Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(102)

Side by Side Diff: third_party/WebKit/Source/core/frame/LocalFrameClient.h

Issue 2764993002: CSP: group policies in didAddContentSecurityPolicy. (Closed)
Patch Set: Group the IPC instead of splitting them. (browser -> renderer) Created 3 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 /* 1 /*
2 * Copyright (C) 2006, 2007, 2008, 2009, 2010, 2011, 2012 Apple Inc. All rights 2 * Copyright (C) 2006, 2007, 2008, 2009, 2010, 2011, 2012 Apple Inc. All rights
3 * reserved. 3 * reserved.
4 * Copyright (C) 2012 Google Inc. All rights reserved. 4 * Copyright (C) 2012 Google Inc. All rights reserved.
5 * 5 *
6 * Redistribution and use in source and binary forms, with or without 6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions 7 * modification, are permitted provided that the following conditions
8 * are met: 8 * are met:
9 * 9 *
10 * 1. Redistributions of source code must retain the above copyright 10 * 1. Redistributions of source code must retain the above copyright
(...skipping 262 matching lines...) Expand 10 before | Expand all | Expand 10 after
273 virtual void didUpdateToUniqueOrigin() {} 273 virtual void didUpdateToUniqueOrigin() {}
274 274
275 virtual void didChangeSandboxFlags(Frame* childFrame, SandboxFlags) {} 275 virtual void didChangeSandboxFlags(Frame* childFrame, SandboxFlags) {}
276 276
277 virtual void didSetFeaturePolicyHeader( 277 virtual void didSetFeaturePolicyHeader(
278 const WebParsedFeaturePolicy& parsedHeader) {} 278 const WebParsedFeaturePolicy& parsedHeader) {}
279 279
280 // Called when a new Content Security Policy is added to the frame's document. 280 // Called when a new Content Security Policy is added to the frame's document.
281 // This can be triggered by handling of HTTP headers, handling of <meta> 281 // This can be triggered by handling of HTTP headers, handling of <meta>
282 // element, or by inheriting CSP from the parent (in case of about:blank). 282 // element, or by inheriting CSP from the parent (in case of about:blank).
283 virtual void didAddContentSecurityPolicy( 283 virtual void didAddContentSecurityPolicies(
284 const String& headerValue, 284 const blink::WebVector<WebContentSecurityPolicyPolicy>&) {}
285 ContentSecurityPolicyHeaderType,
286 ContentSecurityPolicyHeaderSource,
287 const std::vector<WebContentSecurityPolicyPolicy>&) {}
288 285
289 virtual void didChangeFrameOwnerProperties(HTMLFrameElementBase*) {} 286 virtual void didChangeFrameOwnerProperties(HTMLFrameElementBase*) {}
290 287
291 virtual void dispatchWillStartUsingPeerConnectionHandler( 288 virtual void dispatchWillStartUsingPeerConnectionHandler(
292 WebRTCPeerConnectionHandler*) {} 289 WebRTCPeerConnectionHandler*) {}
293 290
294 virtual bool allowWebGL(bool enabledPerSettings) { 291 virtual bool allowWebGL(bool enabledPerSettings) {
295 return enabledPerSettings; 292 return enabledPerSettings;
296 } 293 }
297 294
(...skipping 42 matching lines...) Expand 10 before | Expand all | Expand 10 after
340 virtual KURL overrideFlashEmbedWithHTML(const KURL&) { return KURL(); } 337 virtual KURL overrideFlashEmbedWithHTML(const KURL&) { return KURL(); }
341 338
342 virtual BlameContext* frameBlameContext() { return nullptr; } 339 virtual BlameContext* frameBlameContext() { return nullptr; }
343 340
344 virtual void setHasReceivedUserGesture() {} 341 virtual void setHasReceivedUserGesture() {}
345 }; 342 };
346 343
347 } // namespace blink 344 } // namespace blink
348 345
349 #endif // LocalFrameClient_h 346 #endif // LocalFrameClient_h
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698