| Index: content/browser/frame_host/render_frame_host_manager.cc
|
| diff --git a/content/browser/frame_host/render_frame_host_manager.cc b/content/browser/frame_host/render_frame_host_manager.cc
|
| index 58c17d54c34798e0e070878e4e572a594f41a3a3..845cd2e9e2bc3d4e8c7b1c53c211fed92644f744 100644
|
| --- a/content/browser/frame_host/render_frame_host_manager.cc
|
| +++ b/content/browser/frame_host/render_frame_host_manager.cc
|
| @@ -937,6 +937,27 @@ void RenderFrameHostManager::OnDidUpdateName(const std::string& name,
|
| }
|
| }
|
|
|
| +void RenderFrameHostManager::OnDidAddContentSecurityPolicy(
|
| + const ContentSecurityPolicyHeader& header) {
|
| + if (!SiteIsolationPolicy::AreCrossProcessFramesPossible())
|
| + return;
|
| +
|
| + for (const auto& pair : proxy_hosts_) {
|
| + pair.second->Send(new FrameMsg_AddContentSecurityPolicy(
|
| + pair.second->GetRoutingID(), header));
|
| + }
|
| +}
|
| +
|
| +void RenderFrameHostManager::OnDidResetContentSecurityPolicy() {
|
| + if (!SiteIsolationPolicy::AreCrossProcessFramesPossible())
|
| + return;
|
| +
|
| + for (const auto& pair : proxy_hosts_) {
|
| + pair.second->Send(
|
| + new FrameMsg_ResetContentSecurityPolicy(pair.second->GetRoutingID()));
|
| + }
|
| +}
|
| +
|
| void RenderFrameHostManager::OnEnforceStrictMixedContentChecking(
|
| bool should_enforce) {
|
| if (!SiteIsolationPolicy::AreCrossProcessFramesPossible())
|
|
|