OLD | NEW |
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 // Represents the browser side of the browser <--> renderer communication | 5 // Represents the browser side of the browser <--> renderer communication |
6 // channel. There will be one RenderProcessHost per renderer process. | 6 // channel. There will be one RenderProcessHost per renderer process. |
7 | 7 |
8 #include "content/browser/renderer_host/browser_render_process_host.h" | 8 #include "content/browser/renderer_host/browser_render_process_host.h" |
9 | 9 |
10 #include <algorithm> | 10 #include <algorithm> |
(...skipping 550 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
561 switches::kEnableAdaptive, | 561 switches::kEnableAdaptive, |
562 switches::kEnableBenchmarking, | 562 switches::kEnableBenchmarking, |
563 switches::kEnableClickToPlay, | 563 switches::kEnableClickToPlay, |
564 switches::kEnableCrxlessWebApps, | 564 switches::kEnableCrxlessWebApps, |
565 switches::kEnableDCHECK, | 565 switches::kEnableDCHECK, |
566 switches::kEnableExperimentalExtensionApis, | 566 switches::kEnableExperimentalExtensionApis, |
567 switches::kEnableInBrowserThumbnailing, | 567 switches::kEnableInBrowserThumbnailing, |
568 switches::kEnableIPCFuzzing, | 568 switches::kEnableIPCFuzzing, |
569 switches::kEnableLogging, | 569 switches::kEnableLogging, |
570 switches::kEnableNaCl, | 570 switches::kEnableNaCl, |
571 switches::kEnableOpenMax, | |
572 #if defined(ENABLE_P2P_APIS) | 571 #if defined(ENABLE_P2P_APIS) |
573 switches::kEnableP2PApi, | 572 switches::kEnableP2PApi, |
574 #endif | 573 #endif |
575 switches::kEnablePepperTesting, | 574 switches::kEnablePepperTesting, |
576 switches::kEnableRemoting, | 575 switches::kEnableRemoting, |
577 switches::kEnableResourceContentSettings, | 576 switches::kEnableResourceContentSettings, |
578 #if defined(OS_MACOSX) | 577 #if defined(OS_MACOSX) |
579 // Allow this to be set when invoking the browser and relayed along. | 578 // Allow this to be set when invoking the browser and relayed along. |
580 switches::kEnableSandboxLogging, | 579 switches::kEnableSandboxLogging, |
581 #endif | 580 #endif |
(...skipping 384 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
966 void BrowserRenderProcessHost::OnUserMetricsRecordAction( | 965 void BrowserRenderProcessHost::OnUserMetricsRecordAction( |
967 const std::string& action) { | 966 const std::string& action) { |
968 UserMetrics::RecordComputedAction(action); | 967 UserMetrics::RecordComputedAction(action); |
969 } | 968 } |
970 | 969 |
971 void BrowserRenderProcessHost::OnRevealFolderInOS(const FilePath& path) { | 970 void BrowserRenderProcessHost::OnRevealFolderInOS(const FilePath& path) { |
972 // Only honor the request if appropriate persmissions are granted. | 971 // Only honor the request if appropriate persmissions are granted. |
973 if (ChildProcessSecurityPolicy::GetInstance()->CanReadFile(id(), path)) | 972 if (ChildProcessSecurityPolicy::GetInstance()->CanReadFile(id(), path)) |
974 content::GetContentClient()->browser()->RevealFolderInOS(path); | 973 content::GetContentClient()->browser()->RevealFolderInOS(path); |
975 } | 974 } |
OLD | NEW |