Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(317)

Unified Diff: third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.h

Issue 2436003002: CSP: Add 'script-sample' to violation reports. (Closed)
Patch Set: Rebase. Created 3 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.h
diff --git a/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.h b/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.h
index 7e972cc62c636e6730ba9a671235ea76d5825b09..3b2b5c9d3359400dfa5e5c2561f5fea2ec31c434 100644
--- a/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.h
+++ b/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.h
@@ -134,6 +134,7 @@ class CORE_EXPORT ContentSecurityPolicy
// as those checks happen in the middle of the navigation algorithm,
// and we generally don't have access to the responsible element.
bool allowJavaScriptURLs(Element*,
+ const String& source,
const String& contextURL,
const WTF::OrdinalNumber& contextLine,
ReportingStatus = SendReport) const;
@@ -310,7 +311,8 @@ class CORE_EXPORT ContentSecurityPolicy
LocalFrame* = nullptr,
RedirectStatus = RedirectStatus::FollowedRedirect,
int contextLine = 0,
- Element* = nullptr);
+ Element* = nullptr,
+ const String& source = emptyString);
// Called when mixed content is detected on a page; will trigger a violation
// report if the 'block-all-mixed-content' directive is specified for a

Powered by Google App Engine
This is Rietveld 408576698