OLD | NEW |
1 /* | 1 /* |
2 * Copyright (C) 2009 Google Inc. All rights reserved. | 2 * Copyright (C) 2009 Google Inc. All rights reserved. |
3 * | 3 * |
4 * Redistribution and use in source and binary forms, with or without | 4 * Redistribution and use in source and binary forms, with or without |
5 * modification, are permitted provided that the following conditions are | 5 * modification, are permitted provided that the following conditions are |
6 * met: | 6 * met: |
7 * | 7 * |
8 * * Redistributions of source code must retain the above copyright | 8 * * Redistributions of source code must retain the above copyright |
9 * notice, this list of conditions and the following disclaimer. | 9 * notice, this list of conditions and the following disclaimer. |
10 * * Redistributions in binary form must reproduce the above | 10 * * Redistributions in binary form must reproduce the above |
(...skipping 52 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
63 void WebSecurityPolicy::registerURLSchemeAsCORSEnabled(const WebString& scheme) | 63 void WebSecurityPolicy::registerURLSchemeAsCORSEnabled(const WebString& scheme) |
64 { | 64 { |
65 SchemeRegistry::registerURLSchemeAsCORSEnabled(scheme); | 65 SchemeRegistry::registerURLSchemeAsCORSEnabled(scheme); |
66 } | 66 } |
67 | 67 |
68 void WebSecurityPolicy::registerURLSchemeAsBypassingContentSecurityPolicy(const
WebString& scheme) | 68 void WebSecurityPolicy::registerURLSchemeAsBypassingContentSecurityPolicy(const
WebString& scheme) |
69 { | 69 { |
70 SchemeRegistry::registerURLSchemeAsBypassingContentSecurityPolicy(scheme); | 70 SchemeRegistry::registerURLSchemeAsBypassingContentSecurityPolicy(scheme); |
71 } | 71 } |
72 | 72 |
| 73 void WebSecurityPolicy::registerURLSchemeAsBypassingContentSecurityPolicy(const
WebString& scheme, PolicyAreas policyAreas) |
| 74 { |
| 75 SchemeRegistry::registerURLSchemeAsBypassingContentSecurityPolicy(scheme, st
atic_cast<SchemeRegistry::PolicyAreas>(policyAreas)); |
| 76 } |
| 77 |
73 void WebSecurityPolicy::registerURLSchemeAsEmptyDocument(const WebString& scheme
) | 78 void WebSecurityPolicy::registerURLSchemeAsEmptyDocument(const WebString& scheme
) |
74 { | 79 { |
75 SchemeRegistry::registerURLSchemeAsEmptyDocument(scheme); | 80 SchemeRegistry::registerURLSchemeAsEmptyDocument(scheme); |
76 } | 81 } |
77 | 82 |
78 void WebSecurityPolicy::addOriginAccessWhitelistEntry( | 83 void WebSecurityPolicy::addOriginAccessWhitelistEntry( |
79 const WebURL& sourceOrigin, | 84 const WebURL& sourceOrigin, |
80 const WebString& destinationProtocol, | 85 const WebString& destinationProtocol, |
81 const WebString& destinationHost, | 86 const WebString& destinationHost, |
82 bool allowDestinationSubdomains) | 87 bool allowDestinationSubdomains) |
(...skipping 23 matching lines...) Expand all Loading... |
106 { | 111 { |
107 return SecurityPolicy::generateReferrer(static_cast<ReferrerPolicy>(referrer
Policy), url, referrer).referrer; | 112 return SecurityPolicy::generateReferrer(static_cast<ReferrerPolicy>(referrer
Policy), url, referrer).referrer; |
108 } | 113 } |
109 | 114 |
110 void WebSecurityPolicy::registerURLSchemeAsNotAllowingJavascriptURLs(const WebSt
ring& scheme) | 115 void WebSecurityPolicy::registerURLSchemeAsNotAllowingJavascriptURLs(const WebSt
ring& scheme) |
111 { | 116 { |
112 SchemeRegistry::registerURLSchemeAsNotAllowingJavascriptURLs(scheme); | 117 SchemeRegistry::registerURLSchemeAsNotAllowingJavascriptURLs(scheme); |
113 } | 118 } |
114 | 119 |
115 } // namespace blink | 120 } // namespace blink |
OLD | NEW |