Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #ifndef CONTENT_BROWSER_FRAME_HOST_FRAME_TREE_NODE_H_ | 5 #ifndef CONTENT_BROWSER_FRAME_HOST_FRAME_TREE_NODE_H_ |
| 6 #define CONTENT_BROWSER_FRAME_HOST_FRAME_TREE_NODE_H_ | 6 #define CONTENT_BROWSER_FRAME_HOST_FRAME_TREE_NODE_H_ |
| 7 | 7 |
| 8 #include <stddef.h> | 8 #include <stddef.h> |
| 9 | 9 |
| 10 #include <memory> | 10 #include <memory> |
| (...skipping 149 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 160 void AddContentSecurityPolicy(const ContentSecurityPolicyHeader& header); | 160 void AddContentSecurityPolicy(const ContentSecurityPolicyHeader& header); |
| 161 | 161 |
| 162 // Discards previous CSP headers and notifies proxies about the update. | 162 // Discards previous CSP headers and notifies proxies about the update. |
| 163 // Typically invoked after committing navigation to a new document (since the | 163 // Typically invoked after committing navigation to a new document (since the |
| 164 // new document comes with a fresh set of CSP http headers). | 164 // new document comes with a fresh set of CSP http headers). |
| 165 void ResetContentSecurityPolicy(); | 165 void ResetContentSecurityPolicy(); |
| 166 | 166 |
| 167 // Sets the current insecure request policy, and notifies proxies about the | 167 // Sets the current insecure request policy, and notifies proxies about the |
| 168 // update. | 168 // update. |
| 169 void SetInsecureRequestPolicy(blink::WebInsecureRequestPolicy policy); | 169 void SetInsecureRequestPolicy(blink::WebInsecureRequestPolicy policy); |
| 170 void SetInsecureNavigationsSet( | |
| 171 const std::vector<unsigned>& insecure_navigations_set); | |
|
nasko
2016/12/08 22:45:44
Please be explicit. Unsigned int?
arthursonzogni
2016/12/09 11:06:50
I agree, but at the same time I tried to stay cohe
| |
| 170 | 172 |
| 171 // Returns the currently active sandbox flags for this frame. This includes | 173 // Returns the currently active sandbox flags for this frame. This includes |
| 172 // flags inherited from parent frames and the currently active flags from the | 174 // flags inherited from parent frames and the currently active flags from the |
| 173 // <iframe> element hosting this frame. This does not include flags that | 175 // <iframe> element hosting this frame. This does not include flags that |
| 174 // have been updated in an <iframe> element but have not taken effect yet; | 176 // have been updated in an <iframe> element but have not taken effect yet; |
| 175 // use pending_sandbox_flags() for those. | 177 // use pending_sandbox_flags() for those. |
| 176 blink::WebSandboxFlags effective_sandbox_flags() const { | 178 blink::WebSandboxFlags effective_sandbox_flags() const { |
| 177 return replication_state_.sandbox_flags; | 179 return replication_state_.sandbox_flags; |
| 178 } | 180 } |
| 179 | 181 |
| (...skipping 198 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 378 // browser process activities to this node (when possible). It is unrelated | 380 // browser process activities to this node (when possible). It is unrelated |
| 379 // to the core logic of FrameTreeNode. | 381 // to the core logic of FrameTreeNode. |
| 380 FrameTreeNodeBlameContext blame_context_; | 382 FrameTreeNodeBlameContext blame_context_; |
| 381 | 383 |
| 382 DISALLOW_COPY_AND_ASSIGN(FrameTreeNode); | 384 DISALLOW_COPY_AND_ASSIGN(FrameTreeNode); |
| 383 }; | 385 }; |
| 384 | 386 |
| 385 } // namespace content | 387 } // namespace content |
| 386 | 388 |
| 387 #endif // CONTENT_BROWSER_FRAME_HOST_FRAME_TREE_NODE_H_ | 389 #endif // CONTENT_BROWSER_FRAME_HOST_FRAME_TREE_NODE_H_ |
| OLD | NEW |