| OLD | NEW |
| 1 /* | 1 /* |
| 2 * Copyright (C) 2006, 2007, 2008, 2009, 2010, 2011, 2012 Apple Inc. All rights | 2 * Copyright (C) 2006, 2007, 2008, 2009, 2010, 2011, 2012 Apple Inc. All rights |
| 3 * reserved. | 3 * reserved. |
| 4 * Copyright (C) 2012 Google Inc. All rights reserved. | 4 * Copyright (C) 2012 Google Inc. All rights reserved. |
| 5 * | 5 * |
| 6 * Redistribution and use in source and binary forms, with or without | 6 * Redistribution and use in source and binary forms, with or without |
| 7 * modification, are permitted provided that the following conditions | 7 * modification, are permitted provided that the following conditions |
| 8 * are met: | 8 * are met: |
| 9 * | 9 * |
| 10 * 1. Redistributions of source code must retain the above copyright | 10 * 1. Redistributions of source code must retain the above copyright |
| (...skipping 253 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 264 | 264 |
| 265 virtual void didChangeName(const String& name, const String& uniqueName) {} | 265 virtual void didChangeName(const String& name, const String& uniqueName) {} |
| 266 | 266 |
| 267 virtual void didEnforceInsecureRequestPolicy(WebInsecureRequestPolicy) {} | 267 virtual void didEnforceInsecureRequestPolicy(WebInsecureRequestPolicy) {} |
| 268 | 268 |
| 269 virtual void didUpdateToUniqueOrigin() {} | 269 virtual void didUpdateToUniqueOrigin() {} |
| 270 | 270 |
| 271 virtual void didChangeSandboxFlags(Frame* childFrame, SandboxFlags) {} | 271 virtual void didChangeSandboxFlags(Frame* childFrame, SandboxFlags) {} |
| 272 | 272 |
| 273 virtual void didSetFeaturePolicyHeader( | 273 virtual void didSetFeaturePolicyHeader( |
| 274 const WebParsedFeaturePolicy& parsedHeader) {} | 274 const WebParsedFeaturePolicyHeader& parsedHeader) {} |
| 275 | 275 |
| 276 // Called when a new Content Security Policy is added to the frame's document. | 276 // Called when a new Content Security Policy is added to the frame's document. |
| 277 // This can be triggered by handling of HTTP headers, handling of <meta> | 277 // This can be triggered by handling of HTTP headers, handling of <meta> |
| 278 // element, or by inheriting CSP from the parent (in case of about:blank). | 278 // element, or by inheriting CSP from the parent (in case of about:blank). |
| 279 virtual void didAddContentSecurityPolicy(const String& headerValue, | 279 virtual void didAddContentSecurityPolicy(const String& headerValue, |
| 280 ContentSecurityPolicyHeaderType, | 280 ContentSecurityPolicyHeaderType, |
| 281 ContentSecurityPolicyHeaderSource) {} | 281 ContentSecurityPolicyHeaderSource) {} |
| 282 | 282 |
| 283 virtual void didChangeFrameOwnerProperties(HTMLFrameElementBase*) {} | 283 virtual void didChangeFrameOwnerProperties(HTMLFrameElementBase*) {} |
| 284 | 284 |
| (...skipping 51 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 336 // Overwrites the given URL to use an HTML5 embed if possible. An empty URL is | 336 // Overwrites the given URL to use an HTML5 embed if possible. An empty URL is |
| 337 // returned if the URL is not overriden. | 337 // returned if the URL is not overriden. |
| 338 virtual KURL overrideFlashEmbedWithHTML(const KURL&) { return KURL(); } | 338 virtual KURL overrideFlashEmbedWithHTML(const KURL&) { return KURL(); } |
| 339 | 339 |
| 340 virtual BlameContext* frameBlameContext() { return nullptr; } | 340 virtual BlameContext* frameBlameContext() { return nullptr; } |
| 341 }; | 341 }; |
| 342 | 342 |
| 343 } // namespace blink | 343 } // namespace blink |
| 344 | 344 |
| 345 #endif // FrameLoaderClient_h | 345 #endif // FrameLoaderClient_h |
| OLD | NEW |