| OLD | NEW |
| 1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #ifndef CONTENT_BROWSER_FRAME_HOST_FRAME_TREE_NODE_H_ | 5 #ifndef CONTENT_BROWSER_FRAME_HOST_FRAME_TREE_NODE_H_ |
| 6 #define CONTENT_BROWSER_FRAME_HOST_FRAME_TREE_NODE_H_ | 6 #define CONTENT_BROWSER_FRAME_HOST_FRAME_TREE_NODE_H_ |
| 7 | 7 |
| 8 #include <stddef.h> | 8 #include <stddef.h> |
| 9 | 9 |
| 10 #include <string> | 10 #include <string> |
| (...skipping 130 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 141 // Set the current origin and notify proxies about the update. | 141 // Set the current origin and notify proxies about the update. |
| 142 void SetCurrentOrigin(const url::Origin& origin); | 142 void SetCurrentOrigin(const url::Origin& origin); |
| 143 | 143 |
| 144 // Set the current name and notify proxies about the update. | 144 // Set the current name and notify proxies about the update. |
| 145 void SetFrameName(const std::string& name, const std::string& unique_name); | 145 void SetFrameName(const std::string& name, const std::string& unique_name); |
| 146 | 146 |
| 147 // Sets the current enforcement of strict mixed content checking and | 147 // Sets the current enforcement of strict mixed content checking and |
| 148 // notifies proxies about the update. | 148 // notifies proxies about the update. |
| 149 void SetEnforceStrictMixedContentChecking(bool should_enforce); | 149 void SetEnforceStrictMixedContentChecking(bool should_enforce); |
| 150 | 150 |
| 151 // Sets whether the current origin is a unique, potentially |
| 152 // trustworthy origin, and notifies proxies about the update. |
| 153 void SetUniqueOriginPotentiallyTrustworthy( |
| 154 bool is_unique_origin_potentially_trustworthy); |
| 155 |
| 151 // Returns the currently active sandbox flags for this frame. This includes | 156 // Returns the currently active sandbox flags for this frame. This includes |
| 152 // flags inherited from parent frames and the currently active flags from the | 157 // flags inherited from parent frames and the currently active flags from the |
| 153 // <iframe> element hosting this frame. This does not include flags that | 158 // <iframe> element hosting this frame. This does not include flags that |
| 154 // have been updated in an <iframe> element but have not taken effect yet; | 159 // have been updated in an <iframe> element but have not taken effect yet; |
| 155 // use pending_sandbox_flags() for those. | 160 // use pending_sandbox_flags() for those. |
| 156 blink::WebSandboxFlags effective_sandbox_flags() const { | 161 blink::WebSandboxFlags effective_sandbox_flags() const { |
| 157 return replication_state_.sandbox_flags; | 162 return replication_state_.sandbox_flags; |
| 158 } | 163 } |
| 159 | 164 |
| 160 // Returns the latest sandbox flags for this frame. This includes flags | 165 // Returns the latest sandbox flags for this frame. This includes flags |
| (...skipping 192 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 353 base::ObserverList<Observer> observers_; | 358 base::ObserverList<Observer> observers_; |
| 354 | 359 |
| 355 base::TimeTicks last_focus_time_; | 360 base::TimeTicks last_focus_time_; |
| 356 | 361 |
| 357 DISALLOW_COPY_AND_ASSIGN(FrameTreeNode); | 362 DISALLOW_COPY_AND_ASSIGN(FrameTreeNode); |
| 358 }; | 363 }; |
| 359 | 364 |
| 360 } // namespace content | 365 } // namespace content |
| 361 | 366 |
| 362 #endif // CONTENT_BROWSER_FRAME_HOST_FRAME_TREE_NODE_H_ | 367 #endif // CONTENT_BROWSER_FRAME_HOST_FRAME_TREE_NODE_H_ |
| OLD | NEW |