| OLD | NEW |
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #ifndef WebRemoteFrame_h | 5 #ifndef WebRemoteFrame_h |
| 6 #define WebRemoteFrame_h | 6 #define WebRemoteFrame_h |
| 7 | 7 |
| 8 #include "public/platform/WebContentSecurityPolicy.h" | 8 #include "public/platform/WebContentSecurityPolicy.h" |
| 9 #include "public/platform/WebFeaturePolicy.h" | 9 #include "public/platform/WebFeaturePolicy.h" |
| 10 #include "public/platform/WebInsecureRequestPolicy.h" | 10 #include "public/platform/WebInsecureRequestPolicy.h" |
| (...skipping 16 matching lines...) Expand all Loading... |
| 27 WebRemoteFrameClient*, | 27 WebRemoteFrameClient*, |
| 28 WebFrame* opener = nullptr); | 28 WebFrame* opener = nullptr); |
| 29 | 29 |
| 30 // Functions for the embedder replicate the frame tree between processes. | 30 // Functions for the embedder replicate the frame tree between processes. |
| 31 // TODO(dcheng): The embedder currently does not replicate local frames in | 31 // TODO(dcheng): The embedder currently does not replicate local frames in |
| 32 // insertion order, so the local child version takes a previous sibling to | 32 // insertion order, so the local child version takes a previous sibling to |
| 33 // ensure that it is inserted into the correct location in the list of | 33 // ensure that it is inserted into the correct location in the list of |
| 34 // children. | 34 // children. |
| 35 virtual WebLocalFrame* createLocalChild(WebTreeScopeType, | 35 virtual WebLocalFrame* createLocalChild(WebTreeScopeType, |
| 36 const WebString& name, | 36 const WebString& name, |
| 37 const WebString& uniqueName, | |
| 38 WebSandboxFlags, | 37 WebSandboxFlags, |
| 39 WebFrameClient*, | 38 WebFrameClient*, |
| 40 blink::InterfaceProvider*, | 39 blink::InterfaceProvider*, |
| 41 blink::InterfaceRegistry*, | 40 blink::InterfaceRegistry*, |
| 42 WebFrame* previousSibling, | 41 WebFrame* previousSibling, |
| 43 const WebFrameOwnerProperties&, | 42 const WebFrameOwnerProperties&, |
| 44 WebFrame* opener) = 0; | 43 WebFrame* opener) = 0; |
| 45 | 44 |
| 46 virtual WebRemoteFrame* createRemoteChild(WebTreeScopeType, | 45 virtual WebRemoteFrame* createRemoteChild(WebTreeScopeType, |
| 47 const WebString& name, | 46 const WebString& name, |
| 48 const WebString& uniqueName, | |
| 49 WebSandboxFlags, | 47 WebSandboxFlags, |
| 50 WebRemoteFrameClient*, | 48 WebRemoteFrameClient*, |
| 51 WebFrame* opener) = 0; | 49 WebFrame* opener) = 0; |
| 52 | 50 |
| 53 // Layer for the in-process compositor. | 51 // Layer for the in-process compositor. |
| 54 virtual void setWebLayer(WebLayer*) = 0; | 52 virtual void setWebLayer(WebLayer*) = 0; |
| 55 | 53 |
| 56 // Set security origin replicated from another process. | 54 // Set security origin replicated from another process. |
| 57 virtual void setReplicatedOrigin(const WebSecurityOrigin&) const = 0; | 55 virtual void setReplicatedOrigin(const WebSecurityOrigin&) = 0; |
| 58 | 56 |
| 59 // Set sandbox flags replicated from another process. | 57 // Set sandbox flags replicated from another process. |
| 60 virtual void setReplicatedSandboxFlags(WebSandboxFlags) const = 0; | 58 virtual void setReplicatedSandboxFlags(WebSandboxFlags) = 0; |
| 61 | 59 |
| 62 // Set frame |name| and |uniqueName| replicated from another process. | 60 // Set frame |name| replicated from another process. |
| 63 virtual void setReplicatedName(const WebString& name, | 61 virtual void setReplicatedName(const WebString&) = 0; |
| 64 const WebString& uniqueName) const = 0; | |
| 65 | 62 |
