Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(65)

Side by Side Diff: content/renderer/render_frame_proxy.cc

Issue 2636843003: Move most Feature Policy code into content/ (Closed)
Patch Set: Addressing review comments Created 3 years, 11 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « content/renderer/render_frame_impl.cc ('k') | content/test/BUILD.gn » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright 2014 The Chromium Authors. All rights reserved. 1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "content/renderer/render_frame_proxy.h" 5 #include "content/renderer/render_frame_proxy.h"
6 6
7 #include <stdint.h> 7 #include <stdint.h>
8 #include <map> 8 #include <map>
9 #include <utility> 9 #include <utility>
10 10
11 #include "base/command_line.h" 11 #include "base/command_line.h"
12 #include "base/lazy_instance.h" 12 #include "base/lazy_instance.h"
13 #include "content/child/feature_policy/feature_policy_platform.h"
13 #include "content/child/web_url_request_util.h" 14 #include "content/child/web_url_request_util.h"
14 #include "content/child/webmessageportchannel_impl.h" 15 #include "content/child/webmessageportchannel_impl.h"
15 #include "content/common/content_security_policy_header.h" 16 #include "content/common/content_security_policy_header.h"
16 #include "content/common/content_switches_internal.h" 17 #include "content/common/content_switches_internal.h"
17 #include "content/common/frame_messages.h" 18 #include "content/common/frame_messages.h"
18 #include "content/common/frame_owner_properties.h" 19 #include "content/common/frame_owner_properties.h"
19 #include "content/common/frame_replication_state.h" 20 #include "content/common/frame_replication_state.h"
20 #include "content/common/input_messages.h" 21 #include "content/common/input_messages.h"
21 #include "content/common/page_messages.h" 22 #include "content/common/page_messages.h"
22 #include "content/common/site_isolation_policy.h" 23 #include "content/common/site_isolation_policy.h"
(...skipping 19 matching lines...) Expand all
42 43
43 // Facilitates lookup of RenderFrameProxy by routing_id. 44 // Facilitates lookup of RenderFrameProxy by routing_id.
44 typedef std::map<int, RenderFrameProxy*> RoutingIDProxyMap; 45 typedef std::map<int, RenderFrameProxy*> RoutingIDProxyMap;
45 static base::LazyInstance<RoutingIDProxyMap> g_routing_id_proxy_map = 46 static base::LazyInstance<RoutingIDProxyMap> g_routing_id_proxy_map =
46 LAZY_INSTANCE_INITIALIZER; 47 LAZY_INSTANCE_INITIALIZER;
47 48
48 // Facilitates lookup of RenderFrameProxy by WebFrame. 49 // Facilitates lookup of RenderFrameProxy by WebFrame.
49 typedef std::map<blink::WebFrame*, RenderFrameProxy*> FrameMap; 50 typedef std::map<blink::WebFrame*, RenderFrameProxy*> FrameMap;
50 base::LazyInstance<FrameMap> g_frame_map = LAZY_INSTANCE_INITIALIZER; 51 base::LazyInstance<FrameMap> g_frame_map = LAZY_INSTANCE_INITIALIZER;
51 52
52 blink::WebParsedFeaturePolicy ToWebParsedFeaturePolicy(
53 const ParsedFeaturePolicy& parsed_whitelists) {
54 std::vector<blink::WebFeaturePolicy::ParsedWhitelist> result;
55 for (const FeaturePolicyParsedWhitelist& whitelist : parsed_whitelists) {
56 blink::WebFeaturePolicy::ParsedWhitelist web_whitelist;
57 web_whitelist.featureName =
58 blink::WebString::fromUTF8(whitelist.feature_name);
59 web_whitelist.matchesAllOrigins = whitelist.matches_all_origins;
60 std::vector<blink::WebSecurityOrigin> web_origins;
61 for (const url::Origin& origin : whitelist.origins)
62 web_origins.push_back(origin);
63 result.push_back(web_whitelist);
64 }
65 return result;
66 }
67
68 } // namespace 53 } // namespace
