+2021-08-19 Alex Christensen <achristensen@webkit.org>
+
+ Remove more non-inclusive language from Source
+ https://bugs.webkit.org/show_bug.cgi?id=229230
+
+ Reviewed by Myles C. Maxfield.
+
+ * icu/unicode/uspoof.h:
+ This comment change comes from upstream ICU.
+ * wtf/URL.h:
+
2021-08-18 Ryosuke Niwa <rniwa@webkit.org>
[ iOS Debug ] 12 TestWebKitAPI.WebKitLegacy. tests are crashing
* }
* </pre>
*
- * To disable specific checks and enable all others, the "blacklisted" checks should be ANDed away from
- * ALL_CHECKS. For example, if you are not planning to use the {@link uspoof_areConfusable} functionality,
+ * To disable specific checks and enable all others,
+ * start with ALL_CHECKS and "AND away" the not-desired checks.
+ * For example, if you are not planning to use the {@link uspoof_areConfusable} functionality,
* it is good practice to disable the CONFUSABLE check:
*
* <pre>
WTF_EXPORT_PRIVATE std::optional<uint16_t> defaultPortForProtocol(StringView protocol);
WTF_EXPORT_PRIVATE bool isDefaultPortForProtocol(uint16_t port, StringView protocol);
-WTF_EXPORT_PRIVATE bool portAllowed(const URL&); // Blacklist ports that should never be used for Web resources.
+WTF_EXPORT_PRIVATE bool portAllowed(const URL&); // Disallow ports that should never be used for Web resources.
WTF_EXPORT_PRIVATE void registerDefaultPortForProtocolForTesting(uint16_t port, const String& protocol);
WTF_EXPORT_PRIVATE void clearDefaultPortForProtocolMapForTesting();
+2021-08-19 Alex Christensen <achristensen@webkit.org>
+
+ Remove more non-inclusive language from Source
+ https://bugs.webkit.org/show_bug.cgi?id=229230
+
+ Reviewed by Myles C. Maxfield.
+
+ No change in behavior.
+
+ * WebCore.order:
+ * features.json:
+
2021-08-19 Simon Fraser <simon.fraser@apple.com>
Rename Element::clientRect() which does not return a value in web-exposed "client" coordinates
__ZN7WebCore20ElementRuleCollector14addMatchedRuleEPKNS_8RuleDataE
__ZN7WebCore20ElementRuleCollector27sortAndTransferMatchedRulesEv
__ZNSt3__16__sortIRPFbPKN7WebCore8RuleDataES4_EPS4_EEvT0_S9_T_
-__ZN7WebCore13StyleResolver11MatchResult20addMatchedPropertiesEPKNS_16StylePropertySetEPNS_9StyleRuleEjNS_21PropertyWhitelistTypeE
__ZN3WTF6RefPtrIN7WebCore16StylePropertySetEEaSEPS2_
__ZN7WebCore20ElementRuleCollector13matchedResultEv
__ZN7WebCore13StyleResolver22applyMatchedPropertiesERKNS0_11MatchResultEPKNS_7ElementE
__ZN7WebCore13StyleResolver22applyMatchedPropertiesILNS0_20StyleApplicationPassE0EEEvRKNS0_11MatchResultEbiib
-__ZN7WebCore13StyleResolver15applyPropertiesILNS0_20StyleApplicationPassE0EEEvPKNS_16StylePropertySetEPNS_9StyleRuleEbbNS_21PropertyWhitelistTypeE
__ZN7WebCore13StyleResolver13applyPropertyENS_13CSSPropertyIDEPNS_8CSSValueE
__ZN7WebCore20ApplyPropertyDisplay10applyValueENS_13CSSPropertyIDEPNS_13StyleResolverEPNS_8CSSValueE
__ZN7WebCore13StyleResolver10updateFontEv
__ZN7WebCore13StyleResolver22applyMatchedPropertiesILNS0_20StyleApplicationPassE1EEEvRKNS0_11MatchResultEbiib
-__ZN7WebCore13StyleResolver15applyPropertiesILNS0_20StyleApplicationPassE1EEEvPKNS_16StylePropertySetEPNS_9StyleRuleEbbNS_21PropertyWhitelistTypeE
