OLD | NEW |
---|---|
1 /* | 1 /* |
2 * Copyright (C) 2011, 2012 Google Inc. All rights reserved. | 2 * Copyright (C) 2011, 2012 Google Inc. All rights reserved. |
3 * | 3 * |
4 * Redistribution and use in source and binary forms, with or without | 4 * Redistribution and use in source and binary forms, with or without |
5 * modification, are permitted provided that the following conditions are | 5 * modification, are permitted provided that the following conditions are |
6 * met: | 6 * met: |
7 * | 7 * |
8 * * Redistributions of source code must retain the above copyright | 8 * * Redistributions of source code must retain the above copyright |
9 * notice, this list of conditions and the following disclaimer. | 9 * notice, this list of conditions and the following disclaimer. |
10 * * Redistributions in binary form must reproduce the above | 10 * * Redistributions in binary form must reproduce the above |
(...skipping 163 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
174 // This frame is about to be closed. This is called after frameDetached, | 174 // This frame is about to be closed. This is called after frameDetached, |
175 // when the document is being unloaded, due to new one committing. | 175 // when the document is being unloaded, due to new one committing. |
176 virtual void willClose(WebFrame*) { } | 176 virtual void willClose(WebFrame*) { } |
177 | 177 |
178 // This frame's name has changed. | 178 // This frame's name has changed. |
179 virtual void didChangeName(const WebString& name, const WebString& uniqueNam e) { } | 179 virtual void didChangeName(const WebString& name, const WebString& uniqueNam e) { } |
180 | 180 |
181 // This frame has been set to enforce strict mixed content checking. | 181 // This frame has been set to enforce strict mixed content checking. |
182 virtual void didEnforceStrictMixedContentChecking() {} | 182 virtual void didEnforceStrictMixedContentChecking() {} |
183 | 183 |
184 // This frame has been navigated to a new |origin|, which is a unique origin that should be considered potentially trustworthy if |isPotentiallyTrustworthyU niqueOrigin| is true. | |
alexmos
2016/03/14 22:20:36
"has been navigated" doesn't sound correct here, a
estark
2016/03/15 01:04:41
Urgh. I think we should just kill the <meta> sandb
| |
185 virtual void didUpdateOrigin(const WebSecurityOrigin& origin, bool isPotenti allyTrustworthyUniqueOrigin) {} | |
186 | |
184 // The sandbox flags have changed for a child frame of this frame. | 187 // The sandbox flags have changed for a child frame of this frame. |
185 virtual void didChangeSandboxFlags(WebFrame* childFrame, WebSandboxFlags fla gs) { } | 188 virtual void didChangeSandboxFlags(WebFrame* childFrame, WebSandboxFlags fla gs) { } |
186 | 189 |
187 // Some frame owner properties have changed for a child frame of this frame. | 190 // Some frame owner properties have changed for a child frame of this frame. |
188 // Frame owner properties currently include: scrolling, marginwidth and | 191 // Frame owner properties currently include: scrolling, marginwidth and |
189 // marginheight. | 192 // marginheight. |
190 virtual void didChangeFrameOwnerProperties(WebFrame* childFrame, const WebFr ameOwnerProperties&) { } | 193 virtual void didChangeFrameOwnerProperties(WebFrame* childFrame, const WebFr ameOwnerProperties&) { } |
191 | 194 |
192 // Called when a watched CSS selector matches or stops matching. | 195 // Called when a watched CSS selector matches or stops matching. |
193 virtual void didMatchCSS(WebLocalFrame*, const WebVector<WebString>& newlyMa tchingSelectors, const WebVector<WebString>& stoppedMatchingSelectors) { } | 196 virtual void didMatchCSS(WebLocalFrame*, const WebVector<WebString>& newlyMa tchingSelectors, const WebVector<WebString>& stoppedMatchingSelectors) { } |
(...skipping 505 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
699 // This method takes ownership of the callbacks pointer. | 702 // This method takes ownership of the callbacks pointer. |
700 virtual void checkIfAudioSinkExistsAndIsAuthorized(const WebString& sinkId, const WebSecurityOrigin&, WebSetSinkIdCallbacks*) { BLINK_ASSERT_NOT_REACHED(); } | 703 virtual void checkIfAudioSinkExistsAndIsAuthorized(const WebString& sinkId, const WebSecurityOrigin&, WebSetSinkIdCallbacks*) { BLINK_ASSERT_NOT_REACHED(); } |
701 | 704 |
702 protected: | 705 protected: |
703 virtual ~WebFrameClient() { } | 706 virtual ~WebFrameClient() { } |
704 }; | 707 }; |
705 | 708 |
706 } // namespace blink | 709 } // namespace blink |
707 | 710 |
708 #endif | 711 #endif |
OLD | NEW |