Index: third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.cpp |
diff --git a/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.cpp b/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.cpp |
index 925546b53822ddbfdba803f1470e2e7f3270c286..45a274056be1cfd24fb2b7ad848dd124e8c9e181 100644 |
--- a/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.cpp |
+++ b/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.cpp |
@@ -796,7 +796,7 @@ static String stripURLForUseInReport(Document* document, const KURL& url, Redire |
return SecurityOrigin::create(url)->toString(); |
} |
-static void gatherSecurityPolicyViolationEventData(SecurityPolicyViolationEventInit& init, Document* document, const String& directiveText, const String& effectiveDirective, const KURL& blockedURL, const String& header, RedirectStatus redirectStatus) |
+static void gatherSecurityPolicyViolationEventData(SecurityPolicyViolationEventInit& init, Document* document, const String& directiveText, const String& effectiveDirective, const KURL& blockedURL, const String& header, RedirectStatus redirectStatus, ContentSecurityPolicy::ViolationType violationType, int contextLine) |
{ |
if (equalIgnoringCase(effectiveDirective, ContentSecurityPolicy::FrameAncestors)) { |
// If this load was blocked via 'frame-ancestors', then the URL of |document| has not yet |
@@ -806,14 +806,24 @@ static void gatherSecurityPolicyViolationEventData(SecurityPolicyViolationEventI |
init.setBlockedURI(blockedURL.getString()); |
} else { |
init.setDocumentURI(document->url().getString()); |
- init.setBlockedURI(stripURLForUseInReport(document, blockedURL, redirectStatus)); |
+ switch (violationType) { |
+ case ContentSecurityPolicy::InlineViolation: |
+ init.setBlockedURI("inline"); |
+ break; |
+ case ContentSecurityPolicy::EvalViolation: |
+ init.setBlockedURI("eval"); |
+ break; |
+ case ContentSecurityPolicy::URLViolation: |
+ init.setBlockedURI(stripURLForUseInReport(document, blockedURL, redirectStatus)); |
+ break; |
+ } |
} |
init.setReferrer(document->referrer()); |
init.setViolatedDirective(directiveText); |
init.setEffectiveDirective(effectiveDirective); |
init.setOriginalPolicy(header); |
init.setSourceFile(String()); |
- init.setLineNumber(0); |
+ init.setLineNumber(contextLine); |
init.setColumnNumber(0); |
init.setStatusCode(0); |
@@ -829,7 +839,7 @@ static void gatherSecurityPolicyViolationEventData(SecurityPolicyViolationEventI |
} |
} |
-void ContentSecurityPolicy::reportViolation(const String& directiveText, const String& effectiveDirective, const String& consoleMessage, const KURL& blockedURL, const Vector<String>& reportEndpoints, const String& header, ViolationType violationType, LocalFrame* contextFrame, RedirectStatus redirectStatus) |
+void ContentSecurityPolicy::reportViolation(const String& directiveText, const String& effectiveDirective, const String& consoleMessage, const KURL& blockedURL, const Vector<String>& reportEndpoints, const String& header, ViolationType violationType, LocalFrame* contextFrame, RedirectStatus redirectStatus, int contextLine) |
{ |
ASSERT(violationType == URLViolation || blockedURL.isEmpty()); |
@@ -854,7 +864,7 @@ void ContentSecurityPolicy::reportViolation(const String& directiveText, const S |
return; |
SecurityPolicyViolationEventInit violationData; |
- gatherSecurityPolicyViolationEventData(violationData, document, directiveText, effectiveDirective, blockedURL, header, redirectStatus); |
+ gatherSecurityPolicyViolationEventData(violationData, document, directiveText, effectiveDirective, blockedURL, header, redirectStatus, violationType, contextLine); |
frame->localDOMWindow()->enqueueDocumentEvent(SecurityPolicyViolationEvent::create(EventTypeNames::securitypolicyviolation, violationData)); |
@@ -884,17 +894,7 @@ void ContentSecurityPolicy::reportViolation(const String& directiveText, const S |
cspReport->setString("violated-directive", violationData.violatedDirective()); |
cspReport->setString("effective-directive", violationData.effectiveDirective()); |
cspReport->setString("original-policy", violationData.originalPolicy()); |
- switch (violationType) { |
- case InlineViolation: |
- cspReport->setString("blocked-uri", "inline"); |
- break; |
- case EvalViolation: |
- cspReport->setString("blocked-uri", "eval"); |
- break; |
- case URLViolation: |
- cspReport->setString("blocked-uri", violationData.blockedURI()); |
- break; |
- } |
+ cspReport->setString("blocked-uri", violationData.blockedURI()); |
if (!violationData.sourceFile().isEmpty() && violationData.lineNumber()) { |
cspReport->setString("source-file", violationData.sourceFile()); |
cspReport->setNumber("line-number", violationData.lineNumber()); |