| OLD | NEW |
| 1 /* | 1 /* |
| 2 * Copyright (C) 2011, 2012 Google Inc. All rights reserved. | 2 * Copyright (C) 2011, 2012 Google Inc. All rights reserved. |
| 3 * | 3 * |
| 4 * Redistribution and use in source and binary forms, with or without | 4 * Redistribution and use in source and binary forms, with or without |
| 5 * modification, are permitted provided that the following conditions are | 5 * modification, are permitted provided that the following conditions are |
| 6 * met: | 6 * met: |
| 7 * | 7 * |
| 8 * * Redistributions of source code must retain the above copyright | 8 * * Redistributions of source code must retain the above copyright |
| 9 * notice, this list of conditions and the following disclaimer. | 9 * notice, this list of conditions and the following disclaimer. |
| 10 * * Redistributions in binary form must reproduce the above | 10 * * Redistributions in binary form must reproduce the above |
| (...skipping 211 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 222 // this method only exists to support dynamic sandboxing via a CSP | 222 // this method only exists to support dynamic sandboxing via a CSP |
| 223 // delivered in a <meta> tag. This is not supposed to be allowed per | 223 // delivered in a <meta> tag. This is not supposed to be allowed per |
| 224 // the CSP spec and should be ripped out. https://crbug.com/594645 | 224 // the CSP spec and should be ripped out. https://crbug.com/594645 |
| 225 virtual void didUpdateToUniqueOrigin( | 225 virtual void didUpdateToUniqueOrigin( |
| 226 bool isPotentiallyTrustworthyUniqueOrigin) {} | 226 bool isPotentiallyTrustworthyUniqueOrigin) {} |
| 227 | 227 |
| 228 // The sandbox flags have changed for a child frame of this frame. | 228 // The sandbox flags have changed for a child frame of this frame. |
| 229 virtual void didChangeSandboxFlags(WebFrame* childFrame, | 229 virtual void didChangeSandboxFlags(WebFrame* childFrame, |
| 230 WebSandboxFlags flags) {} | 230 WebSandboxFlags flags) {} |
| 231 | 231 |
| 232 virtual void didAddFeaturePolicyHeader(const WebString& headerValue) {} |
| 233 |
| 232 // Called when a new Content Security Policy is added to the frame's | 234 // Called when a new Content Security Policy is added to the frame's |
| 233 // document. This can be triggered by handling of HTTP headers, handling | 235 // document. This can be triggered by handling of HTTP headers, handling |
| 234 // of <meta> element, or by inheriting CSP from the parent (in case of | 236 // of <meta> element, or by inheriting CSP from the parent (in case of |
| 235 // about:blank). | 237 // about:blank). |
| 236 virtual void didAddContentSecurityPolicy(const WebString& headerValue, | 238 virtual void didAddContentSecurityPolicy(const WebString& headerValue, |
| 237 WebContentSecurityPolicyType, | 239 WebContentSecurityPolicyType, |
| 238 WebContentSecurityPolicySource) {} | 240 WebContentSecurityPolicySource) {} |
| 239 | 241 |
| 240 // Some frame owner properties have changed for a child frame of this frame. | 242 // Some frame owner properties have changed for a child frame of this frame. |
| 241 // Frame owner properties currently include: scrolling, marginwidth and | 243 // Frame owner properties currently include: scrolling, marginwidth and |
| (...skipping 508 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 750 // Overwrites the given URL to use an HTML5 embed if possible. | 752 // Overwrites the given URL to use an HTML5 embed if possible. |
| 751 // An empty URL is returned if the URL is not overriden. | 753 // An empty URL is returned if the URL is not overriden. |
| 752 virtual WebURL overrideFlashEmbedWithHTML(const WebURL& url) { | 754 virtual WebURL overrideFlashEmbedWithHTML(const WebURL& url) { |
| 753 return WebURL(); | 755 return WebURL(); |
| 754 } | 756 } |
| 755 }; | 757 }; |
| 756 | 758 |
| 757 } // namespace blink | 759 } // namespace blink |
| 758 | 760 |
| 759 #endif | 761 #endif |
| OLD | NEW |