Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(373)

Side by Side Diff: content/browser/frame_host/render_frame_host_manager.cc

Issue 2046733003: Replicate WebInsecureRequestPolicy instead of a bool for strict mixed content checks. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@securitycontext
Patch Set: alexmos@ Created 4 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2013 The Chromium Authors. All rights reserved. 1 // Copyright 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "content/browser/frame_host/render_frame_host_manager.h" 5 #include "content/browser/frame_host/render_frame_host_manager.h"
6 6
7 #include <stddef.h> 7 #include <stddef.h>
8 8
9 #include <algorithm> 9 #include <algorithm>
10 #include <utility> 10 #include <utility>
(...skipping 947 matching lines...) Expand 10 before | Expand all | Expand 10 after
958 void RenderFrameHostManager::OnDidResetContentSecurityPolicy() { 958 void RenderFrameHostManager::OnDidResetContentSecurityPolicy() {
959 if (!SiteIsolationPolicy::AreCrossProcessFramesPossible()) 959 if (!SiteIsolationPolicy::AreCrossProcessFramesPossible())
960 return; 960 return;
961 961
962 for (const auto& pair : proxy_hosts_) { 962 for (const auto& pair : proxy_hosts_) {
963 pair.second->Send( 963 pair.second->Send(
964 new FrameMsg_ResetContentSecurityPolicy(pair.second->GetRoutingID())); 964 new FrameMsg_ResetContentSecurityPolicy(pair.second->GetRoutingID()));
965 } 965 }
966 } 966 }
967 967
968 void RenderFrameHostManager::OnEnforceStrictMixedContentChecking( 968 void RenderFrameHostManager::OnEnforceInsecureRequestPolicy(
969 bool should_enforce) { 969 blink::WebInsecureRequestPolicy policy) {
970 if (!SiteIsolationPolicy::AreCrossProcessFramesPossible()) 970 if (!SiteIsolationPolicy::AreCrossProcessFramesPossible())
971 return; 971 return;
972 972
973 for (const auto& pair : proxy_hosts_) { 973 for (const auto& pair : proxy_hosts_) {
974 pair.second->Send(new FrameMsg_EnforceStrictMixedContentChecking( 974 pair.second->Send(new FrameMsg_EnforceInsecureRequestPolicy(
975 pair.second->GetRoutingID(), should_enforce)); 975 pair.second->GetRoutingID(), policy));
976 } 976 }
977 } 977 }
978 978
979 void RenderFrameHostManager::OnDidUpdateFrameOwnerProperties( 979 void RenderFrameHostManager::OnDidUpdateFrameOwnerProperties(
980 const blink::WebFrameOwnerProperties& properties) { 980 const blink::WebFrameOwnerProperties& properties) {
981 if (!SiteIsolationPolicy::AreCrossProcessFramesPossible()) 981 if (!SiteIsolationPolicy::AreCrossProcessFramesPossible())
982 return; 982 return;
983 983
984 // WebFrameOwnerProperties exist only for frames that have a parent. 984 // WebFrameOwnerProperties exist only for frames that have a parent.
985 CHECK(frame_tree_node_->parent()); 985 CHECK(frame_tree_node_->parent());
(...skipping 1616 matching lines...) Expand 10 before | Expand all | Expand 10 after
2602 resolved_url)) { 2602 resolved_url)) {
2603 DCHECK(!dest_instance || 2603 DCHECK(!dest_instance ||
2604 dest_instance == render_frame_host_->GetSiteInstance()); 2604 dest_instance == render_frame_host_->GetSiteInstance());
2605 return false; 2605 return false;
2606 } 2606 }
2607 2607
2608 return true; 2608 return true;
2609 } 2609 }
2610 2610
2611 } // namespace content 2611 } // namespace content
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698