OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 // See http://dev.chromium.org/developers/design-documents/multi-process-resourc
e-loading | 5 // See http://dev.chromium.org/developers/design-documents/multi-process-resourc
e-loading |
6 | 6 |
7 #include "content/browser/loader/resource_dispatcher_host_impl.h" | 7 #include "content/browser/loader/resource_dispatcher_host_impl.h" |
8 | 8 |
9 #include <set> | 9 #include <set> |
10 #include <vector> | 10 #include <vector> |
(...skipping 140 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
151 if (!referrer.url.is_valid() || | 151 if (!referrer.url.is_valid() || |
152 CommandLine::ForCurrentProcess()->HasSwitch(switches::kNoReferrers)) { | 152 CommandLine::ForCurrentProcess()->HasSwitch(switches::kNoReferrers)) { |
153 request->SetReferrer(std::string()); | 153 request->SetReferrer(std::string()); |
154 } else { | 154 } else { |
155 request->SetReferrer(referrer.url.spec()); | 155 request->SetReferrer(referrer.url.spec()); |
156 } | 156 } |
157 | 157 |
158 net::URLRequest::ReferrerPolicy net_referrer_policy = | 158 net::URLRequest::ReferrerPolicy net_referrer_policy = |
159 net::URLRequest::CLEAR_REFERRER_ON_TRANSITION_FROM_SECURE_TO_INSECURE; | 159 net::URLRequest::CLEAR_REFERRER_ON_TRANSITION_FROM_SECURE_TO_INSECURE; |
160 switch (referrer.policy) { | 160 switch (referrer.policy) { |
161 case WebKit::WebReferrerPolicyDefault: | 161 case blink::WebReferrerPolicyDefault: |
162 net_referrer_policy = | 162 net_referrer_policy = |
163 net::URLRequest::CLEAR_REFERRER_ON_TRANSITION_FROM_SECURE_TO_INSECURE; | 163 net::URLRequest::CLEAR_REFERRER_ON_TRANSITION_FROM_SECURE_TO_INSECURE; |
164 break; | 164 break; |
165 case WebKit::WebReferrerPolicyAlways: | 165 case blink::WebReferrerPolicyAlways: |
166 case WebKit::WebReferrerPolicyNever: | 166 case blink::WebReferrerPolicyNever: |
167 case WebKit::WebReferrerPolicyOrigin: | 167 case blink::WebReferrerPolicyOrigin: |
168 net_referrer_policy = net::URLRequest::NEVER_CLEAR_REFERRER; | 168 net_referrer_policy = net::URLRequest::NEVER_CLEAR_REFERRER; |
169 break; | 169 break; |
170 } | 170 } |
171 request->set_referrer_policy(net_referrer_policy); | 171 request->set_referrer_policy(net_referrer_policy); |
172 } | 172 } |
173 | 173 |
174 // Consults the RendererSecurity policy to determine whether the | 174 // Consults the RendererSecurity policy to determine whether the |
175 // ResourceDispatcherHostImpl should service this request. A request might be | 175 // ResourceDispatcherHostImpl should service this request. A request might be |
176 // disallowed if the renderer is not authorized to retrieve the request URL or | 176 // disallowed if the renderer is not authorized to retrieve the request URL or |
177 // if the renderer is attempting to upload an unauthorized file. | 177 // if the renderer is attempting to upload an unauthorized file. |
(...skipping 1040 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
1218 false, // is_main_frame | 1218 false, // is_main_frame |
1219 -1, // frame_id | 1219 -1, // frame_id |
1220 false, // parent_is_main_frame | 1220 false, // parent_is_main_frame |
1221 -1, // parent_frame_id | 1221 -1, // parent_frame_id |
1222 ResourceType::SUB_RESOURCE, | 1222 ResourceType::SUB_RESOURCE, |
1223 PAGE_TRANSITION_LINK, | 1223 PAGE_TRANSITION_LINK, |
1224 download, // is_download | 1224 download, // is_download |
1225 false, // is_stream | 1225 false, // is_stream |
1226 download, // allow_download | 1226 download, // allow_download |
1227 false, // has_user_gesture | 1227 false, // has_user_gesture |
1228 WebKit::WebReferrerPolicyDefault, | 1228 blink::WebReferrerPolicyDefault, |
1229 context, | 1229 context, |
1230 base::WeakPtr<ResourceMessageFilter>(), // filter | 1230 base::WeakPtr<ResourceMessageFilter>(), // filter |
1231 true); // is_async | 1231 true); // is_async |
1232 } | 1232 } |
1233 | 1233 |
1234 void ResourceDispatcherHostImpl::OnRenderViewHostCreated( | 1234 void ResourceDispatcherHostImpl::OnRenderViewHostCreated( |
1235 int child_id, | 1235 int child_id, |
1236 int route_id) { | 1236 int route_id) { |
1237 scheduler_->OnClientCreated(child_id, route_id); | 1237 scheduler_->OnClientCreated(child_id, route_id); |
1238 } | 1238 } |
(...skipping 676 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
1915 if ((load_flags & net::LOAD_REPORT_RAW_HEADERS) | 1915 if ((load_flags & net::LOAD_REPORT_RAW_HEADERS) |
1916 && !policy->CanReadRawCookies(child_id)) { | 1916 && !policy->CanReadRawCookies(child_id)) { |
1917 VLOG(1) << "Denied unauthorized request for raw headers"; | 1917 VLOG(1) << "Denied unauthorized request for raw headers"; |
1918 load_flags &= ~net::LOAD_REPORT_RAW_HEADERS; | 1918 load_flags &= ~net::LOAD_REPORT_RAW_HEADERS; |
1919 } | 1919 } |
1920 | 1920 |
1921 return load_flags; | 1921 return load_flags; |
1922 } | 1922 } |
1923 | 1923 |
1924 } // namespace content | 1924 } // namespace content |
OLD | NEW |