comment is probably important.

Not all `style-src` tests pass and I don't fully understand why yet, but
I presume it has to do with some special quirks of stylesheets that
other CSP checks don't have. All `style-src-attr-elem` tests pass
though.

Part of #4577

Signed-off-by: Tim van der Lippe <tvanderlippe@gmail.com>
2025-05-09 17:36:55 +00:00
..
javascript_src_denied_missing_unsafe_hashes-href_blank-script-src-elem.html.ini Run all CSP tests in CI by default. (#36436) 2025-04-10 08:09:23 +00:00
javascript_src_denied_missing_unsafe_hashes-href_blank.html.ini Run all CSP tests in CI by default. (#36436) 2025-04-10 08:09:23 +00:00
javascript_src_denied_missing_unsafe_hashes-window_open.html.ini Run all CSP tests in CI by default. (#36436) 2025-04-10 08:09:23 +00:00
javascript_src_denied_wrong_hash-href_blank-script-src-elem.html.ini Run all CSP tests in CI by default. (#36436) 2025-04-10 08:09:23 +00:00
javascript_src_denied_wrong_hash-href_blank.html.ini Run all CSP tests in CI by default. (#36436) 2025-04-10 08:09:23 +00:00
javascript_src_denied_wrong_hash-window_open.html.ini Run all CSP tests in CI by default. (#36436) 2025-04-10 08:09:23 +00:00