| OLD | NEW |
| 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 // Represents the browser side of the browser <--> renderer communication | 5 // Represents the browser side of the browser <--> renderer communication |
| 6 // channel. There will be one RenderProcessHost per renderer process. | 6 // channel. There will be one RenderProcessHost per renderer process. |
| 7 | 7 |
| 8 #include "content/browser/renderer_host/browser_render_process_host.h" | 8 #include "content/browser/renderer_host/browser_render_process_host.h" |
| 9 | 9 |
| 10 #include <algorithm> | 10 #include <algorithm> |
| (...skipping 550 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 561 switches::kEnableAdaptive, | 561 switches::kEnableAdaptive, |
| 562 switches::kEnableBenchmarking, | 562 switches::kEnableBenchmarking, |
| 563 switches::kEnableClickToPlay, | 563 switches::kEnableClickToPlay, |
| 564 switches::kEnableCrxlessWebApps, | 564 switches::kEnableCrxlessWebApps, |
| 565 switches::kEnableDCHECK, | 565 switches::kEnableDCHECK, |
| 566 switches::kEnableExperimentalExtensionApis, | 566 switches::kEnableExperimentalExtensionApis, |
| 567 switches::kEnableInBrowserThumbnailing, | 567 switches::kEnableInBrowserThumbnailing, |
| 568 switches::kEnableIPCFuzzing, | 568 switches::kEnableIPCFuzzing, |
| 569 switches::kEnableLogging, | 569 switches::kEnableLogging, |
| 570 switches::kEnableNaCl, | 570 switches::kEnableNaCl, |
| 571 switches::kEnableOpenMax, | |
| 572 #if defined(ENABLE_P2P_APIS) | 571 #if defined(ENABLE_P2P_APIS) |
| 573 switches::kEnableP2PApi, | 572 switches::kEnableP2PApi, |
| 574 #endif | 573 #endif |
| 575 switches::kEnablePepperTesting, | 574 switches::kEnablePepperTesting, |
| 576 switches::kEnableRemoting, | 575 switches::kEnableRemoting, |
| 577 switches::kEnableResourceContentSettings, | 576 switches::kEnableResourceContentSettings, |
| 578 #if defined(OS_MACOSX) | 577 #if defined(OS_MACOSX) |
| 579 // Allow this to be set when invoking the browser and relayed along. | 578 // Allow this to be set when invoking the browser and relayed along. |
| 580 switches::kEnableSandboxLogging, | 579 switches::kEnableSandboxLogging, |
| 581 #endif | 580 #endif |
| (...skipping 384 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 966 void BrowserRenderProcessHost::OnUserMetricsRecordAction( | 965 void BrowserRenderProcessHost::OnUserMetricsRecordAction( |
| 967 const std::string& action) { | 966 const std::string& action) { |
| 968 UserMetrics::RecordComputedAction(action); | 967 UserMetrics::RecordComputedAction(action); |
| 969 } | 968 } |
| 970 | 969 |
| 971 void BrowserRenderProcessHost::OnRevealFolderInOS(const FilePath& path) { | 970 void BrowserRenderProcessHost::OnRevealFolderInOS(const FilePath& path) { |
| 972 // Only honor the request if appropriate persmissions are granted. | 971 // Only honor the request if appropriate persmissions are granted. |
| 973 if (ChildProcessSecurityPolicy::GetInstance()->CanReadFile(id(), path)) | 972 if (ChildProcessSecurityPolicy::GetInstance()->CanReadFile(id(), path)) |
| 974 content::GetContentClient()->browser()->RevealFolderInOS(path); | 973 content::GetContentClient()->browser()->RevealFolderInOS(path); |
| 975 } | 974 } |
| OLD | NEW |