Chromium Code Reviews| Index: content/common/frame_replication_state.h |
| diff --git a/content/common/frame_replication_state.h b/content/common/frame_replication_state.h |
| new file mode 100644 |
| index 0000000000000000000000000000000000000000..2bdf2d223b46defad673e90fba3c74860aff4e08 |
| --- /dev/null |
| +++ b/content/common/frame_replication_state.h |
| @@ -0,0 +1,32 @@ |
| +// Copyright 2014 The Chromium Authors. All rights reserved. |
| +// Use of this source code is governed by a BSD-style license that can be |
| +// found in the LICENSE file. |
| + |
| +#ifndef CONTENT_FRAME_REPLICATION_STATE_H_ |
| +#define CONTENT_FRAME_REPLICATION_STATE_H_ |
| + |
| +#include "content/common/content_export.h" |
| +#include "url/origin.h" |
| + |
| +namespace content { |
| + |
| +// This structure holds information that needs to be replicated from a local |
|
Charlie Reis
2014/11/13 18:00:58
Let's use the content names for LocalFrame and Rem
alexmos
2014/11/18 18:25:32
Done.
|
| +// frame to any of its associated remote frames. |
| +struct CONTENT_EXPORT FrameReplicationState { |
| + FrameReplicationState(); |
| + ~FrameReplicationState(); |
| + |
| + // Current security origin of the frame (can be empty for unique origins). |
| + url::Origin origin; |
|
alexmos
2014/11/12 00:05:47
Is using url::Origin the right thing here? Althou
Charlie Reis
2014/11/13 18:00:58
Hmm, I agree that url::Origin seems a bit limited
alexmos
2014/11/18 18:25:32
After our discussion, and reading the discussion o
|
| + |
| + // Whether the origin is unique. |
| + bool is_unique_origin; |
| + |
| + // TODO(alexmos): Add other properties of SecurityOrigins, such as |
| + // SandboxFlags. Eventually, this structure can also hold other state that |
| + // needs to be replicated, such as frame sizing info. |
| +}; |
| + |
| +} // namespace content |
| + |
| +#endif // CONTENT_FRAME_REPLICATION_STATE_H_ |