| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "chrome/renderer/content_settings_observer.h" | 5 #include "chrome/renderer/content_settings_observer.h" |
| 6 | 6 |
| 7 #include "chrome/common/render_messages.h" | 7 #include "chrome/common/render_messages.h" |
| 8 #include "chrome/common/ssl_insecure_content.h" | 8 #include "chrome/common/ssl_insecure_content.h" |
| 9 #include "content/public/common/url_constants.h" | 9 #include "content/public/common/url_constants.h" |
| 10 #include "content/public/renderer/document_state.h" | 10 #include "content/public/renderer/document_state.h" |
| (...skipping 372 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 383 } | 383 } |
| 384 | 384 |
| 385 bool ContentSettingsObserver::allowMutationEvents(bool default_value) { | 385 bool ContentSettingsObserver::allowMutationEvents(bool default_value) { |
| 386 return IsPlatformApp() ? false : default_value; | 386 return IsPlatformApp() ? false : default_value; |
| 387 } | 387 } |
| 388 | 388 |
| 389 bool ContentSettingsObserver::allowRunningInsecureContent( | 389 bool ContentSettingsObserver::allowRunningInsecureContent( |
| 390 bool allowed_per_settings, | 390 bool allowed_per_settings, |
| 391 const blink::WebSecurityOrigin& origin, | 391 const blink::WebSecurityOrigin& origin, |
| 392 const blink::WebURL& resource_url) { | 392 const blink::WebURL& resource_url) { |
| 393 // Note: this implementation is a mirror of |
| 394 // Browser::ShouldAllowRunningInsecureContent. |
| 393 FilteredReportInsecureContentRan(GURL(resource_url)); | 395 FilteredReportInsecureContentRan(GURL(resource_url)); |
| 394 | 396 |
| 395 if (!allow_running_insecure_content_ && !allowed_per_settings) { | 397 if (!allow_running_insecure_content_ && !allowed_per_settings) { |
| 396 DidBlockContentType(CONTENT_SETTINGS_TYPE_MIXEDSCRIPT); | 398 DidBlockContentType(CONTENT_SETTINGS_TYPE_MIXEDSCRIPT); |
| 397 return false; | 399 return false; |
| 398 } | 400 } |
| 399 | 401 |
| 400 return true; | 402 return true; |
| 401 } | 403 } |
| 402 | 404 |
| 403 bool ContentSettingsObserver::allowAutoplay(bool default_value) { | 405 bool ContentSettingsObserver::allowAutoplay(bool default_value) { |
| 404 if (!content_setting_rules_) | 406 if (!content_setting_rules_) |
| 405 return default_value; | 407 return default_value; |
| 406 | 408 |
| 407 WebFrame* frame = render_frame()->GetWebFrame(); | 409 WebFrame* frame = render_frame()->GetWebFrame(); |
| 408 return GetContentSettingFromRules( | 410 return GetContentSettingFromRules( |
| 409 content_setting_rules_->autoplay_rules, frame, | 411 content_setting_rules_->autoplay_rules, frame, |
| 410 url::Origin(frame->document().getSecurityOrigin()).GetURL()) == | 412 url::Origin(frame->document().getSecurityOrigin()).GetURL()) == |
| 411 CONTENT_SETTING_ALLOW; | 413 CONTENT_SETTING_ALLOW; |
| 412 } | 414 } |
| 413 | 415 |
| 414 void ContentSettingsObserver::passiveInsecureContentFound( | 416 void ContentSettingsObserver::passiveInsecureContentFound( |
| 415 const blink::WebURL& resource_url) { | 417 const blink::WebURL& resource_url) { |
| 418 // Note: this implementation is a mirror of |
| 419 // Browser::PassiveInsecureContentFound. |
| 416 ReportInsecureContent(SslInsecureContentType::DISPLAY); | 420 ReportInsecureContent(SslInsecureContentType::DISPLAY); |
| 417 FilteredReportInsecureContentDisplayed(GURL(resource_url)); | 421 FilteredReportInsecureContentDisplayed(GURL(resource_url)); |
| 418 } | 422 } |
| 419 | 423 |
| 420 void ContentSettingsObserver::didNotAllowPlugins() { | 424 void ContentSettingsObserver::didNotAllowPlugins() { |
| 421 DidBlockContentType(CONTENT_SETTINGS_TYPE_PLUGINS); | 425 DidBlockContentType(CONTENT_SETTINGS_TYPE_PLUGINS); |
| 422 } | 426 } |
| 423 | 427 |
| 424 void ContentSettingsObserver::didNotAllowScript() { | 428 void ContentSettingsObserver::didNotAllowScript() { |
| 425 DidBlockContentType(CONTENT_SETTINGS_TYPE_JAVASCRIPT); | 429 DidBlockContentType(CONTENT_SETTINGS_TYPE_JAVASCRIPT); |
| (...skipping 104 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 530 #endif | 534 #endif |
| 531 | 535 |
| 532 // If the scheme is file:, an empty file name indicates a directory listing, | 536 // If the scheme is file:, an empty file name indicates a directory listing, |
| 533 // which requires JavaScript to function properly. | 537 // which requires JavaScript to function properly. |
| 534 if (protocol == url::kFileScheme && | 538 if (protocol == url::kFileScheme && |
| 535 document_url.protocolIs(url::kFileScheme)) { | 539 document_url.protocolIs(url::kFileScheme)) { |
| 536 return GURL(document_url).ExtractFileName().empty(); | 540 return GURL(document_url).ExtractFileName().empty(); |
| 537 } | 541 } |
| 538 return false; | 542 return false; |
| 539 } | 543 } |
| OLD | NEW |