69 54
70 // static 55 // static
71 RenderFrameProxy* RenderFrameProxy::CreateProxyToReplaceFrame( 56 RenderFrameProxy* RenderFrameProxy::CreateProxyToReplaceFrame(
72 RenderFrameImpl* frame_to_replace, 57 RenderFrameImpl* frame_to_replace,
73 int routing_id, 58 int routing_id,
74 blink::WebTreeScopeType scope) { 59 blink::WebTreeScopeType scope) {
75 CHECK_NE(routing_id, MSG_ROUTING_NONE); 60 CHECK_NE(routing_id, MSG_ROUTING_NONE);
76 61
77 std::unique_ptr<RenderFrameProxy> proxy( 62 std::unique_ptr<RenderFrameProxy> proxy(
(...skipping 157 matching lines...) Expand 10 before | Expand all | Expand 10 after
235 void RenderFrameProxy::SetReplicatedState(const FrameReplicationState& state) { 220 void RenderFrameProxy::SetReplicatedState(const FrameReplicationState& state) {
236 DCHECK(web_frame_); 221 DCHECK(web_frame_);
237 web_frame_->setReplicatedOrigin(state.origin); 222 web_frame_->setReplicatedOrigin(state.origin);
238 web_frame_->setReplicatedSandboxFlags(state.sandbox_flags); 223 web_frame_->setReplicatedSandboxFlags(state.sandbox_flags);
239 web_frame_->setReplicatedName(blink::WebString::fromUTF8(state.name), 224 web_frame_->setReplicatedName(blink::WebString::fromUTF8(state.name),
240 blink::WebString::fromUTF8(state.unique_name)); 225 blink::WebString::fromUTF8(state.unique_name));
241 web_frame_->setReplicatedInsecureRequestPolicy(state.insecure_request_policy); 226 web_frame_->setReplicatedInsecureRequestPolicy(state.insecure_request_policy);
242 web_frame_->setReplicatedPotentiallyTrustworthyUniqueOrigin( 227 web_frame_->setReplicatedPotentiallyTrustworthyUniqueOrigin(
243 state.has_potentially_trustworthy_unique_origin); 228 state.has_potentially_trustworthy_unique_origin);
244 web_frame_->setReplicatedFeaturePolicyHeader( 229 web_frame_->setReplicatedFeaturePolicyHeader(
245 ToWebParsedFeaturePolicy(state.feature_policy_header)); 230 FeaturePolicyHeaderToWeb(state.feature_policy_header));
246 231
247 web_frame_->resetReplicatedContentSecurityPolicy(); 232 web_frame_->resetReplicatedContentSecurityPolicy();
248 for (const auto& header : state.accumulated_csp_headers) 233 for (const auto& header : state.accumulated_csp_headers)
249 OnAddContentSecurityPolicy(header); 234 OnAddContentSecurityPolicy(header);
250 } 235 }
251 236
252 // Update the proxy's SecurityContext and FrameOwner with new sandbox flags 237 // Update the proxy's SecurityContext and FrameOwner with new sandbox flags
253 // that were set by its parent in another process. 238 // that were set by its parent in another process.
254 // 239 //
255 // Normally, when a frame's sandbox attribute is changed dynamically, the 240 // Normally, when a frame's sandbox attribute is changed dynamically, the
(...skipping 271 matching lines...) Expand 10 before | Expand all | Expand 10 after
527 blink::WebLocalFrame* source) { 512 blink::WebLocalFrame* source) {
528 int source_routing_id = RenderFrameImpl::FromWebFrame(source)->GetRoutingID(); 513 int source_routing_id = RenderFrameImpl::FromWebFrame(source)->GetRoutingID();
529 Send(new FrameHostMsg_AdvanceFocus(routing_id_, type, source_routing_id)); 514 Send(new FrameHostMsg_AdvanceFocus(routing_id_, type, source_routing_id));
530 } 515 }
531 516
532 void RenderFrameProxy::frameFocused() { 517 void RenderFrameProxy::frameFocused() {
533 Send(new FrameHostMsg_FrameFocused(routing_id_)); 518 Send(new FrameHostMsg_FrameFocused(routing_id_));
534 } 519 }
535 520
536 } // namespace 521 } // namespace
OLDNEW
« no previous file with comments | « content/renderer/render_frame_impl.cc ('k') | content/test/BUILD.gn » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698