Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(628)

Side by Side Diff: content/browser/frame_host/frame_tree_node.h

Issue 2190183002: Forward CSP violation reporting from RenderFrameProxy to RenderFrameImpl. Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Sanitize report endpoints from IPC against actual CSP contents. Created 4 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « no previous file | content/browser/frame_host/frame_tree_node.cc » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright 2013 The Chromium Authors. All rights reserved. 1 // Copyright 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #ifndef CONTENT_BROWSER_FRAME_HOST_FRAME_TREE_NODE_H_ 5 #ifndef CONTENT_BROWSER_FRAME_HOST_FRAME_TREE_NODE_H_
6 #define CONTENT_BROWSER_FRAME_HOST_FRAME_TREE_NODE_H_ 6 #define CONTENT_BROWSER_FRAME_HOST_FRAME_TREE_NODE_H_
7 7
8 #include <stddef.h> 8 #include <stddef.h>
9 9
10 #include <memory> 10 #include <memory>
(...skipping 139 matching lines...) Expand 10 before | Expand all | Expand 10 after
150 void SetFrameName(const std::string& name, const std::string& unique_name); 150 void SetFrameName(const std::string& name, const std::string& unique_name);
151 151
152 // Add CSP header to replication state and notify proxies about the update. 152 // Add CSP header to replication state and notify proxies about the update.
153 void AddContentSecurityPolicy(const ContentSecurityPolicyHeader& header); 153 void AddContentSecurityPolicy(const ContentSecurityPolicyHeader& header);
154 154
155 // Discards previous CSP headers and notifies proxies about the update. 155 // Discards previous CSP headers and notifies proxies about the update.
156 // Typically invoked after committing navigation to a new document (since the 156 // Typically invoked after committing navigation to a new document (since the
157 // new document comes with a fresh set of CSP http headers). 157 // new document comes with a fresh set of CSP http headers).
158 void ResetContentSecurityPolicy(); 158 void ResetContentSecurityPolicy();
159 159
160 // Checks if the current Content Security Policy contains
161 // |header_value_to_find|.
162 bool ContainsContentSecurityPolicyHeader(
163 const std::string& header_value_to_find);
164
160 // Sets the current insecure request policy, and notifies proxies about the 165 // Sets the current insecure request policy, and notifies proxies about the
161 // update. 166 // update.
162 void SetInsecureRequestPolicy(blink::WebInsecureRequestPolicy policy); 167 void SetInsecureRequestPolicy(blink::WebInsecureRequestPolicy policy);
163 168
164 // Returns the currently active sandbox flags for this frame. This includes 169 // Returns the currently active sandbox flags for this frame. This includes
165 // flags inherited from parent frames and the currently active flags from the 170 // flags inherited from parent frames and the currently active flags from the
166 // <iframe> element hosting this frame. This does not include flags that 171 // <iframe> element hosting this frame. This does not include flags that
167 // have been updated in an <iframe> element but have not taken effect yet; 172 // have been updated in an <iframe> element but have not taken effect yet;
168 // use pending_sandbox_flags() for those. 173 // use pending_sandbox_flags() for those.
169 blink::WebSandboxFlags effective_sandbox_flags() const { 174 blink::WebSandboxFlags effective_sandbox_flags() const {
(...skipping 201 matching lines...) Expand 10 before | Expand all | Expand 10 after
371 // browser process activities to this node (when possible). It is unrelated 376 // browser process activities to this node (when possible). It is unrelated
372 // to the core logic of FrameTreeNode. 377 // to the core logic of FrameTreeNode.
373 FrameTreeNodeBlameContext blame_context_; 378 FrameTreeNodeBlameContext blame_context_;
374 379
375 DISALLOW_COPY_AND_ASSIGN(FrameTreeNode); 380 DISALLOW_COPY_AND_ASSIGN(FrameTreeNode);
376 }; 381 };
377 382
378 } // namespace content 383 } // namespace content
379 384
380 #endif // CONTENT_BROWSER_FRAME_HOST_FRAME_TREE_NODE_H_ 385 #endif // CONTENT_BROWSER_FRAME_HOST_FRAME_TREE_NODE_H_
OLDNEW
« no previous file with comments | « no previous file | content/browser/frame_host/frame_tree_node.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698