| Index: content/common/content_security_policy/csp_context.h
|
| diff --git a/content/common/content_security_policy/csp_context.h b/content/common/content_security_policy/csp_context.h
|
| index cc5f3b50873a7a62ce363cf3cf9f14f74ce28827..4cf89b92001ff51ed3ec4abfb00a510eefb0e662 100644
|
| --- a/content/common/content_security_policy/csp_context.h
|
| +++ b/content/common/content_security_policy/csp_context.h
|
| @@ -55,6 +55,20 @@ class CONTENT_EXPORT CSPContext {
|
|
|
| virtual bool SchemeShouldBypassCSP(const base::StringPiece& scheme);
|
|
|
| + // For security reasons, some urls must not be disclosed cross-origin in
|
| + // violation reports. This includes the blocked url and the url of the
|
| + // initiator of the navigation. This information is potentially transmitted
|
| + // between different renderer processes.
|
| + // TODO(arthursonzogni): Stop hiding sensitive parts of URLs in console error
|
| + // messages as soon as there is a way to send them to the devtools process
|
| + // without the round trip in the renderer process.
|
| + // See https://crbug.com/721329
|
| + virtual void SanitizeDataForUseInCspViolation(
|
| + bool is_redirect,
|
| + CSPDirective::Name directive,
|
| + GURL* blocked_url,
|
| + SourceLocation* source_location) const;
|
| +
|
| private:
|
| bool has_self_ = false;
|
| std::string self_scheme_;
|
|
|