| OLD | NEW |
| 1 /* | 1 /* |
| 2 * Copyright (C) 2011 Google, Inc. All rights reserved. | 2 * Copyright (C) 2011 Google, Inc. All rights reserved. |
| 3 * | 3 * |
| 4 * Redistribution and use in source and binary forms, with or without | 4 * Redistribution and use in source and binary forms, with or without |
| 5 * modification, are permitted provided that the following conditions | 5 * modification, are permitted provided that the following conditions |
| 6 * are met: | 6 * are met: |
| 7 * 1. Redistributions of source code must retain the above copyright | 7 * 1. Redistributions of source code must retain the above copyright |
| 8 * notice, this list of conditions and the following disclaimer. | 8 * notice, this list of conditions and the following disclaimer. |
| 9 * 2. Redistributions in binary form must reproduce the above copyright | 9 * 2. Redistributions in binary form must reproduce the above copyright |
| 10 * notice, this list of conditions and the following disclaimer in the | 10 * notice, this list of conditions and the following disclaimer in the |
| (...skipping 227 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 238 void reportInvalidReferrer(const String&); | 238 void reportInvalidReferrer(const String&); |
| 239 void reportReportOnlyInMeta(const String&); | 239 void reportReportOnlyInMeta(const String&); |
| 240 void reportMetaOutsideHead(const String&); | 240 void reportMetaOutsideHead(const String&); |
| 241 void reportValueForEmptyDirective(const String& directiveName, const String&
value); | 241 void reportValueForEmptyDirective(const String& directiveName, const String&
value); |
| 242 | 242 |
| 243 // If a frame is passed in, the report will be sent using it as a context. I
f no frame is | 243 // If a frame is passed in, the report will be sent using it as a context. I
f no frame is |
| 244 // passed in, the report will be sent via this object's |m_executionContext|
(or dropped | 244 // passed in, the report will be sent via this object's |m_executionContext|
(or dropped |
| 245 // on the floor if no such context is available). | 245 // on the floor if no such context is available). |
| 246 void reportViolation(const String& directiveText, const String& effectiveDir
ective, const String& consoleMessage, const KURL& blockedURL, const Vector<Strin
g>& reportEndpoints, const String& header, ViolationType, LocalFrame* = nullptr)
; | 246 void reportViolation(const String& directiveText, const String& effectiveDir
ective, const String& consoleMessage, const KURL& blockedURL, const Vector<Strin
g>& reportEndpoints, const String& header, ViolationType, LocalFrame* = nullptr)
; |
| 247 | 247 |
| 248 // Called when mixed content is detected on a page; will trigger a violation
report if |
| 249 // the 'block-all-mixed-content' directive is specified for a policy. |
| 250 void reportMixedContent(const KURL& mixedURL); |
| 251 |
| 248 void reportBlockedScriptExecutionToInspector(const String& directiveText) co
nst; | 252 void reportBlockedScriptExecutionToInspector(const String& directiveText) co
nst; |
| 249 | 253 |
| 250 const KURL url() const; | 254 const KURL url() const; |
| 251 void enforceSandboxFlags(SandboxFlags); | 255 void enforceSandboxFlags(SandboxFlags); |
| 252 void enforceStrictMixedContentChecking(); | 256 void enforceStrictMixedContentChecking(); |
| 253 void treatAsPublicAddress(); | 257 void treatAsPublicAddress(); |
| 254 String evalDisabledErrorMessage() const; | 258 String evalDisabledErrorMessage() const; |
| 255 | 259 |
| 256 void setInsecureRequestsPolicy(SecurityContext::InsecureRequestsPolicy); | 260 void setInsecureRequestsPolicy(SecurityContext::InsecureRequestsPolicy); |
| 257 SecurityContext::InsecureRequestsPolicy getInsecureRequestsPolicy() const {
return m_insecureRequestsPolicy; } | 261 SecurityContext::InsecureRequestsPolicy getInsecureRequestsPolicy() const {
return m_insecureRequestsPolicy; } |
| (...skipping 47 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 305 String m_disableEvalErrorMessage; | 309 String m_disableEvalErrorMessage; |
| 306 SecurityContext::InsecureRequestsPolicy m_insecureRequestsPolicy; | 310 SecurityContext::InsecureRequestsPolicy m_insecureRequestsPolicy; |
| 307 | 311 |
| 308 Member<CSPSource> m_selfSource; | 312 Member<CSPSource> m_selfSource; |
| 309 String m_selfProtocol; | 313 String m_selfProtocol; |
| 310 }; | 314 }; |
| 311 | 315 |
| 312 } // namespace blink | 316 } // namespace blink |
| 313 | 317 |
| 314 #endif | 318 #endif |
| OLD | NEW |