diff options
Diffstat (limited to 'WebKit/win/Interfaces/IWebViewPrivate.idl')
| -rw-r--r-- | WebKit/win/Interfaces/IWebViewPrivate.idl | 47 |
1 files changed, 47 insertions, 0 deletions
diff --git a/WebKit/win/Interfaces/IWebViewPrivate.idl b/WebKit/win/Interfaces/IWebViewPrivate.idl index e4680a1..465d804 100644 --- a/WebKit/win/Interfaces/IWebViewPrivate.idl +++ b/WebKit/win/Interfaces/IWebViewPrivate.idl @@ -29,15 +29,26 @@ import "ocidl.idl"; import "IWebFormDelegate.idl"; import "IWebFrameLoadDelegatePrivate.idl"; import "IWebInspector.idl"; +import "IWebInspectorPrivate.idl"; #endif +// Sent when IWebView::close is called. No userInfo is associated with this notification. +cpp_quote("#define WebViewWillCloseNotification L\"WebViewWillCloseNotification\"") + interface IEnumTextMatches; interface IWebFormDelegate; interface IWebFrameLoadDelegatePrivate; interface IWebInspector; +interface IWebInspectorPrivate; +interface IWebPluginHalterDelegate; interface IWebURLRequest; interface IWebView; +typedef enum { + WebInjectAtDocumentStart = 0, + WebInjectAtDocumentEnd, +} WebUserScriptInjectionTime; + [ object, oleautomation, @@ -161,4 +172,40 @@ interface IWebViewPrivate : IUnknown HRESULT setJavaScriptURLsAreAllowed([in] BOOL areAllowed); HRESULT setCanStartPlugins([in] BOOL canStartPlugins); + + /*! + @method MIMETypeForExtension: + @abstract Returns the mime type for a certian file extension. + @param path The extension of the file to check. + @result The mime type of the specified extension. + + (BSTR)MIMETypeForPath:(NSString *)path; + */ + HRESULT MIMETypeForExtension([in] BSTR extension, [out, retval] BSTR* mimeType); + + // For the following functions, 0 < worldID < UINT_MAX. + HRESULT addUserScriptToGroup([in] BSTR groupName, [in] unsigned worldID, [in] BSTR source, [in] BSTR url, + [in] unsigned whitelistCount, [in, size_is(whitelistCount)] BSTR* whitelist, + [in] unsigned blacklistCount, [in, size_is(blacklistCount)] BSTR* blacklist, + [in] WebUserScriptInjectionTime injectionTime); + HRESULT addUserStyleSheetToGroup([in] BSTR groupName, [in] unsigned worldID, [in] BSTR source, [in] BSTR url, + [in] unsigned whitelistCount, [in, size_is(whitelistCount)] BSTR* whitelist, + [in] unsigned blacklistCount, [in, size_is(blacklistCount)] BSTR* blacklist); + HRESULT removeUserContentWithURLFromGroup([in] BSTR groupName, [in] unsigned worldID, [in] BSTR url); + HRESULT removeUserContentFromGroup([in] BSTR groupName, [in] unsigned worldID); + HRESULT removeAllUserContentFromGroup([in] BSTR groupName); + + HRESULT setPluginHalterDelegate([in] IWebPluginHalterDelegate* d); + HRESULT pluginHalterDelegate([retval, out] IWebPluginHalterDelegate** d); + + // If rect is 0, the entire backing store will be invalidated. + HRESULT invalidateBackingStore([in] const RECT* rect); + + // Whitelists access from an origin (sourceOrigin) to a set of one or more origins described by the parameters: + // - destinationProtocol: The protocol to grant access to. + // - destinationHost: The host to grant access to. + // - allowDestinationSubdomains: If host is a domain, setting this to YES will whitelist host and all its subdomains, recursively. + HRESULT whiteListAccessFromOrigin([in] BSTR sourceOrigin, [in] BSTR destinationProtocol, [in] BSTR destinationHost, [in] BOOL allowDestinationSubdomains); + + // Removes all white list entries created with whiteListAccessFromOrigin. + HRESULT resetOriginAccessWhiteLists(); } |
