| OLD | NEW |
| 1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "content/renderer/render_frame_impl.h" | 5 #include "content/renderer/render_frame_impl.h" |
| 6 | 6 |
| 7 #include <map> | 7 #include <map> |
| 8 #include <string> | 8 #include <string> |
| 9 #include <utility> | 9 #include <utility> |
| 10 #include <vector> | 10 #include <vector> |
| (...skipping 856 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 867 #else | 867 #else |
| 868 return true; | 868 return true; |
| 869 #endif | 869 #endif |
| 870 } | 870 } |
| 871 #endif // defined(ENABLE_MOJO_CDM) | 871 #endif // defined(ENABLE_MOJO_CDM) |
| 872 | 872 |
| 873 double ConvertToBlinkTime(const base::TimeTicks& time_ticks) { | 873 double ConvertToBlinkTime(const base::TimeTicks& time_ticks) { |
| 874 return (time_ticks - base::TimeTicks()).InSecondsF(); | 874 return (time_ticks - base::TimeTicks()).InSecondsF(); |
| 875 } | 875 } |
| 876 | 876 |
| 877 ParsedFeaturePolicy ToParsedFeaturePolicy( | 877 ParsedFeaturePolicyHeader ToParsedFeaturePolicyHeader( |
| 878 const blink::WebParsedFeaturePolicy& web_parsed_whitelists) { | 878 const blink::WebParsedFeaturePolicyHeader& parsed_header) { |
| 879 ParsedFeaturePolicy result; | 879 ParsedFeaturePolicyHeader result; |
| 880 for (const blink::WebFeaturePolicy::ParsedWhitelist& web_whitelist : | 880 for (const blink::WebParsedFeaturePolicyDeclaration& web_declaration : |
| 881 web_parsed_whitelists) { | 881 parsed_header) { |
| 882 FeaturePolicyParsedWhitelist whitelist; | 882 ParsedFeaturePolicyDeclaration declaration; |
| 883 whitelist.feature_name = web_whitelist.featureName.utf8(); | 883 declaration.feature_name = web_declaration.featureName.utf8(); |
| 884 whitelist.matches_all_origins = web_whitelist.matchesAllOrigins; | 884 declaration.matches_all_origins = web_declaration.matchesAllOrigins; |
| 885 for (const blink::WebSecurityOrigin& web_origin : web_whitelist.origins) | 885 for (const blink::WebSecurityOrigin& web_origin : web_declaration.origins) |
| 886 whitelist.origins.push_back(web_origin); | 886 declaration.origins.push_back(web_origin); |
| 887 result.push_back(whitelist); | 887 result.push_back(declaration); |
| 888 } | 888 } |
| 889 return result; | 889 return result; |
| 890 } | 890 } |
| 891 | 891 |
| 892 } // namespace | 892 } // namespace |
| 893 | 893 |
| 894 struct RenderFrameImpl::PendingFileChooser { | 894 struct RenderFrameImpl::PendingFileChooser { |
| 895 PendingFileChooser(const FileChooserParams& p, | 895 PendingFileChooser(const FileChooserParams& p, |
| 896 blink::WebFileChooserCompletion* c) | 896 blink::WebFileChooserCompletion* c) |
| 897 : params(p), completion(c) {} | 897 : params(p), completion(c) {} |
| (...skipping 2291 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 3189 routing_id_, is_potentially_trustworthy_unique_origin)); | 3189 routing_id_, is_potentially_trustworthy_unique_origin)); |
| 3190 } | 3190 } |
| 3191 | 3191 |
| 3192 void RenderFrameImpl::didChangeSandboxFlags(blink::WebFrame* child_frame, | 3192 void RenderFrameImpl::didChangeSandboxFlags(blink::WebFrame* child_frame, |
| 3193 blink::WebSandboxFlags flags) { | 3193 blink::WebSandboxFlags flags) { |
| 3194 Send(new FrameHostMsg_DidChangeSandboxFlags( | 3194 Send(new FrameHostMsg_DidChangeSandboxFlags( |
| 3195 routing_id_, GetRoutingIdForFrameOrProxy(child_frame), flags)); | 3195 routing_id_, GetRoutingIdForFrameOrProxy(child_frame), flags)); |
| 3196 } | 3196 } |
| 3197 | 3197 |
| 3198 void RenderFrameImpl::didSetFeaturePolicyHeader( | 3198 void RenderFrameImpl::didSetFeaturePolicyHeader( |
| 3199 const blink::WebParsedFeaturePolicy& parsed_header) { | 3199 const blink::WebParsedFeaturePolicyHeader& parsed_header) { |
| 3200 Send(new FrameHostMsg_DidSetFeaturePolicyHeader( | 3200 Send(new FrameHostMsg_DidSetFeaturePolicyHeader( |
| 3201 routing_id_, ToParsedFeaturePolicy(parsed_header))); | 3201 routing_id_, ToParsedFeaturePolicyHeader(parsed_header))); |
| 3202 } | 3202 } |
| 3203 | 3203 |
| 3204 void RenderFrameImpl::didAddContentSecurityPolicy( | 3204 void RenderFrameImpl::didAddContentSecurityPolicy( |
| 3205 const blink::WebString& header_value, | 3205 const blink::WebString& header_value, |
| 3206 blink::WebContentSecurityPolicyType type, | 3206 blink::WebContentSecurityPolicyType type, |
| 3207 blink::WebContentSecurityPolicySource source) { | 3207 blink::WebContentSecurityPolicySource source) { |
| 3208 if (!SiteIsolationPolicy::AreCrossProcessFramesPossible()) | 3208 if (!SiteIsolationPolicy::AreCrossProcessFramesPossible()) |
| 3209 return; | 3209 return; |
| 3210 | 3210 |
| 3211 ContentSecurityPolicyHeader header; | 3211 ContentSecurityPolicyHeader header; |
| (...skipping 3664 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 6876 // event target. Potentially a Pepper plugin will receive the event. | 6876 // event target. Potentially a Pepper plugin will receive the event. |
| 6877 // In order to tell whether a plugin gets the last mouse event and which it | 6877 // In order to tell whether a plugin gets the last mouse event and which it |
| 6878 // is, we set |pepper_last_mouse_event_target_| to null here. If a plugin gets | 6878 // is, we set |pepper_last_mouse_event_target_| to null here. If a plugin gets |
| 6879 // the event, it will notify us via DidReceiveMouseEvent() and set itself as | 6879 // the event, it will notify us via DidReceiveMouseEvent() and set itself as |
| 6880 // |pepper_last_mouse_event_target_|. | 6880 // |pepper_last_mouse_event_target_|. |
| 6881 pepper_last_mouse_event_target_ = nullptr; | 6881 pepper_last_mouse_event_target_ = nullptr; |
| 6882 #endif | 6882 #endif |
| 6883 } | 6883 } |
| 6884 | 6884 |
| 6885 } // namespace content | 6885 } // namespace content |
| OLD | NEW |