| OLD | NEW |
| 1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "content/browser/frame_host/render_frame_host_manager.h" | 5 #include "content/browser/frame_host/render_frame_host_manager.h" |
| 6 | 6 |
| 7 #include <stddef.h> | 7 #include <stddef.h> |
| 8 | 8 |
| 9 #include <algorithm> | 9 #include <algorithm> |
| 10 #include <utility> | 10 #include <utility> |
| (...skipping 980 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 991 bool should_enforce) { | 991 bool should_enforce) { |
| 992 if (!SiteIsolationPolicy::AreCrossProcessFramesPossible()) | 992 if (!SiteIsolationPolicy::AreCrossProcessFramesPossible()) |
| 993 return; | 993 return; |
| 994 | 994 |
| 995 for (const auto& pair : proxy_hosts_) { | 995 for (const auto& pair : proxy_hosts_) { |
| 996 pair.second->Send(new FrameMsg_EnforceStrictMixedContentChecking( | 996 pair.second->Send(new FrameMsg_EnforceStrictMixedContentChecking( |
| 997 pair.second->GetRoutingID(), should_enforce)); | 997 pair.second->GetRoutingID(), should_enforce)); |
| 998 } | 998 } |
| 999 } | 999 } |
| 1000 | 1000 |
| 1001 void RenderFrameHostManager::OnSetUniqueOriginPotentiallyTrustworthy( |
| 1002 bool is_unique_origin_potentially_trustworthy) { |
| 1003 if (!SiteIsolationPolicy::AreCrossProcessFramesPossible()) |
| 1004 return; |
| 1005 |
| 1006 for (const auto& pair : proxy_hosts_) { |
| 1007 pair.second->Send(new FrameMsg_DidSetUniqueOriginPotentiallyTrustworthy( |
| 1008 pair.second->GetRoutingID(), is_unique_origin_potentially_trustworthy)); |
| 1009 } |
| 1010 } |
| 1011 |
| 1001 void RenderFrameHostManager::OnDidUpdateOrigin(const url::Origin& origin) { | 1012 void RenderFrameHostManager::OnDidUpdateOrigin(const url::Origin& origin) { |
| 1002 if (!SiteIsolationPolicy::IsSwappedOutStateForbidden()) | 1013 if (!SiteIsolationPolicy::IsSwappedOutStateForbidden()) |
| 1003 return; | 1014 return; |
| 1004 | 1015 |
| 1005 for (const auto& pair : proxy_hosts_) { | 1016 for (const auto& pair : proxy_hosts_) { |
| 1006 pair.second->Send( | 1017 pair.second->Send( |
| 1007 new FrameMsg_DidUpdateOrigin(pair.second->GetRoutingID(), origin)); | 1018 new FrameMsg_DidUpdateOrigin(pair.second->GetRoutingID(), origin)); |
| 1008 } | 1019 } |
| 1009 } | 1020 } |
| 1010 | 1021 |
| (...skipping 1529 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 2540 } else if (pending_render_frame_host_) { | 2551 } else if (pending_render_frame_host_) { |
| 2541 send_msg(pending_render_frame_host_.get(), | 2552 send_msg(pending_render_frame_host_.get(), |
| 2542 pending_render_frame_host_->GetRoutingID(), msg); | 2553 pending_render_frame_host_->GetRoutingID(), msg); |
| 2543 } | 2554 } |
| 2544 | 2555 |
| 2545 msg->set_routing_id(render_frame_host_->GetRoutingID()); | 2556 msg->set_routing_id(render_frame_host_->GetRoutingID()); |
| 2546 render_frame_host_->Send(msg); | 2557 render_frame_host_->Send(msg); |
| 2547 } | 2558 } |
| 2548 | 2559 |
| 2549 } // namespace content | 2560 } // namespace content |
| OLD | NEW |