OLD | NEW |
1 /* | 1 /* |
2 * Copyright (C) 2011 Google, Inc. All rights reserved. | 2 * Copyright (C) 2011 Google, Inc. All rights reserved. |
3 * | 3 * |
4 * Redistribution and use in source and binary forms, with or without | 4 * Redistribution and use in source and binary forms, with or without |
5 * modification, are permitted provided that the following conditions | 5 * modification, are permitted provided that the following conditions |
6 * are met: | 6 * are met: |
7 * 1. Redistributions of source code must retain the above copyright | 7 * 1. Redistributions of source code must retain the above copyright |
8 * notice, this list of conditions and the following disclaimer. | 8 * notice, this list of conditions and the following disclaimer. |
9 * 2. Redistributions in binary form must reproduce the above copyright | 9 * 2. Redistributions in binary form must reproduce the above copyright |
10 * notice, this list of conditions and the following disclaimer in the | 10 * notice, this list of conditions and the following disclaimer in the |
(...skipping 227 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
238 void reportInvalidReferrer(const String&); | 238 void reportInvalidReferrer(const String&); |
239 void reportReportOnlyInMeta(const String&); | 239 void reportReportOnlyInMeta(const String&); |
240 void reportMetaOutsideHead(const String&); | 240 void reportMetaOutsideHead(const String&); |
241 void reportValueForEmptyDirective(const String& directiveName, const String&
value); | 241 void reportValueForEmptyDirective(const String& directiveName, const String&
value); |
242 | 242 |
243 // If a frame is passed in, the report will be sent using it as a context. I
f no frame is | 243 // If a frame is passed in, the report will be sent using it as a context. I
f no frame is |
244 // passed in, the report will be sent via this object's |m_executionContext|
(or dropped | 244 // passed in, the report will be sent via this object's |m_executionContext|
(or dropped |
245 // on the floor if no such context is available). | 245 // on the floor if no such context is available). |
246 void reportViolation(const String& directiveText, const String& effectiveDir
ective, const String& consoleMessage, const KURL& blockedURL, const Vector<Strin
g>& reportEndpoints, const String& header, ViolationType, LocalFrame* = nullptr)
; | 246 void reportViolation(const String& directiveText, const String& effectiveDir
ective, const String& consoleMessage, const KURL& blockedURL, const Vector<Strin
g>& reportEndpoints, const String& header, ViolationType, LocalFrame* = nullptr)
; |
247 | 247 |
| 248 // Called when mixed content is detected on a page; will trigger a violation
report if |
| 249 // the 'block-all-mixed-content' directive is specified for a policy. |
| 250 void reportMixedContent(const KURL& mixedURL); |
| 251 |
248 void reportBlockedScriptExecutionToInspector(const String& directiveText) co
nst; | 252 void reportBlockedScriptExecutionToInspector(const String& directiveText) co
nst; |
249 | 253 |
250 const KURL url() const; | 254 const KURL url() const; |
251 void enforceSandboxFlags(SandboxFlags); | 255 void enforceSandboxFlags(SandboxFlags); |
252 void enforceStrictMixedContentChecking(); | 256 void enforceStrictMixedContentChecking(); |
253 void treatAsPublicAddress(); | 257 void treatAsPublicAddress(); |
254 String evalDisabledErrorMessage() const; | 258 String evalDisabledErrorMessage() const; |
255 | 259 |
256 void setInsecureRequestsPolicy(SecurityContext::InsecureRequestsPolicy); | 260 void setInsecureRequestsPolicy(SecurityContext::InsecureRequestsPolicy); |
257 SecurityContext::InsecureRequestsPolicy getInsecureRequestsPolicy() const {
return m_insecureRequestsPolicy; } | 261 SecurityContext::InsecureRequestsPolicy getInsecureRequestsPolicy() const {
return m_insecureRequestsPolicy; } |
(...skipping 47 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
305 String m_disableEvalErrorMessage; | 309 String m_disableEvalErrorMessage; |
306 SecurityContext::InsecureRequestsPolicy m_insecureRequestsPolicy; | 310 SecurityContext::InsecureRequestsPolicy m_insecureRequestsPolicy; |
307 | 311 |
308 Member<CSPSource> m_selfSource; | 312 Member<CSPSource> m_selfSource; |
309 String m_selfProtocol; | 313 String m_selfProtocol; |
310 }; | 314 }; |
311 | 315 |
312 } // namespace blink | 316 } // namespace blink |
313 | 317 |
314 #endif | 318 #endif |
OLD | NEW |