| Index: Source/core/dom/SecurityContext.h
|
| diff --git a/Source/core/dom/SecurityContext.h b/Source/core/dom/SecurityContext.h
|
| index c76178da4937932319c770f577fe147894eccd51..e5c2e4ec593fa6c8c3cef357e7a522973eed0eb2 100644
|
| --- a/Source/core/dom/SecurityContext.h
|
| +++ b/Source/core/dom/SecurityContext.h
|
| @@ -27,6 +27,7 @@
|
| #ifndef SecurityContext_h
|
| #define SecurityContext_h
|
|
|
| +#include "core/dom/SandboxFlags.h"
|
| #include "wtf/PassRefPtr.h"
|
| #include "wtf/RefPtr.h"
|
| #include "wtf/text/WTFString.h"
|
| @@ -48,6 +49,11 @@ public:
|
| // Note: It is dangerous to change the security origin of a script context
|
| // that already contains content.
|
| void setSecurityOrigin(PassRefPtr<SecurityOrigin>);
|
| + virtual void didUpdateSecurityOrigin() = 0;
|
| +
|
| + SandboxFlags sandboxFlags() const { return m_sandboxFlags; }
|
| + bool isSandboxed(SandboxFlags mask) const { return m_sandboxFlags & mask; }
|
| + void enforceSandboxFlags(SandboxFlags mask);
|
|
|
| protected:
|
| SecurityContext();
|
| @@ -62,6 +68,8 @@ private:
|
| bool m_haveInitializedSecurityOrigin;
|
| RefPtr<SecurityOrigin> m_securityOrigin;
|
| RefPtr<ContentSecurityPolicy> m_contentSecurityPolicy;
|
| +
|
| + SandboxFlags m_sandboxFlags;
|
| };
|
|
|
| } // namespace blink
|
|
|