| OLD | NEW |
| 1 /* | 1 /* |
| 2 * Copyright (C) 2011, 2012 Google Inc. All rights reserved. | 2 * Copyright (C) 2011, 2012 Google Inc. All rights reserved. |
| 3 * | 3 * |
| 4 * Redistribution and use in source and binary forms, with or without | 4 * Redistribution and use in source and binary forms, with or without |
| 5 * modification, are permitted provided that the following conditions are | 5 * modification, are permitted provided that the following conditions are |
| 6 * met: | 6 * met: |
| 7 * | 7 * |
| 8 * * Redistributions of source code must retain the above copyright | 8 * * Redistributions of source code must retain the above copyright |
| 9 * notice, this list of conditions and the following disclaimer. | 9 * notice, this list of conditions and the following disclaimer. |
| 10 * * Redistributions in binary form must reproduce the above | 10 * * Redistributions in binary form must reproduce the above |
| (...skipping 235 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 246 virtual void didDisplayInsecureContent(WebFrame*) { } | 246 virtual void didDisplayInsecureContent(WebFrame*) { } |
| 247 | 247 |
| 248 // The indicated security origin has run active content (such as a | 248 // The indicated security origin has run active content (such as a |
| 249 // script) from an insecure source. Note that the insecure content can | 249 // script) from an insecure source. Note that the insecure content can |
| 250 // spread to other frames in the same origin. | 250 // spread to other frames in the same origin. |
| 251 virtual void didRunInsecureContent(WebFrame*, const WebSecurityOrigin&, cons
t WebURL& insecureURL) { } | 251 virtual void didRunInsecureContent(WebFrame*, const WebSecurityOrigin&, cons
t WebURL& insecureURL) { } |
| 252 | 252 |
| 253 // A reflected XSS was encountered in the page and suppressed. | 253 // A reflected XSS was encountered in the page and suppressed. |
| 254 virtual void didDetectXSS(WebFrame*, const WebURL&, bool didBlockEntirePage)
{ } | 254 virtual void didDetectXSS(WebFrame*, const WebURL&, bool didBlockEntirePage)
{ } |
| 255 | 255 |
| 256 // A PingLoader was created, and a request dispatched to a URL. |
| 257 virtual void didDispatchPingLoader(WebFrame*, const WebURL&) { } |
| 258 |
| 256 // Script notifications ------------------------------------------------ | 259 // Script notifications ------------------------------------------------ |
| 257 | 260 |
| 258 // Script in the page tried to allocate too much memory. | 261 // Script in the page tried to allocate too much memory. |
| 259 virtual void didExhaustMemoryAvailableForScript(WebFrame*) { } | 262 virtual void didExhaustMemoryAvailableForScript(WebFrame*) { } |
| 260 | 263 |
| 261 // Notifies that a new script context has been created for this frame. | 264 // Notifies that a new script context has been created for this frame. |
| 262 // This is similar to didClearWindowObject but only called once per | 265 // This is similar to didClearWindowObject but only called once per |
| 263 // frame context. | 266 // frame context. |
| 264 virtual void didCreateScriptContext(WebFrame*, v8::Handle<v8::Context>, int
extensionGroup, int worldId) { } | 267 virtual void didCreateScriptContext(WebFrame*, v8::Handle<v8::Context>, int
extensionGroup, int worldId) { } |
| 265 | 268 |
| (...skipping 118 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 384 // Extensions3D.h in WebCore/platform/graphics). | 387 // Extensions3D.h in WebCore/platform/graphics). |
| 385 virtual void didLoseWebGLContext(WebFrame*, int) { } | 388 virtual void didLoseWebGLContext(WebFrame*, int) { } |
| 386 | 389 |
| 387 protected: | 390 protected: |
| 388 ~WebFrameClient() { } | 391 ~WebFrameClient() { } |
| 389 }; | 392 }; |
| 390 | 393 |
| 391 } // namespace WebKit | 394 } // namespace WebKit |
| 392 | 395 |
| 393 #endif | 396 #endif |
| OLD | NEW |