| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 // See http://dev.chromium.org/developers/design-documents/multi-process-resourc
e-loading | 5 // See http://dev.chromium.org/developers/design-documents/multi-process-resourc
e-loading |
| 6 | 6 |
| 7 #include "content/browser/loader/resource_dispatcher_host_impl.h" | 7 #include "content/browser/loader/resource_dispatcher_host_impl.h" |
| 8 | 8 |
| 9 #include <set> | 9 #include <set> |
| 10 #include <vector> | 10 #include <vector> |
| (...skipping 140 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 151 if (!referrer.url.is_valid() || | 151 if (!referrer.url.is_valid() || |
| 152 CommandLine::ForCurrentProcess()->HasSwitch(switches::kNoReferrers)) { | 152 CommandLine::ForCurrentProcess()->HasSwitch(switches::kNoReferrers)) { |
| 153 request->SetReferrer(std::string()); | 153 request->SetReferrer(std::string()); |
| 154 } else { | 154 } else { |
| 155 request->SetReferrer(referrer.url.spec()); | 155 request->SetReferrer(referrer.url.spec()); |
| 156 } | 156 } |
| 157 | 157 |
| 158 net::URLRequest::ReferrerPolicy net_referrer_policy = | 158 net::URLRequest::ReferrerPolicy net_referrer_policy = |
| 159 net::URLRequest::CLEAR_REFERRER_ON_TRANSITION_FROM_SECURE_TO_INSECURE; | 159 net::URLRequest::CLEAR_REFERRER_ON_TRANSITION_FROM_SECURE_TO_INSECURE; |
| 160 switch (referrer.policy) { | 160 switch (referrer.policy) { |
| 161 case WebKit::WebReferrerPolicyDefault: | 161 case blink::WebReferrerPolicyDefault: |
| 162 net_referrer_policy = | 162 net_referrer_policy = |
| 163 net::URLRequest::CLEAR_REFERRER_ON_TRANSITION_FROM_SECURE_TO_INSECURE; | 163 net::URLRequest::CLEAR_REFERRER_ON_TRANSITION_FROM_SECURE_TO_INSECURE; |
| 164 break; | 164 break; |
| 165 case WebKit::WebReferrerPolicyAlways: | 165 case blink::WebReferrerPolicyAlways: |
| 166 case WebKit::WebReferrerPolicyNever: | 166 case blink::WebReferrerPolicyNever: |
| 167 case WebKit::WebReferrerPolicyOrigin: | 167 case blink::WebReferrerPolicyOrigin: |
| 168 net_referrer_policy = net::URLRequest::NEVER_CLEAR_REFERRER; | 168 net_referrer_policy = net::URLRequest::NEVER_CLEAR_REFERRER; |
| 169 break; | 169 break; |
| 170 } | 170 } |
| 171 request->set_referrer_policy(net_referrer_policy); | 171 request->set_referrer_policy(net_referrer_policy); |
| 172 } | 172 } |
| 173 | 173 |
| 174 // Consults the RendererSecurity policy to determine whether the | 174 // Consults the RendererSecurity policy to determine whether the |
| 175 // ResourceDispatcherHostImpl should service this request. A request might be | 175 // ResourceDispatcherHostImpl should service this request. A request might be |
| 176 // disallowed if the renderer is not authorized to retrieve the request URL or | 176 // disallowed if the renderer is not authorized to retrieve the request URL or |
| 177 // if the renderer is attempting to upload an unauthorized file. | 177 // if the renderer is attempting to upload an unauthorized file. |
| (...skipping 1040 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1218 false, // is_main_frame | 1218 false, // is_main_frame |
| 1219 -1, // frame_id | 1219 -1, // frame_id |
| 1220 false, // parent_is_main_frame | 1220 false, // parent_is_main_frame |
| 1221 -1, // parent_frame_id | 1221 -1, // parent_frame_id |
| 1222 ResourceType::SUB_RESOURCE, | 1222 ResourceType::SUB_RESOURCE, |
| 1223 PAGE_TRANSITION_LINK, | 1223 PAGE_TRANSITION_LINK, |
| 1224 download, // is_download | 1224 download, // is_download |
| 1225 false, // is_stream | 1225 false, // is_stream |
| 1226 download, // allow_download | 1226 download, // allow_download |
| 1227 false, // has_user_gesture | 1227 false, // has_user_gesture |
| 1228 WebKit::WebReferrerPolicyDefault, | 1228 blink::WebReferrerPolicyDefault, |
| 1229 context, | 1229 context, |
| 1230 base::WeakPtr<ResourceMessageFilter>(), // filter | 1230 base::WeakPtr<ResourceMessageFilter>(), // filter |
| 1231 true); // is_async | 1231 true); // is_async |
| 1232 } | 1232 } |
| 1233 | 1233 |
| 1234 void ResourceDispatcherHostImpl::OnRenderViewHostCreated( | 1234 void ResourceDispatcherHostImpl::OnRenderViewHostCreated( |
| 1235 int child_id, | 1235 int child_id, |
| 1236 int route_id) { | 1236 int route_id) { |
| 1237 scheduler_->OnClientCreated(child_id, route_id); | 1237 scheduler_->OnClientCreated(child_id, route_id); |
| 1238 } | 1238 } |
| (...skipping 676 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1915 if ((load_flags & net::LOAD_REPORT_RAW_HEADERS) | 1915 if ((load_flags & net::LOAD_REPORT_RAW_HEADERS) |
| 1916 && !policy->CanReadRawCookies(child_id)) { | 1916 && !policy->CanReadRawCookies(child_id)) { |
| 1917 VLOG(1) << "Denied unauthorized request for raw headers"; | 1917 VLOG(1) << "Denied unauthorized request for raw headers"; |
| 1918 load_flags &= ~net::LOAD_REPORT_RAW_HEADERS; | 1918 load_flags &= ~net::LOAD_REPORT_RAW_HEADERS; |
| 1919 } | 1919 } |
| 1920 | 1920 |
| 1921 return load_flags; | 1921 return load_flags; |
| 1922 } | 1922 } |
| 1923 | 1923 |
| 1924 } // namespace content | 1924 } // namespace content |
| OLD | NEW |