OLD | NEW |
1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "web/WebRemoteFrameImpl.h" | 5 #include "web/WebRemoteFrameImpl.h" |
6 | 6 |
7 #include "core/frame/FrameView.h" | 7 #include "core/frame/FrameView.h" |
8 #include "core/frame/Settings.h" | 8 #include "core/frame/Settings.h" |
9 #include "core/html/HTMLFrameOwnerElement.h" | 9 #include "core/html/HTMLFrameOwnerElement.h" |
10 #include "core/layout/LayoutObject.h" | 10 #include "core/layout/LayoutObject.h" |
(...skipping 677 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
688 ASSERT(frame()); | 688 ASSERT(frame()); |
689 frame()->tree().setPrecalculatedName(name, uniqueName); | 689 frame()->tree().setPrecalculatedName(name, uniqueName); |
690 } | 690 } |
691 | 691 |
692 void WebRemoteFrameImpl::setReplicatedShouldEnforceStrictMixedContentChecking(bo
ol shouldEnforce) const | 692 void WebRemoteFrameImpl::setReplicatedShouldEnforceStrictMixedContentChecking(bo
ol shouldEnforce) const |
693 { | 693 { |
694 ASSERT(frame()); | 694 ASSERT(frame()); |
695 frame()->securityContext()->setShouldEnforceStrictMixedContentChecking(shoul
dEnforce); | 695 frame()->securityContext()->setShouldEnforceStrictMixedContentChecking(shoul
dEnforce); |
696 } | 696 } |
697 | 697 |
| 698 void WebRemoteFrameImpl::setReplicatedPotentiallyTrustworthyUniqueOrigin(bool is
UniqueOriginPotentiallyTrustworthy) const |
| 699 { |
| 700 ASSERT(frame()); |
| 701 // If |isUniqueOriginPotentiallyTrustworthy| is true, then the origin must b
e unique. |
| 702 ASSERT(!isUniqueOriginPotentiallyTrustworthy || frame()->securityContext()->
securityOrigin()->isUnique()); |
| 703 frame()->securityContext()->securityOrigin()->setUniqueOriginIsPotentiallyTr
ustworthy(isUniqueOriginPotentiallyTrustworthy); |
| 704 } |
| 705 |
698 void WebRemoteFrameImpl::DispatchLoadEventForFrameOwner() const | 706 void WebRemoteFrameImpl::DispatchLoadEventForFrameOwner() const |
699 { | 707 { |
700 ASSERT(frame()->owner()->isLocal()); | 708 ASSERT(frame()->owner()->isLocal()); |
701 frame()->owner()->dispatchLoad(); | 709 frame()->owner()->dispatchLoad(); |
702 } | 710 } |
703 | 711 |
704 void WebRemoteFrameImpl::didStartLoading() | 712 void WebRemoteFrameImpl::didStartLoading() |
705 { | 713 { |
706 frame()->setIsLoading(true); | 714 frame()->setIsLoading(true); |
707 } | 715 } |
(...skipping 20 matching lines...) Expand all Loading... |
728 : WebRemoteFrame(scope) | 736 : WebRemoteFrame(scope) |
729 , m_frameClient(RemoteFrameClientImpl::create(this)) | 737 , m_frameClient(RemoteFrameClientImpl::create(this)) |
730 , m_client(client) | 738 , m_client(client) |
731 #if ENABLE(OILPAN) | 739 #if ENABLE(OILPAN) |
732 , m_selfKeepAlive(this) | 740 , m_selfKeepAlive(this) |
733 #endif | 741 #endif |
734 { | 742 { |
735 } | 743 } |
736 | 744 |
737 } // namespace blink | 745 } // namespace blink |
OLD | NEW |