__ZN7WebCore13StyleResolver17loadPendingImagesEv
__ZN7WebCore13StyleResolver23loadPendingSVGDocumentsEv
__ZN7WebCore13StyleResolver17adjustRenderStyleEPNS_11RenderStyleES2_PNS_7ElementE
__ZN7WebCore11HistoryItem16setDocumentStateERKN3WTF6VectorINS1_6StringELm0ENS1_15CrashOnOverflowEEE
__ZN7WebCore11HistoryItem14setScrollPointERKNS_8IntPointE
__ZN7WebCore11HistoryItem18setPageScaleFactorEf
-__ZN7WebCore14SecurityPolicy19isAccessWhiteListedEPKNS_14SecurityOriginES3_
__ZNK7WebCore14SecurityOrigin8toStringEv
__ZN3WTF9HashTableIPN7WebCore26PageActivityAssertionTokenES3_NS_17IdentityExtractorENS_7PtrHashIS3_EENS_10HashTraitsIS3_EES8_E16lookupForWritingINS_22IdentityHashTranslatorIS6_EES3_EENSt3__14pairIPS3_bEERKT0_
__ZN7WebCore14ArchiveFactory17isArchiveMimeTypeERKN3WTF6StringE
__ZN3WTF6VectorIN7WebCore15FormDataElementELm0ENS_15CrashOnOverflowEE15reserveCapacityEm
__ZN7WebCore15FormDataElementC2ERKS0_
__ZN7WebCore32isSimpleCrossOriginAccessRequestERKN3WTF6StringERKNS_13HTTPHeaderMapE
-__ZN7WebCore45isOnAccessControlSimpleRequestHeaderWhitelistERKN3WTF6StringES3_
__ZNK7WebCore8FormData8deepCopyEv
__ZN7WebCore8FormDataD1Ev
__ZN7WebCore8FormDataD2Ev
__ZN7WebCore8FormData6decodeERN3WTF7DecoderE
__ZN7WebCore20ResourceHandleClient11didSendDataEPNS_14ResourceHandleEyy
__ZN7WebCore24InspectorInstrumentation27didLoadXHRSynchronouslyImplEPNS_19InstrumentingAgentsE
-__ZN7WebCore40isOnAccessControlResponseHeaderWhitelistERKN3WTF6StringE
__ZN7WebCore17HTMLAnchorElement9sendPingsERKNS_4KURLE
__ZN7WebCore12EventHandler23handleMouseReleaseEventERKNS_28MouseEventWithHitTestResultsE
__ZNK7WebCore20AutoscrollController20autoscrollInProgressEv
__ZTVN7WebCore30SearchFieldCancelButtonElementE
__ZTVN7WebCore12TextDocumentE
__ZTVN7WebCore18TextDocumentParserE
-__ZN7WebCoreL25textEncodingNameBlacklistE
__ZTVN7WebCore9TextEventE
__ZTVN7WebCore18TextFieldInputTypeE
__ZTVN7WebCore13TextInputTypeE
__ZN7WebCore18WebCoreMemoryTypes14RenderTreeUsedE
__ZN7WebCore18WebCoreMemoryTypes16RenderTreeUnusedE
__ZN7WebCore18WebCoreMemoryTypes20ProcessPrivateMemoryE
-__ZL26IDNScriptWhiteListFileRead
__ZTVN7WebCore5TimerINS_21WebGLRenderingContextEEE
__ZTVN7WebCore41WebGLRenderingContextErrorMessageCallbackE
__ZTVN7WebCore33WebGLRenderingContextLostCallbackE
"url": "https://w3c.github.io/webappsec-csp/2/",
"keywords": ["csp", "cross-site scripting", "xss", "injection", "header", "security"],
"category": "webapps",
- "description": "A mechanism that web applications can use to mitigate content injection vulnerabilities, such as cross-site scripting (XSS). Developers can declare a CSP policy to prohibit their web application from loading content or executing scripts that have not been whitelisted among other capabilities.",
+ "description": "A mechanism that web applications can use to mitigate content injection vulnerabilities, such as cross-site scripting (XSS). Developers can declare a CSP policy to prohibit their web application from loading content or executing scripts that have not been allowed among other capabilities.",
"contact": {
"name": "Daniel Bates",
"email": "dbates@webkit.org"
+2021-08-19 Alex Christensen <achristensen@webkit.org>
+
+ Remove more non-inclusive language from Source
+ https://bugs.webkit.org/show_bug.cgi?id=229230
+
+ Reviewed by Myles C. Maxfield.
