| Index: content/browser/frame_host/render_frame_host_manager.cc
|
| diff --git a/content/browser/frame_host/render_frame_host_manager.cc b/content/browser/frame_host/render_frame_host_manager.cc
|
| index f2ea2b299d3eba5dae49e59f56e67d5aad973716..2d778a623a0ef8d385fa7512181b50fdaf744c22 100644
|
| --- a/content/browser/frame_host/render_frame_host_manager.cc
|
| +++ b/content/browser/frame_host/render_frame_host_manager.cc
|
| @@ -672,6 +672,9 @@ void RenderFrameHostManager::DidNavigateFrame(
|
| // Make sure any dynamic changes to this frame's sandbox flags that were made
|
| // prior to navigation take effect.
|
| CommitPendingSandboxFlags();
|
| +
|
| + // Reset enforcement of strict mixed content checking.
|
| + frame_tree_node_->SetShouldEnforceStrictMixedContentChecking(false);
|
| }
|
|
|
| void RenderFrameHostManager::CommitPendingIfNecessary(
|
| @@ -1149,6 +1152,15 @@ void RenderFrameHostManager::OnDidUpdateName(const std::string& name) {
|
| }
|
| }
|
|
|
| +void RenderFrameHostManager::OnDidUpdateShouldEnforceStrictMixedContentChecking(
|
| + bool should_enforce) {
|
| + for (const auto& pair : *proxy_hosts_) {
|
| + pair.second->Send(
|
| + new FrameMsg_DidUpdateShouldEnforceStrictMixedContentChecking(
|
| + pair.second->GetRoutingID(), should_enforce));
|
| + }
|
| +}
|
| +
|
| void RenderFrameHostManager::OnDidUpdateOrigin(const url::Origin& origin) {
|
| if (!SiteIsolationPolicy::IsSwappedOutStateForbidden())
|
| return;
|
|
|