Chromium Code Reviews| Index: content/browser/content_browser_client.h |
| diff --git a/content/browser/content_browser_client.h b/content/browser/content_browser_client.h |
| index 787273e9d135e100d26339c99cf22390285766ce..44db6f192b7a3cfe25b071e1746a4cb65f1a989b 100644 |
| --- a/content/browser/content_browser_client.h |
| +++ b/content/browser/content_browser_client.h |
| @@ -23,6 +23,7 @@ class GURL; |
| class MHTMLGenerationManager; |
| class PluginProcessHost; |
| class QuotaPermissionContext; |
| +class RenderProcessHost; |
| class RenderViewHost; |
| class ResourceDispatcherHost; |
| class SSLCertErrorHandler; |
| @@ -124,6 +125,15 @@ class ContentBrowserClient { |
| // SiteInstance. |
| virtual bool IsURLSameAsAnySiteInstance(const GURL& url) = 0; |
| + // Returns whether a specified URL should be rendered in a process with |
| + // special privileges, e.g. special bindings. |
|
jam
2011/09/26 15:46:16
nit: it's unclear to me reading this what special
jochen (gone - plz use gerrit)
2011/09/26 15:56:04
I tried to avoid saying extension bindings, since
|
| + virtual bool ShouldRunInPrivilegedProcess(const GURL& url) = 0; |
| + |
| + // Returns whether a new view for a given |site_url| can be launched in a |
| + // given |process_host|. |
| + virtual bool IsSuitableHost(RenderProcessHost* process_host, |
| + const GURL& site_url) = 0; |
| + |
| // See CharacterEncoding's comment. |
| virtual std::string GetCanonicalEncodingNameByAliasName( |
| const std::string& alias_name) = 0; |