diff options
author | hackademix | 2018-09-08 14:36:47 +0200 |
---|---|---|
committer | hackademix | 2018-09-08 14:36:47 +0200 |
commit | 746655c885023bba91caffaad73aaab298b0da76 (patch) | |
tree | ae208850df3cd795a2f40c4c3b6baec2d8523ec2 | |
parent | 28c9a50b17eaf0991e7a2dea2e04942632dc2823 (diff) | |
download | noscript-746655c885023bba91caffaad73aaab298b0da76.tar.gz noscript-746655c885023bba91caffaad73aaab298b0da76.tar.xz noscript-746655c885023bba91caffaad73aaab298b0da76.zip |
Fixed regression: undefined fake request.url ends to for inline scripts CSP reports.
-rw-r--r-- | src/bg/RequestGuard.js | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/src/bg/RequestGuard.js b/src/bg/RequestGuard.js index e507806..299e1a3 100644 --- a/src/bg/RequestGuard.js +++ b/src/bg/RequestGuard.js @@ -394,7 +394,7 @@ var RequestGuard = (() => { let blockedURI = report['blocked-uri']; if (blockedURI && blockedURI !== 'self') { let r = fakeRequestFromCSP(report, request); - if (r.url === 'inline') r.url = request.documentURI; + if (r.url === 'inline') r.url = request.documentUrl; Content.reportTo(r, false, policyTypesMap[r.type]); TabStatus.record(r, "blocked"); } else if (report["violated-directive"] === "script-src" && /; script-src 'none'/.test(report["original-policy"])) { |