Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #ifndef CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ | 5 #ifndef CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ |
| 6 #define CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ | 6 #define CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ |
| 7 | 7 |
| 8 #include <string> | 8 #include <string> |
| 9 #include <utility> | 9 #include <utility> |
| 10 #include <vector> | 10 #include <vector> |
| (...skipping 245 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 256 ResourceContext* context, | 256 ResourceContext* context, |
| 257 const std::vector<std::pair<int, int> >& render_views); | 257 const std::vector<std::pair<int, int> >& render_views); |
| 258 | 258 |
| 259 // Allow the embedder to override the request context based on the URL for | 259 // Allow the embedder to override the request context based on the URL for |
| 260 // certain operations, like cookie access. Returns NULL to indicate the | 260 // certain operations, like cookie access. Returns NULL to indicate the |
| 261 // regular request context should be used. | 261 // regular request context should be used. |
| 262 // This is called on the IO thread. | 262 // This is called on the IO thread. |
| 263 virtual net::URLRequestContext* OverrideRequestContextForURL( | 263 virtual net::URLRequestContext* OverrideRequestContextForURL( |
| 264 const GURL& url, ResourceContext* context); | 264 const GURL& url, ResourceContext* context); |
| 265 | 265 |
| 266 // Allow the embedder to specify storage parititon id associated with a child | 266 // Allow the embedder to specify storage parititon id associated with a site. |
|
Charlie Reis
2012/11/07 02:36:34
Can you also update this to explain that partition
nasko
2012/11/07 17:47:01
Done.
| |
| 267 // process. | |
| 268 // | |
| 269 // Child processes that have different storage partition identifiers will | |
| 270 // behave as if they belong to different web browsers and not be able to | |
| 271 // access each other's cookies, local storage, etc. IDs must only fit the | |
| 272 // pattern [a-z0-9]* (lowercase letters or digits). | |
| 273 // | |
| 274 // Returns the empty string for the regular storage partition. | |
| 275 virtual std::string GetStoragePartitionIdForChildProcess( | |
| 276 content::BrowserContext* browser_context, | |
| 277 int child_process_id); | |
| 278 | |
| 279 // Same as GetStoragePartitionIdForChildProcess(), but uses a site instead. | |
| 280 // | |
| 281 // TODO(ajwong): Replace all uses of GetStoragePartitionIdForChildProcess() | |
| 282 // with this one. | |
| 283 virtual std::string GetStoragePartitionIdForSite( | 267 virtual std::string GetStoragePartitionIdForSite( |
| 284 content::BrowserContext* browser_context, | 268 content::BrowserContext* browser_context, |
| 285 const GURL& site); | 269 const GURL& site); |
| 286 | 270 |
| 287 // Allows the embedder to provide a validation check for |partition_id|s. | 271 // Allows the embedder to provide a validation check for |partition_id|s. |
| 288 // This domain of valid entries should match the range of outputs for | 272 // This domain of valid entries should match the range of outputs for |
| 289 // GetStoragePartitionIdForChildProcess(). | 273 // GetStoragePartitionIdForChildProcess(). |
| 290 virtual bool IsValidStoragePartitionId(BrowserContext* browser_context, | 274 virtual bool IsValidStoragePartitionId(BrowserContext* browser_context, |
| 291 const std::string& partition_id); | 275 const std::string& partition_id); |
| 292 | 276 |
| 277 // Allow the embedder to provide storage parititon description associated with | |
|
Charlie Reis
2012/11/07 01:40:54
nit: Allows
nit: provide a
s/associated with/for/
Charlie Reis
2012/11/07 02:36:34
Also, s/description/configuration/. We've already
nasko
2012/11/07 17:47:01
Done.
nasko
2012/11/07 17:47:01
Done.
| |
| 278 // a site. Storage can be split into partition domains, which are independent | |
|
Charlie Reis
2012/11/07 01:40:54
This sentence is hard for me to understand. Can w
nasko
2012/11/07 17:47:01
Done.
| |
| 279 // from each other. The |partition_domain| is an arbitrary string, specifying | |
|
awong
2012/11/07 01:14:11
Please state the formating constraints (eg., what'
nasko
2012/11/07 17:47:01
Done.
| |
| 280 // the domain in which partitions live (similar to namespace). Within a | |
| 281 // domain, partitions can be uniquely identified by the combination of | |
| 282 // |partition_name| and |in_memory| values. When a partition is not to be | |
| 283 // persisted, the |in_memory| value should be set to true. | |
|
awong
2012/11/07 01:14:11
should -> will
Charlie Reis
2012/11/07 01:40:54
Hmm, I think I agree with Nasko's wording (should)
awong
2012/11/07 01:43:46
I tend to think of function comments as hard specs
nasko
2012/11/07 17:47:01
Done.
nasko
2012/11/07 17:47:01
Done.
| |
| 284 virtual void GetStoragePartitionConfigForSite( | |
| 285 content::BrowserContext* browser_context, | |
| 286 const GURL& site, | |
| 287 std::string* partition_domain, | |
| 288 std::string* partition_name, | |
| 289 bool* in_memory); | |
| 290 | |
| 293 // Create and return a new quota permission context. | 291 // Create and return a new quota permission context. |
| 294 virtual QuotaPermissionContext* CreateQuotaPermissionContext(); | 292 virtual QuotaPermissionContext* CreateQuotaPermissionContext(); |
| 295 | 293 |
| 296 // Open the given file in the desktop's default manner. | 294 // Open the given file in the desktop's default manner. |
| 297 virtual void OpenItem(const FilePath& path) {} | 295 virtual void OpenItem(const FilePath& path) {} |
| 298 | 296 |
| 299 // Show the given file in a file manager. If possible, select the file. | 297 // Show the given file in a file manager. If possible, select the file. |
| 300 virtual void ShowItemInFolder(const FilePath& path) {} | 298 virtual void ShowItemInFolder(const FilePath& path) {} |
| 301 | 299 |
| 302 // Informs the embedder that a certificate error has occured. If | 300 // Informs the embedder that a certificate error has occured. If |
| (...skipping 169 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 472 // This is called on a worker thread. | 470 // This is called on a worker thread. |
| 473 virtual | 471 virtual |
| 474 crypto::CryptoModuleBlockingPasswordDelegate* GetCryptoPasswordDelegate( | 472 crypto::CryptoModuleBlockingPasswordDelegate* GetCryptoPasswordDelegate( |
| 475 const GURL& url); | 473 const GURL& url); |
| 476 #endif | 474 #endif |
| 477 }; | 475 }; |
| 478 | 476 |
| 479 } // namespace content | 477 } // namespace content |
| 480 | 478 |
| 481 #endif // CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ | 479 #endif // CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ |
| OLD | NEW |