Index: third_party/WebKit/public/web/WebFrame.h |
diff --git a/third_party/WebKit/public/web/WebFrame.h b/third_party/WebKit/public/web/WebFrame.h |
index 204841a2590e031d78f127c2e2b8164db325188a..ea7abf1d51ff3d01828ef3a40eaa4dff2fb479e7 100644 |
--- a/third_party/WebKit/public/web/WebFrame.h |
+++ b/third_party/WebKit/public/web/WebFrame.h |
@@ -64,12 +64,8 @@ enum class WebSandboxFlags; |
struct WebFrameOwnerProperties; |
struct WebPrintParams; |
struct WebRect; |
-struct WebScriptSource; |
struct WebSize; |
-template <typename T> |
-class WebVector; |
- |
// Frames may be rendered in process ('local') or out of process ('remote'). |
// A remote frame is always cross-site; a local frame may be either same-site or |
// cross-site. |
@@ -215,59 +211,6 @@ class BLINK_EXPORT WebFrame { |
// Returns the global proxy object. |
virtual v8::Local<v8::Object> GlobalProxy() const = 0; |
- // Executes JavaScript in a new world associated with the web frame. |
- // The script gets its own global scope and its own prototypes for |
- // intrinsic JavaScript objects (String, Array, and so-on). It also |
- // gets its own wrappers for all DOM nodes and DOM constructors. |
- // |
- // worldID must be > 0 (as 0 represents the main world). |
- // worldID must be < EmbedderWorldIdLimit, high number used internally. |
- virtual void ExecuteScriptInIsolatedWorld(int world_id, |
- const WebScriptSource* sources, |
- unsigned num_sources) = 0; |
- |
- // Associates an isolated world (see above for description) with a security |
- // origin. XMLHttpRequest instances used in that world will be considered |
- // to come from that origin, not the frame's. |
- virtual void SetIsolatedWorldSecurityOrigin(int world_id, |
- const WebSecurityOrigin&) = 0; |
- |
- // Associates a content security policy with an isolated world. This policy |
- // should be used when evaluating script in the isolated world, and should |
- // also replace a protected resource's CSP when evaluating resources |
- // injected into the DOM. |
- // |
- // FIXME: Setting this simply bypasses the protected resource's CSP. It |
- // doesn't yet restrict the isolated world to the provided policy. |
- virtual void SetIsolatedWorldContentSecurityPolicy(int world_id, |
- const WebString&) = 0; |
- |
- // Calls window.gc() if it is defined. |
- virtual void CollectGarbage() = 0; |
- |
- // Executes script in the context of the current page and returns the value |
- // that the script evaluated to. |
- // DEPRECATED: Use WebLocalFrame::requestExecuteScriptAndReturnValue. |
- virtual v8::Local<v8::Value> ExecuteScriptAndReturnValue( |
- const WebScriptSource&) = 0; |
- |
- // worldID must be > 0 (as 0 represents the main world). |
- // worldID must be < EmbedderWorldIdLimit, high number used internally. |
- // DEPRECATED: Use WebLocalFrame::requestExecuteScriptInIsolatedWorld. |
- virtual void ExecuteScriptInIsolatedWorld( |
- int world_id, |
- const WebScriptSource* sources_in, |
- unsigned num_sources, |
- WebVector<v8::Local<v8::Value>>* results) = 0; |
- |
- // Call the function with the given receiver and arguments, bypassing |
- // canExecute(). |
- virtual v8::Local<v8::Value> CallFunctionEvenIfScriptDisabled( |
- v8::Local<v8::Function>, |
- v8::Local<v8::Value>, |
- int argc, |
- v8::Local<v8::Value> argv[]) = 0; |
- |
// Returns true if the WebFrame currently executing JavaScript has access |
// to the given WebFrame, or false otherwise. |
static bool ScriptCanAccess(WebFrame*); |