Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 // Represents the browser side of the browser <--> renderer communication | 5 // Represents the browser side of the browser <--> renderer communication |
| 6 // channel. There will be one RenderProcessHost per renderer process. | 6 // channel. There will be one RenderProcessHost per renderer process. |
| 7 | 7 |
| 8 #include "content/browser/renderer_host/browser_render_process_host.h" | 8 #include "content/browser/renderer_host/browser_render_process_host.h" |
| 9 | 9 |
| 10 #include <algorithm> | 10 #include <algorithm> |
| (...skipping 549 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 560 switches::kDisableJavaScriptI18NAPI, | 560 switches::kDisableJavaScriptI18NAPI, |
| 561 switches::kDisableLocalStorage, | 561 switches::kDisableLocalStorage, |
| 562 switches::kDisableLogging, | 562 switches::kDisableLogging, |
| 563 switches::kDisableSeccompSandbox, | 563 switches::kDisableSeccompSandbox, |
| 564 switches::kDisableSessionStorage, | 564 switches::kDisableSessionStorage, |
| 565 switches::kDisableSharedWorkers, | 565 switches::kDisableSharedWorkers, |
| 566 switches::kDisableSpeechInput, | 566 switches::kDisableSpeechInput, |
| 567 switches::kDisableWebAudio, | 567 switches::kDisableWebAudio, |
| 568 switches::kDisableWebSockets, | 568 switches::kDisableWebSockets, |
| 569 switches::kEnableAccessibilityLogging, | 569 switches::kEnableAccessibilityLogging, |
| 570 switches::kEnableCompositingForFixedPosition, | |
|
jamesr
2011/10/27 06:19:52
why is this here? i know we tend to cargo-cult it
| |
| 570 switches::kEnableDCHECK, | 571 switches::kEnableDCHECK, |
| 571 switches::kEnableGPUServiceLogging, | 572 switches::kEnableGPUServiceLogging, |
| 572 switches::kEnableGPUClientLogging, | 573 switches::kEnableGPUClientLogging, |
| 573 switches::kEnableLogging, | 574 switches::kEnableLogging, |
| 574 switches::kEnableMediaStream, | 575 switches::kEnableMediaStream, |
| 575 switches::kEnableStrictSiteIsolation, | 576 switches::kEnableStrictSiteIsolation, |
| 576 switches::kDisableFullScreen, | 577 switches::kDisableFullScreen, |
| 577 switches::kEnablePepperTesting, | 578 switches::kEnablePepperTesting, |
| 578 #if defined(OS_MACOSX) | 579 #if defined(OS_MACOSX) |
| 579 // Allow this to be set when invoking the browser and relayed along. | 580 // Allow this to be set when invoking the browser and relayed along. |
| (...skipping 412 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 992 void BrowserRenderProcessHost::OnRevealFolderInOS(const FilePath& path) { | 993 void BrowserRenderProcessHost::OnRevealFolderInOS(const FilePath& path) { |
| 993 // Only honor the request if appropriate persmissions are granted. | 994 // Only honor the request if appropriate persmissions are granted. |
| 994 if (ChildProcessSecurityPolicy::GetInstance()->CanReadFile(id(), path)) | 995 if (ChildProcessSecurityPolicy::GetInstance()->CanReadFile(id(), path)) |
| 995 content::GetContentClient()->browser()->OpenItem(path); | 996 content::GetContentClient()->browser()->OpenItem(path); |
| 996 } | 997 } |
| 997 | 998 |
| 998 void BrowserRenderProcessHost::OnSavedPageAsMHTML(int job_id, int64 data_size) { | 999 void BrowserRenderProcessHost::OnSavedPageAsMHTML(int job_id, int64 data_size) { |
| 999 content::GetContentClient()->browser()->GetMHTMLGenerationManager()-> | 1000 content::GetContentClient()->browser()->GetMHTMLGenerationManager()-> |
| 1000 MHTMLGenerated(job_id, data_size); | 1001 MHTMLGenerated(job_id, data_size); |
| 1001 } | 1002 } |
| OLD | NEW |