Index: third_party/WebKit/Source/web/WebRemoteFrameImpl.cpp |
diff --git a/third_party/WebKit/Source/web/WebRemoteFrameImpl.cpp b/third_party/WebKit/Source/web/WebRemoteFrameImpl.cpp |
index 3fcba5514d4016c656052ed1c962fa0d90d7a9cf..abc05d1fcc14d1d6ceefcfb394d20a69165a6bee 100644 |
--- a/third_party/WebKit/Source/web/WebRemoteFrameImpl.cpp |
+++ b/third_party/WebKit/Source/web/WebRemoteFrameImpl.cpp |
@@ -75,11 +75,6 @@ void WebRemoteFrameImpl::close() { |
m_selfKeepAlive.clear(); |
} |
-WebString WebRemoteFrameImpl::uniqueName() const { |
- NOTREACHED(); |
- return WebString(); |
-} |
- |
WebString WebRemoteFrameImpl::assignedName() const { |
NOTREACHED(); |
return WebString(); |
@@ -328,7 +323,6 @@ WebString WebRemoteFrameImpl::layerTreeAsText(bool showDebugInfo) const { |
WebLocalFrame* WebRemoteFrameImpl::createLocalChild( |
WebTreeScopeType scope, |
const WebString& name, |
- const WebString& uniqueName, |
WebSandboxFlags sandboxFlags, |
WebFrameClient* client, |
blink::InterfaceProvider* interfaceProvider, |
@@ -346,7 +340,7 @@ WebLocalFrame* WebRemoteFrameImpl::createLocalChild( |
// (one from the initial frame creation, and one from swapping it into the |
// remote process). FrameLoader might need a special initialization function |
// for this case to avoid that duplicate navigation. |
- child->initializeCoreFrame(frame()->host(), owner, name, uniqueName); |
+ child->initializeCoreFrame(frame()->host(), owner, name); |
// Partially related with the above FIXME--the init() call may trigger JS |
// dispatch. However, |
// if the parent is remote, it should never be detached synchronously... |
@@ -356,17 +350,15 @@ WebLocalFrame* WebRemoteFrameImpl::createLocalChild( |
void WebRemoteFrameImpl::initializeCoreFrame(FrameHost* host, |
FrameOwner* owner, |
- const AtomicString& name, |
- const AtomicString& uniqueName) { |
+ const AtomicString& name) { |
setCoreFrame(RemoteFrame::create(m_frameClient.get(), host, owner)); |
frame()->createView(); |
- m_frame->tree().setPrecalculatedName(name, uniqueName); |
+ m_frame->tree().setName(name); |
} |
WebRemoteFrame* WebRemoteFrameImpl::createRemoteChild( |
WebTreeScopeType scope, |
const WebString& name, |
- const WebString& uniqueName, |
WebSandboxFlags sandboxFlags, |
WebRemoteFrameClient* client, |
WebFrame* opener) { |
@@ -374,7 +366,7 @@ WebRemoteFrame* WebRemoteFrameImpl::createRemoteChild( |
appendChild(child); |
RemoteFrameOwner* owner = RemoteFrameOwner::create( |
static_cast<SandboxFlags>(sandboxFlags), WebFrameOwnerProperties()); |
- child->initializeCoreFrame(frame()->host(), owner, name, uniqueName); |
+ child->initializeCoreFrame(frame()->host(), owner, name); |
return child; |
} |
@@ -395,8 +387,7 @@ WebRemoteFrameImpl* WebRemoteFrameImpl::fromFrame(RemoteFrame& frame) { |
return static_cast<RemoteFrameClientImpl*>(frame.client())->webFrame(); |
} |
-void WebRemoteFrameImpl::setReplicatedOrigin( |
- const WebSecurityOrigin& origin) const { |
+void WebRemoteFrameImpl::setReplicatedOrigin(const WebSecurityOrigin& origin) { |
DCHECK(frame()); |
frame()->securityContext()->setReplicatedOrigin(origin); |
@@ -415,21 +406,19 @@ void WebRemoteFrameImpl::setReplicatedOrigin( |
} |
} |
-void WebRemoteFrameImpl::setReplicatedSandboxFlags( |
- WebSandboxFlags flags) const { |
+void WebRemoteFrameImpl::setReplicatedSandboxFlags(WebSandboxFlags flags) { |
DCHECK(frame()); |
frame()->securityContext()->enforceSandboxFlags( |
static_cast<SandboxFlags>(flags)); |
} |
-void WebRemoteFrameImpl::setReplicatedName(const WebString& name, |
- const WebString& uniqueName) const { |
+void WebRemoteFrameImpl::setReplicatedName(const WebString& name) { |
DCHECK(frame()); |
- frame()->tree().setPrecalculatedName(name, uniqueName); |
+ frame()->tree().setName(name); |
} |
void WebRemoteFrameImpl::setReplicatedFeaturePolicyHeader( |
- const WebParsedFeaturePolicyHeader& parsedHeader) const { |
+ const WebParsedFeaturePolicyHeader& parsedHeader) { |
if (RuntimeEnabledFeatures::featurePolicyEnabled()) { |
FeaturePolicy* parentFeaturePolicy = nullptr; |
if (parent()) { |
@@ -444,24 +433,24 @@ void WebRemoteFrameImpl::setReplicatedFeaturePolicyHeader( |
void WebRemoteFrameImpl::addReplicatedContentSecurityPolicyHeader( |
const WebString& headerValue, |
WebContentSecurityPolicyType type, |
- WebContentSecurityPolicySource source) const { |
+ WebContentSecurityPolicySource source) { |
frame()->securityContext()->contentSecurityPolicy()->addPolicyFromHeaderValue( |
headerValue, static_cast<ContentSecurityPolicyHeaderType>(type), |
static_cast<ContentSecurityPolicyHeaderSource>(source)); |
} |
-void WebRemoteFrameImpl::resetReplicatedContentSecurityPolicy() const { |
+void WebRemoteFrameImpl::resetReplicatedContentSecurityPolicy() { |
frame()->securityContext()->resetReplicatedContentSecurityPolicy(); |
} |
void WebRemoteFrameImpl::setReplicatedInsecureRequestPolicy( |
- WebInsecureRequestPolicy policy) const { |
+ WebInsecureRequestPolicy policy) { |
DCHECK(frame()); |
frame()->securityContext()->setInsecureRequestPolicy(policy); |
} |
void WebRemoteFrameImpl::setReplicatedPotentiallyTrustworthyUniqueOrigin( |
- bool isUniqueOriginPotentiallyTrustworthy) const { |
+ bool isUniqueOriginPotentiallyTrustworthy) { |
DCHECK(frame()); |
// If |isUniqueOriginPotentiallyTrustworthy| is true, then the origin must be |
// unique. |
@@ -474,7 +463,7 @@ void WebRemoteFrameImpl::setReplicatedPotentiallyTrustworthyUniqueOrigin( |
isUniqueOriginPotentiallyTrustworthy); |
} |
-void WebRemoteFrameImpl::dispatchLoadEventOnFrameOwner() const { |
+void WebRemoteFrameImpl::dispatchLoadEventOnFrameOwner() { |
DCHECK(frame()->owner()->isLocal()); |
frame()->owner()->dispatchLoad(); |
} |