| Index: third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.cpp
|
| diff --git a/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.cpp b/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.cpp
|
| index 52ef1de51c2fae117ff77b156b302897ead5674c..3450842fac3544204dfeca9de285b948907f0f3b 100644
|
| --- a/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.cpp
|
| +++ b/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.cpp
|
| @@ -92,9 +92,9 @@ const char ContentSecurityPolicy::FormAction[] = "form-action";
|
| const char ContentSecurityPolicy::FrameAncestors[] = "frame-ancestors";
|
| const char ContentSecurityPolicy::PluginTypes[] = "plugin-types";
|
|
|
| -// CSP Editor's Draft:
|
| -// https://w3c.github.io/webappsec/specs/content-security-policy
|
| +// CSP Level 3 Directives
|
| const char ContentSecurityPolicy::ManifestSrc[] = "manifest-src";
|
| +const char ContentSecurityPolicy::WorkerSrc[] = "worker-src";
|
|
|
| // Mixed Content Directive
|
| // https://w3c.github.io/webappsec/specs/mixedcontent/#strict-mode
|
| @@ -125,6 +125,7 @@ bool ContentSecurityPolicy::isDirectiveName(const String& name) {
|
| equalIgnoringCase(name, FrameAncestors) ||
|
| equalIgnoringCase(name, PluginTypes) ||
|
| equalIgnoringCase(name, ManifestSrc) ||
|
| + equalIgnoringCase(name, WorkerSrc) ||
|
| equalIgnoringCase(name, BlockAllMixedContent) ||
|
| equalIgnoringCase(name, UpgradeInsecureRequests) ||
|
| equalIgnoringCase(name, TreatAsPublicAddress) ||
|
| @@ -844,7 +845,7 @@ bool ContentSecurityPolicy::allowRequest(
|
| return allowFormAction(url, redirectStatus, reportingStatus);
|
| case WebURLRequest::RequestContextFrame:
|
| case WebURLRequest::RequestContextIframe:
|
| - return allowChildFrameFromSource(url, redirectStatus, reportingStatus);
|
| + return allowFrameFromSource(url, redirectStatus, reportingStatus);
|
| case WebURLRequest::RequestContextImport:
|
| case WebURLRequest::RequestContextScript:
|
| return allowScriptFromSource(url, nonce, parserDisposition,
|
| @@ -892,11 +893,11 @@ bool ContentSecurityPolicy::allowObjectFromSource(
|
| m_policies, url, redirectStatus, reportingStatus);
|
| }
|
|
|
| -bool ContentSecurityPolicy::allowChildFrameFromSource(
|
| +bool ContentSecurityPolicy::allowFrameFromSource(
|
| const KURL& url,
|
| RedirectStatus redirectStatus,
|
| ContentSecurityPolicy::ReportingStatus reportingStatus) const {
|
| - return isAllowedByAll<&CSPDirectiveList::allowChildFrameFromSource>(
|
| + return isAllowedByAll<&CSPDirectiveList::allowFrameFromSource>(
|
| m_policies, url, redirectStatus, reportingStatus);
|
| }
|
|
|
| @@ -971,7 +972,7 @@ bool ContentSecurityPolicy::allowWorkerContextFromSource(
|
| // impact of this backwards-incompatible change.
|
| if (Document* document = this->document()) {
|
| UseCounter::count(*document, UseCounter::WorkerSubjectToCSP);
|
| - if (isAllowedByAll<&CSPDirectiveList::allowChildContextFromSource>(
|
| + if (isAllowedByAll<&CSPDirectiveList::allowWorkerFromSource>(
|
| m_policies, url, redirectStatus, SuppressReport) &&
|
| !isAllowedByAll<&CSPDirectiveList::allowScriptFromSource>(
|
| m_policies, url, AtomicString(), NotParserInserted, redirectStatus,
|
| @@ -981,7 +982,7 @@ bool ContentSecurityPolicy::allowWorkerContextFromSource(
|
| }
|
| }
|
|
|
| - return isAllowedByAll<&CSPDirectiveList::allowChildContextFromSource>(
|
| + return isAllowedByAll<&CSPDirectiveList::allowWorkerFromSource>(
|
| m_policies, url, redirectStatus, reportingStatus);
|
| }
|
|
|
|
|