OLD | NEW |
1 /* | 1 /* |
2 * Copyright (C) 2009 Google Inc. All rights reserved. | 2 * Copyright (C) 2009 Google Inc. All rights reserved. |
3 * | 3 * |
4 * Redistribution and use in source and binary forms, with or without | 4 * Redistribution and use in source and binary forms, with or without |
5 * modification, are permitted provided that the following conditions are | 5 * modification, are permitted provided that the following conditions are |
6 * met: | 6 * met: |
7 * | 7 * |
8 * * Redistributions of source code must retain the above copyright | 8 * * Redistributions of source code must retain the above copyright |
9 * notice, this list of conditions and the following disclaimer. | 9 * notice, this list of conditions and the following disclaimer. |
10 * * Redistributions in binary form must reproduce the above | 10 * * Redistributions in binary form must reproduce the above |
(...skipping 233 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
244 virtual void executeScriptInIsolatedWorld( | 244 virtual void executeScriptInIsolatedWorld( |
245 int worldID, const WebScriptSource* sources, unsigned numSources, | 245 int worldID, const WebScriptSource* sources, unsigned numSources, |
246 int extensionGroup) = 0; | 246 int extensionGroup) = 0; |
247 | 247 |
248 // Associates an isolated world (see above for description) with a security | 248 // Associates an isolated world (see above for description) with a security |
249 // origin. XMLHttpRequest instances used in that world will be considered | 249 // origin. XMLHttpRequest instances used in that world will be considered |
250 // to come from that origin, not the frame's. | 250 // to come from that origin, not the frame's. |
251 virtual void setIsolatedWorldSecurityOrigin( | 251 virtual void setIsolatedWorldSecurityOrigin( |
252 int worldID, const WebSecurityOrigin&) = 0; | 252 int worldID, const WebSecurityOrigin&) = 0; |
253 | 253 |
| 254 // Associates an isolated world with human-readable name which is useful for |
| 255 // extension debugging. |
| 256 virtual void setIsolatedWorldHumanReadableName( |
| 257 int worldID, const WebString&) = 0; |
| 258 |
254 // Associates a content security policy with an isolated world. This policy | 259 // Associates a content security policy with an isolated world. This policy |
255 // should be used when evaluating script in the isolated world, and should | 260 // should be used when evaluating script in the isolated world, and should |
256 // also replace a protected resource's CSP when evaluating resources | 261 // also replace a protected resource's CSP when evaluating resources |
257 // injected into the DOM. | 262 // injected into the DOM. |
258 // | 263 // |
259 // FIXME: Setting this simply bypasses the protected resource's CSP. It | 264 // FIXME: Setting this simply bypasses the protected resource's CSP. It |
260 // doesn't yet restrict the isolated world to the provided policy. | 265 // doesn't yet restrict the isolated world to the provided policy. |
261 virtual void setIsolatedWorldContentSecurityPolicy( | 266 virtual void setIsolatedWorldContentSecurityPolicy( |
262 int worldID, const WebString&) = 0; | 267 int worldID, const WebString&) = 0; |
263 | 268 |
(...skipping 396 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
660 // text form. This is used only by layout tests. | 665 // text form. This is used only by layout tests. |
661 virtual WebString layerTreeAsText(bool showDebugInfo = false) const = 0; | 666 virtual WebString layerTreeAsText(bool showDebugInfo = false) const = 0; |
662 | 667 |
663 protected: | 668 protected: |
664 ~WebFrame() { } | 669 ~WebFrame() { } |
665 }; | 670 }; |
666 | 671 |
667 } // namespace WebKit | 672 } // namespace WebKit |
668 | 673 |
669 #endif | 674 #endif |
OLD | NEW |