Index: content/browser/content_browser_client.h |
diff --git a/content/browser/content_browser_client.h b/content/browser/content_browser_client.h |
index 787273e9d135e100d26339c99cf22390285766ce..44db6f192b7a3cfe25b071e1746a4cb65f1a989b 100644 |
--- a/content/browser/content_browser_client.h |
+++ b/content/browser/content_browser_client.h |
@@ -23,6 +23,7 @@ class GURL; |
class MHTMLGenerationManager; |
class PluginProcessHost; |
class QuotaPermissionContext; |
+class RenderProcessHost; |
class RenderViewHost; |
class ResourceDispatcherHost; |
class SSLCertErrorHandler; |
@@ -124,6 +125,15 @@ class ContentBrowserClient { |
// SiteInstance. |
virtual bool IsURLSameAsAnySiteInstance(const GURL& url) = 0; |
+ // Returns whether a specified URL should be rendered in a process with |
+ // special privileges, e.g. special bindings. |
jam
2011/09/26 15:46:16
nit: it's unclear to me reading this what special
jochen (gone - plz use gerrit)
2011/09/26 15:56:04
I tried to avoid saying extension bindings, since
|
+ virtual bool ShouldRunInPrivilegedProcess(const GURL& url) = 0; |
+ |
+ // Returns whether a new view for a given |site_url| can be launched in a |
+ // given |process_host|. |
+ virtual bool IsSuitableHost(RenderProcessHost* process_host, |
+ const GURL& site_url) = 0; |
+ |
// See CharacterEncoding's comment. |
virtual std::string GetCanonicalEncodingNameByAliasName( |
const std::string& alias_name) = 0; |