Index: content/public/browser/child_process_security_policy.h |
diff --git a/content/public/browser/child_process_security_policy.h b/content/public/browser/child_process_security_policy.h |
index f2dea9ed31db732cccc90dcb1bcf32a778419811..1bbe218dc6009e3b36b09fde7c7cd9113e8506c7 100644 |
--- a/content/public/browser/child_process_security_policy.h |
+++ b/content/public/browser/child_process_security_policy.h |
@@ -199,6 +199,15 @@ class ChildProcessSecurityPolicy { |
// Does not affect cookies attached to or set by network requests. |
// Only might return false if the --site-per-process flag is used. |
virtual bool CanAccessDataForOrigin(int child_id, const GURL& gurl) = 0; |
+ |
+ // Returns true if GrantOrigin was called earlier with the same parameters. |
+ // |
+ // TODO(alexmos): This currently exists to support checking whether a |
+ // <webview> guest process has permission to request blob URLs in its |
+ // embedder's origin on the IO thread. This should be removed once that |
+ // check is superseded by a UI thread check. See https://crbug.com/656752. |
+ virtual bool HasSpecificPermissionForOrigin(int child_id, |
+ const url::Origin& origin) = 0; |
}; |
} // namespace content |