Index: Source/core/frame/csp/ContentSecurityPolicy.cpp |
diff --git a/Source/core/frame/csp/ContentSecurityPolicy.cpp b/Source/core/frame/csp/ContentSecurityPolicy.cpp |
index f2fbc59696ce3d0305a178bd968d690a8b42d883..741126a0cbeb0c57a93b73c09a376e507a1bfd87 100644 |
--- a/Source/core/frame/csp/ContentSecurityPolicy.cpp |
+++ b/Source/core/frame/csp/ContentSecurityPolicy.cpp |
@@ -130,8 +130,8 @@ static ReferrerPolicy mergeReferrerPolicies(ReferrerPolicy a, ReferrerPolicy b) |
return a; |
} |
-ContentSecurityPolicy::ContentSecurityPolicy(ExecutionContextClient* client) |
- : m_client(client) |
+ContentSecurityPolicy::ContentSecurityPolicy(ExecutionContext* executionContext) |
+ : m_executionContext(executionContext) |
, m_overrideInlineStyleAllowed(false) |
, m_scriptHashAlgorithmsUsed(ContentSecurityPolicyHashAlgorithmNone) |
, m_styleHashAlgorithmsUsed(ContentSecurityPolicyHashAlgorithmNone) |
@@ -198,7 +198,7 @@ void ContentSecurityPolicy::addPolicyFromHeaderValue(const String& header, Conte |
// We disable 'eval()' even in the case of report-only policies, and rely on the check in the V8Initializer::codeGenerationCheckCallbackInMainThread callback to determine whether the call should execute or not. |
if (!policy->allowEval(0, SuppressReport)) |
- m_client->disableEval(policy->evalDisabledErrorMessage()); |
+ m_executionContext->disableEval(policy->evalDisabledErrorMessage()); |
m_policies.append(policy.release()); |
@@ -474,8 +474,8 @@ bool ContentSecurityPolicy::allowChildContextFromSource(const KURL& url, Content |
bool ContentSecurityPolicy::allowWorkerContextFromSource(const KURL& url, ContentSecurityPolicy::ReportingStatus reportingStatus) const |
{ |
// CSP 1.1 moves workers from 'script-src' to the new 'child-src'. Measure the impact of this backwards-incompatible change. |
- if (m_client->isDocument()) { |
- Document* document = static_cast<Document*>(m_client); |
+ if (m_executionContext->isDocument()) { |
+ Document* document = static_cast<Document*>(m_executionContext); |
UseCounter::count(*document, UseCounter::WorkerSubjectToCSP); |
if (isAllowedByAllWithURL<&CSPDirectiveList::allowChildContextFromSource>(m_policies, url, SuppressReport) && !isAllowedByAllWithURL<&CSPDirectiveList::allowScriptFromSource>(m_policies, url, SuppressReport)) |
UseCounter::count(*document, UseCounter::WorkerAllowedByChildBlockedByScript); |
@@ -527,17 +527,17 @@ bool ContentSecurityPolicy::didSetReferrerPolicy() const |
SecurityOrigin* ContentSecurityPolicy::securityOrigin() const |
{ |
- return m_client->securityContext().securityOrigin(); |
+ return m_executionContext->securityContext().securityOrigin(); |
} |
const KURL ContentSecurityPolicy::url() const |
{ |
- return m_client->contextURL(); |
+ return m_executionContext->contextURL(); |
} |
KURL ContentSecurityPolicy::completeURL(const String& url) const |
{ |
- return m_client->contextCompleteURL(url); |
+ return m_executionContext->contextCompleteURL(url); |
} |
void ContentSecurityPolicy::enforceSandboxFlags(SandboxFlags mask) const |
@@ -588,7 +588,7 @@ static void gatherSecurityPolicyViolationEventData(SecurityPolicyViolationEventI |
void ContentSecurityPolicy::reportViolation(const String& directiveText, const String& effectiveDirective, const String& consoleMessage, const KURL& blockedURL, const Vector<KURL>& reportURIs, const String& header) |
{ |
// FIXME: Support sending reports from worker. |
- if (!m_client->isDocument()) |
+ if (!m_executionContext->isDocument()) |
return; |
Document* document = this->document(); |
@@ -749,12 +749,12 @@ void ContentSecurityPolicy::reportMissingReportURI(const String& policy) const |
void ContentSecurityPolicy::logToConsole(const String& message) const |
{ |
- m_client->addConsoleMessage(SecurityMessageSource, ErrorMessageLevel, message); |
+ m_executionContext->addConsoleMessage(SecurityMessageSource, ErrorMessageLevel, message); |
} |
void ContentSecurityPolicy::reportBlockedScriptExecutionToInspector(const String& directiveText) const |
{ |
- m_client->reportBlockedScriptExecutionToInspector(directiveText); |
+ m_executionContext->reportBlockedScriptExecutionToInspector(directiveText); |
} |
bool ContentSecurityPolicy::experimentalFeaturesEnabled() const |