OLD | NEW |
1 /* | 1 /* |
2 * Copyright (C) 2009 Google Inc. All rights reserved. | 2 * Copyright (C) 2009 Google Inc. All rights reserved. |
3 * | 3 * |
4 * Redistribution and use in source and binary forms, with or without | 4 * Redistribution and use in source and binary forms, with or without |
5 * modification, are permitted provided that the following conditions are | 5 * modification, are permitted provided that the following conditions are |
6 * met: | 6 * met: |
7 * | 7 * |
8 * * Redistributions of source code must retain the above copyright | 8 * * Redistributions of source code must retain the above copyright |
9 * notice, this list of conditions and the following disclaimer. | 9 * notice, this list of conditions and the following disclaimer. |
10 * * Redistributions in binary form must reproduce the above | 10 * * Redistributions in binary form must reproduce the above |
(...skipping 269 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
280 // Associates a content security policy with an isolated world. This policy | 280 // Associates a content security policy with an isolated world. This policy |
281 // should be used when evaluating script in the isolated world, and should | 281 // should be used when evaluating script in the isolated world, and should |
282 // also replace a protected resource's CSP when evaluating resources | 282 // also replace a protected resource's CSP when evaluating resources |
283 // injected into the DOM. | 283 // injected into the DOM. |
284 // | 284 // |
285 // FIXME: Setting this simply bypasses the protected resource's CSP. It | 285 // FIXME: Setting this simply bypasses the protected resource's CSP. It |
286 // doesn't yet restrict the isolated world to the provided policy. | 286 // doesn't yet restrict the isolated world to the provided policy. |
287 virtual void setIsolatedWorldContentSecurityPolicy( | 287 virtual void setIsolatedWorldContentSecurityPolicy( |
288 int worldID, const WebString&) = 0; | 288 int worldID, const WebString&) = 0; |
289 | 289 |
| 290 // Associates an isolated world with human-readable name which is useful for |
| 291 // extension debugging. |
| 292 virtual void setIsolatedWorldHumanReadableName( |
| 293 int worldID, const WebString&) = 0; |
| 294 |
290 // Logs to the console associated with this frame. | 295 // Logs to the console associated with this frame. |
291 virtual void addMessageToConsole(const WebConsoleMessage&) = 0; | 296 virtual void addMessageToConsole(const WebConsoleMessage&) = 0; |
292 | 297 |
293 // Calls window.gc() if it is defined. | 298 // Calls window.gc() if it is defined. |
294 virtual void collectGarbage() = 0; | 299 virtual void collectGarbage() = 0; |
295 | 300 |
296 // Check if the scripting URL represents a mixed content condition relative | 301 // Check if the scripting URL represents a mixed content condition relative |
297 // to this frame. | 302 // to this frame. |
298 virtual bool checkIfRunInsecureContent(const WebURL&) const = 0; | 303 virtual bool checkIfRunInsecureContent(const WebURL&) const = 0; |
299 | 304 |
(...skipping 394 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
694 WebPrivateOwnPtr<OpenedFrameTracker> m_openedFrameTracker; | 699 WebPrivateOwnPtr<OpenedFrameTracker> m_openedFrameTracker; |
695 }; | 700 }; |
696 | 701 |
697 #if BLINK_IMPLEMENTATION | 702 #if BLINK_IMPLEMENTATION |
698 Frame* toCoreFrame(const WebFrame*); | 703 Frame* toCoreFrame(const WebFrame*); |
699 #endif | 704 #endif |
700 | 705 |
701 } // namespace blink | 706 } // namespace blink |
702 | 707 |
703 #endif | 708 #endif |
OLD | NEW |