| Index: third_party/WebKit/Source/core/loader/HttpEquiv.cpp
|
| diff --git a/third_party/WebKit/Source/core/loader/HttpEquiv.cpp b/third_party/WebKit/Source/core/loader/HttpEquiv.cpp
|
| index 1298ad21930590876aa0166d7c10894f646ed60e..822ce8849e9131da44c31b72dfbbf151a947cd64 100644
|
| --- a/third_party/WebKit/Source/core/loader/HttpEquiv.cpp
|
| +++ b/third_party/WebKit/Source/core/loader/HttpEquiv.cpp
|
| @@ -4,6 +4,7 @@
|
|
|
| #include "core/loader/HttpEquiv.h"
|
|
|
| +#include "bindings/core/v8/SourceLocation.h"
|
| #include "core/dom/Document.h"
|
| #include "core/dom/ScriptableDocumentParser.h"
|
| #include "core/dom/StyleEngine.h"
|
| @@ -35,7 +36,7 @@ void HttpEquiv::process(Document& document, const AtomicString& equiv, const Ato
|
| } else if (equalIgnoringCase(equiv, "x-dns-prefetch-control")) {
|
| document.parseDNSPrefetchControlHeader(content);
|
| } else if (equalIgnoringCase(equiv, "x-frame-options")) {
|
| - document.addConsoleMessage(ConsoleMessage::create(SecurityMessageSource, ErrorMessageLevel, "X-Frame-Options may only be set via an HTTP header sent along with a document. It may not be set inside <meta>."));
|
| + document.addConsoleMessage(ConsoleMessage::create(SecurityMessageSource, ErrorMessageLevel, "X-Frame-Options may only be set via an HTTP header sent along with a document. It may not be set inside <meta>.", SourceLocation::capture(&document)));
|
| } else if (equalIgnoringCase(equiv, "accept-ch")) {
|
| processHttpEquivAcceptCH(document, content);
|
| } else if (equalIgnoringCase(equiv, "content-security-policy") || equalIgnoringCase(equiv, "content-security-policy-report-only")) {
|
| @@ -44,7 +45,7 @@ void HttpEquiv::process(Document& document, const AtomicString& equiv, const Ato
|
| else
|
| document.contentSecurityPolicy()->reportMetaOutsideHead(content);
|
| } else if (equalIgnoringCase(equiv, "suborigin")) {
|
| - document.addConsoleMessage(ConsoleMessage::create(SecurityMessageSource, ErrorMessageLevel, "Error with Suborigin header: Suborigin header with value '" + content + "' was delivered via a <meta> element and not an HTTP header, which is disallowed. The Suborigin has been ignored."));
|
| + document.addConsoleMessage(ConsoleMessage::create(SecurityMessageSource, ErrorMessageLevel, "Error with Suborigin header: Suborigin header with value '" + content + "' was delivered via a <meta> element and not an HTTP header, which is disallowed. The Suborigin has been ignored.", SourceLocation::capture(&document)));
|
| } else if (equalIgnoringCase(equiv, HTTPNames::Origin_Trial)) {
|
| if (inDocumentHeadElement)
|
| OriginTrialContext::from(&document)->addToken(content);
|
|
|