| OLD | NEW |
| 1 /* | 1 /* |
| 2 * Copyright (C) 2009, 2012 Google Inc. All rights reserved. | 2 * Copyright (C) 2009, 2012 Google Inc. All rights reserved. |
| 3 * Copyright (C) 2011 Apple Inc. All rights reserved. | 3 * Copyright (C) 2011 Apple Inc. All rights reserved. |
| 4 * | 4 * |
| 5 * Redistribution and use in source and binary forms, with or without | 5 * Redistribution and use in source and binary forms, with or without |
| 6 * modification, are permitted provided that the following conditions are | 6 * modification, are permitted provided that the following conditions are |
| 7 * met: | 7 * met: |
| 8 * | 8 * |
| 9 * * Redistributions of source code must retain the above copyright | 9 * * Redistributions of source code must retain the above copyright |
| 10 * notice, this list of conditions and the following disclaimer. | 10 * notice, this list of conditions and the following disclaimer. |
| (...skipping 245 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 256 } | 256 } |
| 257 | 257 |
| 258 bool FrameLoaderClientImpl::allowImage(bool enabledPerSettings, const KURL& imag
eURL) | 258 bool FrameLoaderClientImpl::allowImage(bool enabledPerSettings, const KURL& imag
eURL) |
| 259 { | 259 { |
| 260 if (m_webFrame->contentSettingsClient()) | 260 if (m_webFrame->contentSettingsClient()) |
| 261 return m_webFrame->contentSettingsClient()->allowImage(enabledPerSetting
s, imageURL); | 261 return m_webFrame->contentSettingsClient()->allowImage(enabledPerSetting
s, imageURL); |
| 262 | 262 |
| 263 return enabledPerSettings; | 263 return enabledPerSettings; |
| 264 } | 264 } |
| 265 | 265 |
| 266 bool FrameLoaderClientImpl::allowDisplayingInsecureContent(bool enabledPerSettin
gs, const KURL& url) | |
| 267 { | |
| 268 if (m_webFrame->contentSettingsClient()) | |
| 269 return m_webFrame->contentSettingsClient()->allowDisplayingInsecureConte
nt(enabledPerSettings, WebURL(url)); | |
| 270 | |
| 271 return enabledPerSettings; | |
| 272 } | |
| 273 | |
| 274 bool FrameLoaderClientImpl::allowRunningInsecureContent(bool enabledPerSettings,
SecurityOrigin* context, const KURL& url) | 266 bool FrameLoaderClientImpl::allowRunningInsecureContent(bool enabledPerSettings,
SecurityOrigin* context, const KURL& url) |
| 275 { | 267 { |
| 276 if (m_webFrame->contentSettingsClient()) | 268 if (m_webFrame->contentSettingsClient()) |
| 277 return m_webFrame->contentSettingsClient()->allowRunningInsecureContent(
enabledPerSettings, WebSecurityOrigin(context), WebURL(url)); | 269 return m_webFrame->contentSettingsClient()->allowRunningInsecureContent(
enabledPerSettings, WebSecurityOrigin(context), WebURL(url)); |
| 278 | 270 |
| 279 return enabledPerSettings; | 271 return enabledPerSettings; |
| 280 } | 272 } |
| 281 | 273 |
| 282 bool FrameLoaderClientImpl::allowAutoplay(bool defaultValue) | 274 bool FrameLoaderClientImpl::allowAutoplay(bool defaultValue) |
| 283 { | 275 { |
| 284 if (m_webFrame->contentSettingsClient()) | 276 if (m_webFrame->contentSettingsClient()) |
| 285 return m_webFrame->contentSettingsClient()->allowAutoplay(defaultValue); | 277 return m_webFrame->contentSettingsClient()->allowAutoplay(defaultValue); |
| 286 | 278 |
| 287 return defaultValue; | 279 return defaultValue; |
| 288 } | 280 } |
| 289 | 281 |
| 282 void FrameLoaderClientImpl::passiveInsecureContentFound(const KURL& url) |
| 283 { |
| 284 if (m_webFrame->contentSettingsClient()) |
| 285 return m_webFrame->contentSettingsClient()->passiveInsecureContentFound(
WebURL(url)); |
| 286 } |
| 287 |
| 290 void FrameLoaderClientImpl::didNotAllowScript() | 288 void FrameLoaderClientImpl::didNotAllowScript() |
| 291 { | 289 { |
| 292 if (m_webFrame->contentSettingsClient()) | 290 if (m_webFrame->contentSettingsClient()) |
| 293 m_webFrame->contentSettingsClient()->didNotAllowScript(); | 291 m_webFrame->contentSettingsClient()->didNotAllowScript(); |
| 294 } | 292 } |
| 295 | 293 |
| 296 void FrameLoaderClientImpl::didNotAllowPlugins() | 294 void FrameLoaderClientImpl::didNotAllowPlugins() |
| 297 { | 295 { |
| 298 if (m_webFrame->contentSettingsClient()) | 296 if (m_webFrame->contentSettingsClient()) |
| 299 m_webFrame->contentSettingsClient()->didNotAllowPlugins(); | 297 m_webFrame->contentSettingsClient()->didNotAllowPlugins(); |
| (...skipping 729 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1029 { | 1027 { |
| 1030 return WebLocalFrameImpl::fromFrame(m_webFrame->frame()->localFrameRoot())->
devToolsAgentImpl(); | 1028 return WebLocalFrameImpl::fromFrame(m_webFrame->frame()->localFrameRoot())->
devToolsAgentImpl(); |
| 1031 } | 1029 } |
| 1032 | 1030 |
| 1033 KURL FrameLoaderClientImpl::overrideFlashEmbedWithHTML(const KURL& url) | 1031 KURL FrameLoaderClientImpl::overrideFlashEmbedWithHTML(const KURL& url) |
| 1034 { | 1032 { |
| 1035 return m_webFrame->client()->overrideFlashEmbedWithHTML(WebURL(url)); | 1033 return m_webFrame->client()->overrideFlashEmbedWithHTML(WebURL(url)); |
| 1036 } | 1034 } |
| 1037 | 1035 |
| 1038 } // namespace blink | 1036 } // namespace blink |
| OLD | NEW |