| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "chrome/browser/chrome_content_browser_client.h" | 5 #include "chrome/browser/chrome_content_browser_client.h" |
| 6 | 6 |
| 7 #include <set> | 7 #include <set> |
| 8 #include <utility> | 8 #include <utility> |
| 9 #include <vector> | 9 #include <vector> |
| 10 | 10 |
| (...skipping 912 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 923 base::Bind(&TabSpecificContentSettings::CookieChanged, render_process_id, | 923 base::Bind(&TabSpecificContentSettings::CookieChanged, render_process_id, |
| 924 render_view_id, url, first_party, cookie_line, *options, | 924 render_view_id, url, first_party, cookie_line, *options, |
| 925 !allow)); | 925 !allow)); |
| 926 return allow; | 926 return allow; |
| 927 } | 927 } |
| 928 | 928 |
| 929 bool ChromeContentBrowserClient::AllowSaveLocalState( | 929 bool ChromeContentBrowserClient::AllowSaveLocalState( |
| 930 content::ResourceContext* context) { | 930 content::ResourceContext* context) { |
| 931 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); | 931 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); |
| 932 ProfileIOData* io_data = ProfileIOData::FromResourceContext(context); | 932 ProfileIOData* io_data = ProfileIOData::FromResourceContext(context); |
| 933 CookieSettings* cookie_settings = io_data->GetCookieSettings(); |
| 934 ContentSetting setting = cookie_settings->GetDefaultCookieSetting(NULL); |
| 933 | 935 |
| 934 return !io_data->clear_local_state_on_exit()->GetValue(); | 936 // TODO(bauerb): Should we also disallow local state if the default is BLOCK? |
| 937 // Could we even support per-origin settings? |
| 938 return setting != CONTENT_SETTING_SESSION_ONLY; |
| 935 } | 939 } |
| 936 | 940 |
| 937 bool ChromeContentBrowserClient::AllowWorkerDatabase( | 941 bool ChromeContentBrowserClient::AllowWorkerDatabase( |
| 938 const GURL& url, | 942 const GURL& url, |
| 939 const string16& name, | 943 const string16& name, |
| 940 const string16& display_name, | 944 const string16& display_name, |
| 941 unsigned long estimated_size, | 945 unsigned long estimated_size, |
| 942 content::ResourceContext* context, | 946 content::ResourceContext* context, |
| 943 const std::vector<std::pair<int, int> >& render_views) { | 947 const std::vector<std::pair<int, int> >& render_views) { |
| 944 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); | 948 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); |
| (...skipping 685 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1630 #if defined(USE_NSS) | 1634 #if defined(USE_NSS) |
| 1631 crypto::CryptoModuleBlockingPasswordDelegate* | 1635 crypto::CryptoModuleBlockingPasswordDelegate* |
| 1632 ChromeContentBrowserClient::GetCryptoPasswordDelegate( | 1636 ChromeContentBrowserClient::GetCryptoPasswordDelegate( |
| 1633 const GURL& url) { | 1637 const GURL& url) { |
| 1634 return browser::NewCryptoModuleBlockingDialogDelegate( | 1638 return browser::NewCryptoModuleBlockingDialogDelegate( |
| 1635 browser::kCryptoModulePasswordKeygen, url.host()); | 1639 browser::kCryptoModulePasswordKeygen, url.host()); |
| 1636 } | 1640 } |
| 1637 #endif | 1641 #endif |
| 1638 | 1642 |
| 1639 } // namespace chrome | 1643 } // namespace chrome |
| OLD | NEW |