OLD | NEW |
---|---|
1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "content/browser/frame_host/render_frame_host_manager.h" | 5 #include "content/browser/frame_host/render_frame_host_manager.h" |
6 | 6 |
7 #include <algorithm> | 7 #include <algorithm> |
8 #include <utility> | 8 #include <utility> |
9 | 9 |
10 #include "base/command_line.h" | 10 #include "base/command_line.h" |
(...skipping 1166 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
1177 // OnDidUpdateOrigin? | 1177 // OnDidUpdateOrigin? |
1178 if (!SiteIsolationPolicy::AreCrossProcessFramesPossible()) | 1178 if (!SiteIsolationPolicy::AreCrossProcessFramesPossible()) |
1179 return; | 1179 return; |
1180 | 1180 |
1181 for (const auto& pair : *proxy_hosts_) { | 1181 for (const auto& pair : *proxy_hosts_) { |
1182 pair.second->Send( | 1182 pair.second->Send( |
1183 new FrameMsg_DidUpdateName(pair.second->GetRoutingID(), name)); | 1183 new FrameMsg_DidUpdateName(pair.second->GetRoutingID(), name)); |
1184 } | 1184 } |
1185 } | 1185 } |
1186 | 1186 |
1187 void RenderFrameHostManager::OnDidUpdateShouldEnforceStrictMixedContentChecking( | |
1188 bool should_enforce) { | |
1189 for (const auto& pair : *proxy_hosts_) { | |
alexmos
2015/12/11 02:52:27
Are there other situations in which another frame'
estark
2015/12/12 01:35:43
Well, it's checked whenever mixed content loads in
| |
1190 pair.second->Send( | |
1191 new FrameMsg_DidUpdateShouldEnforceStrictMixedContentChecking( | |
1192 pair.second->GetRoutingID(), should_enforce)); | |
1193 } | |
1194 } | |
1195 | |
1187 void RenderFrameHostManager::OnDidUpdateOrigin(const url::Origin& origin) { | 1196 void RenderFrameHostManager::OnDidUpdateOrigin(const url::Origin& origin) { |
1188 if (!SiteIsolationPolicy::IsSwappedOutStateForbidden()) | 1197 if (!SiteIsolationPolicy::IsSwappedOutStateForbidden()) |
1189 return; | 1198 return; |
1190 | 1199 |
1191 for (const auto& pair : *proxy_hosts_) { | 1200 for (const auto& pair : *proxy_hosts_) { |
1192 pair.second->Send( | 1201 pair.second->Send( |
1193 new FrameMsg_DidUpdateOrigin(pair.second->GetRoutingID(), origin)); | 1202 new FrameMsg_DidUpdateOrigin(pair.second->GetRoutingID(), origin)); |
1194 } | 1203 } |
1195 } | 1204 } |
1196 | 1205 |
(...skipping 1486 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
2683 int RenderFrameHostManager::GetOpenerRoutingID(SiteInstance* instance) { | 2692 int RenderFrameHostManager::GetOpenerRoutingID(SiteInstance* instance) { |
2684 if (!frame_tree_node_->opener()) | 2693 if (!frame_tree_node_->opener()) |
2685 return MSG_ROUTING_NONE; | 2694 return MSG_ROUTING_NONE; |
2686 | 2695 |
2687 return frame_tree_node_->opener() | 2696 return frame_tree_node_->opener() |
2688 ->render_manager() | 2697 ->render_manager() |
2689 ->GetRoutingIdForSiteInstance(instance); | 2698 ->GetRoutingIdForSiteInstance(instance); |
2690 } | 2699 } |
2691 | 2700 |
2692 } // namespace content | 2701 } // namespace content |
OLD | NEW |