Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(40)

Side by Side Diff: content/browser/frame_host/render_frame_host_manager.cc

Issue 1723753002: Make Document::isSecureContext() work for OOPIFs (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: fix WebRemoteFrameImpl assert Created 4 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2013 The Chromium Authors. All rights reserved. 1 // Copyright 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "content/browser/frame_host/render_frame_host_manager.h" 5 #include "content/browser/frame_host/render_frame_host_manager.h"
6 6
7 #include <stddef.h> 7 #include <stddef.h>
8 8
9 #include <algorithm> 9 #include <algorithm>
10 #include <utility> 10 #include <utility>
(...skipping 980 matching lines...) Expand 10 before | Expand all | Expand 10 after
991 bool should_enforce) { 991 bool should_enforce) {
992 if (!SiteIsolationPolicy::AreCrossProcessFramesPossible()) 992 if (!SiteIsolationPolicy::AreCrossProcessFramesPossible())
993 return; 993 return;
994 994
995 for (const auto& pair : proxy_hosts_) { 995 for (const auto& pair : proxy_hosts_) {
996 pair.second->Send(new FrameMsg_EnforceStrictMixedContentChecking( 996 pair.second->Send(new FrameMsg_EnforceStrictMixedContentChecking(
997 pair.second->GetRoutingID(), should_enforce)); 997 pair.second->GetRoutingID(), should_enforce));
998 } 998 }
999 } 999 }
1000 1000
1001 void RenderFrameHostManager::OnSetUniqueOriginPotentiallyTrustworthy(
1002 bool is_unique_origin_potentially_trustworthy) {
1003 if (!SiteIsolationPolicy::AreCrossProcessFramesPossible())
1004 return;
1005
1006 for (const auto& pair : proxy_hosts_) {
1007 pair.second->Send(new FrameMsg_DidSetUniqueOriginPotentiallyTrustworthy(
1008 pair.second->GetRoutingID(), is_unique_origin_potentially_trustworthy));
1009 }
1010 }
1011
1001 void RenderFrameHostManager::OnDidUpdateOrigin(const url::Origin& origin) { 1012 void RenderFrameHostManager::OnDidUpdateOrigin(const url::Origin& origin) {
1002 if (!SiteIsolationPolicy::IsSwappedOutStateForbidden()) 1013 if (!SiteIsolationPolicy::IsSwappedOutStateForbidden())
1003 return; 1014 return;
1004 1015
1005 for (const auto& pair : proxy_hosts_) { 1016 for (const auto& pair : proxy_hosts_) {
1006 pair.second->Send( 1017 pair.second->Send(
1007 new FrameMsg_DidUpdateOrigin(pair.second->GetRoutingID(), origin)); 1018 new FrameMsg_DidUpdateOrigin(pair.second->GetRoutingID(), origin));
1008 } 1019 }
1009 } 1020 }
1010 1021
(...skipping 1529 matching lines...) Expand 10 before | Expand all | Expand 10 after
2540 } else if (pending_render_frame_host_) { 2551 } else if (pending_render_frame_host_) {
2541 send_msg(pending_render_frame_host_.get(), 2552 send_msg(pending_render_frame_host_.get(),
2542 pending_render_frame_host_->GetRoutingID(), msg); 2553 pending_render_frame_host_->GetRoutingID(), msg);
2543 } 2554 }
2544 2555
2545 msg->set_routing_id(render_frame_host_->GetRoutingID()); 2556 msg->set_routing_id(render_frame_host_->GetRoutingID());
2546 render_frame_host_->Send(msg); 2557 render_frame_host_->Send(msg);
2547 } 2558 }
2548 2559
2549 } // namespace content 2560 } // namespace content
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698