Chromium Code Reviews| Index: content/renderer/render_frame_impl.cc |
| diff --git a/content/renderer/render_frame_impl.cc b/content/renderer/render_frame_impl.cc |
| index 1115f80527d5811b2a518473947ab65682847fd5..e83e3f4724d5df95ace2839df604a8ed1710eeb0 100644 |
| --- a/content/renderer/render_frame_impl.cc |
| +++ b/content/renderer/render_frame_impl.cc |
| @@ -3122,6 +3122,14 @@ void RenderFrameImpl::didChangeSandboxFlags(blink::WebFrame* child_frame, |
| routing_id_, GetRoutingIdForFrameOrProxy(child_frame), flags)); |
| } |
| +void RenderFrameImpl::didSetFeaturePolicyHeader( |
| + const blink::WebString& header_value) { |
| + if (!SiteIsolationPolicy::AreCrossProcessFramesPossible()) |
| + return; |
|
raymes
2016/11/07 23:10:25
Hmm - we will want this to be replicated to the br
iclelland
2016/11/08 03:13:41
That's a good point - once we start using it for b
alexmos
2016/11/09 01:16:55
I'd say just remove this now.
AreCrossProcessFr
iclelland
2016/11/09 18:07:59
Done, make sense. Thanks.
|
| + Send(new FrameHostMsg_DidSetFeaturePolicyHeader( |
| + routing_id_, base::UTF16ToUTF8(base::StringPiece16(header_value)))); |
| +} |
| + |
| void RenderFrameImpl::didAddContentSecurityPolicy( |
| const blink::WebString& header_value, |
| blink::WebContentSecurityPolicyType type, |