+
+ * UserInterface/External/three.js/three.js:
+ (return.parseTrackName):
+ (parseTrackName):
+ * UserInterface/Views/ConsoleMessageView.js:
+ (WI.ConsoleMessageView.prototype._formatWithSubstitutionString.styleFormatter):
+ (WI.ConsoleMessageView.prototype._formatWithSubstitutionString.isAllowedProperty):
+ (WI.ConsoleMessageView.prototype._formatWithSubstitutionString.isWhitelistedProperty): Deleted.
+ * UserInterface/Views/DOMTreeElement.js:
+ (WI.DOMTreeElement.prototype.populateDOMNodeContextMenu):
+
2021-08-19 Tim Nguyen <ntim@apple.com>
Implement ::backdrop pseudo element
var objectName = results.nodeName.substring( lastDot + 1 );
- // Object names must be checked against a whitelist. Otherwise, there
+ // Object names must be checked against a list. Otherwise, there
// is no way to parse 'foo.bar.baz': 'baz' must be a property, but
// 'bar' could be the objectName, or part of a nodeName (which can
// include '.' characters).
buffer.setAttribute("style", obj.description);
for (var i = 0; i < buffer.style.length; i++) {
var property = buffer.style[i];
- if (isWhitelistedProperty(property))
+ if (isAllowedProperty(property))
currentStyle[property] = buffer.style[property];
}
}
- function isWhitelistedProperty(property)
+ function isAllowedProperty(property)
{
for (var prefix of ["background", "border", "color", "font", "line", "margin", "padding", "text"]) {
if (property.startsWith(prefix) || property.startsWith("-webkit-" + prefix))
}, WI.isBeingEdited(attributeNode));
}
- if (InspectorBackend.hasCommand("DOM.setNodeName") && !DOMTreeElement.EditTagBlacklist.has(this.representedObject.nodeNameInCorrectCase())) {
+ if (InspectorBackend.hasCommand("DOM.setNodeName") && !DOMTreeElement.UneditableTagNames.has(this.representedObject.nodeNameInCorrectCase())) {
let tagNameNode = event.target.closest(".html-tag-name");
subMenus.edit.appendItem(WI.UIString("Tag", "A submenu item of 'Edit' to change DOM element's tag name"), () => {
}
var tagName = tagNameElement.textContent;
- if (WI.DOMTreeElement.EditTagBlacklist.has(tagName.toLowerCase()))
+ if (WI.DOMTreeElement.UneditableTagNames.has(tagName.toLowerCase()))
return false;
if (WI.isBeingEdited(tagNameElement))
]);
// These tags we do not allow editing their tag name.
-WI.DOMTreeElement.EditTagBlacklist = new Set([
+WI.DOMTreeElement.UneditableTagNames = new Set([
"html", "head", "body"
]);
+2021-08-19 Alex Christensen <achristensen@webkit.org>
+
+ Remove more non-inclusive language from Source
+ https://bugs.webkit.org/show_bug.cgi?id=229230
+
+ Reviewed by Myles C. Maxfield.
