1
    2
    3
    4
    5
    6
    7
    8
    9
   10
   11
   12
   13
   14
   15
   16
   17
   18
   19
   20
   21
   22
   23
   24
   25
   26
   27
   28
   29
   30
   31
   32
   33
   34
   35
   36
   37
   38
   39
   40
   41
   42

content / browser / renderer_host / render_frame_host_csp_context.h [blame]

// Copyright 2021 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.

#ifndef CONTENT_BROWSER_RENDERER_HOST_RENDER_FRAME_HOST_CSP_CONTEXT_H_
#define CONTENT_BROWSER_RENDERER_HOST_RENDER_FRAME_HOST_CSP_CONTEXT_H_

#include "base/memory/raw_ptr.h"
#include "content/common/content_export.h"
#include "services/network/public/cpp/content_security_policy/csp_context.h"

class GURL;

namespace content {

class RenderFrameHostImpl;

// RenderFrameHostCSPContext is a network::CSPContext that reports Content
// Security Policy violations through the mojo connection between a
// RenderFrameHostImpl and its corresponding LocalFrame.
class CONTENT_EXPORT RenderFrameHostCSPContext : public network::CSPContext {
 public:
  // Construct a new RenderFrameHostCSPContext reporting CSP violations through
  // `render_frame_host`. The parameter `render_frame_host` can be null, in
  // which case this won't report any violations.
  explicit RenderFrameHostCSPContext(RenderFrameHostImpl* render_frame_host);

  // network::CSPContext
  void ReportContentSecurityPolicyViolation(
      network::mojom::CSPViolationPtr violation_params) override;
  void SanitizeDataForUseInCspViolation(
      network::mojom::CSPDirectiveName directive,
      GURL* blocked_url,
      network::mojom::SourceLocation* source_location) const override;

 private:
  raw_ptr<RenderFrameHostImpl> render_frame_host_;
};

}  // namespace content

#endif  // CONTENT_BROWSER_RENDERER_HOST_RENDER_FRAME_HOST_CSP_CONTEXT_H_