OLD | NEW |
1 /* | 1 /* |
2 * Copyright (C) 2009, 2012 Google Inc. All rights reserved. | 2 * Copyright (C) 2009, 2012 Google Inc. All rights reserved. |
3 * Copyright (C) 2011 Apple Inc. All rights reserved. | 3 * Copyright (C) 2011 Apple Inc. All rights reserved. |
4 * | 4 * |
5 * Redistribution and use in source and binary forms, with or without | 5 * Redistribution and use in source and binary forms, with or without |
6 * modification, are permitted provided that the following conditions are | 6 * modification, are permitted provided that the following conditions are |
7 * met: | 7 * met: |
8 * | 8 * |
9 * * Redistributions of source code must retain the above copyright | 9 * * Redistributions of source code must retain the above copyright |
10 * notice, this list of conditions and the following disclaimer. | 10 * notice, this list of conditions and the following disclaimer. |
(...skipping 194 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
205 | 205 |
206 bool FrameLoaderClientImpl::allowImage(bool enabledPerSettings, const KURL& imag
eURL) | 206 bool FrameLoaderClientImpl::allowImage(bool enabledPerSettings, const KURL& imag
eURL) |
207 { | 207 { |
208 WebViewImpl* webview = m_webFrame->viewImpl(); | 208 WebViewImpl* webview = m_webFrame->viewImpl(); |
209 if (webview && webview->permissionClient()) | 209 if (webview && webview->permissionClient()) |
210 return webview->permissionClient()->allowImage(m_webFrame, enabledPerSet
tings, imageURL); | 210 return webview->permissionClient()->allowImage(m_webFrame, enabledPerSet
tings, imageURL); |
211 | 211 |
212 return enabledPerSettings; | 212 return enabledPerSettings; |
213 } | 213 } |
214 | 214 |
| 215 bool FrameLoaderClientImpl::allowMedia(bool enabledPerSettings, const KURL& medi
aURL) |
| 216 { |
| 217 WebViewImpl* webview = m_webFrame->viewImpl(); |
| 218 if (webview && webview->permissionClient()) |
| 219 return webview->permissionClient()->allowMedia(m_webFrame, enabledPerSet
tings, mediaURL); |
| 220 |
| 221 return enabledPerSettings; |
| 222 } |
| 223 |
215 bool FrameLoaderClientImpl::allowDisplayingInsecureContent(bool enabledPerSettin
gs, SecurityOrigin* context, const KURL& url) | 224 bool FrameLoaderClientImpl::allowDisplayingInsecureContent(bool enabledPerSettin
gs, SecurityOrigin* context, const KURL& url) |
216 { | 225 { |
217 WebViewImpl* webview = m_webFrame->viewImpl(); | 226 WebViewImpl* webview = m_webFrame->viewImpl(); |
218 if (webview && webview->permissionClient()) | 227 if (webview && webview->permissionClient()) |
219 return webview->permissionClient()->allowDisplayingInsecureContent(m_web
Frame, enabledPerSettings, WebSecurityOrigin(context), WebURL(url)); | 228 return webview->permissionClient()->allowDisplayingInsecureContent(m_web
Frame, enabledPerSettings, WebSecurityOrigin(context), WebURL(url)); |
220 | 229 |
221 return enabledPerSettings; | 230 return enabledPerSettings; |
222 } | 231 } |
223 | 232 |
224 bool FrameLoaderClientImpl::allowRunningInsecureContent(bool enabledPerSettings,
SecurityOrigin* context, const KURL& url) | 233 bool FrameLoaderClientImpl::allowRunningInsecureContent(bool enabledPerSettings,
SecurityOrigin* context, const KURL& url) |
(...skipping 542 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
767 return adoptPtr(m_webFrame->client()->createServiceWorkerProvider(m_webFrame
, client.leakPtr())); | 776 return adoptPtr(m_webFrame->client()->createServiceWorkerProvider(m_webFrame
, client.leakPtr())); |
768 } | 777 } |
769 | 778 |
770 void FrameLoaderClientImpl::didStopAllLoaders() | 779 void FrameLoaderClientImpl::didStopAllLoaders() |
771 { | 780 { |
772 if (m_webFrame->client()) | 781 if (m_webFrame->client()) |
773 m_webFrame->client()->didAbortLoading(m_webFrame); | 782 m_webFrame->client()->didAbortLoading(m_webFrame); |
774 } | 783 } |
775 | 784 |
776 } // namespace WebKit | 785 } // namespace WebKit |
OLD | NEW |