1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
content / browser / renderer_host / render_frame_host_csp_context.h [blame]
// Copyright 2021 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef CONTENT_BROWSER_RENDERER_HOST_RENDER_FRAME_HOST_CSP_CONTEXT_H_
#define CONTENT_BROWSER_RENDERER_HOST_RENDER_FRAME_HOST_CSP_CONTEXT_H_
#include "base/memory/raw_ptr.h"
#include "content/common/content_export.h"
#include "services/network/public/cpp/content_security_policy/csp_context.h"
class GURL;
namespace content {
class RenderFrameHostImpl;
// RenderFrameHostCSPContext is a network::CSPContext that reports Content
// Security Policy violations through the mojo connection between a
// RenderFrameHostImpl and its corresponding LocalFrame.
class CONTENT_EXPORT RenderFrameHostCSPContext : public network::CSPContext {
public:
// Construct a new RenderFrameHostCSPContext reporting CSP violations through
// `render_frame_host`. The parameter `render_frame_host` can be null, in
// which case this won't report any violations.
explicit RenderFrameHostCSPContext(RenderFrameHostImpl* render_frame_host);
// network::CSPContext
void ReportContentSecurityPolicyViolation(
network::mojom::CSPViolationPtr violation_params) override;
void SanitizeDataForUseInCspViolation(
network::mojom::CSPDirectiveName directive,
GURL* blocked_url,
network::mojom::SourceLocation* source_location) const override;
private:
raw_ptr<RenderFrameHostImpl> render_frame_host_;
};
} // namespace content
#endif // CONTENT_BROWSER_RENDERER_HOST_RENDER_FRAME_HOST_CSP_CONTEXT_H_