diff options
Diffstat (limited to 'Source/WebCore/page/SecurityOrigin.h')
-rw-r--r-- | Source/WebCore/page/SecurityOrigin.h | 7 |
1 files changed, 7 insertions, 0 deletions
diff --git a/Source/WebCore/page/SecurityOrigin.h b/Source/WebCore/page/SecurityOrigin.h index 8572f4ce4..980fcfffb 100644 --- a/Source/WebCore/page/SecurityOrigin.h +++ b/Source/WebCore/page/SecurityOrigin.h @@ -139,6 +139,11 @@ public: // WARNING: This is an extremely powerful ability. Use with caution! void grantUniversalAccess(); + // Explicitly deny the ability to issue cross origin requests. + // + void denyCrossOriginRequests(); + bool allowsCrossOriginRequests() const { return !m_deniedCORS; } + void setStorageBlockingPolicy(StorageBlockingPolicy policy) { m_storageBlockingPolicy = policy; } #if ENABLE(CACHE_PARTITIONING) @@ -173,6 +178,7 @@ public: // FIXME 81578: The naming of this is confusing. Files with restricted access to other local files // still can have other privileges that can be remembered, thereby not making them unique. void enforceFilePathSeparation(); + bool enforcesFilePathSeparation() const { return m_enforceFilePathSeparation; } // Convert this SecurityOrigin into a string. The string // representation of a SecurityOrigin is similar to a URL, except it @@ -231,6 +237,7 @@ private: StorageBlockingPolicy m_storageBlockingPolicy; bool m_enforceFilePathSeparation; bool m_needsDatabaseIdentifierQuirkForFiles; + bool m_deniedCORS; }; } // namespace WebCore |