OLD | NEW |
1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "content/renderer/render_frame_proxy.h" | 5 #include "content/renderer/render_frame_proxy.h" |
6 | 6 |
7 #include <stdint.h> | 7 #include <stdint.h> |
8 #include <map> | 8 #include <map> |
9 #include <utility> | 9 #include <utility> |
10 | 10 |
11 #include "base/command_line.h" | 11 #include "base/command_line.h" |
12 #include "base/lazy_instance.h" | 12 #include "base/lazy_instance.h" |
| 13 #include "content/child/feature_policy/feature_policy_platform.h" |
13 #include "content/child/web_url_request_util.h" | 14 #include "content/child/web_url_request_util.h" |
14 #include "content/child/webmessageportchannel_impl.h" | 15 #include "content/child/webmessageportchannel_impl.h" |
15 #include "content/common/content_security_policy_header.h" | 16 #include "content/common/content_security_policy_header.h" |
16 #include "content/common/content_switches_internal.h" | 17 #include "content/common/content_switches_internal.h" |
17 #include "content/common/frame_messages.h" | 18 #include "content/common/frame_messages.h" |
18 #include "content/common/frame_owner_properties.h" | 19 #include "content/common/frame_owner_properties.h" |
19 #include "content/common/frame_replication_state.h" | 20 #include "content/common/frame_replication_state.h" |
20 #include "content/common/input_messages.h" | 21 #include "content/common/input_messages.h" |
21 #include "content/common/page_messages.h" | 22 #include "content/common/page_messages.h" |
22 #include "content/common/site_isolation_policy.h" | 23 #include "content/common/site_isolation_policy.h" |
(...skipping 19 matching lines...) Expand all Loading... |
42 | 43 |
43 // Facilitates lookup of RenderFrameProxy by routing_id. | 44 // Facilitates lookup of RenderFrameProxy by routing_id. |
44 typedef std::map<int, RenderFrameProxy*> RoutingIDProxyMap; | 45 typedef std::map<int, RenderFrameProxy*> RoutingIDProxyMap; |
45 static base::LazyInstance<RoutingIDProxyMap> g_routing_id_proxy_map = | 46 static base::LazyInstance<RoutingIDProxyMap> g_routing_id_proxy_map = |
46 LAZY_INSTANCE_INITIALIZER; | 47 LAZY_INSTANCE_INITIALIZER; |
47 | 48 |
48 // Facilitates lookup of RenderFrameProxy by WebFrame. | 49 // Facilitates lookup of RenderFrameProxy by WebFrame. |
49 typedef std::map<blink::WebFrame*, RenderFrameProxy*> FrameMap; | 50 typedef std::map<blink::WebFrame*, RenderFrameProxy*> FrameMap; |
50 base::LazyInstance<FrameMap> g_frame_map = LAZY_INSTANCE_INITIALIZER; | 51 base::LazyInstance<FrameMap> g_frame_map = LAZY_INSTANCE_INITIALIZER; |
51 | 52 |
52 blink::WebParsedFeaturePolicy ToWebParsedFeaturePolicy( | |
53 const ParsedFeaturePolicy& parsed_whitelists) { | |
54 std::vector<blink::WebFeaturePolicy::ParsedWhitelist> result; | |
55 for (const FeaturePolicyParsedWhitelist& whitelist : parsed_whitelists) { | |
56 blink::WebFeaturePolicy::ParsedWhitelist web_whitelist; | |
57 web_whitelist.featureName = | |
58 blink::WebString::fromUTF8(whitelist.feature_name); | |
59 web_whitelist.matchesAllOrigins = whitelist.matches_all_origins; | |
60 std::vector<blink::WebSecurityOrigin> web_origins; | |
61 for (const url::Origin& origin : whitelist.origins) | |
62 web_origins.push_back(origin); | |
63 result.push_back(web_whitelist); | |
64 } | |
65 return result; | |
66 } | |
67 | |
68 } // namespace | 53 } // namespace |
69 | 54 |
70 // static | 55 // static |
71 RenderFrameProxy* RenderFrameProxy::CreateProxyToReplaceFrame( | 56 RenderFrameProxy* RenderFrameProxy::CreateProxyToReplaceFrame( |
