Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(204)

Side by Side Diff: Source/web/WebSecurityPolicy.cpp

Issue 730203007: CSP: Permit exempting schemes only for certain policy areas. (Closed) Base URL: svn://svn.chromium.org/blink/trunk
Patch Set: add ASSERT(policyAreas != PolicyAreaNone) Created 6 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 /* 1 /*
2 * Copyright (C) 2009 Google Inc. All rights reserved. 2 * Copyright (C) 2009 Google Inc. All rights reserved.
3 * 3 *
4 * Redistribution and use in source and binary forms, with or without 4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions are 5 * modification, are permitted provided that the following conditions are
6 * met: 6 * met:
7 * 7 *
8 * * Redistributions of source code must retain the above copyright 8 * * Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer. 9 * notice, this list of conditions and the following disclaimer.
10 * * Redistributions in binary form must reproduce the above 10 * * Redistributions in binary form must reproduce the above
(...skipping 52 matching lines...) Expand 10 before | Expand all | Expand 10 after
63 void WebSecurityPolicy::registerURLSchemeAsCORSEnabled(const WebString& scheme) 63 void WebSecurityPolicy::registerURLSchemeAsCORSEnabled(const WebString& scheme)
64 { 64 {
65 SchemeRegistry::registerURLSchemeAsCORSEnabled(scheme); 65 SchemeRegistry::registerURLSchemeAsCORSEnabled(scheme);
66 } 66 }
67 67
68 void WebSecurityPolicy::registerURLSchemeAsBypassingContentSecurityPolicy(const WebString& scheme) 68 void WebSecurityPolicy::registerURLSchemeAsBypassingContentSecurityPolicy(const WebString& scheme)
69 { 69 {
70 SchemeRegistry::registerURLSchemeAsBypassingContentSecurityPolicy(scheme); 70 SchemeRegistry::registerURLSchemeAsBypassingContentSecurityPolicy(scheme);
71 } 71 }
72 72
73 void WebSecurityPolicy::registerURLSchemeAsBypassingContentSecurityPolicy(const WebString& scheme, PolicyAreas policyAreas)
74 {
75 SchemeRegistry::registerURLSchemeAsBypassingContentSecurityPolicy(scheme, st atic_cast<SchemeRegistry::PolicyAreas>(policyAreas));
76 }
77
73 void WebSecurityPolicy::registerURLSchemeAsEmptyDocument(const WebString& scheme ) 78 void WebSecurityPolicy::registerURLSchemeAsEmptyDocument(const WebString& scheme )
74 { 79 {
75 SchemeRegistry::registerURLSchemeAsEmptyDocument(scheme); 80 SchemeRegistry::registerURLSchemeAsEmptyDocument(scheme);
76 } 81 }
77 82
78 void WebSecurityPolicy::addOriginAccessWhitelistEntry( 83 void WebSecurityPolicy::addOriginAccessWhitelistEntry(
79 const WebURL& sourceOrigin, 84 const WebURL& sourceOrigin,
80 const WebString& destinationProtocol, 85 const WebString& destinationProtocol,
81 const WebString& destinationHost, 86 const WebString& destinationHost,
82 bool allowDestinationSubdomains) 87 bool allowDestinationSubdomains)
(...skipping 23 matching lines...) Expand all
106 { 111 {
107 return SecurityPolicy::generateReferrer(static_cast<ReferrerPolicy>(referrer Policy), url, referrer).referrer; 112 return SecurityPolicy::generateReferrer(static_cast<ReferrerPolicy>(referrer Policy), url, referrer).referrer;
108 } 113 }
109 114
110 void WebSecurityPolicy::registerURLSchemeAsNotAllowingJavascriptURLs(const WebSt ring& scheme) 115 void WebSecurityPolicy::registerURLSchemeAsNotAllowingJavascriptURLs(const WebSt ring& scheme)
111 { 116 {
112 SchemeRegistry::registerURLSchemeAsNotAllowingJavascriptURLs(scheme); 117 SchemeRegistry::registerURLSchemeAsNotAllowingJavascriptURLs(scheme);
113 } 118 }
114 119
115 } // namespace blink 120 } // namespace blink
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698