+
+ * mac/WebKit2.order:
+
2021-08-19 Simon Fraser <simon.fraser@apple.com>
Rename Element::clientRect() which does not return a value in web-exposed "client" coordinates
__ZN6WebKit25InjectedBundleScriptWorldC2EN3WTF10PassRefPtrIN7WebCore15DOMWrapperWorldEEE
__ZN6WebKitL9allWorldsEv
_WKBooleanGetTypeID
-_WKBundleAddOriginAccessWhitelistEntry
-__ZN6WebKit14InjectedBundle29addOriginAccessWhitelistEntryERKN3WTF6StringES4_S4_b
__ZNK6WebKit14TypedAPIObjectILNS_9APIObject4TypeE81EE4typeEv
_WKBundlePageGroupGetTypeID
_WKBundleAddUserStyleSheet
__ZNK6WebKit15PluginInfoStore21findPluginForMIMETypeERKN3WTF6StringEN7WebCore10PluginData18AllowedPluginTypesE
__ZN6WebKit15PluginInfoStore26defaultLoadPolicyForPluginERKNS_16PluginModuleInfoE
_WKShouldBlockPlugin
-__ZN15PluginBlacklist17shouldBlockPluginEP8NSStringS1_
-____ZL30initializePluginBlacklistQueuev_block_invoke
-____ZN15PluginBlacklist17shouldBlockPluginEP8NSStringS1__block_invoke
-__ZL32reloadPluginBlacklistIfNecessaryv
-__ZN15PluginBlacklist6createEP8NSStringP11objc_object
-__ZN15PluginBlacklist14splitOSVersionEP8NSString
-__ZN15PluginBlacklistC2EP12NSDictionaryS1_P5NSSet
-__ZNK15PluginBlacklist11shouldBlockEP8NSStringS1_
__ZN6WebKit33createPluginInformationDictionaryERKNS_16PluginModuleInfoERKN3WTF6StringES6_S6_S6_S6_b
__ZN6WebKit26getPluginModuleInformationERKNS_16PluginModuleInfoERN3WTF7HashMapINS3_6StringENS3_6RefPtrINS_9APIObjectEEENS3_10StringHashENS3_10HashTraitsIS5_EENSA_IS8_EEEE
__ZN6WebKit34getPlatformPluginModuleInformationERKNS_16PluginModuleInfoERN3WTF7HashMapINS3_6StringENS3_6RefPtrINS_9APIObjectEEENS3_10StringHashENS3_10HashTraitsIS5_EENSA_IS8_EEEE
__ZN6WebKit38pluginInformationBundleShortVersionKeyEv
__ZN6WebKit64pluginInformationUpdatePastLastBlockedVersionIsKnownAvailableKeyEv
_WKIsPluginUpdateAvailable
-__ZN15PluginBlacklist23isPluginUpdateAvailableEP8NSString
-____ZN15PluginBlacklist23isPluginUpdateAvailableEP8NSString_block_invoke
__ZN6WebKit37pluginInformationHasSandboxProfileKeyEv
__ZN6WebKit23pluginHasSandboxProfileERKN3WTF6StringE
__ZN6WebKitL24pluginSandboxProfileNameERKN3WTF6StringE
_WKPageGroupRemoveAllUserStyleSheets