72 RenderFrameImpl* frame_to_replace, | 57 RenderFrameImpl* frame_to_replace, |
73 int routing_id, | 58 int routing_id, |
74 blink::WebTreeScopeType scope) { | 59 blink::WebTreeScopeType scope) { |
75 CHECK_NE(routing_id, MSG_ROUTING_NONE); | 60 CHECK_NE(routing_id, MSG_ROUTING_NONE); |
76 | 61 |
77 std::unique_ptr<RenderFrameProxy> proxy( | 62 std::unique_ptr<RenderFrameProxy> proxy( |
(...skipping 157 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
235 void RenderFrameProxy::SetReplicatedState(const FrameReplicationState& state) { | 220 void RenderFrameProxy::SetReplicatedState(const FrameReplicationState& state) { |
236 DCHECK(web_frame_); | 221 DCHECK(web_frame_); |
237 web_frame_->setReplicatedOrigin(state.origin); | 222 web_frame_->setReplicatedOrigin(state.origin); |
238 web_frame_->setReplicatedSandboxFlags(state.sandbox_flags); | 223 web_frame_->setReplicatedSandboxFlags(state.sandbox_flags); |
239 web_frame_->setReplicatedName(blink::WebString::fromUTF8(state.name), | 224 web_frame_->setReplicatedName(blink::WebString::fromUTF8(state.name), |
240 blink::WebString::fromUTF8(state.unique_name)); | 225 blink::WebString::fromUTF8(state.unique_name)); |
241 web_frame_->setReplicatedInsecureRequestPolicy(state.insecure_request_policy); | 226 web_frame_->setReplicatedInsecureRequestPolicy(state.insecure_request_policy); |
242 web_frame_->setReplicatedPotentiallyTrustworthyUniqueOrigin( | 227 web_frame_->setReplicatedPotentiallyTrustworthyUniqueOrigin( |
243 state.has_potentially_trustworthy_unique_origin); | 228 state.has_potentially_trustworthy_unique_origin); |
244 web_frame_->setReplicatedFeaturePolicyHeader( | 229 web_frame_->setReplicatedFeaturePolicyHeader( |
245 ToWebParsedFeaturePolicy(state.feature_policy_header)); | 230 FeaturePolicyHeaderToWeb(state.feature_policy_header)); |
246 | 231 |
247 web_frame_->resetReplicatedContentSecurityPolicy(); | 232 web_frame_->resetReplicatedContentSecurityPolicy(); |
248 for (const auto& header : state.accumulated_csp_headers) | 233 for (const auto& header : state.accumulated_csp_headers) |
249 OnAddContentSecurityPolicy(header); | 234 OnAddContentSecurityPolicy(header); |
250 } | 235 } |
251 | 236 |
252 // Update the proxy's SecurityContext and FrameOwner with new sandbox flags | 237 // Update the proxy's SecurityContext and FrameOwner with new sandbox flags |
253 // that were set by its parent in another process. | 238 // that were set by its parent in another process. |
254 // | 239 // |
255 // Normally, when a frame's sandbox attribute is changed dynamically, the | 240 // Normally, when a frame's sandbox attribute is changed dynamically, the |
(...skipping 271 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
527 blink::WebLocalFrame* source) { | 512 blink::WebLocalFrame* source) { |
528 int source_routing_id = RenderFrameImpl::FromWebFrame(source)->GetRoutingID(); | 513 int source_routing_id = RenderFrameImpl::FromWebFrame(source)->GetRoutingID(); |
529 Send(new FrameHostMsg_AdvanceFocus(routing_id_, type, source_routing_id)); | 514 Send(new FrameHostMsg_AdvanceFocus(routing_id_, type, source_routing_id)); |
530 } | 515 } |
531 | 516 |
532 void RenderFrameProxy::frameFocused() { | 517 void RenderFrameProxy::frameFocused() { |
533 Send(new FrameHostMsg_FrameFocused(routing_id_)); | 518 Send(new FrameHostMsg_FrameFocused(routing_id_)); |
534 } | 519 } |
535 | 520 |
536 } // namespace | 521 } // namespace |
OLD | NEW |