| 66 virtual void setReplicatedFeaturePolicyHeader( | 63 virtual void setReplicatedFeaturePolicyHeader( |
| 67 const WebParsedFeaturePolicyHeader& parsedHeader) const = 0; | 64 const WebParsedFeaturePolicyHeader& parsedHeader) = 0; |
| 68 | 65 |
| 69 // Adds |header| to the set of replicated CSP headers. | 66 // Adds |header| to the set of replicated CSP headers. |
| 70 virtual void addReplicatedContentSecurityPolicyHeader( | 67 virtual void addReplicatedContentSecurityPolicyHeader( |
| 71 const WebString& headerValue, | 68 const WebString& headerValue, |
| 72 WebContentSecurityPolicyType, | 69 WebContentSecurityPolicyType, |
| 73 WebContentSecurityPolicySource) const = 0; | 70 WebContentSecurityPolicySource) = 0; |
| 74 | 71 |
| 75 // Resets replicated CSP headers to an empty set. | 72 // Resets replicated CSP headers to an empty set. |
| 76 virtual void resetReplicatedContentSecurityPolicy() const = 0; | 73 virtual void resetReplicatedContentSecurityPolicy() = 0; |
| 77 | 74 |
| 78 // Set frame enforcement of insecure request policy replicated from another | 75 // Set frame enforcement of insecure request policy replicated from another |
| 79 // process. | 76 // process. |
| 80 virtual void setReplicatedInsecureRequestPolicy( | 77 virtual void setReplicatedInsecureRequestPolicy(WebInsecureRequestPolicy) = 0; |
| 81 WebInsecureRequestPolicy) const = 0; | |
| 82 | 78 |
| 83 // Set the frame to a unique origin that is potentially trustworthy, | 79 // Set the frame to a unique origin that is potentially trustworthy, |
| 84 // replicated from another process. | 80 // replicated from another process. |
| 85 virtual void setReplicatedPotentiallyTrustworthyUniqueOrigin(bool) const = 0; | 81 virtual void setReplicatedPotentiallyTrustworthyUniqueOrigin(bool) = 0; |
| 86 | 82 |
| 87 virtual void dispatchLoadEventOnFrameOwner() const = 0; | 83 virtual void dispatchLoadEventOnFrameOwner() = 0; |
| 88 | 84 |
| 89 virtual void didStartLoading() = 0; | 85 virtual void didStartLoading() = 0; |
| 90 virtual void didStopLoading() = 0; | 86 virtual void didStopLoading() = 0; |
| 91 | 87 |
| 92 // Returns true if this frame should be ignored during hittesting. | 88 // Returns true if this frame should be ignored during hittesting. |
| 93 virtual bool isIgnoredForHitTest() const = 0; | 89 virtual bool isIgnoredForHitTest() const = 0; |
| 94 | 90 |
| 95 // This is called in OOPIF scenarios when an element contained in this | 91 // This is called in OOPIF scenarios when an element contained in this |
| 96 // frame is about to enter fullscreen. This frame's owner | 92 // frame is about to enter fullscreen. This frame's owner |
| 97 // corresponds to the HTMLFrameOwnerElement to be fullscreened. Calling | 93 // corresponds to the HTMLFrameOwnerElement to be fullscreened. Calling |
| (...skipping 15 matching lines...) Expand all Loading... |
| 113 // to call these on a WebRemoteFrame. | 109 // to call these on a WebRemoteFrame. |
| 114 bool isWebLocalFrame() const override = 0; | 110 bool isWebLocalFrame() const override = 0; |
| 115 WebLocalFrame* toWebLocalFrame() override = 0; | 111 WebLocalFrame* toWebLocalFrame() override = 0; |
| 116 bool isWebRemoteFrame() const override = 0; | 112 bool isWebRemoteFrame() const override = 0; |
| 117 WebRemoteFrame* toWebRemoteFrame() override = 0; | 113 WebRemoteFrame* toWebRemoteFrame() override = 0; |
| 118 }; | 114 }; |
| 119 | 115 |
| 120 } // namespace blink | 116 } // namespace blink |
| 121 | 117 |
| 122 #endif // WebRemoteFrame_h | 118 #endif // WebRemoteFrame_h |
| OLD | NEW |