Index: third_party/WebKit/Source/web/WebRemoteFrameImpl.cpp |
diff --git a/third_party/WebKit/Source/web/WebRemoteFrameImpl.cpp b/third_party/WebKit/Source/web/WebRemoteFrameImpl.cpp |
index 0b68993725ab0e00e5eca8aa5883bd4e62d39051..22ce474058f800c21d241e290475177322fd4fa6 100644 |
--- a/third_party/WebKit/Source/web/WebRemoteFrameImpl.cpp |
+++ b/third_party/WebKit/Source/web/WebRemoteFrameImpl.cpp |
@@ -79,11 +79,6 @@ void WebRemoteFrameImpl::close() { |
m_selfKeepAlive.clear(); |
} |
-WebString WebRemoteFrameImpl::uniqueName() const { |
- NOTREACHED(); |
- return WebString(); |
-} |
- |
WebString WebRemoteFrameImpl::assignedName() const { |
NOTREACHED(); |
return WebString(); |
@@ -325,7 +320,6 @@ WebString WebRemoteFrameImpl::layerTreeAsText(bool showDebugInfo) const { |
WebLocalFrame* WebRemoteFrameImpl::createLocalChild( |
WebTreeScopeType scope, |
const WebString& name, |
- const WebString& uniqueName, |
WebSandboxFlags sandboxFlags, |
WebFrameClient* client, |
blink::InterfaceProvider* interfaceProvider, |
@@ -343,7 +337,7 @@ WebLocalFrame* WebRemoteFrameImpl::createLocalChild( |
// (one from the initial frame creation, and one from swapping it into the |
// remote process). FrameLoader might need a special initialization function |
// for this case to avoid that duplicate navigation. |
- child->initializeCoreFrame(frame()->host(), owner, name, uniqueName); |
+ child->initializeCoreFrame(frame()->host(), owner, name); |
// Partially related with the above FIXME--the init() call may trigger JS |
// dispatch. However, |
// if the parent is remote, it should never be detached synchronously... |
@@ -353,18 +347,16 @@ WebLocalFrame* WebRemoteFrameImpl::createLocalChild( |
void WebRemoteFrameImpl::initializeCoreFrame(FrameHost* host, |
FrameOwner* owner, |
- const AtomicString& name, |
- const AtomicString& uniqueName) { |
+ const AtomicString& name) { |
setCoreFrame(RemoteFrame::create(m_frameClient.get(), |
host ? &host->page() : nullptr, owner)); |
frame()->createView(); |
- m_frame->tree().setPrecalculatedName(name, uniqueName); |
+ m_frame->tree().setName(name); |
} |
WebRemoteFrame* WebRemoteFrameImpl::createRemoteChild( |
WebTreeScopeType scope, |
const WebString& name, |
- const WebString& uniqueName, |
WebSandboxFlags sandboxFlags, |
WebRemoteFrameClient* client, |
WebFrame* opener) { |
@@ -372,7 +364,7 @@ WebRemoteFrame* WebRemoteFrameImpl::createRemoteChild( |
appendChild(child); |
RemoteFrameOwner* owner = RemoteFrameOwner::create( |
static_cast<SandboxFlags>(sandboxFlags), WebFrameOwnerProperties()); |
- child->initializeCoreFrame(frame()->host(), owner, name, uniqueName); |
+ child->initializeCoreFrame(frame()->host(), owner, name); |
return child; |
} |
@@ -393,8 +385,7 @@ WebRemoteFrameImpl* WebRemoteFrameImpl::fromFrame(RemoteFrame& frame) { |
return static_cast<RemoteFrameClientImpl*>(frame.client())->webFrame(); |
} |
-void WebRemoteFrameImpl::setReplicatedOrigin( |
- const WebSecurityOrigin& origin) const { |
+void WebRemoteFrameImpl::setReplicatedOrigin(const WebSecurityOrigin& origin) { |
DCHECK(frame()); |
frame()->securityContext()->setReplicatedOrigin(origin); |
@@ -413,21 +404,19 @@ void WebRemoteFrameImpl::setReplicatedOrigin( |
} |
} |
-void WebRemoteFrameImpl::setReplicatedSandboxFlags( |
- WebSandboxFlags flags) const { |
+void WebRemoteFrameImpl::setReplicatedSandboxFlags(WebSandboxFlags flags) { |
DCHECK(frame()); |
frame()->securityContext()->enforceSandboxFlags( |
static_cast<SandboxFlags>(flags)); |
} |
-void WebRemoteFrameImpl::setReplicatedName(const WebString& name, |
- const WebString& uniqueName) const { |
+void WebRemoteFrameImpl::setReplicatedName(const WebString& name) { |
DCHECK(frame()); |
- frame()->tree().setPrecalculatedName(name, uniqueName); |
+ frame()->tree().setName(name); |
} |
void WebRemoteFrameImpl::setReplicatedFeaturePolicyHeader( |
- const WebParsedFeaturePolicy& parsedHeader) const { |
+ const WebParsedFeaturePolicy& parsedHeader) { |
if (RuntimeEnabledFeatures::featurePolicyEnabled()) { |
WebFeaturePolicy* parentFeaturePolicy = nullptr; |
if (parent()) { |
@@ -448,24 +437,24 @@ void WebRemoteFrameImpl::setReplicatedFeaturePolicyHeader( |
void WebRemoteFrameImpl::addReplicatedContentSecurityPolicyHeader( |
const WebString& headerValue, |
WebContentSecurityPolicyType type, |
- WebContentSecurityPolicySource source) const { |
+ WebContentSecurityPolicySource source) { |
frame()->securityContext()->contentSecurityPolicy()->addPolicyFromHeaderValue( |
headerValue, static_cast<ContentSecurityPolicyHeaderType>(type), |
static_cast<ContentSecurityPolicyHeaderSource>(source)); |
} |
-void WebRemoteFrameImpl::resetReplicatedContentSecurityPolicy() const { |
+void WebRemoteFrameImpl::resetReplicatedContentSecurityPolicy() { |
frame()->securityContext()->resetReplicatedContentSecurityPolicy(); |
} |
void WebRemoteFrameImpl::setReplicatedInsecureRequestPolicy( |
- WebInsecureRequestPolicy policy) const { |
+ WebInsecureRequestPolicy policy) { |
DCHECK(frame()); |
frame()->securityContext()->setInsecureRequestPolicy(policy); |
} |
void WebRemoteFrameImpl::setReplicatedPotentiallyTrustworthyUniqueOrigin( |
- bool isUniqueOriginPotentiallyTrustworthy) const { |
+ bool isUniqueOriginPotentiallyTrustworthy) { |
DCHECK(frame()); |
// If |isUniqueOriginPotentiallyTrustworthy| is true, then the origin must be |
// unique. |
@@ -478,7 +467,7 @@ void WebRemoteFrameImpl::setReplicatedPotentiallyTrustworthyUniqueOrigin( |
isUniqueOriginPotentiallyTrustworthy); |
} |
-void WebRemoteFrameImpl::dispatchLoadEventOnFrameOwner() const { |
+void WebRemoteFrameImpl::dispatchLoadEventOnFrameOwner() { |
DCHECK(frame()->owner()->isLocal()); |
frame()->owner()->dispatchLoad(); |
} |