Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(559)

Issue 553423002: CSP: Use a specified frame for reporting 'frame-ancestors' violations. (Closed)

Created:
6 years, 3 months ago by Mike West
Modified:
6 years, 3 months ago
CC:
blink-reviews, Nate Chapin, gavinp+loader_chromium.org
Project:
blink
Visibility:
Public.

Description

CSP: Use a specified frame for reporting 'frame-ancestors' violations. We don't have an ExecutionContext when dealing with 'frame-ancestors' violations. This patch uses the LocalFrame which we pass into allowAncestors in order to provide hooks for both PingLoader and ConsoleMessages. It also fiddles a bit with the reporting data, as we'd otherwise suggest that 'about:blank' failed to load (as that's the initial contents of a frame before we navigate to a document). BUG=412725 Committed: https://src.chromium.org/viewvc/blink?view=rev&revision=181910

Patch Set 1 #

Total comments: 4

Patch Set 2 : Feedback, tests, and rebase. #

Unified diffs Side-by-side diffs Delta from patch set Stats (+68 lines, -25 lines) Patch
M LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-nested-cross-in-cross-none-block-expected.txt View 1 1 chunk +1 line, -0 lines 0 comments Download
M LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-nested-cross-in-cross-self-block-expected.txt View 1 1 chunk +1 line, -0 lines 0 comments Download
M LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-nested-cross-in-cross-url-block-expected.txt View 1 1 chunk +1 line, -0 lines 0 comments Download
M LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-nested-cross-in-same-none-block-expected.txt View 1 1 chunk +1 line, -0 lines 0 comments Download
M LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-nested-cross-in-same-self-block-expected.txt View 1 1 chunk +1 line, -0 lines 0 comments Download
M LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-nested-cross-in-same-url-block-expected.txt View 1 1 chunk +1 line, -0 lines 0 comments Download
M LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-nested-same-in-cross-none-block-expected.txt View 1 1 chunk +1 line, -0 lines 0 comments Download
M LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-nested-same-in-cross-self-block-expected.txt View 1 1 chunk +1 line, -0 lines 0 comments Download
M LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-nested-same-in-cross-url-block-expected.txt View 1 1 chunk +1 line, -0 lines 0 comments Download
M LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-nested-same-in-same-none-block-expected.txt View 1 1 chunk +1 line, -0 lines 0 comments Download
M LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-nested-same-in-same-url-block-expected.txt View 1 1 chunk +1 line, -0 lines 0 comments Download
M LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-none-block-expected.txt View 1 1 chunk +1 line, -0 lines 0 comments Download
M LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-self-block-expected.txt View 1 1 chunk +1 line, -0 lines 0 comments Download
M LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-url-block-expected.txt View 1 1 chunk +1 line, -0 lines 0 comments Download
M Source/core/frame/csp/CSPDirectiveList.h View 3 chunks +3 lines, -2 lines 0 comments Download
M Source/core/frame/csp/CSPDirectiveList.cpp View 3 chunks +11 lines, -4 lines 0 comments Download
M Source/core/frame/csp/ContentSecurityPolicy.h View 1 3 chunks +9 lines, -3 lines 0 comments Download
M Source/core/frame/csp/ContentSecurityPolicy.cpp View 1 6 chunks +30 lines, -15 lines 0 comments Download
M Source/core/loader/DocumentLoader.cpp View 1 1 chunk +1 line, -1 line 0 comments Download

Messages

Total messages: 11 (5 generated)
Mike West
This depends on a few other CLs, I'll throw it to the bots when they ...
6 years, 3 months ago (2014-09-10 11:50:56 UTC) #2
philipj_slow
This was simple enough, LGTM with nits. I don't have the experience with CSP to ...
6 years, 3 months ago (2014-09-12 08:35:46 UTC) #3
Mike West
I've added ASSERTs which verify that we _either_ have a contextFrame _or_ an ExecutionContext, but ...
6 years, 3 months ago (2014-09-12 11:27:27 UTC) #4
commit-bot: I haz the power
CQ is trying da patch. Follow status at https://chromium-cq-status.appspot.com/patchset/553423002/20001
6 years, 3 months ago (2014-09-12 11:30:38 UTC) #6
commit-bot: I haz the power
CQ is trying da patch. Follow status at https://chromium-cq-status.appspot.com/patchset/553423002/20001
6 years, 3 months ago (2014-09-12 15:13:35 UTC) #10
commit-bot: I haz the power
6 years, 3 months ago (2014-09-12 15:14:19 UTC) #11
Message was sent while issue was closed.
Committed patchset #2 (id:20001) as 181910

Powered by Google App Engine
This is Rietveld 408576698