OLD | NEW |
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/common/chrome_content_client.h" | 5 #include "chrome/common/chrome_content_client.h" |
6 | 6 |
7 #include "base/command_line.h" | 7 #include "base/command_line.h" |
8 #include "base/file_util.h" | 8 #include "base/file_util.h" |
9 #include "base/path_service.h" | 9 #include "base/path_service.h" |
10 #include "base/process_util.h" | 10 #include "base/process_util.h" |
(...skipping 102 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
113 webkit::npapi::WebPluginMimeType nacl_mime_type(kNaClPluginMimeType, | 113 webkit::npapi::WebPluginMimeType nacl_mime_type(kNaClPluginMimeType, |
114 kNaClPluginExtension, | 114 kNaClPluginExtension, |
115 kNaClPluginDescription); | 115 kNaClPluginDescription); |
116 nacl.mime_types.push_back(nacl_mime_type); | 116 nacl.mime_types.push_back(nacl_mime_type); |
117 plugins->push_back(nacl); | 117 plugins->push_back(nacl); |
118 | 118 |
119 skip_nacl_file_check = true; | 119 skip_nacl_file_check = true; |
120 } | 120 } |
121 } | 121 } |
122 | 122 |
123 // The Remoting Viewer plugin is built-in, but behind a flag for now. | 123 // The Remoting Viewer plugin is built-in. |
124 #if defined(ENABLE_REMOTING) | 124 #if defined(ENABLE_REMOTING) |
125 if (CommandLine::ForCurrentProcess()->HasSwitch( | 125 PepperPluginInfo info; |
126 switches::kEnableRemoting)) { | 126 info.is_internal = true; |
127 PepperPluginInfo info; | 127 info.name = kRemotingViewerPluginName; |
128 info.is_internal = true; | 128 info.path = FilePath(kRemotingViewerPluginPath); |
129 info.name = kRemotingViewerPluginName; | 129 webkit::npapi::WebPluginMimeType remoting_mime_type( |
130 info.path = FilePath(kRemotingViewerPluginPath); | 130 kRemotingViewerPluginMimeType, |
131 webkit::npapi::WebPluginMimeType remoting_mime_type( | 131 std::string(), |
132 kRemotingViewerPluginMimeType, | 132 std::string()); |
133 std::string(), | 133 info.mime_types.push_back(remoting_mime_type); |
134 std::string()); | 134 webkit::npapi::WebPluginMimeType old_remoting_mime_type( |
135 info.mime_types.push_back(remoting_mime_type); | 135 kRemotingViewerPluginOldMimeType, |
136 webkit::npapi::WebPluginMimeType old_remoting_mime_type( | 136 std::string(), |
137 kRemotingViewerPluginOldMimeType, | 137 std::string()); |
138 std::string(), | 138 info.mime_types.push_back(old_remoting_mime_type); |
139 std::string()); | 139 info.internal_entry_points.get_interface = remoting::PPP_GetInterface; |
140 info.mime_types.push_back(old_remoting_mime_type); | 140 info.internal_entry_points.initialize_module = |
141 info.internal_entry_points.get_interface = remoting::PPP_GetInterface; | 141 remoting::PPP_InitializeModule; |
142 info.internal_entry_points.initialize_module = | 142 info.internal_entry_points.shutdown_module = remoting::PPP_ShutdownModule; |
143 remoting::PPP_InitializeModule; | |
144 info.internal_entry_points.shutdown_module = remoting::PPP_ShutdownModule; | |
145 | 143 |
146 plugins->push_back(info); | 144 plugins->push_back(info); |
147 } | |
148 #endif | 145 #endif |
149 } | 146 } |
150 | 147 |
151 void AddOutOfProcessFlash(std::vector<PepperPluginInfo>* plugins) { | 148 void AddOutOfProcessFlash(std::vector<PepperPluginInfo>* plugins) { |
152 // Flash being out of process is handled separately than general plugins | 149 // Flash being out of process is handled separately than general plugins |
153 // for testing purposes. | 150 // for testing purposes. |
154 bool flash_out_of_process = !CommandLine::ForCurrentProcess()->HasSwitch( | 151 bool flash_out_of_process = !CommandLine::ForCurrentProcess()->HasSwitch( |
155 switches::kPpapiFlashInProcess); | 152 switches::kPpapiFlashInProcess); |
156 | 153 |
157 // Handle any Pepper Flash first. | 154 // Handle any Pepper Flash first. |
(...skipping 214 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
372 policy->SetJobLevel(sandbox::JOB_UNPROTECTED, 0); | 369 policy->SetJobLevel(sandbox::JOB_UNPROTECTED, 0); |
373 policy->SetTokenLevel( | 370 policy->SetTokenLevel( |
374 sandbox::USER_UNPROTECTED, sandbox::USER_UNPROTECTED); | 371 sandbox::USER_UNPROTECTED, sandbox::USER_UNPROTECTED); |
375 } | 372 } |
376 | 373 |
377 return true; | 374 return true; |
378 } | 375 } |
379 #endif | 376 #endif |
380 | 377 |
381 } // namespace chrome | 378 } // namespace chrome |
OLD | NEW |