| OLD | NEW |
| 1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "content/browser/frame_host/render_frame_host_manager.h" | 5 #include "content/browser/frame_host/render_frame_host_manager.h" |
| 6 | 6 |
| 7 #include <stddef.h> | 7 #include <stddef.h> |
| 8 | 8 |
| 9 #include <algorithm> | 9 #include <algorithm> |
| 10 #include <utility> | 10 #include <utility> |
| (...skipping 947 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 958 void RenderFrameHostManager::OnDidResetContentSecurityPolicy() { | 958 void RenderFrameHostManager::OnDidResetContentSecurityPolicy() { |
| 959 if (!SiteIsolationPolicy::AreCrossProcessFramesPossible()) | 959 if (!SiteIsolationPolicy::AreCrossProcessFramesPossible()) |
| 960 return; | 960 return; |
| 961 | 961 |
| 962 for (const auto& pair : proxy_hosts_) { | 962 for (const auto& pair : proxy_hosts_) { |
| 963 pair.second->Send( | 963 pair.second->Send( |
| 964 new FrameMsg_ResetContentSecurityPolicy(pair.second->GetRoutingID())); | 964 new FrameMsg_ResetContentSecurityPolicy(pair.second->GetRoutingID())); |
| 965 } | 965 } |
| 966 } | 966 } |
| 967 | 967 |
| 968 void RenderFrameHostManager::OnEnforceStrictMixedContentChecking( | 968 void RenderFrameHostManager::OnEnforceInsecureRequestPolicy( |
| 969 bool should_enforce) { | 969 blink::WebInsecureRequestPolicy policy) { |
| 970 if (!SiteIsolationPolicy::AreCrossProcessFramesPossible()) | 970 if (!SiteIsolationPolicy::AreCrossProcessFramesPossible()) |
| 971 return; | 971 return; |
| 972 | 972 |
| 973 for (const auto& pair : proxy_hosts_) { | 973 for (const auto& pair : proxy_hosts_) { |
| 974 pair.second->Send(new FrameMsg_EnforceStrictMixedContentChecking( | 974 pair.second->Send(new FrameMsg_EnforceInsecureRequestPolicy( |
| 975 pair.second->GetRoutingID(), should_enforce)); | 975 pair.second->GetRoutingID(), policy)); |
| 976 } | 976 } |
| 977 } | 977 } |
| 978 | 978 |
| 979 void RenderFrameHostManager::OnDidUpdateFrameOwnerProperties( | 979 void RenderFrameHostManager::OnDidUpdateFrameOwnerProperties( |
| 980 const blink::WebFrameOwnerProperties& properties) { | 980 const blink::WebFrameOwnerProperties& properties) { |
| 981 if (!SiteIsolationPolicy::AreCrossProcessFramesPossible()) | 981 if (!SiteIsolationPolicy::AreCrossProcessFramesPossible()) |
| 982 return; | 982 return; |
| 983 | 983 |
| 984 // WebFrameOwnerProperties exist only for frames that have a parent. | 984 // WebFrameOwnerProperties exist only for frames that have a parent. |
| 985 CHECK(frame_tree_node_->parent()); | 985 CHECK(frame_tree_node_->parent()); |
| (...skipping 1616 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 2602 resolved_url)) { | 2602 resolved_url)) { |
| 2603 DCHECK(!dest_instance || | 2603 DCHECK(!dest_instance || |
| 2604 dest_instance == render_frame_host_->GetSiteInstance()); | 2604 dest_instance == render_frame_host_->GetSiteInstance()); |
| 2605 return false; | 2605 return false; |
| 2606 } | 2606 } |
| 2607 | 2607 |
| 2608 return true; | 2608 return true; |
| 2609 } | 2609 } |
| 2610 | 2610 |
| 2611 } // namespace content | 2611 } // namespace content |
| OLD | NEW |