__ZN6WebKit12WebPageGroup24removeAllUserStyleSheetsEv
__ZN6WebKit12WebPageGroup25sendToAllProcessesInGroupIN8Messages17WebPageGroupProxy24RemoveAllUserStyleSheetsEEEvRKT_y
--[WKBrowsingContextGroup addUserStyleSheet:baseURL:whitelistedURLPatterns:blacklistedURLPatterns:mainFrameOnly:]
__ZL13createWKArrayP7NSArray
_WKPageGroupAddUserStyleSheet
__ZN6WebKit12WebPageGroup17addUserStyleSheetERKN3WTF6StringES4_PNS_14ImmutableArrayES6_N7WebCore25UserContentInjectedFramesENS7_14UserStyleLevelE
_WKPageGroupRemoveAllUserScripts
__ZN6WebKit12WebPageGroup20removeAllUserScriptsEv
__ZN6WebKit12WebPageGroup25sendToAllProcessesInGroupIN8Messages17WebPageGroupProxy20RemoveAllUserScriptsEEEvRKT_y
--[WKBrowsingContextGroup addUserScript:baseURL:whitelistedURLPatterns:blacklistedURLPatterns:injectionTime:mainFrameOnly:]
_WKPageGroupAddUserScript
__ZN6WebKit12WebPageGroup13addUserScriptERKN3WTF6StringES4_PNS_14ImmutableArrayES6_N7WebCore25UserContentInjectedFramesENS7_23UserScriptInjectionTimeE
__ZN7WebCore10UserScriptC2ERKN3WTF6StringERKNS_4KURLERKNS1_6VectorIS2_Lm0ENS1_15CrashOnOverflowEEESC_NS_23UserScriptInjectionTimeENS_25UserContentInjectedFramesE
_WKBundleClearApplicationCache
__ZN6WebKit14InjectedBundle21clearApplicationCacheEv
__ZN6WebKit10WebProcess10supplementINS_26WebApplicationCacheManagerEEEPT_v
-_WKBundleResetOriginAccessWhitelists
-__ZN6WebKit14InjectedBundle27resetOriginAccessWhitelistsEv
_WKURLResponseCopyURL
_WKURLCopyHostName
__ZNK6WebKit6WebURL4hostEv
__ZN7CoreIPC13MessageSender4sendIN8Messages12WebPageProxy20DidDetectXSSForFrameEEEbRKT_y
__ZN6WebKit12WebPageProxy20didDetectXSSForFrameEyRN7CoreIPC14MessageDecoderE
__ZN6WebKit15WebLoaderClient20didDetectXSSForFrameEPNS_12WebPageProxyEPNS_13WebFrameProxyEPNS_9APIObjectE
-_WKBundleRemoveOriginAccessWhitelistEntry
-__ZN6WebKit14InjectedBundle32removeOriginAccessWhitelistEntryERKN3WTF6StringES4_S4_b
__ZNK6WebKit23RemoteNetworkingContext12blockedErrorERKN7WebCore15ResourceRequestE
__ZN7WebCore17FrameLoaderClient17didNotAllowScriptEv
_WKAccessibilityFocusedObject
+2021-08-19 Alex Christensen <achristensen@webkit.org>
+
+ Remove more non-inclusive language from Source
+ https://bugs.webkit.org/show_bug.cgi?id=229230
+
+ Reviewed by Myles C. Maxfield.
