-
ggaren@apple.com authored
https://bugs.webkit.org/show_bug.cgi?id=112999 Reviewed by Maciej Stachowiak. This setting is useful for clients that want protection from script injection attacks. ../WebCore: * page/Settings.h: (Settings): Clarified which clients should call canExecuteScripts(). * page/Settings.in: Added the new setting. ../WebKit2: * Shared/WebPreferencesStore.h: * UIProcess/API/C/WKPreferences.cpp: (WKPreferencesGetJavaScriptMarkupEnabled): (WKPreferencesSetJavaScriptMarkupEnabled): (WKPreferencesGetJavaScriptEnabled): * UIProcess/API/C/WKPreferences.h: * UIProcess/API/mac/WKBrowsingContextGroup.mm: (-[WKBrowsingContextGroup allowsJavaScriptMarkup]): (-[WKBrowsingContextGroup setAllowsJavaScriptMarkup:]): * WebProcess/InjectedBundle/InjectedBundle.cpp: (WebKit::InjectedBundle::overrideBoolPreferenceForTestRunner): * WebProcess/WebPage/WebPage.cpp: (WebKit::WebPage::updatePreferences): Plumbed through to API. git-svn-id: http://svn.webkit.org/repository/webkit/trunk@146664 268f45cc-cd09-0410-ab3c-d52691b4dbfc
aaeb65ec