Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Fixes a part of #1793.
Although this blocks all
source-file: "moz-extension"
CSP reports, we still have the issue of some of our scripts being blocked by page CSPs in Firefox.Note that script surrogates are no longer subject to page CSPs (#2801).
DDG's test page: https://privacy-test-pages.glitch.me/security/csp-report/index.html
What does still get broken by page CSPs in Firefox?
Anything injected into page-level contexts ("main world"). So,
navigator.doNotTrack
, canvas fp. detection,document.cookie
/localStorage blocking, ...— https://bugzilla.mozilla.org/show_bug.cgi?id=1588957#c13
Are there any MV2 workarounds?
Yes, inject page scripts from
web_accessible_resources
or via "Xray vision" instead.https://bugzilla.mozilla.org/show_bug.cgi?id=1591983#c1
How will this change with MV3?
TBD