+
+ * WebKit.order:
+ * WebView/WebViewPrivate.h:
+
2021-08-19 Simon Fraser <simon.fraser@apple.com>
Rename Element::clientRect() which does not return a value in web-exposed "client" coordinates
-[WebView currentNodeHighlight]
-[WebClipView resetAdditionalClip]
__Z14CallUIDelegateP7WebViewP13objc_selectorP11objc_object
-+[WebView(WebPrivate) _addOriginAccessWhitelistEntryWithSourceOrigin:destinationProtocol:destinationHost:allowDestinationSubdomains:]
__ZN7WebCore14SecurityOriginD2Ev
-[WebView initWithFrame:frameName:groupName:]
-[WebView(WebPrivate) _initWithFrame:frameName:groupName:usesDocumentViews:]
-[WebView(WebPrivate) setProhibitsMainFrameScrolling:]
__ZN15WebChromeClient35selectItemWritingDirectionIsNaturalEv
__ZN15WebChromeClient46selectItemAlignmentFollowsMenuWritingDirectionEv
-+[WebView(WebPrivate) _removeOriginAccessWhitelistEntryWithSourceOrigin:destinationProtocol:destinationHost:allowDestinationSubdomains:]
-[WebSecurityOrigin initWithURL:]
-[WebDatabaseManager deleteOrigin:]
-[WebSecurityOrigin(WebInternal) _core]
+[WebView(WebPrivate) _removeAllUserContentFromGroup:]
-[WebView(WebPrivate) setTracksRepaints:]
+[WebView(WebPrivate) _setUsesTestModeFocusRingColor:]
-+[WebView(WebPrivate) _resetOriginAccessWhitelists]
+[WebView(WebPrivate) _setAllowsRoundingHacks:]
-[WebFrame(WebPrivate) _clearOpener]
-[WebView(WebPendingPublic) setHistoryDelegate:]
__ZN7WebCore15InspectorClient23overridesShowPaintRectsEv
-[WebBasePluginPackage bundleVersion]
_WKShouldBlockPlugin
-__ZN15PluginBlacklist17shouldBlockPluginEP8NSStringS1_
-____ZL30initializePluginBlacklistQueuev_block_invoke
-____ZN15PluginBlacklist17shouldBlockPluginEP8NSStringS1__block_invoke
-__ZL32reloadPluginBlacklistIfNecessaryv
-__ZN15PluginBlacklist6createEP8NSStringP11objc_object
-__ZN15PluginBlacklist14splitOSVersionEP8NSString
-__ZN15PluginBlacklistC2EP12NSDictionaryS1_P5NSSet
-__ZNK15PluginBlacklist11shouldBlockEP8NSStringS1_
+[WebHostedNetscapePluginView initialize]
-[WebBaseNetscapePluginView .cxx_construct]
-[WebHostedNetscapePluginView .cxx_construct]
-[WebView _zoomOut:isTextOnly:]
-[WebView(WebPendingPublic) zoomPageIn:]
-[WebView _zoomIn:isTextOnly:]
-+[WebView(WebPrivate) _addUserStyleSheetToGroup:world:source:url:whitelist:blacklist:injectedFrames:]
__ZL14toStringVectorP7NSArray
-[WebFrameView scrollToBeginningOfDocument:]
-[WebFrameView _scrollToBeginningOfDocument]
__XPCSetException
_WKPCSetException
__ZN6WebKit27NetscapePluginInstanceProxy18setGlobalExceptionERKN3WTF6StringE
-+[WebView(WebPrivate) _addUserScriptToGroup:world:source:url:whitelist:blacklist:injectionTime:injectedFrames:]
__ZN7WebCore14PluginViewBase27privateBrowsingStateChangedEb
-[WebHostedNetscapePluginView privateBrowsingModeDidChange]
__ZN6WebKit27NetscapePluginInstanceProxy28privateBrowsingModeDidChangeEb
- (NSPasteboard *)_insertionPasteboard;
#endif
-// Whitelists access from an origin (sourceOrigin) to a set of one or more origins described by the parameters:
+// Allow lists access from an origin (sourceOrigin) to a set of one or more origins described by the parameters:
// - destinationProtocol: The protocol to grant access to.
// - destinationHost: The host to grant access to.
-// - allowDestinationSubdomains: If host is a domain, setting this to YES will whitelist host and all its subdomains, recursively.
+// - allowDestinationSubdomains: If host is a domain, setting this to YES will allow host and all its subdomains, recursively.
+ (void)_addOriginAccessAllowListEntryWithSourceOrigin:(NSString *)sourceOrigin destinationProtocol:(NSString *)destinationProtocol destinationHost:(NSString *)destinationHost allowDestinationSubdomains:(BOOL)allowDestinationSubdomains;
+ (void)_removeOriginAccessAllowListEntryWithSourceOrigin:(NSString *)sourceOrigin destinationProtocol:(NSString *)destinationProtocol destinationHost:(NSString *)destinationHost allowDestinationSubdomains:(BOOL)allowDestinationSubdomains;