| OLD | NEW |
| 1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #ifndef CONTENT_BROWSER_FRAME_HOST_FRAME_TREE_NODE_H_ | 5 #ifndef CONTENT_BROWSER_FRAME_HOST_FRAME_TREE_NODE_H_ |
| 6 #define CONTENT_BROWSER_FRAME_HOST_FRAME_TREE_NODE_H_ | 6 #define CONTENT_BROWSER_FRAME_HOST_FRAME_TREE_NODE_H_ |
| 7 | 7 |
| 8 #include <stddef.h> | 8 #include <stddef.h> |
| 9 | 9 |
| 10 #include <memory> | 10 #include <memory> |
| (...skipping 142 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 153 void AddContentSecurityPolicy(const ContentSecurityPolicyHeader& header); | 153 void AddContentSecurityPolicy(const ContentSecurityPolicyHeader& header); |
| 154 | 154 |
| 155 // Discards previous CSP headers and notifies proxies about the update. | 155 // Discards previous CSP headers and notifies proxies about the update. |
| 156 // Typically invoked after committing navigation to a new document (since the | 156 // Typically invoked after committing navigation to a new document (since the |
| 157 // new document comes with a fresh set of CSP http headers). | 157 // new document comes with a fresh set of CSP http headers). |
| 158 void ResetContentSecurityPolicy(); | 158 void ResetContentSecurityPolicy(); |
| 159 | 159 |
| 160 // Sets the current insecure request policy, and notifies proxies about the | 160 // Sets the current insecure request policy, and notifies proxies about the |
| 161 // update. | 161 // update. |
| 162 void SetInsecureRequestPolicy(blink::WebInsecureRequestPolicy policy); | 162 void SetInsecureRequestPolicy(blink::WebInsecureRequestPolicy policy); |
| 163 bool upgrades_insecure_requests() const { |
| 164 return replication_state_.insecure_request_policy & |
| 165 blink::kUpgradeInsecureRequests; |
| 166 } |
| 163 | 167 |
| 164 // Returns the currently active sandbox flags for this frame. This includes | 168 // Returns the currently active sandbox flags for this frame. This includes |
| 165 // flags inherited from parent frames and the currently active flags from the | 169 // flags inherited from parent frames and the currently active flags from the |
| 166 // <iframe> element hosting this frame. This does not include flags that | 170 // <iframe> element hosting this frame. This does not include flags that |
| 167 // have been updated in an <iframe> element but have not taken effect yet; | 171 // have been updated in an <iframe> element but have not taken effect yet; |
| 168 // use pending_sandbox_flags() for those. | 172 // use pending_sandbox_flags() for those. |
| 169 blink::WebSandboxFlags effective_sandbox_flags() const { | 173 blink::WebSandboxFlags effective_sandbox_flags() const { |
| 170 return replication_state_.sandbox_flags; | 174 return replication_state_.sandbox_flags; |
| 171 } | 175 } |
| 172 | 176 |
| (...skipping 198 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 371 // browser process activities to this node (when possible). It is unrelated | 375 // browser process activities to this node (when possible). It is unrelated |
| 372 // to the core logic of FrameTreeNode. | 376 // to the core logic of FrameTreeNode. |
| 373 FrameTreeNodeBlameContext blame_context_; | 377 FrameTreeNodeBlameContext blame_context_; |
| 374 | 378 |
| 375 DISALLOW_COPY_AND_ASSIGN(FrameTreeNode); | 379 DISALLOW_COPY_AND_ASSIGN(FrameTreeNode); |
| 376 }; | 380 }; |
| 377 | 381 |
| 378 } // namespace content | 382 } // namespace content |
| 379 | 383 |
| 380 #endif // CONTENT_BROWSER_FRAME_HOST_FRAME_TREE_NODE_H_ | 384 #endif // CONTENT_BROWSER_FRAME_HOST_FRAME_TREE_NODE_H_ |
| OLD | NEW |