Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(455)

Side by Side Diff: third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.h

Issue 2331213002: Add `disposition` to SecurityPolicyViolationEvent (Closed)
Patch Set: Fix a typo in rebased test expectation Created 4 years, 2 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 /* 1 /*
2 * Copyright (C) 2011 Google, Inc. All rights reserved. 2 * Copyright (C) 2011 Google, Inc. All rights reserved.
3 * 3 *
4 * Redistribution and use in source and binary forms, with or without 4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions 5 * modification, are permitted provided that the following conditions
6 * are met: 6 * are met:
7 * 1. Redistributions of source code must retain the above copyright 7 * 1. Redistributions of source code must retain the above copyright
8 * notice, this list of conditions and the following disclaimer. 8 * notice, this list of conditions and the following disclaimer.
9 * 2. Redistributions in binary form must reproduce the above copyright 9 * 2. Redistributions in binary form must reproduce the above copyright
10 * notice, this list of conditions and the following disclaimer in the 10 * notice, this list of conditions and the following disclaimer in the
(...skipping 295 matching lines...) Expand 10 before | Expand all | Expand 10 after
306 // If a frame is passed in, the report will be sent using it as a context. If 306 // If a frame is passed in, the report will be sent using it as a context. If
307 // no frame is passed in, the report will be sent via this object's 307 // no frame is passed in, the report will be sent via this object's
308 // |m_executionContext| (or dropped on the floor if no such context is 308 // |m_executionContext| (or dropped on the floor if no such context is
309 // available). 309 // available).
310 void reportViolation(const String& directiveText, 310 void reportViolation(const String& directiveText,
311 const String& effectiveDirective, 311 const String& effectiveDirective,
312 const String& consoleMessage, 312 const String& consoleMessage,
313 const KURL& blockedURL, 313 const KURL& blockedURL,
314 const Vector<String>& reportEndpoints, 314 const Vector<String>& reportEndpoints,
315 const String& header, 315 const String& header,
316 ContentSecurityPolicyHeaderType,
316 ViolationType, 317 ViolationType,
317 LocalFrame* = nullptr, 318 LocalFrame* = nullptr,
318 RedirectStatus = RedirectStatus::FollowedRedirect, 319 RedirectStatus = RedirectStatus::FollowedRedirect,
319 int contextLine = 0); 320 int contextLine = 0);
320 321
321 // Called when mixed content is detected on a page; will trigger a violation 322 // Called when mixed content is detected on a page; will trigger a violation
322 // report if the 'block-all-mixed-content' directive is specified for a 323 // report if the 'block-all-mixed-content' directive is specified for a
323 // policy. 324 // policy.
324 void reportMixedContent(const KURL& mixedURL, RedirectStatus); 325 void reportMixedContent(const KURL& mixedURL, RedirectStatus);
325 326
(...skipping 69 matching lines...) Expand 10 before | Expand all | Expand 10 after
395 String m_disableEvalErrorMessage; 396 String m_disableEvalErrorMessage;
396 WebInsecureRequestPolicy m_insecureRequestPolicy; 397 WebInsecureRequestPolicy m_insecureRequestPolicy;
397 398
398 Member<CSPSource> m_selfSource; 399 Member<CSPSource> m_selfSource;
399 String m_selfProtocol; 400 String m_selfProtocol;
400 }; 401 };
401 402
402 } // namespace blink 403 } // namespace blink
403 404
404 #endif 405 #endif
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698