Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(156)

Side by Side Diff: third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.h

Issue 2331213002: Add `disposition` to SecurityPolicyViolationEvent (Closed)
Patch Set: Update SecurityPolicyViolationEventInit.idl Created 4 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 /* 1 /*
2 * Copyright (C) 2011 Google, Inc. All rights reserved. 2 * Copyright (C) 2011 Google, Inc. All rights reserved.
3 * 3 *
4 * Redistribution and use in source and binary forms, with or without 4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions 5 * modification, are permitted provided that the following conditions
6 * are met: 6 * are met:
7 * 1. Redistributions of source code must retain the above copyright 7 * 1. Redistributions of source code must retain the above copyright
8 * notice, this list of conditions and the following disclaimer. 8 * notice, this list of conditions and the following disclaimer.
9 * 2. Redistributions in binary form must reproduce the above copyright 9 * 2. Redistributions in binary form must reproduce the above copyright
10 * notice, this list of conditions and the following disclaimer in the 10 * notice, this list of conditions and the following disclaimer in the
(...skipping 233 matching lines...) Expand 10 before | Expand all | Expand 10 after
244 void reportInvalidInReportOnly(const String&); 244 void reportInvalidInReportOnly(const String&);
245 void reportInvalidDirectiveInMeta(const String& directiveName); 245 void reportInvalidDirectiveInMeta(const String& directiveName);
246 void reportInvalidReferrer(const String&); 246 void reportInvalidReferrer(const String&);
247 void reportReportOnlyInMeta(const String&); 247 void reportReportOnlyInMeta(const String&);
248 void reportMetaOutsideHead(const String&); 248 void reportMetaOutsideHead(const String&);
249 void reportValueForEmptyDirective(const String& directiveName, const String& value); 249 void reportValueForEmptyDirective(const String& directiveName, const String& value);
250 250
251 // If a frame is passed in, the report will be sent using it as a context. I f no frame is 251 // If a frame is passed in, the report will be sent using it as a context. I f no frame is
252 // passed in, the report will be sent via this object's |m_executionContext| (or dropped 252 // passed in, the report will be sent via this object's |m_executionContext| (or dropped
253 // on the floor if no such context is available). 253 // on the floor if no such context is available).
254 void reportViolation(const String& directiveText, const String& effectiveDir ective, const String& consoleMessage, const KURL& blockedURL, const Vector<Strin g>& reportEndpoints, const String& header, ViolationType, LocalFrame* = nullptr, RedirectStatus = RedirectStatus::FollowedRedirect, int contextLine = 0); 254 void reportViolation(const String& directiveText, const String& effectiveDir ective, const String& consoleMessage, const KURL& blockedURL, const Vector<Strin g>& reportEndpoints, const String& header, ContentSecurityPolicyHeaderType, Viol ationType, LocalFrame* = nullptr, RedirectStatus = RedirectStatus::FollowedRedir ect, int contextLine = 0);
255 255
256 // Called when mixed content is detected on a page; will trigger a violation report if 256 // Called when mixed content is detected on a page; will trigger a violation report if
257 // the 'block-all-mixed-content' directive is specified for a policy. 257 // the 'block-all-mixed-content' directive is specified for a policy.
258 void reportMixedContent(const KURL& mixedURL, RedirectStatus); 258 void reportMixedContent(const KURL& mixedURL, RedirectStatus);
259 259
260 void reportBlockedScriptExecutionToInspector(const String& directiveText) co nst; 260 void reportBlockedScriptExecutionToInspector(const String& directiveText) co nst;
261 261
262 const KURL url() const; 262 const KURL url() const;
263 void enforceSandboxFlags(SandboxFlags); 263 void enforceSandboxFlags(SandboxFlags);
264 void treatAsPublicAddress(); 264 void treatAsPublicAddress();
(...skipping 58 matching lines...) Expand 10 before | Expand all | Expand 10 after
323 String m_disableEvalErrorMessage; 323 String m_disableEvalErrorMessage;
324 WebInsecureRequestPolicy m_insecureRequestPolicy; 324 WebInsecureRequestPolicy m_insecureRequestPolicy;
325 325
326 Member<CSPSource> m_selfSource; 326 Member<CSPSource> m_selfSource;
327 String m_selfProtocol; 327 String m_selfProtocol;
328 }; 328 };
329 329
330 } // namespace blink 330 } // namespace blink
331 331
332 #endif 332 #endif
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698