Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(478)

Side by Side Diff: third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.h

Issue 2436003002: CSP: Add 'script-sample' to violation reports. (Closed)
Patch Set: Rebase. Created 3 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 /* 1 /*
2 * Copyright (C) 2011 Google, Inc. All rights reserved. 2 * Copyright (C) 2011 Google, Inc. All rights reserved.
3 * 3 *
4 * Redistribution and use in source and binary forms, with or without 4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions 5 * modification, are permitted provided that the following conditions
6 * are met: 6 * are met:
7 * 1. Redistributions of source code must retain the above copyright 7 * 1. Redistributions of source code must retain the above copyright
8 * notice, this list of conditions and the following disclaimer. 8 * notice, this list of conditions and the following disclaimer.
9 * 2. Redistributions in binary form must reproduce the above copyright 9 * 2. Redistributions in binary form must reproduce the above copyright
10 * notice, this list of conditions and the following disclaimer in the 10 * notice, this list of conditions and the following disclaimer in the
(...skipping 116 matching lines...) Expand 10 before | Expand all | Expand 10 after
127 ContentSecurityPolicyHeaderType, 127 ContentSecurityPolicyHeaderType,
128 ContentSecurityPolicyHeaderSource); 128 ContentSecurityPolicyHeaderSource);
129 void reportAccumulatedHeaders(FrameLoaderClient*) const; 129 void reportAccumulatedHeaders(FrameLoaderClient*) const;
130 130
131 std::unique_ptr<Vector<CSPHeaderAndType>> headers() const; 131 std::unique_ptr<Vector<CSPHeaderAndType>> headers() const;
132 132
133 // |element| will not be present for navigations to javascript URLs, 133 // |element| will not be present for navigations to javascript URLs,
134 // as those checks happen in the middle of the navigation algorithm, 134 // as those checks happen in the middle of the navigation algorithm,
135 // and we generally don't have access to the responsible element. 135 // and we generally don't have access to the responsible element.
136 bool allowJavaScriptURLs(Element*, 136 bool allowJavaScriptURLs(Element*,
137 const String& source,
137 const String& contextURL, 138 const String& contextURL,
138 const WTF::OrdinalNumber& contextLine, 139 const WTF::OrdinalNumber& contextLine,
139 ReportingStatus = SendReport) const; 140 ReportingStatus = SendReport) const;
140 141
141 // |element| will be present almost all of the time, but because of 142 // |element| will be present almost all of the time, but because of
142 // strangeness around targeting handlers for '<body>', '<svg>', and 143 // strangeness around targeting handlers for '<body>', '<svg>', and
143 // '<frameset>', it will be 'nullptr' for handlers on those 144 // '<frameset>', it will be 'nullptr' for handlers on those
144 // elements. 145 // elements.
145 bool allowInlineEventHandler(Element*, 146 bool allowInlineEventHandler(Element*,
146 const String& source, 147 const String& source,
(...skipping 156 matching lines...) Expand 10 before | Expand all | Expand 10 after
303 const DirectiveType& effectiveType, 304 const DirectiveType& effectiveType,
304 const String& consoleMessage, 305 const String& consoleMessage,
305 const KURL& blockedURL, 306 const KURL& blockedURL,
306 const Vector<String>& reportEndpoints, 307 const Vector<String>& reportEndpoints,
307 const String& header, 308 const String& header,
308 ContentSecurityPolicyHeaderType, 309 ContentSecurityPolicyHeaderType,
309 ViolationType, 310 ViolationType,
310 LocalFrame* = nullptr, 311 LocalFrame* = nullptr,
311 RedirectStatus = RedirectStatus::FollowedRedirect, 312 RedirectStatus = RedirectStatus::FollowedRedirect,
312 int contextLine = 0, 313 int contextLine = 0,
313 Element* = nullptr); 314 Element* = nullptr,
315 const String& source = emptyString);
314 316
315 // Called when mixed content is detected on a page; will trigger a violation 317 // Called when mixed content is detected on a page; will trigger a violation
316 // report if the 'block-all-mixed-content' directive is specified for a 318 // report if the 'block-all-mixed-content' directive is specified for a
317 // policy. 319 // policy.
318 void reportMixedContent(const KURL& mixedURL, RedirectStatus); 320 void reportMixedContent(const KURL& mixedURL, RedirectStatus);
319 321
320 void reportBlockedScriptExecutionToInspector( 322 void reportBlockedScriptExecutionToInspector(
321 const String& directiveText) const; 323 const String& directiveText) const;
322 324
323 const KURL url() const; 325 const KURL url() const;
(...skipping 85 matching lines...) Expand 10 before | Expand all | Expand 10 after
409 String m_disableEvalErrorMessage; 411 String m_disableEvalErrorMessage;
410 WebInsecureRequestPolicy m_insecureRequestPolicy; 412 WebInsecureRequestPolicy m_insecureRequestPolicy;
411 413
412 Member<CSPSource> m_selfSource; 414 Member<CSPSource> m_selfSource;
413 String m_selfProtocol; 415 String m_selfProtocol;
414 }; 416 };
415 417
416 } // namespace blink 418 } // namespace blink
417 419
418 #endif 420 #endif
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698