- From: W3C Webmaster via GitHub API <sysbot+gh@w3.org>
- Date: Mon, 19 Sep 2022 17:00:34 +0000
- To: public-webappsec@w3.org
- Message-Id: <E1oaK8I-00HGDy-5h@uranus.w3.org>
Issues
------
* w3c/webappsec-subresource-integrity (+0/-0/💬1)
1 issues received 1 new comments:
- #21 Consider integrity enforcement of iframe (1 by nathanfranke)
https://github.com/w3c/webappsec-subresource-integrity/issues/21 [feature-request]
* w3c/webappsec-csp (+1/-1/💬4)
1 issues created:
- The editor's draft includes several features that no one has shipped. (by mikewest)
https://github.com/w3c/webappsec-csp/issues/563
1 issues received 4 new comments:
- #563 The editor's draft includes several features that no one has shipped. (4 by annevk, mikewest)
https://github.com/w3c/webappsec-csp/issues/563
1 issues closed:
- "Get the effective directive for request" should handle at least worklets https://github.com/w3c/webappsec-csp/issues/554
* w3c/webappsec-credential-management (+0/-1/💬0)
1 issues closed:
- Specify what happens when a credential request is issued while another one is in progress https://github.com/w3c/webappsec-credential-management/issues/206 [type:technical]
* w3c/permissions-registry (+0/-0/💬3)
2 issues received 3 new comments:
- #11 Removal of PermissionName broke downstream standards (1 by rakuco)
https://github.com/w3c/permissions-registry/issues/11
- #4 CFC for publication as a "Draft Registry" (2 by annevk, miketaylr)
https://github.com/w3c/permissions-registry/issues/4
* w3c/webappsec-permissions-policy (+0/-0/💬3)
2 issues received 3 new comments:
- #386 Usefulness of reporting in Permissions Policy (1 by bartoszniemczura)
https://github.com/w3c/webappsec-permissions-policy/issues/386
- #208 How do I disable everything? (2 by AramZS, samuelweiler)
https://github.com/w3c/webappsec-permissions-policy/issues/208 [feature question]
* w3c/webappsec-trusted-types (+1/-1/💬1)
1 issues created:
- TrustedHTML.fromLiteral is exposed in workers but assumes the current global is a Window (by Ms2ger)
https://github.com/w3c/webappsec-trusted-types/issues/374
1 issues received 1 new comments:
- #363 Figure out if there is a better way to guard navigations to `javascript:` across documents (1 by shhnjk)
https://github.com/w3c/webappsec-trusted-types/issues/363
1 issues closed:
- Figure out if there is a better way to guard navigations to `javascript:` across documents https://github.com/w3c/webappsec-trusted-types/issues/363
Pull requests
-------------
* w3c/webappsec (+1/-1/💬0)
1 pull requests submitted:
- Adding my name to attendees list (by seanturner)
https://github.com/w3c/webappsec/pull/615
1 pull requests merged:
- Adding my name to attendees list
https://github.com/w3c/webappsec/pull/615
* w3c/webappsec-csp (+1/-3/💬3)
1 pull requests submitted:
- Remove `navigate-to`. (by mikewest)
https://github.com/w3c/webappsec-csp/pull/564
2 pull requests received 3 new comments:
- #564 Remove `navigate-to`. (2 by antosart, mikewest)
https://github.com/w3c/webappsec-csp/pull/564
- #555 Return correct effective directive for worklets (1 by mikewest)
https://github.com/w3c/webappsec-csp/pull/555
3 pull requests merged:
- Remove `navigate-to`.
https://github.com/w3c/webappsec-csp/pull/564
- Return correct effective directive for worklets
https://github.com/w3c/webappsec-csp/pull/555
- Editorial: Clarify the role of `'none'` in source lists.
https://github.com/w3c/webappsec-csp/pull/534
* w3c/webappsec-credential-management (+1/-1/💬4)
1 pull requests submitted:
- Add support for publickey-credentials-create permission policy (by stephenmcgruer)
https://github.com/w3c/webappsec-credential-management/pull/209
2 pull requests received 4 new comments:
- #209 Add support for publickey-credentials-create permission policy (2 by stephenmcgruer)
https://github.com/w3c/webappsec-credential-management/pull/209
- #207 Disallow multiple in-progress credential requests (2 by npm1, nsatragno)
https://github.com/w3c/webappsec-credential-management/pull/207
1 pull requests merged:
- Disallow multiple in-progress credential requests
https://github.com/w3c/webappsec-credential-management/pull/207
* w3c/webappsec-permissions-policy (+3/-1/💬2)
3 pull requests submitted:
- Use spec-prod instead of Travis CI. (by jyasskin)
https://github.com/w3c/webappsec-permissions-policy/pull/486
- Turn on PR Preview (by jyasskin)
https://github.com/w3c/webappsec-permissions-policy/pull/485
- Reference "generate and queue a report" (by clelland)
https://github.com/w3c/webappsec-permissions-policy/pull/484
2 pull requests received 2 new comments:
- #486 Use spec-prod instead of Travis CI. (1 by jyasskin)
https://github.com/w3c/webappsec-permissions-policy/pull/486
- #482 Wildcards in Permissions Policy Origins (1 by arichiv)
https://github.com/w3c/webappsec-permissions-policy/pull/482
1 pull requests merged:
- Editorial: export * and 'self'
https://github.com/w3c/webappsec-permissions-policy/pull/474
Repositories tracked by this digest:
-----------------------------------
* https://github.com/w3c/webappsec
* https://github.com/w3c/webappsec-subresource-integrity
* https://github.com/w3c/webappsec-csp
* https://github.com/w3c/webappsec-mixed-content
* https://github.com/w3c/webappsec-upgrade-insecure-requests
* https://github.com/w3c/webappsec-credential-management
* https://github.com/w3c/permissions
* https://github.com/w3c/permissions-registry
* https://github.com/w3c/webappsec-referrer-policy
* https://github.com/w3c/webappsec-secure-contexts
* https://github.com/w3c/webappsec-clear-site-data
* https://github.com/w3c/webappsec-cowl
* https://github.com/w3c/webappsec-epr
* https://github.com/w3c/webappsec-suborigins
* https://github.com/w3c/webappsec-cspee
* https://github.com/w3c/webappsec-permissions-policy
* https://github.com/w3c/webappsec-fetch-metadata
* https://github.com/w3c/webappsec-trusted-types
* https://github.com/w3c/webappsec-change-password-url
* https://github.com/w3c/webappsec-post-spectre-webdev
--
Sent via github-notify-ml as configured in https://github.com/w3c/github-notify-ml-config
Received on Monday, 19 September 2022 17:00:36 UTC