| Index: third_party/WebKit/Source/core/dom/SecurityContext.h
|
| diff --git a/third_party/WebKit/Source/core/dom/SecurityContext.h b/third_party/WebKit/Source/core/dom/SecurityContext.h
|
| index c15a4edb2782dfc3f696b6e0fa95ea7bb0375806..1693b3578fb3e0b31fb047b21142dc2b10e35643 100644
|
| --- a/third_party/WebKit/Source/core/dom/SecurityContext.h
|
| +++ b/third_party/WebKit/Source/core/dom/SecurityContext.h
|
| @@ -67,7 +67,7 @@ public:
|
| void setSecurityOrigin(PassRefPtr<SecurityOrigin>);
|
| virtual void didUpdateSecurityOrigin() = 0;
|
|
|
| - SandboxFlags sandboxFlags() const { return m_sandboxFlags; }
|
| + SandboxFlags getSandboxFlags() const { return m_sandboxFlags; }
|
| bool isSandboxed(SandboxFlags mask) const { return m_sandboxFlags & mask; }
|
| void enforceSandboxFlags(SandboxFlags mask);
|
|
|
| @@ -75,7 +75,7 @@ public:
|
| bool isHostedInReservedIPRange() const { return m_hostedInReservedIPRange; }
|
|
|
| void setInsecureRequestsPolicy(InsecureRequestsPolicy policy) { m_insecureRequestsPolicy = policy; }
|
| - InsecureRequestsPolicy insecureRequestsPolicy() const { return m_insecureRequestsPolicy; }
|
| + InsecureRequestsPolicy getInsecureRequestsPolicy() const { return m_insecureRequestsPolicy; }
|
|
|
| void addInsecureNavigationUpgrade(unsigned hashedHost) { m_insecureNavigationsToUpgrade.add(hashedHost); }
|
| InsecureNavigationsSet* insecureNavigationsToUpgrade() { return &m_insecureNavigationsToUpgrade; }
|
|
|