Chromium Code Reviews| Index: content/common/content_security_policy/csp_context.h |
| diff --git a/content/common/content_security_policy/csp_context.h b/content/common/content_security_policy/csp_context.h |
| index cc5f3b50873a7a62ce363cf3cf9f14f74ce28827..54cd947c3de0e28367b3e8ec4ffb64a888e261d9 100644 |
| --- a/content/common/content_security_policy/csp_context.h |
| +++ b/content/common/content_security_policy/csp_context.h |
| @@ -55,6 +55,11 @@ class CONTENT_EXPORT CSPContext { |
| virtual bool SchemeShouldBypassCSP(const base::StringPiece& scheme); |
| + // For security reasons, some urls must not be disclosed in console error |
| + // messages, source location and reports. When this function returns false, |
|
alexmos
2017/05/10 22:33:08
Note: using those URLs in console error messages i
arthursonzogni
2017/05/11 13:06:23
Yes, using those URLs will be fine as soon as we w
|
| + // only the url's origin is displayed instead. |
|
alexmos
2017/05/10 22:33:08
This latter part doesn't apply to SourceLocation,
arthursonzogni
2017/05/11 13:06:23
source_location is used in console message and in
|
| + virtual bool IsOriginSafeToUseInCspViolation(const url::Origin& origin) const; |
| + |
| private: |
| bool has_self_ = false; |
| std::string self_scheme_; |