Index: content/common/frame_replication_state.h |
diff --git a/content/common/frame_replication_state.h b/content/common/frame_replication_state.h |
new file mode 100644 |
index 0000000000000000000000000000000000000000..2bdf2d223b46defad673e90fba3c74860aff4e08 |
--- /dev/null |
+++ b/content/common/frame_replication_state.h |
@@ -0,0 +1,32 @@ |
+// Copyright 2014 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#ifndef CONTENT_FRAME_REPLICATION_STATE_H_ |
+#define CONTENT_FRAME_REPLICATION_STATE_H_ |
+ |
+#include "content/common/content_export.h" |
+#include "url/origin.h" |
+ |
+namespace content { |
+ |
+// This structure holds information that needs to be replicated from a local |
Charlie Reis
2014/11/13 18:00:58
Let's use the content names for LocalFrame and Rem
alexmos
2014/11/18 18:25:32
Done.
|
+// frame to any of its associated remote frames. |
+struct CONTENT_EXPORT FrameReplicationState { |
+ FrameReplicationState(); |
+ ~FrameReplicationState(); |
+ |
+ // Current security origin of the frame (can be empty for unique origins). |
+ url::Origin origin; |
alexmos
2014/11/12 00:05:47
Is using url::Origin the right thing here? Althou
Charlie Reis
2014/11/13 18:00:58
Hmm, I agree that url::Origin seems a bit limited
alexmos
2014/11/18 18:25:32
After our discussion, and reading the discussion o
|
+ |
+ // Whether the origin is unique. |
+ bool is_unique_origin; |
+ |
+ // TODO(alexmos): Add other properties of SecurityOrigins, such as |
+ // SandboxFlags. Eventually, this structure can also hold other state that |
+ // needs to be replicated, such as frame sizing info. |
+}; |
+ |
+} // namespace content |
+ |
+#endif // CONTENT_FRAME_REPLICATION_STATE_H_ |