Return-Path: X-Original-To: apmail-cordova-dev-archive@www.apache.org Delivered-To: apmail-cordova-dev-archive@www.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id 360F5C67D for ; Wed, 17 Dec 2014 16:18:12 +0000 (UTC) Received: (qmail 31759 invoked by uid 500); 17 Dec 2014 16:18:12 -0000 Delivered-To: apmail-cordova-dev-archive@cordova.apache.org Received: (qmail 31720 invoked by uid 500); 17 Dec 2014 16:18:12 -0000 Mailing-List: contact dev-help@cordova.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: dev@cordova.apache.org Delivered-To: mailing list dev@cordova.apache.org Received: (qmail 31708 invoked by uid 99); 17 Dec 2014 16:18:10 -0000 Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 17 Dec 2014 16:18:10 +0000 X-ASF-Spam-Status: No, hits=1.5 required=5.0 tests=HTML_MESSAGE,RCVD_IN_DNSWL_LOW,SPF_PASS X-Spam-Check-By: apache.org Received-SPF: pass (nike.apache.org: domain of iclelland@google.com designates 209.85.218.45 as permitted sender) Received: from [209.85.218.45] (HELO mail-oi0-f45.google.com) (209.85.218.45) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 17 Dec 2014 16:17:44 +0000 Received: by mail-oi0-f45.google.com with SMTP id a141so11329785oig.18 for ; Wed, 17 Dec 2014 08:16:12 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=mime-version:references:from:date:message-id:subject:to :content-type; bh=m+hklrZgdR9BTzpEXZvVQ1A+SoEVzAhRq7yrFvaQnxw=; b=WpybSBq8DLPhu7znD3inz60Z4uKzhw5AurlcnMbxb8NvtF0Zxbkop3Mpw8Wrqj+EYZ zo6uHyH7HOmPS7/j97DCLKOWYj4DHLRzrUzaPqqP+wMsDbZ6VPGaJt7cvRQRGYwaUri/ WWZacnJg+/6zBjC12KqQhs2r4QdCsRPOucGyU= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:references:from:date:message-id :subject:to:content-type; bh=m+hklrZgdR9BTzpEXZvVQ1A+SoEVzAhRq7yrFvaQnxw=; b=Hp/q1QWQHov3ypRBGEKo5W29/bzsX2/ye1En1itPxaMWOnGjqcbKIyLHZrmuhjYKrk qDo/PXALy1/Y2p0yPZd8F6cYi6oxgPEmg3eZvvAy4o1m8hLzmrFn3nFBgNojZMJcPumR vkSbI3umvWFtwtgHuZwUEIlSksLZ1XAnRfZfOHaRFzaLS2klmxTnrLPeKJBDpwyufmYw I9ewYOwICBa8s/a/n0nssdB2OEJgyx1BQYGf/pSEq7waFrhcbHs3Bb2miC7Zp3Ol57tV x9WXKA+YyaDT4GjudxRqK6pePnWI9cS8rlLasVNFUdyBHapJExUe7D8GQX+XWWenntFy azAQ== X-Gm-Message-State: ALoCoQnU9G1UsyRHXgUxUXojKWTDI+xBX2yEnE9Xsv9fvXgxrNkZV3hyHwVvnCC0SqYPMNHjDASD X-Received: by 10.202.17.142 with SMTP id 136mr24942477oir.51.1418832972747; Wed, 17 Dec 2014 08:16:12 -0800 (PST) MIME-Version: 1.0 References: From: Ian Clelland Date: Wed, 17 Dec 2014 16:16:12 +0000 Message-ID: Subject: Re: How to handle CSP for XHR in Cordova 4.0 To: dev@cordova.apache.org Content-Type: multipart/alternative; boundary=001a113d12ec5635ec050a6bcb95 X-Virus-Checked: Checked by ClamAV on apache.org --001a113d12ec5635ec050a6bcb95 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Definitely want to handle iOS, with the same policy. I've been working on that in parallel with Android. Do we want to use for Nav? I wasn't sure, given its history, and the fact that we're changing its behaviour. Is it better to stick with the familiar tag and change what it tries to do? Or create a new tag and deprecate ? On Wed Dec 17 2014 at 10:30:18 AM Chuck Lantz wrote: > What about top level nav and script access? Would the thought be that th= e > elements would map to that in the base platform? I'm thinking i= n > terms of consistency across the different platforms. It strikes me we'd > want to update iOS at least as well. > > -Chuck > > -----Original Message----- > From: agrieve@google.com [mailto:agrieve@google.com] On Behalf Of Andrew > Grieve > Sent: Tuesday, December 16, 2014 7:21 AM > To: dev > Subject: Re: How to handle CSP for XHR in Cordova 4.0 > > On Mon, Dec 15, 2014 at 8:19 PM, Chuck Lantz wrote= : > > > > Near term, for Windows 8.0/8.1, a custom security policy is in place > > at the platform level for store apps so CSP doesn't really apply there > > at the moment. (And, to be really specific, CSP support is pretty > > limited in > > IE10/11 focusing on the sandbox directive. The Windows 10 Tech Preview > > is where you can see the real support in IE right now.) So, it's a > > more of forward-thinking topic in that world. > > > > A related question, however - CSP support only started in the Android > > browser with 4.4 did it not? Obviously Crosswalk would have it but > > what about when using the base browser? Is the thought devs should > > use the old whitelist model here? > > > > I think one of the big issues is that the whitelist never worked for > blocking *all* requests. It didn't work pre-3.0, and it doesn't block >