OLD | NEW |
1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "content/browser/frame_host/render_frame_host_manager.h" | 5 #include "content/browser/frame_host/render_frame_host_manager.h" |
6 | 6 |
7 #include <stddef.h> | 7 #include <stddef.h> |
8 | 8 |
9 #include <algorithm> | 9 #include <algorithm> |
10 #include <utility> | 10 #include <utility> |
(...skipping 917 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
928 // WebView). Don't send the update to proxies in those cases. | 928 // WebView). Don't send the update to proxies in those cases. |
929 if (!SiteIsolationPolicy::AreCrossProcessFramesPossible()) | 929 if (!SiteIsolationPolicy::AreCrossProcessFramesPossible()) |
930 return; | 930 return; |
931 | 931 |
932 for (const auto& pair : proxy_hosts_) { | 932 for (const auto& pair : proxy_hosts_) { |
933 pair.second->Send(new FrameMsg_DidUpdateName(pair.second->GetRoutingID(), | 933 pair.second->Send(new FrameMsg_DidUpdateName(pair.second->GetRoutingID(), |
934 name, unique_name)); | 934 name, unique_name)); |
935 } | 935 } |
936 } | 936 } |
937 | 937 |
| 938 void RenderFrameHostManager::OnDidAddContentSecurityPolicy( |
| 939 const ContentSecurityPolicyHeader& header) { |
| 940 if (!SiteIsolationPolicy::AreCrossProcessFramesPossible()) |
| 941 return; |
| 942 |
| 943 for (const auto& pair : proxy_hosts_) { |
| 944 pair.second->Send(new FrameMsg_AddContentSecurityPolicy( |
| 945 pair.second->GetRoutingID(), header)); |
| 946 } |
| 947 } |
| 948 |
| 949 void RenderFrameHostManager::OnDidResetContentSecurityPolicy() { |
| 950 if (!SiteIsolationPolicy::AreCrossProcessFramesPossible()) |
| 951 return; |
| 952 |
| 953 for (const auto& pair : proxy_hosts_) { |
| 954 pair.second->Send( |
| 955 new FrameMsg_ResetContentSecurityPolicy(pair.second->GetRoutingID())); |
| 956 } |
| 957 } |
| 958 |
938 void RenderFrameHostManager::OnEnforceStrictMixedContentChecking( | 959 void RenderFrameHostManager::OnEnforceStrictMixedContentChecking( |
939 bool should_enforce) { | 960 bool should_enforce) { |
940 if (!SiteIsolationPolicy::AreCrossProcessFramesPossible()) | 961 if (!SiteIsolationPolicy::AreCrossProcessFramesPossible()) |
941 return; | 962 return; |
942 | 963 |
943 for (const auto& pair : proxy_hosts_) { | 964 for (const auto& pair : proxy_hosts_) { |
944 pair.second->Send(new FrameMsg_EnforceStrictMixedContentChecking( | 965 pair.second->Send(new FrameMsg_EnforceStrictMixedContentChecking( |
945 pair.second->GetRoutingID(), should_enforce)); | 966 pair.second->GetRoutingID(), should_enforce)); |
946 } | 967 } |
947 } | 968 } |
(...skipping 1617 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
2565 resolved_url)) { | 2586 resolved_url)) { |
2566 DCHECK(!dest_instance || | 2587 DCHECK(!dest_instance || |
2567 dest_instance == render_frame_host_->GetSiteInstance()); | 2588 dest_instance == render_frame_host_->GetSiteInstance()); |
2568 return false; | 2589 return false; |
2569 } | 2590 } |
2570 | 2591 |
2571 return true; | 2592 return true; |
2572 } | 2593 } |
2573 | 2594 |
2574 } // namespace content | 2595 } // namespace content |
OLD | NEW |