Index: content/browser/frame_host/render_frame_host_manager.cc |
diff --git a/content/browser/frame_host/render_frame_host_manager.cc b/content/browser/frame_host/render_frame_host_manager.cc |
index 58c17d54c34798e0e070878e4e572a594f41a3a3..845cd2e9e2bc3d4e8c7b1c53c211fed92644f744 100644 |
--- a/content/browser/frame_host/render_frame_host_manager.cc |
+++ b/content/browser/frame_host/render_frame_host_manager.cc |
@@ -937,6 +937,27 @@ void RenderFrameHostManager::OnDidUpdateName(const std::string& name, |
} |
} |
+void RenderFrameHostManager::OnDidAddContentSecurityPolicy( |
+ const ContentSecurityPolicyHeader& header) { |
+ if (!SiteIsolationPolicy::AreCrossProcessFramesPossible()) |
+ return; |
+ |
+ for (const auto& pair : proxy_hosts_) { |
+ pair.second->Send(new FrameMsg_AddContentSecurityPolicy( |
+ pair.second->GetRoutingID(), header)); |
+ } |
+} |
+ |
+void RenderFrameHostManager::OnDidResetContentSecurityPolicy() { |
+ if (!SiteIsolationPolicy::AreCrossProcessFramesPossible()) |
+ return; |
+ |
+ for (const auto& pair : proxy_hosts_) { |
+ pair.second->Send( |
+ new FrameMsg_ResetContentSecurityPolicy(pair.second->GetRoutingID())); |
+ } |
+} |
+ |
void RenderFrameHostManager::OnEnforceStrictMixedContentChecking( |
bool should_enforce) { |
if (!SiteIsolationPolicy::AreCrossProcessFramesPossible()) |