OLD | NEW |
1 /* | 1 /* |
2 * Copyright (C) 2011, 2012 Google Inc. All rights reserved. | 2 * Copyright (C) 2011, 2012 Google Inc. All rights reserved. |
3 * | 3 * |
4 * Redistribution and use in source and binary forms, with or without | 4 * Redistribution and use in source and binary forms, with or without |
5 * modification, are permitted provided that the following conditions are | 5 * modification, are permitted provided that the following conditions are |
6 * met: | 6 * met: |
7 * | 7 * |
8 * * Redistributions of source code must retain the above copyright | 8 * * Redistributions of source code must retain the above copyright |
9 * notice, this list of conditions and the following disclaimer. | 9 * notice, this list of conditions and the following disclaimer. |
10 * * Redistributions in binary form must reproduce the above | 10 * * Redistributions in binary form must reproduce the above |
(...skipping 211 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
222 // this method only exists to support dynamic sandboxing via a CSP | 222 // this method only exists to support dynamic sandboxing via a CSP |
223 // delivered in a <meta> tag. This is not supposed to be allowed per | 223 // delivered in a <meta> tag. This is not supposed to be allowed per |
224 // the CSP spec and should be ripped out. https://crbug.com/594645 | 224 // the CSP spec and should be ripped out. https://crbug.com/594645 |
225 virtual void didUpdateToUniqueOrigin( | 225 virtual void didUpdateToUniqueOrigin( |
226 bool isPotentiallyTrustworthyUniqueOrigin) {} | 226 bool isPotentiallyTrustworthyUniqueOrigin) {} |
227 | 227 |
228 // The sandbox flags have changed for a child frame of this frame. | 228 // The sandbox flags have changed for a child frame of this frame. |
229 virtual void didChangeSandboxFlags(WebFrame* childFrame, | 229 virtual void didChangeSandboxFlags(WebFrame* childFrame, |
230 WebSandboxFlags flags) {} | 230 WebSandboxFlags flags) {} |
231 | 231 |
| 232 // Called when a Feature-Policy HTTP header is encountered while loading the |
| 233 // frame's document. |
| 234 virtual void didSetFeaturePolicyHeader(const WebString& headerValue) {} |
| 235 |
232 // Called when a new Content Security Policy is added to the frame's | 236 // Called when a new Content Security Policy is added to the frame's |
233 // document. This can be triggered by handling of HTTP headers, handling | 237 // document. This can be triggered by handling of HTTP headers, handling |
234 // of <meta> element, or by inheriting CSP from the parent (in case of | 238 // of <meta> element, or by inheriting CSP from the parent (in case of |
235 // about:blank). | 239 // about:blank). |
236 virtual void didAddContentSecurityPolicy(const WebString& headerValue, | 240 virtual void didAddContentSecurityPolicy(const WebString& headerValue, |
237 WebContentSecurityPolicyType, | 241 WebContentSecurityPolicyType, |
238 WebContentSecurityPolicySource) {} | 242 WebContentSecurityPolicySource) {} |
239 | 243 |
240 // Some frame owner properties have changed for a child frame of this frame. | 244 // Some frame owner properties have changed for a child frame of this frame. |
241 // Frame owner properties currently include: scrolling, marginwidth and | 245 // Frame owner properties currently include: scrolling, marginwidth and |
(...skipping 509 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
751 // Overwrites the given URL to use an HTML5 embed if possible. | 755 // Overwrites the given URL to use an HTML5 embed if possible. |
752 // An empty URL is returned if the URL is not overriden. | 756 // An empty URL is returned if the URL is not overriden. |
753 virtual WebURL overrideFlashEmbedWithHTML(const WebURL& url) { | 757 virtual WebURL overrideFlashEmbedWithHTML(const WebURL& url) { |
754 return WebURL(); | 758 return WebURL(); |
755 } | 759 } |
756 }; | 760 }; |
757 | 761 |
758 } // namespace blink | 762 } // namespace blink |
759 | 763 |
760 #endif | 764 #endif |
OLD | NEW |