Block 'javascript:' navigation in the correct document.
While working through [1], I noticed that Blink blocks 'javascript:' URL
navigation in the _target_ document as opposed to in the _navigating_
document. This is particularly incorrect for `<iframe>`.
This patch corrects the targeting. As a drive-by, this patch also ensures
that we fire a `SecurityPolicyViolationEvent` for all CSP events. Previously,
we fired only _unique_ CSP events. This optimization is meant to reduce
traffic to a server (as completely duplicate reports are ~useless), but
inadvertently blocked DOM events as well. The change to
`ContentSecurityPolicy::reportViolation` fixes that.
[1]:
https://github.com/w3c/webappsec-csp/issues/127
R=jochen@chromium.org
Committed:
https://crrev.com/cab8b9f289ebe22d5e5ad79f6150cf729ef5079c
Cr-Commit-Position: refs/heads/master@{#431539}