Index: content/renderer/render_frame_impl.cc |
diff --git a/content/renderer/render_frame_impl.cc b/content/renderer/render_frame_impl.cc |
index 1115f80527d5811b2a518473947ab65682847fd5..e83e3f4724d5df95ace2839df604a8ed1710eeb0 100644 |
--- a/content/renderer/render_frame_impl.cc |
+++ b/content/renderer/render_frame_impl.cc |
@@ -3122,6 +3122,14 @@ void RenderFrameImpl::didChangeSandboxFlags(blink::WebFrame* child_frame, |
routing_id_, GetRoutingIdForFrameOrProxy(child_frame), flags)); |
} |
+void RenderFrameImpl::didSetFeaturePolicyHeader( |
+ const blink::WebString& header_value) { |
+ if (!SiteIsolationPolicy::AreCrossProcessFramesPossible()) |
+ return; |
raymes
2016/11/07 23:10:25
Hmm - we will want this to be replicated to the br
iclelland
2016/11/08 03:13:41
That's a good point - once we start using it for b
alexmos
2016/11/09 01:16:55
I'd say just remove this now.
AreCrossProcessFr
iclelland
2016/11/09 18:07:59
Done, make sense. Thanks.
|
+ Send(new FrameHostMsg_DidSetFeaturePolicyHeader( |
+ routing_id_, base::UTF16ToUTF8(base::StringPiece16(header_value)))); |
+} |
+ |
void RenderFrameImpl::didAddContentSecurityPolicy( |
const blink::WebString& header_value, |
blink::WebContentSecurityPolicyType type, |