| OLD | NEW |
| 1 /* | 1 /* |
| 2 * Copyright (C) 2009 Google Inc. All rights reserved. | 2 * Copyright (C) 2009 Google Inc. All rights reserved. |
| 3 * | 3 * |
| 4 * Redistribution and use in source and binary forms, with or without | 4 * Redistribution and use in source and binary forms, with or without |
| 5 * modification, are permitted provided that the following conditions are | 5 * modification, are permitted provided that the following conditions are |
| 6 * met: | 6 * met: |
| 7 * | 7 * |
| 8 * * Redistributions of source code must retain the above copyright | 8 * * Redistributions of source code must retain the above copyright |
| 9 * notice, this list of conditions and the following disclaimer. | 9 * notice, this list of conditions and the following disclaimer. |
| 10 * * Redistributions in binary form must reproduce the above | 10 * * Redistributions in binary form must reproduce the above |
| (...skipping 233 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 244 virtual void executeScriptInIsolatedWorld( | 244 virtual void executeScriptInIsolatedWorld( |
| 245 int worldID, const WebScriptSource* sources, unsigned numSources, | 245 int worldID, const WebScriptSource* sources, unsigned numSources, |
| 246 int extensionGroup) = 0; | 246 int extensionGroup) = 0; |
| 247 | 247 |
| 248 // Associates an isolated world (see above for description) with a security | 248 // Associates an isolated world (see above for description) with a security |
| 249 // origin. XMLHttpRequest instances used in that world will be considered | 249 // origin. XMLHttpRequest instances used in that world will be considered |
| 250 // to come from that origin, not the frame's. | 250 // to come from that origin, not the frame's. |
| 251 virtual void setIsolatedWorldSecurityOrigin( | 251 virtual void setIsolatedWorldSecurityOrigin( |
| 252 int worldID, const WebSecurityOrigin&) = 0; | 252 int worldID, const WebSecurityOrigin&) = 0; |
| 253 | 253 |
| 254 // Associates an isolated world with human-readable name which is useful for |
| 255 // extension debugging. |
| 256 virtual void setIsolatedWorldHumanReadableName( |
| 257 int worldID, const WebString&) = 0; |
| 258 |
| 254 // Associates a content security policy with an isolated world. This policy | 259 // Associates a content security policy with an isolated world. This policy |
| 255 // should be used when evaluating script in the isolated world, and should | 260 // should be used when evaluating script in the isolated world, and should |
| 256 // also replace a protected resource's CSP when evaluating resources | 261 // also replace a protected resource's CSP when evaluating resources |
| 257 // injected into the DOM. | 262 // injected into the DOM. |
| 258 // | 263 // |
| 259 // FIXME: Setting this simply bypasses the protected resource's CSP. It | 264 // FIXME: Setting this simply bypasses the protected resource's CSP. It |
| 260 // doesn't yet restrict the isolated world to the provided policy. | 265 // doesn't yet restrict the isolated world to the provided policy. |
| 261 virtual void setIsolatedWorldContentSecurityPolicy( | 266 virtual void setIsolatedWorldContentSecurityPolicy( |
| 262 int worldID, const WebString&) = 0; | 267 int worldID, const WebString&) = 0; |
| 263 | 268 |
| (...skipping 392 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 656 // text form. This is used only by layout tests. | 661 // text form. This is used only by layout tests. |
| 657 virtual WebString layerTreeAsText(bool showDebugInfo = false) const = 0; | 662 virtual WebString layerTreeAsText(bool showDebugInfo = false) const = 0; |
| 658 | 663 |
| 659 protected: | 664 protected: |
| 660 ~WebFrame() { } | 665 ~WebFrame() { } |
| 661 }; | 666 }; |
| 662 | 667 |
| 663 } // namespace WebKit | 668 } // namespace WebKit |
| 664 | 669 |
| 665 #endif | 670 #endif |
| OLD | NEW |