Index: content/renderer/render_frame_impl.cc |
diff --git a/content/renderer/render_frame_impl.cc b/content/renderer/render_frame_impl.cc |
index 8b82079aa7bc60fc6c74c3f5b813b6145973f607..a11c2a0559d00029cf170ca8eccf0f27654d3f14 100644 |
--- a/content/renderer/render_frame_impl.cc |
+++ b/content/renderer/render_frame_impl.cc |
@@ -50,6 +50,7 @@ |
#include "content/child/weburlresponse_extradata_impl.h" |
#include "content/common/accessibility_messages.h" |
#include "content/common/clipboard_messages.h" |
+#include "content/common/content_security_policy_header.h" |
#include "content/common/frame_messages.h" |
#include "content/common/frame_replication_state.h" |
#include "content/common/gpu/client/context_provider_command_buffer.h" |
@@ -6014,6 +6015,20 @@ blink::ServiceRegistry* RenderFrameImpl::serviceRegistry() { |
return &blink_service_registry_; |
} |
+void RenderFrameImpl::didAddContentSecurityPolicy( |
+ const blink::WebString& header_value, |
+ blink::WebContentSecurityPolicyType type, |
+ blink::WebContentSecurityPolicySource source) { |
+ if (!SiteIsolationPolicy::AreCrossProcessFramesPossible()) |
alexmos
2016/05/12 22:37:24
I think this is ok. One thought is that this migh
Łukasz Anforowicz
2016/05/13 17:29:15
This reminds me - there are other places where we
|
+ return; |
+ |
+ ContentSecurityPolicyHeader header; |
+ header.header_value = base::UTF16ToUTF8(base::StringPiece16(header_value)); |
+ header.type = type; |
+ header.source = source; |
+ Send(new FrameHostMsg_DidAddContentSecurityPolicy(routing_id_, header)); |
+} |
+ |
blink::WebPlugin* RenderFrameImpl::GetWebPluginForFind() { |
if (!is_main_frame_) |
return nullptr; |