OLD | NEW |
---|---|
1 /* | 1 /* |
2 * Copyright (C) 2011, 2012 Google Inc. All rights reserved. | 2 * Copyright (C) 2011, 2012 Google Inc. All rights reserved. |
3 * | 3 * |
4 * Redistribution and use in source and binary forms, with or without | 4 * Redistribution and use in source and binary forms, with or without |
5 * modification, are permitted provided that the following conditions are | 5 * modification, are permitted provided that the following conditions are |
6 * met: | 6 * met: |
7 * | 7 * |
8 * * Redistributions of source code must retain the above copyright | 8 * * Redistributions of source code must retain the above copyright |
9 * notice, this list of conditions and the following disclaimer. | 9 * notice, this list of conditions and the following disclaimer. |
10 * * Redistributions in binary form must reproduce the above | 10 * * Redistributions in binary form must reproduce the above |
(...skipping 211 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
222 // this method only exists to support dynamic sandboxing via a CSP | 222 // this method only exists to support dynamic sandboxing via a CSP |
223 // delivered in a <meta> tag. This is not supposed to be allowed per | 223 // delivered in a <meta> tag. This is not supposed to be allowed per |
224 // the CSP spec and should be ripped out. https://crbug.com/594645 | 224 // the CSP spec and should be ripped out. https://crbug.com/594645 |
225 virtual void didUpdateToUniqueOrigin( | 225 virtual void didUpdateToUniqueOrigin( |
226 bool isPotentiallyTrustworthyUniqueOrigin) {} | 226 bool isPotentiallyTrustworthyUniqueOrigin) {} |
227 | 227 |
228 // The sandbox flags have changed for a child frame of this frame. | 228 // The sandbox flags have changed for a child frame of this frame. |
229 virtual void didChangeSandboxFlags(WebFrame* childFrame, | 229 virtual void didChangeSandboxFlags(WebFrame* childFrame, |
230 WebSandboxFlags flags) {} | 230 WebSandboxFlags flags) {} |
231 | 231 |
232 virtual void didSetFeaturePolicyHeader(const WebString& headerValue) {} | |
alexmos
2016/11/09 01:16:55
nit: needs a comment.
iclelland
2016/11/09 18:07:59
Done.
| |
233 | |
232 // Called when a new Content Security Policy is added to the frame's | 234 // Called when a new Content Security Policy is added to the frame's |
233 // document. This can be triggered by handling of HTTP headers, handling | 235 // document. This can be triggered by handling of HTTP headers, handling |
234 // of <meta> element, or by inheriting CSP from the parent (in case of | 236 // of <meta> element, or by inheriting CSP from the parent (in case of |
235 // about:blank). | 237 // about:blank). |
236 virtual void didAddContentSecurityPolicy(const WebString& headerValue, | 238 virtual void didAddContentSecurityPolicy(const WebString& headerValue, |
237 WebContentSecurityPolicyType, | 239 WebContentSecurityPolicyType, |
238 WebContentSecurityPolicySource) {} | 240 WebContentSecurityPolicySource) {} |
239 | 241 |
240 // Some frame owner properties have changed for a child frame of this frame. | 242 // Some frame owner properties have changed for a child frame of this frame. |
241 // Frame owner properties currently include: scrolling, marginwidth and | 243 // Frame owner properties currently include: scrolling, marginwidth and |
(...skipping 508 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
750 // Overwrites the given URL to use an HTML5 embed if possible. | 752 // Overwrites the given URL to use an HTML5 embed if possible. |
751 // An empty URL is returned if the URL is not overriden. | 753 // An empty URL is returned if the URL is not overriden. |
752 virtual WebURL overrideFlashEmbedWithHTML(const WebURL& url) { | 754 virtual WebURL overrideFlashEmbedWithHTML(const WebURL& url) { |
753 return WebURL(); | 755 return WebURL(); |
754 } | 756 } |
755 }; | 757 }; |
756 | 758 |
757 } // namespace blink | 759 } // namespace blink |
758 | 760 |
759 #endif | 761 #endif |
OLD | NEW |