| OLD | NEW |
| 1 /* | 1 /* |
| 2 * Copyright (C) 2006, 2007, 2008, 2009, 2010, 2011, 2012 Apple Inc. All rights | 2 * Copyright (C) 2006, 2007, 2008, 2009, 2010, 2011, 2012 Apple Inc. All rights |
| 3 * reserved. | 3 * reserved. |
| 4 * Copyright (C) 2012 Google Inc. All rights reserved. | 4 * Copyright (C) 2012 Google Inc. All rights reserved. |
| 5 * | 5 * |
| 6 * Redistribution and use in source and binary forms, with or without | 6 * Redistribution and use in source and binary forms, with or without |
| 7 * modification, are permitted provided that the following conditions | 7 * modification, are permitted provided that the following conditions |
| 8 * are met: | 8 * are met: |
| 9 * | 9 * |
| 10 * 1. Redistributions of source code must retain the above copyright | 10 * 1. Redistributions of source code must retain the above copyright |
| (...skipping 257 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 268 virtual WebCookieJar* cookieJar() const = 0; | 268 virtual WebCookieJar* cookieJar() const = 0; |
| 269 | 269 |
| 270 virtual void didChangeName(const String& name, const String& uniqueName) {} | 270 virtual void didChangeName(const String& name, const String& uniqueName) {} |
| 271 | 271 |
| 272 virtual void didEnforceInsecureRequestPolicy(WebInsecureRequestPolicy) {} | 272 virtual void didEnforceInsecureRequestPolicy(WebInsecureRequestPolicy) {} |
| 273 | 273 |
| 274 virtual void didUpdateToUniqueOrigin() {} | 274 virtual void didUpdateToUniqueOrigin() {} |
| 275 | 275 |
| 276 virtual void didChangeSandboxFlags(Frame* childFrame, SandboxFlags) {} | 276 virtual void didChangeSandboxFlags(Frame* childFrame, SandboxFlags) {} |
| 277 | 277 |
| 278 virtual void didSetFeaturePolicyHeader(const String& headerValue) {} |
| 279 |
| 278 // Called when a new Content Security Policy is added to the frame's document. | 280 // Called when a new Content Security Policy is added to the frame's document. |
| 279 // This can be triggered by handling of HTTP headers, handling of <meta> | 281 // This can be triggered by handling of HTTP headers, handling of <meta> |
| 280 // element, or by inheriting CSP from the parent (in case of about:blank). | 282 // element, or by inheriting CSP from the parent (in case of about:blank). |
| 281 virtual void didAddContentSecurityPolicy(const String& headerValue, | 283 virtual void didAddContentSecurityPolicy(const String& headerValue, |
| 282 ContentSecurityPolicyHeaderType, | 284 ContentSecurityPolicyHeaderType, |
| 283 ContentSecurityPolicyHeaderSource) {} | 285 ContentSecurityPolicyHeaderSource) {} |
| 284 | 286 |
| 285 virtual void didChangeFrameOwnerProperties(HTMLFrameElementBase*) {} | 287 virtual void didChangeFrameOwnerProperties(HTMLFrameElementBase*) {} |
| 286 | 288 |
| 287 virtual void dispatchWillStartUsingPeerConnectionHandler( | 289 virtual void dispatchWillStartUsingPeerConnectionHandler( |
| (...skipping 48 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 336 } | 338 } |
| 337 | 339 |
| 338 // Overwrites the given URL to use an HTML5 embed if possible. An empty URL is | 340 // Overwrites the given URL to use an HTML5 embed if possible. An empty URL is |
| 339 // returned if the URL is not overriden. | 341 // returned if the URL is not overriden. |
| 340 virtual KURL overrideFlashEmbedWithHTML(const KURL&) { return KURL(); } | 342 virtual KURL overrideFlashEmbedWithHTML(const KURL&) { return KURL(); } |
| 341 }; | 343 }; |
| 342 | 344 |
| 343 } // namespace blink | 345 } // namespace blink |
| 344 | 346 |
| 345 #endif // FrameLoaderClient_h | 347 #endif // FrameLoaderClient_h |
| OLD | NEW |