OLD | NEW |
1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "content/browser/frame_host/render_frame_host_manager.h" | 5 #include "content/browser/frame_host/render_frame_host_manager.h" |
6 | 6 |
7 #include <stddef.h> | 7 #include <stddef.h> |
8 | 8 |
9 #include <algorithm> | 9 #include <algorithm> |
10 #include <utility> | 10 #include <utility> |
(...skipping 980 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
991 bool should_enforce) { | 991 bool should_enforce) { |
992 if (!SiteIsolationPolicy::AreCrossProcessFramesPossible()) | 992 if (!SiteIsolationPolicy::AreCrossProcessFramesPossible()) |
993 return; | 993 return; |
994 | 994 |
995 for (const auto& pair : proxy_hosts_) { | 995 for (const auto& pair : proxy_hosts_) { |
996 pair.second->Send(new FrameMsg_EnforceStrictMixedContentChecking( | 996 pair.second->Send(new FrameMsg_EnforceStrictMixedContentChecking( |
997 pair.second->GetRoutingID(), should_enforce)); | 997 pair.second->GetRoutingID(), should_enforce)); |
998 } | 998 } |
999 } | 999 } |
1000 | 1000 |
| 1001 void RenderFrameHostManager::OnSetUniqueOriginPotentiallyTrustworthy( |
| 1002 bool is_unique_origin_potentially_trustworthy) { |
| 1003 if (!SiteIsolationPolicy::AreCrossProcessFramesPossible()) |
| 1004 return; |
| 1005 |
| 1006 for (const auto& pair : proxy_hosts_) { |
| 1007 pair.second->Send(new FrameMsg_DidSetUniqueOriginPotentiallyTrustworthy( |
| 1008 pair.second->GetRoutingID(), is_unique_origin_potentially_trustworthy)); |
| 1009 } |
| 1010 } |
| 1011 |
1001 void RenderFrameHostManager::OnDidUpdateOrigin(const url::Origin& origin) { | 1012 void RenderFrameHostManager::OnDidUpdateOrigin(const url::Origin& origin) { |
1002 if (!SiteIsolationPolicy::IsSwappedOutStateForbidden()) | 1013 if (!SiteIsolationPolicy::IsSwappedOutStateForbidden()) |
1003 return; | 1014 return; |
1004 | 1015 |
1005 for (const auto& pair : proxy_hosts_) { | 1016 for (const auto& pair : proxy_hosts_) { |
1006 pair.second->Send( | 1017 pair.second->Send( |
1007 new FrameMsg_DidUpdateOrigin(pair.second->GetRoutingID(), origin)); | 1018 new FrameMsg_DidUpdateOrigin(pair.second->GetRoutingID(), origin)); |
1008 } | 1019 } |
1009 } | 1020 } |
1010 | 1021 |
(...skipping 1529 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
2540 } else if (pending_render_frame_host_) { | 2551 } else if (pending_render_frame_host_) { |
2541 send_msg(pending_render_frame_host_.get(), | 2552 send_msg(pending_render_frame_host_.get(), |
2542 pending_render_frame_host_->GetRoutingID(), msg); | 2553 pending_render_frame_host_->GetRoutingID(), msg); |
2543 } | 2554 } |
2544 | 2555 |
2545 msg->set_routing_id(render_frame_host_->GetRoutingID()); | 2556 msg->set_routing_id(render_frame_host_->GetRoutingID()); |
2546 render_frame_host_->Send(msg); | 2557 render_frame_host_->Send(msg); |
2547 } | 2558 } |
2548 | 2559 |
2549 } // namespace content | 2560 } // namespace content |
OLD | NEW |