| OLD | NEW |
| 1 /* | 1 /* |
| 2 * Copyright (C) 2009 Google Inc. All rights reserved. | 2 * Copyright (C) 2009 Google Inc. All rights reserved. |
| 3 * | 3 * |
| 4 * Redistribution and use in source and binary forms, with or without | 4 * Redistribution and use in source and binary forms, with or without |
| 5 * modification, are permitted provided that the following conditions are | 5 * modification, are permitted provided that the following conditions are |
| 6 * met: | 6 * met: |
| 7 * | 7 * |
| 8 * * Redistributions of source code must retain the above copyright | 8 * * Redistributions of source code must retain the above copyright |
| 9 * notice, this list of conditions and the following disclaimer. | 9 * notice, this list of conditions and the following disclaimer. |
| 10 * * Redistributions in binary form must reproduce the above | 10 * * Redistributions in binary form must reproduce the above |
| (...skipping 269 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 280 // Associates a content security policy with an isolated world. This policy | 280 // Associates a content security policy with an isolated world. This policy |
| 281 // should be used when evaluating script in the isolated world, and should | 281 // should be used when evaluating script in the isolated world, and should |
| 282 // also replace a protected resource's CSP when evaluating resources | 282 // also replace a protected resource's CSP when evaluating resources |
| 283 // injected into the DOM. | 283 // injected into the DOM. |
| 284 // | 284 // |
| 285 // FIXME: Setting this simply bypasses the protected resource's CSP. It | 285 // FIXME: Setting this simply bypasses the protected resource's CSP. It |
| 286 // doesn't yet restrict the isolated world to the provided policy. | 286 // doesn't yet restrict the isolated world to the provided policy. |
| 287 virtual void setIsolatedWorldContentSecurityPolicy( | 287 virtual void setIsolatedWorldContentSecurityPolicy( |
| 288 int worldID, const WebString&) = 0; | 288 int worldID, const WebString&) = 0; |
| 289 | 289 |
| 290 // Associates an isolated world with human-readable name which is useful for |
| 291 // extension debugging. |
| 292 virtual void setIsolatedWorldHumanReadableName( |
| 293 int worldID, const WebString&) = 0; |
| 294 |
| 290 // Logs to the console associated with this frame. | 295 // Logs to the console associated with this frame. |
| 291 virtual void addMessageToConsole(const WebConsoleMessage&) = 0; | 296 virtual void addMessageToConsole(const WebConsoleMessage&) = 0; |
| 292 | 297 |
| 293 // Calls window.gc() if it is defined. | 298 // Calls window.gc() if it is defined. |
| 294 virtual void collectGarbage() = 0; | 299 virtual void collectGarbage() = 0; |
| 295 | 300 |
| 296 // Check if the scripting URL represents a mixed content condition relative | 301 // Check if the scripting URL represents a mixed content condition relative |
| 297 // to this frame. | 302 // to this frame. |
| 298 virtual bool checkIfRunInsecureContent(const WebURL&) const = 0; | 303 virtual bool checkIfRunInsecureContent(const WebURL&) const = 0; |
| 299 | 304 |
| (...skipping 394 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 694 WebPrivateOwnPtr<OpenedFrameTracker> m_openedFrameTracker; | 699 WebPrivateOwnPtr<OpenedFrameTracker> m_openedFrameTracker; |
| 695 }; | 700 }; |
| 696 | 701 |
| 697 #if BLINK_IMPLEMENTATION | 702 #if BLINK_IMPLEMENTATION |
| 698 Frame* toCoreFrame(const WebFrame*); | 703 Frame* toCoreFrame(const WebFrame*); |
| 699 #endif | 704 #endif |
| 700 | 705 |
| 701 } // namespace blink | 706 } // namespace blink |
| 702 | 707 |
| 703 #endif | 708 #endif |
| OLD | NEW |