| Index: third_party/WebKit/Source/core/loader/MixedContentChecker.h
|
| diff --git a/third_party/WebKit/Source/core/loader/MixedContentChecker.h b/third_party/WebKit/Source/core/loader/MixedContentChecker.h
|
| index 33e8a1a82f912cf420a7de0e7aa3d51d85ed4f20..7aca72fdab9c65c8ae594b98cac4629d95808d8d 100644
|
| --- a/third_party/WebKit/Source/core/loader/MixedContentChecker.h
|
| +++ b/third_party/WebKit/Source/core/loader/MixedContentChecker.h
|
| @@ -47,6 +47,14 @@ class KURL;
|
| class ResourceResponse;
|
| class SecurityOrigin;
|
|
|
| +// Checks resource loads for mixed content. If PlzNavigate is enabled then this
|
| +// class only checks for sub-resource loads while frame-level loads are
|
| +// delegated to the browser where they are checked by
|
| +// MixedContentNavigationThrottle. Changes to this class might need to be
|
| +// reflected on its browser counterpart.
|
| +//
|
| +// Current mixed content W3C draft that drives this implementation:
|
| +// https://w3c.github.io/webappsec-mixed-content/
|
| class CORE_EXPORT MixedContentChecker final {
|
| WTF_MAKE_NONCOPYABLE(MixedContentChecker);
|
| DISALLOW_NEW();
|
| @@ -94,6 +102,14 @@ class CORE_EXPORT MixedContentChecker final {
|
| WebURLRequest::FrameType,
|
| WebURLRequest::RequestContext);
|
|
|
| + // Receive information about mixed content found externally.
|
| + static void mixedContentFound(LocalFrame*,
|
| + const KURL& mainResourceUrl,
|
| + const KURL& mixedContentUrl,
|
| + WebURLRequest::RequestContext,
|
| + bool wasAllowed,
|
| + bool hadRedirect);
|
| +
|
| private:
|
| FRIEND_TEST_ALL_PREFIXES(MixedContentCheckerTest, HandleCertificateError);
|
|
|
|
|