Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 /* | 1 /* |
| 2 * Copyright (C) 2009 Google Inc. All rights reserved. | 2 * Copyright (C) 2009 Google Inc. All rights reserved. |
| 3 * | 3 * |
| 4 * Redistribution and use in source and binary forms, with or without | 4 * Redistribution and use in source and binary forms, with or without |
| 5 * modification, are permitted provided that the following conditions are | 5 * modification, are permitted provided that the following conditions are |
| 6 * met: | 6 * met: |
| 7 * | 7 * |
| 8 * * Redistributions of source code must retain the above copyright | 8 * * Redistributions of source code must retain the above copyright |
| 9 * notice, this list of conditions and the following disclaimer. | 9 * notice, this list of conditions and the following disclaimer. |
| 10 * * Redistributions in binary form must reproduce the above | 10 * * Redistributions in binary form must reproduce the above |
| (...skipping 267 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 278 // Associates a content security policy with an isolated world. This policy | 278 // Associates a content security policy with an isolated world. This policy |
| 279 // should be used when evaluating script in the isolated world, and should | 279 // should be used when evaluating script in the isolated world, and should |
| 280 // also replace a protected resource's CSP when evaluating resources | 280 // also replace a protected resource's CSP when evaluating resources |
| 281 // injected into the DOM. | 281 // injected into the DOM. |
| 282 // | 282 // |
| 283 // FIXME: Setting this simply bypasses the protected resource's CSP. It | 283 // FIXME: Setting this simply bypasses the protected resource's CSP. It |
| 284 // doesn't yet restrict the isolated world to the provided policy. | 284 // doesn't yet restrict the isolated world to the provided policy. |
| 285 virtual void setIsolatedWorldContentSecurityPolicy( | 285 virtual void setIsolatedWorldContentSecurityPolicy( |
| 286 int worldID, const WebString&) = 0; | 286 int worldID, const WebString&) = 0; |
| 287 | 287 |
| 288 // Associates an isolated world with human-readable name which is useful for | |
| 289 // extension debugging. | |
| 290 virtual void setIsolatedWorldHumanReadableName( | |
|
dcheng
2014/09/22 22:09:49
Please move this function to WebLocalFrame.h. I do
| |
| 291 int worldID, const WebString&) = 0; | |
| 292 | |
| 288 // Logs to the console associated with this frame. | 293 // Logs to the console associated with this frame. |
| 289 virtual void addMessageToConsole(const WebConsoleMessage&) = 0; | 294 virtual void addMessageToConsole(const WebConsoleMessage&) = 0; |
| 290 | 295 |
| 291 // Calls window.gc() if it is defined. | 296 // Calls window.gc() if it is defined. |
| 292 virtual void collectGarbage() = 0; | 297 virtual void collectGarbage() = 0; |
| 293 | 298 |
| 294 // Check if the scripting URL represents a mixed content condition relative | 299 // Check if the scripting URL represents a mixed content condition relative |
| 295 // to this frame. | 300 // to this frame. |
| 296 virtual bool checkIfRunInsecureContent(const WebURL&) const = 0; | 301 virtual bool checkIfRunInsecureContent(const WebURL&) const = 0; |
| 297 | 302 |
| (...skipping 394 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 692 WebPrivateOwnPtr<OpenedFrameTracker> m_openedFrameTracker; | 697 WebPrivateOwnPtr<OpenedFrameTracker> m_openedFrameTracker; |
| 693 }; | 698 }; |
| 694 | 699 |
| 695 #if BLINK_IMPLEMENTATION | 700 #if BLINK_IMPLEMENTATION |
| 696 Frame* toCoreFrame(const WebFrame*); | 701 Frame* toCoreFrame(const WebFrame*); |
| 697 #endif | 702 #endif |
| 698 | 703 |
| 699 } // namespace blink | 704 } // namespace blink |
| 700 | 705 |
| 701 #endif | 706 #endif |
| OLD | NEW |