OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/renderer/content_settings_observer.h" | 5 #include "chrome/renderer/content_settings_observer.h" |
6 | 6 |
7 #include "chrome/common/render_messages.h" | 7 #include "chrome/common/render_messages.h" |
8 #include "chrome/common/ssl_insecure_content.h" | 8 #include "chrome/common/ssl_insecure_content.h" |
9 #include "content/public/common/url_constants.h" | 9 #include "content/public/common/url_constants.h" |
10 #include "content/public/renderer/document_state.h" | 10 #include "content/public/renderer/document_state.h" |
(...skipping 388 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
399 } | 399 } |
400 | 400 |
401 bool ContentSettingsObserver::allowMutationEvents(bool default_value) { | 401 bool ContentSettingsObserver::allowMutationEvents(bool default_value) { |
402 return IsPlatformApp() ? false : default_value; | 402 return IsPlatformApp() ? false : default_value; |
403 } | 403 } |
404 | 404 |
405 bool ContentSettingsObserver::allowRunningInsecureContent( | 405 bool ContentSettingsObserver::allowRunningInsecureContent( |
406 bool allowed_per_settings, | 406 bool allowed_per_settings, |
407 const blink::WebSecurityOrigin& origin, | 407 const blink::WebSecurityOrigin& origin, |
408 const blink::WebURL& resource_url) { | 408 const blink::WebURL& resource_url) { |
| 409 // Note: this implementation is a mirror of |
| 410 // Browser::ShouldAllowRunningInsecureContent. |
409 FilteredReportInsecureContentRan(GURL(resource_url)); | 411 FilteredReportInsecureContentRan(GURL(resource_url)); |
410 | 412 |
411 if (!allow_running_insecure_content_ && !allowed_per_settings) { | 413 if (!allow_running_insecure_content_ && !allowed_per_settings) { |
412 DidBlockContentType(CONTENT_SETTINGS_TYPE_MIXEDSCRIPT); | 414 DidBlockContentType(CONTENT_SETTINGS_TYPE_MIXEDSCRIPT); |
413 return false; | 415 return false; |
414 } | 416 } |
415 | 417 |
416 return true; | 418 return true; |
417 } | 419 } |
418 | 420 |
419 bool ContentSettingsObserver::allowAutoplay(bool default_value) { | 421 bool ContentSettingsObserver::allowAutoplay(bool default_value) { |
420 if (!content_setting_rules_) | 422 if (!content_setting_rules_) |
421 return default_value; | 423 return default_value; |
422 | 424 |
423 WebFrame* frame = render_frame()->GetWebFrame(); | 425 WebFrame* frame = render_frame()->GetWebFrame(); |
424 return GetContentSettingFromRules( | 426 return GetContentSettingFromRules( |
425 content_setting_rules_->autoplay_rules, frame, | 427 content_setting_rules_->autoplay_rules, frame, |
426 url::Origin(frame->document().getSecurityOrigin()).GetURL()) == | 428 url::Origin(frame->document().getSecurityOrigin()).GetURL()) == |
427 CONTENT_SETTING_ALLOW; | 429 CONTENT_SETTING_ALLOW; |
428 } | 430 } |
429 | 431 |
430 void ContentSettingsObserver::passiveInsecureContentFound( | 432 void ContentSettingsObserver::passiveInsecureContentFound( |
431 const blink::WebURL& resource_url) { | 433 const blink::WebURL& resource_url) { |
| 434 // Note: this implementation is a mirror of |
| 435 // Browser::PassiveInsecureContentFound. |
432 ReportInsecureContent(SslInsecureContentType::DISPLAY); | 436 ReportInsecureContent(SslInsecureContentType::DISPLAY); |
433 FilteredReportInsecureContentDisplayed(GURL(resource_url)); | 437 FilteredReportInsecureContentDisplayed(GURL(resource_url)); |
434 } | 438 } |
435 | 439 |
436 void ContentSettingsObserver::didNotAllowPlugins() { | 440 void ContentSettingsObserver::didNotAllowPlugins() { |
437 DidBlockContentType(CONTENT_SETTINGS_TYPE_PLUGINS); | 441 DidBlockContentType(CONTENT_SETTINGS_TYPE_PLUGINS); |
438 } | 442 } |
439 | 443 |
440 void ContentSettingsObserver::didNotAllowScript() { | 444 void ContentSettingsObserver::didNotAllowScript() { |
441 DidBlockContentType(CONTENT_SETTINGS_TYPE_JAVASCRIPT); | 445 DidBlockContentType(CONTENT_SETTINGS_TYPE_JAVASCRIPT); |
(...skipping 93 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
535 #endif | 539 #endif |
536 | 540 |
537 // If the scheme is file:, an empty file name indicates a directory listing, | 541 // If the scheme is file:, an empty file name indicates a directory listing, |
538 // which requires JavaScript to function properly. | 542 // which requires JavaScript to function properly. |
539 if (protocol == url::kFileScheme && | 543 if (protocol == url::kFileScheme && |
540 document_url.protocolIs(url::kFileScheme)) { | 544 document_url.protocolIs(url::kFileScheme)) { |
541 return GURL(document_url).ExtractFileName().empty(); | 545 return GURL(document_url).ExtractFileName().empty(); |
542 } | 546 } |
543 return false; | 547 return false; |
544 } | 548 } |
OLD | NEW |