OLD | NEW |
1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "content/renderer/render_frame_impl.h" | 5 #include "content/renderer/render_frame_impl.h" |
6 | 6 |
7 #include <map> | 7 #include <map> |
8 #include <string> | 8 #include <string> |
9 #include <utility> | 9 #include <utility> |
10 #include <vector> | 10 #include <vector> |
(...skipping 3066 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
3077 routing_id_, is_potentially_trustworthy_unique_origin)); | 3077 routing_id_, is_potentially_trustworthy_unique_origin)); |
3078 } | 3078 } |
3079 | 3079 |
3080 void RenderFrameImpl::didChangeSandboxFlags(blink::WebFrame* child_frame, | 3080 void RenderFrameImpl::didChangeSandboxFlags(blink::WebFrame* child_frame, |
3081 blink::WebSandboxFlags flags) { | 3081 blink::WebSandboxFlags flags) { |
3082 Send(new FrameHostMsg_DidChangeSandboxFlags( | 3082 Send(new FrameHostMsg_DidChangeSandboxFlags( |
3083 routing_id_, GetRoutingIdForFrameOrProxy(child_frame), flags)); | 3083 routing_id_, GetRoutingIdForFrameOrProxy(child_frame), flags)); |
3084 } | 3084 } |
3085 | 3085 |
3086 void RenderFrameImpl::didSetFeaturePolicyHeader( | 3086 void RenderFrameImpl::didSetFeaturePolicyHeader( |
3087 const blink::WebString& header_value) { | 3087 const blink::WebVector<blink::WebFeaturePolicy::ParsedWhitelist>& |
| 3088 header_policy) { |
3088 Send(new FrameHostMsg_DidSetFeaturePolicyHeader( | 3089 Send(new FrameHostMsg_DidSetFeaturePolicyHeader( |
3089 routing_id_, base::UTF16ToUTF8(base::StringPiece16(header_value)))); | 3090 routing_id_, |
| 3091 FeaturePolicyParsedWhitelist::fromWebFeaturePolicyParsedWhitelist( |
| 3092 header_policy))); |
3090 } | 3093 } |
3091 | 3094 |
3092 void RenderFrameImpl::didAddContentSecurityPolicy( | 3095 void RenderFrameImpl::didAddContentSecurityPolicy( |
3093 const blink::WebString& header_value, | 3096 const blink::WebString& header_value, |
3094 blink::WebContentSecurityPolicyType type, | 3097 blink::WebContentSecurityPolicyType type, |
3095 blink::WebContentSecurityPolicySource source) { | 3098 blink::WebContentSecurityPolicySource source) { |
3096 if (!SiteIsolationPolicy::AreCrossProcessFramesPossible()) | 3099 if (!SiteIsolationPolicy::AreCrossProcessFramesPossible()) |
3097 return; | 3100 return; |
3098 | 3101 |
3099 ContentSecurityPolicyHeader header; | 3102 ContentSecurityPolicyHeader header; |
(...skipping 3515 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
6615 // event target. Potentially a Pepper plugin will receive the event. | 6618 // event target. Potentially a Pepper plugin will receive the event. |
6616 // In order to tell whether a plugin gets the last mouse event and which it | 6619 // In order to tell whether a plugin gets the last mouse event and which it |
6617 // is, we set |pepper_last_mouse_event_target_| to null here. If a plugin gets | 6620 // is, we set |pepper_last_mouse_event_target_| to null here. If a plugin gets |
6618 // the event, it will notify us via DidReceiveMouseEvent() and set itself as | 6621 // the event, it will notify us via DidReceiveMouseEvent() and set itself as |
6619 // |pepper_last_mouse_event_target_|. | 6622 // |pepper_last_mouse_event_target_|. |
6620 pepper_last_mouse_event_target_ = nullptr; | 6623 pepper_last_mouse_event_target_ = nullptr; |
6621 #endif | 6624 #endif |
6622 } | 6625 } |
6623 | 6626 |
6624 } // namespace content | 6627 } // namespace content |
OLD | NEW |