From 9595024f3d2ef1067547b7006233351aa5707bd9 Mon Sep 17 00:00:00 2001 From: Kevin McNee Date: Mon, 7 Oct 2024 01:30:35 -0400 Subject: [PATCH] Exempt the Speculation-Rules header from CSP Per discussions, this is outside of CSP's threat model. Closes #327. --- speculation-rules.bs | 7 ++++--- triggers.md | 10 +++++----- 2 files changed, 9 insertions(+), 8 deletions(-) diff --git a/speculation-rules.bs b/speculation-rules.bs index c26d058..fc0b927 100644 --- a/speculation-rules.bs +++ b/speculation-rules.bs @@ -755,10 +755,11 @@ The algorithm needs patches to handle the "`script speculationrules`" type at th

Get the effective directive for request

-The switch needs one additional case. At present, requests can only be issued in the case of the [:Speculation-Rules:] header, so `script-src-elem` is too specific and only `script-src` (or its fallback, `default-src`) applies. +In [[CSP#effective-directive-for-a-request]], the switch on the request [=request/destination=] needs one additional case. +

At present, requests can only be issued in the case of the [:Speculation-Rules:] header, so CSP does not apply. If support is added for loading external rule sets via ` ``` -(The use of `