Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(132)

Side by Side Diff: content/browser/loader/resource_dispatcher_host_impl.cc

Issue 63253002: Rename WebKit namespace to blink (part 3) (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Created 7 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 // See http://dev.chromium.org/developers/design-documents/multi-process-resourc e-loading 5 // See http://dev.chromium.org/developers/design-documents/multi-process-resourc e-loading
6 6
7 #include "content/browser/loader/resource_dispatcher_host_impl.h" 7 #include "content/browser/loader/resource_dispatcher_host_impl.h"
8 8
9 #include <set> 9 #include <set>
10 #include <vector> 10 #include <vector>
(...skipping 140 matching lines...) Expand 10 before | Expand all | Expand 10 after
151 if (!referrer.url.is_valid() || 151 if (!referrer.url.is_valid() ||
152 CommandLine::ForCurrentProcess()->HasSwitch(switches::kNoReferrers)) { 152 CommandLine::ForCurrentProcess()->HasSwitch(switches::kNoReferrers)) {
153 request->SetReferrer(std::string()); 153 request->SetReferrer(std::string());
154 } else { 154 } else {
155 request->SetReferrer(referrer.url.spec()); 155 request->SetReferrer(referrer.url.spec());
156 } 156 }
157 157
158 net::URLRequest::ReferrerPolicy net_referrer_policy = 158 net::URLRequest::ReferrerPolicy net_referrer_policy =
159 net::URLRequest::CLEAR_REFERRER_ON_TRANSITION_FROM_SECURE_TO_INSECURE; 159 net::URLRequest::CLEAR_REFERRER_ON_TRANSITION_FROM_SECURE_TO_INSECURE;
160 switch (referrer.policy) { 160 switch (referrer.policy) {
161 case WebKit::WebReferrerPolicyDefault: 161 case blink::WebReferrerPolicyDefault:
162 net_referrer_policy = 162 net_referrer_policy =
163 net::URLRequest::CLEAR_REFERRER_ON_TRANSITION_FROM_SECURE_TO_INSECURE; 163 net::URLRequest::CLEAR_REFERRER_ON_TRANSITION_FROM_SECURE_TO_INSECURE;
164 break; 164 break;
165 case WebKit::WebReferrerPolicyAlways: 165 case blink::WebReferrerPolicyAlways:
166 case WebKit::WebReferrerPolicyNever: 166 case blink::WebReferrerPolicyNever:
167 case WebKit::WebReferrerPolicyOrigin: 167 case blink::WebReferrerPolicyOrigin:
168 net_referrer_policy = net::URLRequest::NEVER_CLEAR_REFERRER; 168 net_referrer_policy = net::URLRequest::NEVER_CLEAR_REFERRER;
169 break; 169 break;
170 } 170 }
171 request->set_referrer_policy(net_referrer_policy); 171 request->set_referrer_policy(net_referrer_policy);
172 } 172 }
173 173
174 // Consults the RendererSecurity policy to determine whether the 174 // Consults the RendererSecurity policy to determine whether the
175 // ResourceDispatcherHostImpl should service this request. A request might be 175 // ResourceDispatcherHostImpl should service this request. A request might be
176 // disallowed if the renderer is not authorized to retrieve the request URL or 176 // disallowed if the renderer is not authorized to retrieve the request URL or
177 // if the renderer is attempting to upload an unauthorized file. 177 // if the renderer is attempting to upload an unauthorized file.
(...skipping 1040 matching lines...) Expand 10 before | Expand all | Expand 10 after
1218 false, // is_main_frame 1218 false, // is_main_frame
1219 -1, // frame_id 1219 -1, // frame_id
1220 false, // parent_is_main_frame 1220 false, // parent_is_main_frame
1221 -1, // parent_frame_id 1221 -1, // parent_frame_id
1222 ResourceType::SUB_RESOURCE, 1222 ResourceType::SUB_RESOURCE,
1223 PAGE_TRANSITION_LINK, 1223 PAGE_TRANSITION_LINK,
1224 download, // is_download 1224 download, // is_download
1225 false, // is_stream 1225 false, // is_stream
1226 download, // allow_download 1226 download, // allow_download
1227 false, // has_user_gesture 1227 false, // has_user_gesture
1228 WebKit::WebReferrerPolicyDefault, 1228 blink::WebReferrerPolicyDefault,
1229 context, 1229 context,
1230 base::WeakPtr<ResourceMessageFilter>(), // filter 1230 base::WeakPtr<ResourceMessageFilter>(), // filter
1231 true); // is_async 1231 true); // is_async
1232 } 1232 }
1233 1233
1234 void ResourceDispatcherHostImpl::OnRenderViewHostCreated( 1234 void ResourceDispatcherHostImpl::OnRenderViewHostCreated(
1235 int child_id, 1235 int child_id,
1236 int route_id) { 1236 int route_id) {
1237 scheduler_->OnClientCreated(child_id, route_id); 1237 scheduler_->OnClientCreated(child_id, route_id);
1238 } 1238 }
(...skipping 676 matching lines...) Expand 10 before | Expand all | Expand 10 after
1915 if ((load_flags & net::LOAD_REPORT_RAW_HEADERS) 1915 if ((load_flags & net::LOAD_REPORT_RAW_HEADERS)
1916 && !policy->CanReadRawCookies(child_id)) { 1916 && !policy->CanReadRawCookies(child_id)) {
1917 VLOG(1) << "Denied unauthorized request for raw headers"; 1917 VLOG(1) << "Denied unauthorized request for raw headers";
1918 load_flags &= ~net::LOAD_REPORT_RAW_HEADERS; 1918 load_flags &= ~net::LOAD_REPORT_RAW_HEADERS;
1919 } 1919 }
1920 1920
1921 return load_flags; 1921 return load_flags;
1922 } 1922 }
1923 1923
1924 } // namespace content 1924 } // namespace content
OLDNEW
« no previous file with comments | « content/browser/indexed_db/indexed_db_transaction.cc ('k') | content/browser/loader/resource_dispatcher_host_unittest.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698