OLD | NEW |
1 /* | 1 /* |
2 * Copyright (C) 2009 Google Inc. All rights reserved. | 2 * Copyright (C) 2009 Google Inc. All rights reserved. |
3 * | 3 * |
4 * Redistribution and use in source and binary forms, with or without | 4 * Redistribution and use in source and binary forms, with or without |
5 * modification, are permitted provided that the following conditions are | 5 * modification, are permitted provided that the following conditions are |
6 * met: | 6 * met: |
7 * | 7 * |
8 * * Redistributions of source code must retain the above copyright | 8 * * Redistributions of source code must retain the above copyright |
9 * notice, this list of conditions and the following disclaimer. | 9 * notice, this list of conditions and the following disclaimer. |
10 * * Redistributions in binary form must reproduce the above | 10 * * Redistributions in binary form must reproduce the above |
(...skipping 120 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
131 void WebSecurityPolicy::resetOriginAccessWhitelists() | 131 void WebSecurityPolicy::resetOriginAccessWhitelists() |
132 { | 132 { |
133 SecurityPolicy::resetOriginAccessWhitelists(); | 133 SecurityPolicy::resetOriginAccessWhitelists(); |
134 } | 134 } |
135 | 135 |
136 void WebSecurityPolicy::addOriginTrustworthyWhiteList(const WebSecurityOrigin& o
rigin) | 136 void WebSecurityPolicy::addOriginTrustworthyWhiteList(const WebSecurityOrigin& o
rigin) |
137 { | 137 { |
138 SecurityPolicy::addOriginTrustworthyWhiteList(origin); | 138 SecurityPolicy::addOriginTrustworthyWhiteList(origin); |
139 } | 139 } |
140 | 140 |
| 141 void WebSecurityPolicy::addSchemeToBypassSecureContextWhitelist(const WebString&
scheme) |
| 142 { |
| 143 SchemeRegistry::registerURLSchemeBypassingSecureContextCheck(scheme); |
| 144 } |
| 145 |
141 WebString WebSecurityPolicy::generateReferrerHeader(WebReferrerPolicy referrerPo
licy, const WebURL& url, const WebString& referrer) | 146 WebString WebSecurityPolicy::generateReferrerHeader(WebReferrerPolicy referrerPo
licy, const WebURL& url, const WebString& referrer) |
142 { | 147 { |
143 return SecurityPolicy::generateReferrer(static_cast<ReferrerPolicy>(referrer
Policy), url, referrer).referrer; | 148 return SecurityPolicy::generateReferrer(static_cast<ReferrerPolicy>(referrer
Policy), url, referrer).referrer; |
144 } | 149 } |
145 | 150 |
146 void WebSecurityPolicy::registerURLSchemeAsNotAllowingJavascriptURLs(const WebSt
ring& scheme) | 151 void WebSecurityPolicy::registerURLSchemeAsNotAllowingJavascriptURLs(const WebSt
ring& scheme) |
147 { | 152 { |
148 SchemeRegistry::registerURLSchemeAsNotAllowingJavascriptURLs(scheme); | 153 SchemeRegistry::registerURLSchemeAsNotAllowingJavascriptURLs(scheme); |
149 } | 154 } |
150 | 155 |
151 } // namespace blink | 156 } // namespace blink |
OLD | NEW |