OLD | NEW |
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 // Represents the browser side of the browser <--> renderer communication | 5 // Represents the browser side of the browser <--> renderer communication |
6 // channel. There will be one RenderProcessHost per renderer process. | 6 // channel. There will be one RenderProcessHost per renderer process. |
7 | 7 |
8 #include "content/browser/renderer_host/browser_render_process_host.h" | 8 #include "content/browser/renderer_host/browser_render_process_host.h" |
9 | 9 |
10 #include <algorithm> | 10 #include <algorithm> |
(...skipping 556 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
567 switches::kEnableLogging, | 567 switches::kEnableLogging, |
568 switches::kEnableMediaStream, | 568 switches::kEnableMediaStream, |
569 switches::kDisableFullScreen, | 569 switches::kDisableFullScreen, |
570 switches::kEnablePepperTesting, | 570 switches::kEnablePepperTesting, |
571 #if defined(OS_MACOSX) | 571 #if defined(OS_MACOSX) |
572 // Allow this to be set when invoking the browser and relayed along. | 572 // Allow this to be set when invoking the browser and relayed along. |
573 switches::kEnableSandboxLogging, | 573 switches::kEnableSandboxLogging, |
574 #endif | 574 #endif |
575 switches::kEnableSeccompSandbox, | 575 switches::kEnableSeccompSandbox, |
576 switches::kEnableStatsTable, | 576 switches::kEnableStatsTable, |
| 577 switches::kEnableThreadedCompositing, |
577 switches::kEnableVideoFullscreen, | 578 switches::kEnableVideoFullscreen, |
578 switches::kEnableVideoLogging, | 579 switches::kEnableVideoLogging, |
579 switches::kFullMemoryCrashReport, | 580 switches::kFullMemoryCrashReport, |
580 #if !defined (GOOGLE_CHROME_BUILD) | 581 #if !defined (GOOGLE_CHROME_BUILD) |
581 // These are unsupported and not fully tested modes, so don't enable them | 582 // These are unsupported and not fully tested modes, so don't enable them |
582 // for official Google Chrome builds. | 583 // for official Google Chrome builds. |
583 switches::kInProcessPlugins, | 584 switches::kInProcessPlugins, |
584 #endif // GOOGLE_CHROME_BUILD | 585 #endif // GOOGLE_CHROME_BUILD |
585 switches::kInProcessWebGL, | 586 switches::kInProcessWebGL, |
586 switches::kJavaScriptFlags, | 587 switches::kJavaScriptFlags, |
(...skipping 387 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
974 void BrowserRenderProcessHost::OnRevealFolderInOS(const FilePath& path) { | 975 void BrowserRenderProcessHost::OnRevealFolderInOS(const FilePath& path) { |
975 // Only honor the request if appropriate persmissions are granted. | 976 // Only honor the request if appropriate persmissions are granted. |
976 if (ChildProcessSecurityPolicy::GetInstance()->CanReadFile(id(), path)) | 977 if (ChildProcessSecurityPolicy::GetInstance()->CanReadFile(id(), path)) |
977 content::GetContentClient()->browser()->OpenItem(path); | 978 content::GetContentClient()->browser()->OpenItem(path); |
978 } | 979 } |
979 | 980 |
980 void BrowserRenderProcessHost::OnSavedPageAsMHTML(int job_id, int64 data_size) { | 981 void BrowserRenderProcessHost::OnSavedPageAsMHTML(int job_id, int64 data_size) { |
981 content::GetContentClient()->browser()->GetMHTMLGenerationManager()-> | 982 content::GetContentClient()->browser()->GetMHTMLGenerationManager()-> |
982 MHTMLGenerated(job_id, data_size); | 983 MHTMLGenerated(job_id, data_size); |
983 } | 984 } |
OLD | NEW |