Index: third_party/WebKit/Source/core/frame/csp/CSPDirectiveList.cpp |
diff --git a/third_party/WebKit/Source/core/frame/csp/CSPDirectiveList.cpp b/third_party/WebKit/Source/core/frame/csp/CSPDirectiveList.cpp |
index 1fcf8b49fc0a7ab5445a39ce163cdb25c7a32569..eb4e0606685fa234f2ee714eae5b552e7d60979a 100644 |
--- a/third_party/WebKit/Source/core/frame/csp/CSPDirectiveList.cpp |
+++ b/third_party/WebKit/Source/core/frame/csp/CSPDirectiveList.cpp |
@@ -8,6 +8,7 @@ |
#include "core/dom/SecurityContext.h" |
#include "core/dom/SpaceSplitString.h" |
#include "core/frame/LocalFrame.h" |
+#include "core/frame/UseCounter.h" |
#include "core/inspector/ConsoleMessage.h" |
#include "platform/Crypto.h" |
#include "platform/ParsingUtilities.h" |
@@ -67,7 +68,7 @@ RawPtr<CSPDirectiveList> CSPDirectiveList::create(ContentSecurityPolicy* policy, |
directives->setEvalDisabledErrorMessage(message); |
} |
- if (directives->isReportOnly() && directives->reportEndpoints().isEmpty()) |
+ if (directives->isReportOnly() && source != ContentSecurityPolicyHeaderSourceMeta && directives->reportEndpoints().isEmpty()) |
policy->reportMissingReportURI(String(begin, end - begin)); |
return directives.release(); |
@@ -541,6 +542,13 @@ void CSPDirectiveList::parseReportURI(const String& name, const String& value) |
return; |
} |
+ // Remove report-uri in meta policies, per https://www.w3.org/TR/CSP2/#delivery-html-meta-element. |
+ if (m_headerSource == ContentSecurityPolicyHeaderSourceMeta) { |
+ UseCounter::count(m_policy->document(), UseCounter::InvalidReportUriDirectiveInMetaCSP); |
+ m_policy->reportInvalidDirectiveInMeta(name); |
+ return; |
+ } |
+ |
Vector<UChar> characters; |
value.appendTo(characters); |
@@ -568,11 +576,25 @@ void CSPDirectiveList::setCSPDirective(const String& name, const String& value, |
m_policy->reportDuplicateDirective(name); |
return; |
} |
+ |
+ // Remove frame-ancestors directives in meta policies, per https://www.w3.org/TR/CSP2/#delivery-html-meta-element. |
+ if (m_headerSource == ContentSecurityPolicyHeaderSourceMeta && name == ContentSecurityPolicy::FrameAncestors) { |
+ UseCounter::count(m_policy->document(), UseCounter::InvalidFrameAncestorsDirectiveInMetaCSP); |
+ m_policy->reportInvalidDirectiveInMeta(name); |
+ return; |
+ } |
+ |
directive = new CSPDirectiveType(name, value, m_policy); |
} |
void CSPDirectiveList::applySandboxPolicy(const String& name, const String& sandboxPolicy) |
{ |
+ // Remove sandbox directives in meta policies, per https://www.w3.org/TR/CSP2/#delivery-html-meta-element. |
+ if (m_headerSource == ContentSecurityPolicyHeaderSourceMeta) { |
+ UseCounter::count(m_policy->document(), UseCounter::InvalidSandboxDirectiveInMetaCSP); |
+ m_policy->reportInvalidDirectiveInMeta(name); |
+ return; |
+ } |
if (m_reportOnly) { |
m_policy->reportInvalidInReportOnly(name); |
return; |