Index: third_party/WebKit/Source/core/dom/ScriptLoader.cpp |
diff --git a/third_party/WebKit/Source/core/dom/ScriptLoader.cpp b/third_party/WebKit/Source/core/dom/ScriptLoader.cpp |
index 9b2b21cf6d0836b52f9addbcf3a64d77d82464b6..a8337a8df390e92e0f5c4ad23955a52e56086473 100644 |
--- a/third_party/WebKit/Source/core/dom/ScriptLoader.cpp |
+++ b/third_party/WebKit/Source/core/dom/ScriptLoader.cpp |
@@ -300,19 +300,15 @@ bool ScriptLoader::fetchScript(const String& sourceUrl, FetchRequest::DeferOptio |
request.setCrossOriginAccessControl(elementDocument->getSecurityOrigin(), crossOrigin); |
request.setCharset(scriptCharset()); |
- // Skip fetch-related CSP checks if the script element has a valid nonce, or if dynamically |
- // injected script is whitelisted and this script is not parser-inserted. |
+ // Skip fetch-related CSP checks if dynamically injected script is whitelisted and this script is not parser-inserted. |
bool scriptPassesCSPDynamic = (!isParserInserted() && elementDocument->contentSecurityPolicy()->allowDynamic()); |
- bool scriptPassesCSPNonce = elementDocument->contentSecurityPolicy()->allowScriptWithNonce(m_element->fastGetAttribute(HTMLNames::nonceAttr)); |
- if (scriptPassesCSPDynamic) |
- UseCounter::count(elementDocument->frame(), UseCounter::ScriptPassesCSPDynamic); |
- |
- if (scriptPassesCSPNonce) |
- UseCounter::count(elementDocument->frame(), UseCounter::ScriptPassesCSPNonce); |
+ request.setContentSecurityPolicyNonce(m_element->fastGetAttribute(HTMLNames::nonceAttr)); |
- if (scriptPassesCSPDynamic || scriptPassesCSPNonce) |
+ if (scriptPassesCSPDynamic) { |
+ UseCounter::count(elementDocument->frame(), UseCounter::ScriptPassesCSPDynamic); |
request.setContentSecurityCheck(DoNotCheckContentSecurityPolicy); |
+ } |
request.setDefer(defer); |
String integrityAttr = m_element->fastGetAttribute(HTMLNames::integrityAttr); |
@@ -375,11 +371,10 @@ bool ScriptLoader::executeScript(const ScriptSourceCode& sourceCode, double* com |
const ContentSecurityPolicy* csp = elementDocument->contentSecurityPolicy(); |
bool shouldBypassMainWorldCSP = (frame && frame->script().shouldBypassMainWorldCSP()) |
- || csp->allowScriptWithNonce(m_element->fastGetAttribute(HTMLNames::nonceAttr)) |
|| csp->allowScriptWithHash(sourceCode.source().toString(), ContentSecurityPolicy::InlineType::Block) |
|| (!isParserInserted() && csp->allowDynamic()); |
- if (!m_isExternalScript && (!shouldBypassMainWorldCSP && !csp->allowInlineScript(elementDocument->url(), m_startLineNumber, sourceCode.source().toString()))) { |
+ if (!m_isExternalScript && (!shouldBypassMainWorldCSP && !csp->allowInlineScript(elementDocument->url(), m_element->fastGetAttribute(HTMLNames::nonceAttr), m_startLineNumber, sourceCode.source().toString()))) { |
return false; |
} |