OLD | NEW |
1 /* | 1 /* |
2 * Copyright (C) 2009 Google Inc. All rights reserved. | 2 * Copyright (C) 2009 Google Inc. All rights reserved. |
3 * | 3 * |
4 * Redistribution and use in source and binary forms, with or without | 4 * Redistribution and use in source and binary forms, with or without |
5 * modification, are permitted provided that the following conditions are | 5 * modification, are permitted provided that the following conditions are |
6 * met: | 6 * met: |
7 * | 7 * |
8 * * Redistributions of source code must retain the above copyright | 8 * * Redistributions of source code must retain the above copyright |
9 * notice, this list of conditions and the following disclaimer. | 9 * notice, this list of conditions and the following disclaimer. |
10 * * Redistributions in binary form must reproduce the above | 10 * * Redistributions in binary form must reproduce the above |
(...skipping 233 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
244 virtual void executeScriptInIsolatedWorld( | 244 virtual void executeScriptInIsolatedWorld( |
245 int worldID, const WebScriptSource* sources, unsigned numSources, | 245 int worldID, const WebScriptSource* sources, unsigned numSources, |
246 int extensionGroup) = 0; | 246 int extensionGroup) = 0; |
247 | 247 |
248 // Associates an isolated world (see above for description) with a security | 248 // Associates an isolated world (see above for description) with a security |
249 // origin. XMLHttpRequest instances used in that world will be considered | 249 // origin. XMLHttpRequest instances used in that world will be considered |
250 // to come from that origin, not the frame's. | 250 // to come from that origin, not the frame's. |
251 virtual void setIsolatedWorldSecurityOrigin( | 251 virtual void setIsolatedWorldSecurityOrigin( |
252 int worldID, const WebSecurityOrigin&) = 0; | 252 int worldID, const WebSecurityOrigin&) = 0; |
253 | 253 |
| 254 // Associates an isolated world with human-readable name which is useful for |
| 255 // extension debugging. |
| 256 virtual void setIsolatedWorldHumanReadableName( |
| 257 int worldID, const WebString&) = 0; |
| 258 |
254 // Associates a content security policy with an isolated world. This policy | 259 // Associates a content security policy with an isolated world. This policy |
255 // should be used when evaluating script in the isolated world, and should | 260 // should be used when evaluating script in the isolated world, and should |
256 // also replace a protected resource's CSP when evaluating resources | 261 // also replace a protected resource's CSP when evaluating resources |
257 // injected into the DOM. | 262 // injected into the DOM. |
258 // | 263 // |
259 // FIXME: Setting this simply bypasses the protected resource's CSP. It | 264 // FIXME: Setting this simply bypasses the protected resource's CSP. It |
260 // doesn't yet restrict the isolated world to the provided policy. | 265 // doesn't yet restrict the isolated world to the provided policy. |
261 virtual void setIsolatedWorldContentSecurityPolicy( | 266 virtual void setIsolatedWorldContentSecurityPolicy( |
262 int worldID, const WebString&) = 0; | 267 int worldID, const WebString&) = 0; |
263 | 268 |
(...skipping 392 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
656 // text form. This is used only by layout tests. | 661 // text form. This is used only by layout tests. |
657 virtual WebString layerTreeAsText(bool showDebugInfo = false) const = 0; | 662 virtual WebString layerTreeAsText(bool showDebugInfo = false) const = 0; |
658 | 663 |
659 protected: | 664 protected: |
660 ~WebFrame() { } | 665 ~WebFrame() { } |
661 }; | 666 }; |
662 | 667 |
663 } // namespace WebKit | 668 } // namespace WebKit |
664 | 669 |
665 #endif | 670 #endif |
OLD | NEW |