| OLD | NEW |
| 1 /* | 1 /* |
| 2 * Copyright (C) 2006, 2007, 2008, 2009, 2010, 2011, 2012 Apple Inc. All rights | 2 * Copyright (C) 2006, 2007, 2008, 2009, 2010, 2011, 2012 Apple Inc. All rights |
| 3 * reserved. | 3 * reserved. |
| 4 * Copyright (C) 2012 Google Inc. All rights reserved. | 4 * Copyright (C) 2012 Google Inc. All rights reserved. |
| 5 * | 5 * |
| 6 * Redistribution and use in source and binary forms, with or without | 6 * Redistribution and use in source and binary forms, with or without |
| 7 * modification, are permitted provided that the following conditions | 7 * modification, are permitted provided that the following conditions |
| 8 * are met: | 8 * are met: |
| 9 * | 9 * |
| 10 * 1. Redistributions of source code must retain the above copyright | 10 * 1. Redistributions of source code must retain the above copyright |
| (...skipping 252 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 263 virtual WebCookieJar* cookieJar() const = 0; | 263 virtual WebCookieJar* cookieJar() const = 0; |
| 264 | 264 |
| 265 virtual void didChangeName(const String& name, const String& uniqueName) {} | 265 virtual void didChangeName(const String& name, const String& uniqueName) {} |
| 266 | 266 |
| 267 virtual void didEnforceInsecureRequestPolicy(WebInsecureRequestPolicy) {} | 267 virtual void didEnforceInsecureRequestPolicy(WebInsecureRequestPolicy) {} |
| 268 | 268 |
| 269 virtual void didUpdateToUniqueOrigin() {} | 269 virtual void didUpdateToUniqueOrigin() {} |
| 270 | 270 |
| 271 virtual void didChangeSandboxFlags(Frame* childFrame, SandboxFlags) {} | 271 virtual void didChangeSandboxFlags(Frame* childFrame, SandboxFlags) {} |
| 272 | 272 |
| 273 virtual void didAddFeaturePolicyHeader(const String& headerValue) {} |
| 274 |
| 273 // Called when a new Content Security Policy is added to the frame's document. | 275 // Called when a new Content Security Policy is added to the frame's document. |
| 274 // This can be triggered by handling of HTTP headers, handling of <meta> | 276 // This can be triggered by handling of HTTP headers, handling of <meta> |
| 275 // element, or by inheriting CSP from the parent (in case of about:blank). | 277 // element, or by inheriting CSP from the parent (in case of about:blank). |
| 276 virtual void didAddContentSecurityPolicy(const String& headerValue, | 278 virtual void didAddContentSecurityPolicy(const String& headerValue, |
| 277 ContentSecurityPolicyHeaderType, | 279 ContentSecurityPolicyHeaderType, |
| 278 ContentSecurityPolicyHeaderSource) {} | 280 ContentSecurityPolicyHeaderSource) {} |
| 279 | 281 |
| 280 virtual void didChangeFrameOwnerProperties(HTMLFrameElementBase*) {} | 282 virtual void didChangeFrameOwnerProperties(HTMLFrameElementBase*) {} |
| 281 | 283 |
| 282 virtual void dispatchWillStartUsingPeerConnectionHandler( | 284 virtual void dispatchWillStartUsingPeerConnectionHandler( |
| (...skipping 48 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 331 } | 333 } |
| 332 | 334 |
| 333 // Overwrites the given URL to use an HTML5 embed if possible. An empty URL is | 335 // Overwrites the given URL to use an HTML5 embed if possible. An empty URL is |
| 334 // returned if the URL is not overriden. | 336 // returned if the URL is not overriden. |
| 335 virtual KURL overrideFlashEmbedWithHTML(const KURL&) { return KURL(); } | 337 virtual KURL overrideFlashEmbedWithHTML(const KURL&) { return KURL(); } |
| 336 }; | 338 }; |
| 337 | 339 |
| 338 } // namespace blink | 340 } // namespace blink |
| 339 | 341 |
| 340 #endif // FrameLoaderClient_h | 342 #endif // FrameLoaderClient_h |
| OLD | NEW |