OLD | NEW |
1 /* | 1 /* |
2 * Copyright (C) 2011, 2012 Google Inc. All rights reserved. | 2 * Copyright (C) 2011, 2012 Google Inc. All rights reserved. |
3 * | 3 * |
4 * Redistribution and use in source and binary forms, with or without | 4 * Redistribution and use in source and binary forms, with or without |
5 * modification, are permitted provided that the following conditions are | 5 * modification, are permitted provided that the following conditions are |
6 * met: | 6 * met: |
7 * | 7 * |
8 * * Redistributions of source code must retain the above copyright | 8 * * Redistributions of source code must retain the above copyright |
9 * notice, this list of conditions and the following disclaimer. | 9 * notice, this list of conditions and the following disclaimer. |
10 * * Redistributions in binary form must reproduce the above | 10 * * Redistributions in binary form must reproduce the above |
(...skipping 164 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
175 // This frame is about to be closed. This is called after frameDetached, | 175 // This frame is about to be closed. This is called after frameDetached, |
176 // when the document is being unloaded, due to new one committing. | 176 // when the document is being unloaded, due to new one committing. |
177 virtual void willClose(WebFrame*) { } | 177 virtual void willClose(WebFrame*) { } |
178 | 178 |
179 // This frame's name has changed. | 179 // This frame's name has changed. |
180 virtual void didChangeName(const WebString& name, const WebString& uniqueNam
e) { } | 180 virtual void didChangeName(const WebString& name, const WebString& uniqueNam
e) { } |
181 | 181 |
182 // This frame has been set to enforce strict mixed content checking. | 182 // This frame has been set to enforce strict mixed content checking. |
183 virtual void didEnforceStrictMixedContentChecking() {} | 183 virtual void didEnforceStrictMixedContentChecking() {} |
184 | 184 |
| 185 // This frame has been updated to a unique origin, which should be |
| 186 // considered potentially trustworthy if |
| 187 // |isPotentiallyTrustworthyUniqueOrigin| is true. TODO(estark): |
| 188 // this method only exists to support dynamic sandboxing via a CSP |
| 189 // delivered in a <meta> tag. This is not supposed to be allowed per |
| 190 // the CSP spec and should be ripped out. https://crbug.com/594645 |
| 191 virtual void didUpdateToUniqueOrigin(bool isPotentiallyTrustworthyUniqueOrig
in) {} |
| 192 |
185 // The sandbox flags have changed for a child frame of this frame. | 193 // The sandbox flags have changed for a child frame of this frame. |
186 virtual void didChangeSandboxFlags(WebFrame* childFrame, WebSandboxFlags fla
gs) { } | 194 virtual void didChangeSandboxFlags(WebFrame* childFrame, WebSandboxFlags fla
gs) { } |
187 | 195 |
188 // Some frame owner properties have changed for a child frame of this frame. | 196 // Some frame owner properties have changed for a child frame of this frame. |
189 // Frame owner properties currently include: scrolling, marginwidth and | 197 // Frame owner properties currently include: scrolling, marginwidth and |
190 // marginheight. | 198 // marginheight. |
191 virtual void didChangeFrameOwnerProperties(WebFrame* childFrame, const WebFr
ameOwnerProperties&) { } | 199 virtual void didChangeFrameOwnerProperties(WebFrame* childFrame, const WebFr
ameOwnerProperties&) { } |
192 | 200 |
193 // Called when a watched CSS selector matches or stops matching. | 201 // Called when a watched CSS selector matches or stops matching. |
194 virtual void didMatchCSS(WebLocalFrame*, const WebVector<WebString>& newlyMa
tchingSelectors, const WebVector<WebString>& stoppedMatchingSelectors) { } | 202 virtual void didMatchCSS(WebLocalFrame*, const WebVector<WebString>& newlyMa
tchingSelectors, const WebVector<WebString>& stoppedMatchingSelectors) { } |
(...skipping 507 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
702 // This method takes ownership of the callbacks pointer. | 710 // This method takes ownership of the callbacks pointer. |
703 virtual void checkIfAudioSinkExistsAndIsAuthorized(const WebString& sinkId,
const WebSecurityOrigin&, WebSetSinkIdCallbacks*) { BLINK_ASSERT_NOT_REACHED();
} | 711 virtual void checkIfAudioSinkExistsAndIsAuthorized(const WebString& sinkId,
const WebSecurityOrigin&, WebSetSinkIdCallbacks*) { BLINK_ASSERT_NOT_REACHED();
} |
704 | 712 |
705 protected: | 713 protected: |
706 virtual ~WebFrameClient() { } | 714 virtual ~WebFrameClient() { } |
707 }; | 715 }; |
708 | 716 |
709 } // namespace blink | 717 } // namespace blink |
710 | 718 |
711 #endif | 719 #endif |
OLD | NEW |