Chromium Code Reviews| Index: content/common/content_security_policy/csp_context.h |
| diff --git a/content/common/content_security_policy/csp_context.h b/content/common/content_security_policy/csp_context.h |
| index cc5f3b50873a7a62ce363cf3cf9f14f74ce28827..0eaae78aabca9546c337bb344fd93180685b31c1 100644 |
| --- a/content/common/content_security_policy/csp_context.h |
| +++ b/content/common/content_security_policy/csp_context.h |
| @@ -55,6 +55,17 @@ class CONTENT_EXPORT CSPContext { |
| virtual bool SchemeShouldBypassCSP(const base::StringPiece& scheme); |
| + // For security reasons, some urls must not be disclosed. It includes the |
|
alexmos
2017/05/12 01:37:20
nit: disclosed -> disclosed cross-origin in violat
arthursonzogni
2017/05/15 12:20:46
Done.
|
| + // blocked url and the url of the initiator of the navigation. These |
| + // informations are potentially transmitted between different renderer |
|
alexmos
2017/05/12 01:37:20
nit: These informations are -> This information is
arthursonzogni
2017/05/15 12:20:46
Done.
|
| + // processes. When this function returns true, only the url's origin is |
| + // displayed instead. |
| + // TODO(arthursonzogni): Stop hidding sensitive parts of URLs in console |
|
alexmos
2017/05/12 01:37:20
nit: s/hidding/hiding/
arthursonzogni
2017/05/15 12:20:46
Done.
|
| + // error message as soon as there is a way to send it to the devtool process |
|
alexmos
2017/05/12 01:37:20
nit: s/message/messages/
s/devtool/devtools/
arthursonzogni
2017/05/15 12:20:46
Done.
|
| + // without the round trip in the renderer process. |
| + // See https://crbug.com/721329 |
| + virtual bool ShouldProtectDataInCspViolation(const url::Origin& origin) const; |
| + |
| private: |
| bool has_self_ = false; |
| std::string self_scheme_; |