| OLD | NEW |
| 1 /* | 1 /* |
| 2 * Copyright (C) 2011, 2012 Google Inc. All rights reserved. | 2 * Copyright (C) 2011, 2012 Google Inc. All rights reserved. |
| 3 * | 3 * |
| 4 * Redistribution and use in source and binary forms, with or without | 4 * Redistribution and use in source and binary forms, with or without |
| 5 * modification, are permitted provided that the following conditions are | 5 * modification, are permitted provided that the following conditions are |
| 6 * met: | 6 * met: |
| 7 * | 7 * |
| 8 * * Redistributions of source code must retain the above copyright | 8 * * Redistributions of source code must retain the above copyright |
| 9 * notice, this list of conditions and the following disclaimer. | 9 * notice, this list of conditions and the following disclaimer. |
| 10 * * Redistributions in binary form must reproduce the above | 10 * * Redistributions in binary form must reproduce the above |
| (...skipping 197 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 208 // A provisional load is about to commit. | 208 // A provisional load is about to commit. |
| 209 virtual void willCommitProvisionalLoad(WebLocalFrame*) {} | 209 virtual void willCommitProvisionalLoad(WebLocalFrame*) {} |
| 210 | 210 |
| 211 // This frame's name has changed. | 211 // This frame's name has changed. |
| 212 virtual void didChangeName(const WebString& name, | 212 virtual void didChangeName(const WebString& name, |
| 213 const WebString& uniqueName) {} | 213 const WebString& uniqueName) {} |
| 214 | 214 |
| 215 // This frame has set an insecure request policy. | 215 // This frame has set an insecure request policy. |
| 216 virtual void didEnforceInsecureRequestPolicy(WebInsecureRequestPolicy) {} | 216 virtual void didEnforceInsecureRequestPolicy(WebInsecureRequestPolicy) {} |
| 217 | 217 |
| 218 // This frame has set an upgrade insecure navigations set. |
| 219 virtual void didEnforceInsecureNavigationsSet(const std::vector<unsigned>&) {} |
| 220 |
| 218 // This frame has been updated to a unique origin, which should be | 221 // This frame has been updated to a unique origin, which should be |
| 219 // considered potentially trustworthy if | 222 // considered potentially trustworthy if |
| 220 // |isPotentiallyTrustworthyUniqueOrigin| is true. TODO(estark): | 223 // |isPotentiallyTrustworthyUniqueOrigin| is true. TODO(estark): |
| 221 // this method only exists to support dynamic sandboxing via a CSP | 224 // this method only exists to support dynamic sandboxing via a CSP |
| 222 // delivered in a <meta> tag. This is not supposed to be allowed per | 225 // delivered in a <meta> tag. This is not supposed to be allowed per |
| 223 // the CSP spec and should be ripped out. https://crbug.com/594645 | 226 // the CSP spec and should be ripped out. https://crbug.com/594645 |
| 224 virtual void didUpdateToUniqueOrigin( | 227 virtual void didUpdateToUniqueOrigin( |
| 225 bool isPotentiallyTrustworthyUniqueOrigin) {} | 228 bool isPotentiallyTrustworthyUniqueOrigin) {} |
| 226 | 229 |
| 227 // The sandbox flags have changed for a child frame of this frame. | 230 // The sandbox flags have changed for a child frame of this frame. |
| (...skipping 530 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 758 // Overwrites the given URL to use an HTML5 embed if possible. | 761 // Overwrites the given URL to use an HTML5 embed if possible. |
| 759 // An empty URL is returned if the URL is not overriden. | 762 // An empty URL is returned if the URL is not overriden. |
| 760 virtual WebURL overrideFlashEmbedWithHTML(const WebURL& url) { | 763 virtual WebURL overrideFlashEmbedWithHTML(const WebURL& url) { |
| 761 return WebURL(); | 764 return WebURL(); |
| 762 } | 765 } |
| 763 }; | 766 }; |
| 764 | 767 |
| 765 } // namespace blink | 768 } // namespace blink |
| 766 | 769 |
| 767 #endif | 770 #endif |
| OLD | NEW |