Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "content/browser/frame_host/render_frame_host_manager.h" | 5 #include "content/browser/frame_host/render_frame_host_manager.h" |
| 6 | 6 |
| 7 #include <algorithm> | 7 #include <algorithm> |
| 8 #include <utility> | 8 #include <utility> |
| 9 | 9 |
| 10 #include "base/command_line.h" | 10 #include "base/command_line.h" |
| (...skipping 1166 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 1177 // OnDidUpdateOrigin? | 1177 // OnDidUpdateOrigin? |
| 1178 if (!SiteIsolationPolicy::AreCrossProcessFramesPossible()) | 1178 if (!SiteIsolationPolicy::AreCrossProcessFramesPossible()) |
| 1179 return; | 1179 return; |
| 1180 | 1180 |
| 1181 for (const auto& pair : *proxy_hosts_) { | 1181 for (const auto& pair : *proxy_hosts_) { |
| 1182 pair.second->Send( | 1182 pair.second->Send( |
| 1183 new FrameMsg_DidUpdateName(pair.second->GetRoutingID(), name)); | 1183 new FrameMsg_DidUpdateName(pair.second->GetRoutingID(), name)); |
| 1184 } | 1184 } |
| 1185 } | 1185 } |
| 1186 | 1186 |
| 1187 void RenderFrameHostManager::OnDidUpdateShouldEnforceStrictMixedContentChecking( | |
| 1188 bool should_enforce) { | |
| 1189 for (const auto& pair : *proxy_hosts_) { | |
|
alexmos
2015/12/11 02:52:27
Are there other situations in which another frame'
estark
2015/12/12 01:35:43
Well, it's checked whenever mixed content loads in
| |
| 1190 pair.second->Send( | |
| 1191 new FrameMsg_DidUpdateShouldEnforceStrictMixedContentChecking( | |
| 1192 pair.second->GetRoutingID(), should_enforce)); | |
| 1193 } | |
| 1194 } | |
| 1195 | |
| 1187 void RenderFrameHostManager::OnDidUpdateOrigin(const url::Origin& origin) { | 1196 void RenderFrameHostManager::OnDidUpdateOrigin(const url::Origin& origin) { |
| 1188 if (!SiteIsolationPolicy::IsSwappedOutStateForbidden()) | 1197 if (!SiteIsolationPolicy::IsSwappedOutStateForbidden()) |
| 1189 return; | 1198 return; |
| 1190 | 1199 |
| 1191 for (const auto& pair : *proxy_hosts_) { | 1200 for (const auto& pair : *proxy_hosts_) { |
| 1192 pair.second->Send( | 1201 pair.second->Send( |
| 1193 new FrameMsg_DidUpdateOrigin(pair.second->GetRoutingID(), origin)); | 1202 new FrameMsg_DidUpdateOrigin(pair.second->GetRoutingID(), origin)); |
| 1194 } | 1203 } |
| 1195 } | 1204 } |
| 1196 | 1205 |
| (...skipping 1486 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 2683 int RenderFrameHostManager::GetOpenerRoutingID(SiteInstance* instance) { | 2692 int RenderFrameHostManager::GetOpenerRoutingID(SiteInstance* instance) { |
| 2684 if (!frame_tree_node_->opener()) | 2693 if (!frame_tree_node_->opener()) |
| 2685 return MSG_ROUTING_NONE; | 2694 return MSG_ROUTING_NONE; |
| 2686 | 2695 |
| 2687 return frame_tree_node_->opener() | 2696 return frame_tree_node_->opener() |
| 2688 ->render_manager() | 2697 ->render_manager() |
| 2689 ->GetRoutingIdForSiteInstance(instance); | 2698 ->GetRoutingIdForSiteInstance(instance); |
| 2690 } | 2699 } |
| 2691 | 2700 |
| 2692 } // namespace content | 2701 } // namespace content |
| OLD | NEW |