mirror of
https://bitbucket.org/chromiumembedded/cef
synced 2025-06-05 21:39:12 +02:00
Replace AddCustomScheme bool arguments with int using bit flags
This commit is contained in:
committed by
Marshall Greenblatt
parent
ba8b4e8b9d
commit
c72d57aa60
@@ -2745,6 +2745,90 @@ typedef enum {
|
||||
SSL_CONTENT_RAN_INSECURE_CONTENT = 1 << 1,
|
||||
} cef_ssl_content_status_t;
|
||||
|
||||
//
|
||||
// Configuration options for registering a custom scheme.
|
||||
// These values are used when calling AddCustomScheme.
|
||||
//
|
||||
typedef enum {
|
||||
CEF_SCHEME_OPTION_NONE = 0,
|
||||
|
||||
///
|
||||
// If CEF_SCHEME_OPTION_STANDARD is set the scheme will be treated as a
|
||||
// standard scheme. Standard schemes are subject to URL canonicalization and
|
||||
// parsing rules as defined in the Common Internet Scheme Syntax RFC 1738
|
||||
// Section 3.1 available at http://www.ietf.org/rfc/rfc1738.txt
|
||||
//
|
||||
// In particular, the syntax for standard scheme URLs must be of the form:
|
||||
// <pre>
|
||||
// [scheme]://[username]:[password]@[host]:[port]/[url-path]
|
||||
// </pre> Standard scheme URLs must have a host component that is a fully
|
||||
// qualified domain name as defined in Section 3.5 of RFC 1034 [13] and
|
||||
// Section 2.1 of RFC 1123. These URLs will be canonicalized to
|
||||
// "scheme://host/path" in the simplest case and
|
||||
// "scheme://username:password@host:port/path" in the most explicit case. For
|
||||
// example, "scheme:host/path" and "scheme:///host/path" will both be
|
||||
// canonicalized to "scheme://host/path". The origin of a standard scheme URL
|
||||
// is the combination of scheme, host and port (i.e., "scheme://host:port" in
|
||||
// the most explicit case).
|
||||
//
|
||||
// For non-standard scheme URLs only the "scheme:" component is parsed and
|
||||
// canonicalized. The remainder of the URL will be passed to the handler as-
|
||||
// is. For example, "scheme:///some%20text" will remain the same. Non-standard
|
||||
// scheme URLs cannot be used as a target for form submission.
|
||||
///
|
||||
CEF_SCHEME_OPTION_STANDARD = 1 << 0,
|
||||
|
||||
///
|
||||
// If CEF_SCHEME_OPTION_LOCAL is set the scheme will be treated with the same
|
||||
// security rules as those applied to "file" URLs. Normal pages cannot link to
|
||||
// or access local URLs. Also, by default, local URLs can only perform
|
||||
// XMLHttpRequest calls to the same URL (origin + path) that originated the
|
||||
// request. To allow XMLHttpRequest calls from a local URL to other URLs with
|
||||
// the same origin set the CefSettings.file_access_from_file_urls_allowed
|
||||
// value to true (1). To allow XMLHttpRequest calls from a local URL to all
|
||||
// origins set the CefSettings.universal_access_from_file_urls_allowed value
|
||||
// to true (1).
|
||||
///
|
||||
CEF_SCHEME_OPTION_LOCAL = 1 << 1,
|
||||
|
||||
///
|
||||
// If CEF_SCHEME_OPTION_DISPLAY_ISOLATED is set the scheme can only be
|
||||
// displayed from other content hosted with the same scheme. For example,
|
||||
// pages in other origins cannot create iframes or hyperlinks to URLs with the
|
||||
// scheme. For schemes that must be accessible from other schemes don't set
|
||||
// this, set CEF_SCHEME_OPTION_CORS_ENABLED, and use CORS
|
||||
// "Access-Control-Allow-Origin" headers to further restrict access.
|
||||
///
|
||||
CEF_SCHEME_OPTION_DISPLAY_ISOLATED = 1 << 2,
|
||||
|
||||
///
|
||||
// If CEF_SCHEME_OPTION_SECURE is set the scheme will be treated with the same
|
||||
// security rules as those applied to "https" URLs. For example, loading this
|
||||
// scheme from other secure schemes will not trigger mixed content warnings.
|
||||
///
|
||||
CEF_SCHEME_OPTION_SECURE = 1 << 3,
|
||||
|
||||
///
|
||||
// If CEF_SCHEME_OPTION_CORS_ENABLED is set the scheme can be sent CORS
|
||||
// requests. This value should be set in most cases where
|
||||
// CEF_SCHEME_OPTION_STANDARD is set.
|
||||
///
|
||||
CEF_SCHEME_OPTION_CORS_ENABLED = 1 << 4,
|
||||
|
||||
///
|
||||
// If CEF_SCHEME_OPTION_CSP_BYPASSING is set the scheme can bypass Content-
|
||||
// Security-Policy (CSP) checks. This value should not be set in most cases
|
||||
// where CEF_SCHEME_OPTION_STANDARD is set.
|
||||
///
|
||||
CEF_SCHEME_OPTION_CSP_BYPASSING = 1 << 5,
|
||||
|
||||
///
|
||||
// If CEF_SCHEME_OPTION_FETCH_ENABLED is set the scheme can perform Fetch API
|
||||
// requests.
|
||||
///
|
||||
CEF_SCHEME_OPTION_FETCH_ENABLED = 1 << 6,
|
||||
} cef_scheme_options_t;
|
||||
|
||||
///
|
||||
// Error codes for CDM registration. See cef_web_plugin.h for details.
|
||||
///
|
||||
|
Reference in New Issue
Block a user