Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(115)

Side by Side Diff: content/browser/frame_host/render_frame_host_manager.cc

Issue 1489253002: Plumb document's strict mixed content checking for RemoteFrames (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: fix transition type for test crashes Created 5 years ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2013 The Chromium Authors. All rights reserved. 1 // Copyright 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "content/browser/frame_host/render_frame_host_manager.h" 5 #include "content/browser/frame_host/render_frame_host_manager.h"
6 6
7 #include <algorithm> 7 #include <algorithm>
8 #include <utility> 8 #include <utility>
9 9
10 #include "base/command_line.h" 10 #include "base/command_line.h"
(...skipping 1166 matching lines...) Expand 10 before | Expand all | Expand 10 after
1177 // OnDidUpdateOrigin? 1177 // OnDidUpdateOrigin?
1178 if (!SiteIsolationPolicy::AreCrossProcessFramesPossible()) 1178 if (!SiteIsolationPolicy::AreCrossProcessFramesPossible())
1179 return; 1179 return;
1180 1180
1181 for (const auto& pair : *proxy_hosts_) { 1181 for (const auto& pair : *proxy_hosts_) {
1182 pair.second->Send( 1182 pair.second->Send(
1183 new FrameMsg_DidUpdateName(pair.second->GetRoutingID(), name)); 1183 new FrameMsg_DidUpdateName(pair.second->GetRoutingID(), name));
1184 } 1184 }
1185 } 1185 }
1186 1186
1187 void RenderFrameHostManager::OnDidUpdateShouldEnforceStrictMixedContentChecking(
1188 bool should_enforce) {
1189 for (const auto& pair : *proxy_hosts_) {
alexmos 2015/12/11 02:52:27 Are there other situations in which another frame'
estark 2015/12/12 01:35:43 Well, it's checked whenever mixed content loads in
1190 pair.second->Send(
1191 new FrameMsg_DidUpdateShouldEnforceStrictMixedContentChecking(
1192 pair.second->GetRoutingID(), should_enforce));
1193 }
1194 }
1195
1187 void RenderFrameHostManager::OnDidUpdateOrigin(const url::Origin& origin) { 1196 void RenderFrameHostManager::OnDidUpdateOrigin(const url::Origin& origin) {
1188 if (!SiteIsolationPolicy::IsSwappedOutStateForbidden()) 1197 if (!SiteIsolationPolicy::IsSwappedOutStateForbidden())
1189 return; 1198 return;
1190 1199
1191 for (const auto& pair : *proxy_hosts_) { 1200 for (const auto& pair : *proxy_hosts_) {
1192 pair.second->Send( 1201 pair.second->Send(
1193 new FrameMsg_DidUpdateOrigin(pair.second->GetRoutingID(), origin)); 1202 new FrameMsg_DidUpdateOrigin(pair.second->GetRoutingID(), origin));
1194 } 1203 }
1195 } 1204 }
1196 1205
(...skipping 1486 matching lines...) Expand 10 before | Expand all | Expand 10 after
2683 int RenderFrameHostManager::GetOpenerRoutingID(SiteInstance* instance) { 2692 int RenderFrameHostManager::GetOpenerRoutingID(SiteInstance* instance) {
2684 if (!frame_tree_node_->opener()) 2693 if (!frame_tree_node_->opener())
2685 return MSG_ROUTING_NONE; 2694 return MSG_ROUTING_NONE;
2686 2695
2687 return frame_tree_node_->opener() 2696 return frame_tree_node_->opener()
2688 ->render_manager() 2697 ->render_manager()
2689 ->GetRoutingIdForSiteInstance(instance); 2698 ->GetRoutingIdForSiteInstance(instance);
2690 } 2699 }
2691 2700
2692 } // namespace content 2701 } // namespace content
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698