Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(620)

Side by Side Diff: third_party/WebKit/public/web/WebRemoteFrame.h

Issue 2714943004: Move unique name generation and tracking into //content. (Closed)
Patch Set: . Created 3 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2014 The Chromium Authors. All rights reserved. 1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #ifndef WebRemoteFrame_h 5 #ifndef WebRemoteFrame_h
6 #define WebRemoteFrame_h 6 #define WebRemoteFrame_h
7 7
8 #include "public/platform/WebContentSecurityPolicy.h" 8 #include "public/platform/WebContentSecurityPolicy.h"
9 #include "public/platform/WebFeaturePolicy.h" 9 #include "public/platform/WebFeaturePolicy.h"
10 #include "public/platform/WebInsecureRequestPolicy.h" 10 #include "public/platform/WebInsecureRequestPolicy.h"
(...skipping 16 matching lines...) Expand all
27 WebRemoteFrameClient*, 27 WebRemoteFrameClient*,
28 WebFrame* opener = nullptr); 28 WebFrame* opener = nullptr);
29 29
30 // Functions for the embedder replicate the frame tree between processes. 30 // Functions for the embedder replicate the frame tree between processes.
31 // TODO(dcheng): The embedder currently does not replicate local frames in 31 // TODO(dcheng): The embedder currently does not replicate local frames in
32 // insertion order, so the local child version takes a previous sibling to 32 // insertion order, so the local child version takes a previous sibling to
33 // ensure that it is inserted into the correct location in the list of 33 // ensure that it is inserted into the correct location in the list of
34 // children. 34 // children.
35 virtual WebLocalFrame* createLocalChild(WebTreeScopeType, 35 virtual WebLocalFrame* createLocalChild(WebTreeScopeType,
36 const WebString& name, 36 const WebString& name,
37 const WebString& uniqueName,
38 WebSandboxFlags, 37 WebSandboxFlags,
39 WebFrameClient*, 38 WebFrameClient*,
40 blink::InterfaceProvider*, 39 blink::InterfaceProvider*,
41 blink::InterfaceRegistry*, 40 blink::InterfaceRegistry*,
42 WebFrame* previousSibling, 41 WebFrame* previousSibling,
43 const WebFrameOwnerProperties&, 42 const WebFrameOwnerProperties&,
44 WebFrame* opener) = 0; 43 WebFrame* opener) = 0;
45 44
46 virtual WebRemoteFrame* createRemoteChild(WebTreeScopeType, 45 virtual WebRemoteFrame* createRemoteChild(WebTreeScopeType,
47 const WebString& name, 46 const WebString& name,
48 const WebString& uniqueName,
49 WebSandboxFlags, 47 WebSandboxFlags,
50 WebRemoteFrameClient*, 48 WebRemoteFrameClient*,
51 WebFrame* opener) = 0; 49 WebFrame* opener) = 0;
52 50
53 // Layer for the in-process compositor. 51 // Layer for the in-process compositor.
54 virtual void setWebLayer(WebLayer*) = 0; 52 virtual void setWebLayer(WebLayer*) = 0;
55 53
56 // Set security origin replicated from another process. 54 // Set security origin replicated from another process.
57 virtual void setReplicatedOrigin(const WebSecurityOrigin&) const = 0; 55 virtual void setReplicatedOrigin(const WebSecurityOrigin&) = 0;
58 56
59 // Set sandbox flags replicated from another process. 57 // Set sandbox flags replicated from another process.
60 virtual void setReplicatedSandboxFlags(WebSandboxFlags) const = 0; 58 virtual void setReplicatedSandboxFlags(WebSandboxFlags) = 0;
61 59
62 // Set frame |name| and |uniqueName| replicated from another process. 60 // Set frame |name| replicated from another process.
63 virtual void setReplicatedName(const WebString& name, 61 virtual void setReplicatedName(const WebString&) = 0;
64 const WebString& uniqueName) const = 0;
65 62
66 virtual void setReplicatedFeaturePolicyHeader( 63 virtual void setReplicatedFeaturePolicyHeader(
67 const WebParsedFeaturePolicyHeader& parsedHeader) const = 0; 64 const WebParsedFeaturePolicyHeader& parsedHeader) = 0;
68 65
69 // Adds |header| to the set of replicated CSP headers. 66 // Adds |header| to the set of replicated CSP headers.
70 virtual void addReplicatedContentSecurityPolicyHeader( 67 virtual void addReplicatedContentSecurityPolicyHeader(
71 const WebString& headerValue, 68 const WebString& headerValue,
72 WebContentSecurityPolicyType, 69 WebContentSecurityPolicyType,
73 WebContentSecurityPolicySource) const = 0; 70 WebContentSecurityPolicySource) = 0;
74 71
75 // Resets replicated CSP headers to an empty set. 72 // Resets replicated CSP headers to an empty set.
76 virtual void resetReplicatedContentSecurityPolicy() const = 0; 73 virtual void resetReplicatedContentSecurityPolicy() = 0;
77 74
78 // Set frame enforcement of insecure request policy replicated from another 75 // Set frame enforcement of insecure request policy replicated from another
79 // process. 76 // process.
80 virtual void setReplicatedInsecureRequestPolicy( 77 virtual void setReplicatedInsecureRequestPolicy(WebInsecureRequestPolicy) = 0;
81 WebInsecureRequestPolicy) const = 0;
82 78
83 // Set the frame to a unique origin that is potentially trustworthy, 79 // Set the frame to a unique origin that is potentially trustworthy,
84 // replicated from another process. 80 // replicated from another process.
85 virtual void setReplicatedPotentiallyTrustworthyUniqueOrigin(bool) const = 0; 81 virtual void setReplicatedPotentiallyTrustworthyUniqueOrigin(bool) = 0;
86 82
87 virtual void dispatchLoadEventOnFrameOwner() const = 0; 83 virtual void dispatchLoadEventOnFrameOwner() = 0;
88 84
89 virtual void didStartLoading() = 0; 85 virtual void didStartLoading() = 0;
90 virtual void didStopLoading() = 0; 86 virtual void didStopLoading() = 0;
91 87
92 // Returns true if this frame should be ignored during hittesting. 88 // Returns true if this frame should be ignored during hittesting.
93 virtual bool isIgnoredForHitTest() const = 0; 89 virtual bool isIgnoredForHitTest() const = 0;
94 90
95 // This is called in OOPIF scenarios when an element contained in this 91 // This is called in OOPIF scenarios when an element contained in this
96 // frame is about to enter fullscreen. This frame's owner 92 // frame is about to enter fullscreen. This frame's owner
97 // corresponds to the HTMLFrameOwnerElement to be fullscreened. Calling 93 // corresponds to the HTMLFrameOwnerElement to be fullscreened. Calling
(...skipping 15 matching lines...) Expand all
113 // to call these on a WebRemoteFrame. 109 // to call these on a WebRemoteFrame.
114 bool isWebLocalFrame() const override = 0; 110 bool isWebLocalFrame() const override = 0;
115 WebLocalFrame* toWebLocalFrame() override = 0; 111 WebLocalFrame* toWebLocalFrame() override = 0;
116 bool isWebRemoteFrame() const override = 0; 112 bool isWebRemoteFrame() const override = 0;
117 WebRemoteFrame* toWebRemoteFrame() override = 0; 113 WebRemoteFrame* toWebRemoteFrame() override = 0;
118 }; 114 };
119 115
120 } // namespace blink 116 } // namespace blink
121 117
122 #endif // WebRemoteFrame_h 118 #endif // WebRemoteFrame_h
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698