| OLD | NEW |
| 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 // Represents the browser side of the browser <--> renderer communication | 5 // Represents the browser side of the browser <--> renderer communication |
| 6 // channel. There will be one RenderProcessHost per renderer process. | 6 // channel. There will be one RenderProcessHost per renderer process. |
| 7 | 7 |
| 8 #include "content/browser/renderer_host/render_process_host_impl.h" | 8 #include "content/browser/renderer_host/render_process_host_impl.h" |
| 9 | 9 |
| 10 #include <algorithm> | 10 #include <algorithm> |
| (...skipping 676 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 687 switches::kEnablePepperTesting, | 687 switches::kEnablePepperTesting, |
| 688 switches::kEnablePointerLock, | 688 switches::kEnablePointerLock, |
| 689 #if defined(OS_MACOSX) | 689 #if defined(OS_MACOSX) |
| 690 // Allow this to be set when invoking the browser and relayed along. | 690 // Allow this to be set when invoking the browser and relayed along. |
| 691 switches::kEnableSandboxLogging, | 691 switches::kEnableSandboxLogging, |
| 692 #endif | 692 #endif |
| 693 switches::kEnableSeccompSandbox, | 693 switches::kEnableSeccompSandbox, |
| 694 switches::kEnableStatsTable, | 694 switches::kEnableStatsTable, |
| 695 switches::kEnableThreadedCompositing, | 695 switches::kEnableThreadedCompositing, |
| 696 switches::kEnableVideoFullscreen, | 696 switches::kEnableVideoFullscreen, |
| 697 switches::kEnableVideoLogging, | |
| 698 switches::kEnableVideoTrack, | 697 switches::kEnableVideoTrack, |
| 699 switches::kFullMemoryCrashReport, | 698 switches::kFullMemoryCrashReport, |
| 700 #if !defined (GOOGLE_CHROME_BUILD) | 699 #if !defined (GOOGLE_CHROME_BUILD) |
| 701 // These are unsupported and not fully tested modes, so don't enable them | 700 // These are unsupported and not fully tested modes, so don't enable them |
| 702 // for official Google Chrome builds. | 701 // for official Google Chrome builds. |
| 703 switches::kInProcessPlugins, | 702 switches::kInProcessPlugins, |
| 704 #endif // GOOGLE_CHROME_BUILD | 703 #endif // GOOGLE_CHROME_BUILD |
| 705 switches::kInProcessWebGL, | 704 switches::kInProcessWebGL, |
| 706 switches::kJavaScriptFlags, | 705 switches::kJavaScriptFlags, |
| 707 switches::kLoggingLevel, | 706 switches::kLoggingLevel, |
| (...skipping 598 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1306 void RenderProcessHostImpl::OnRevealFolderInOS(const FilePath& path) { | 1305 void RenderProcessHostImpl::OnRevealFolderInOS(const FilePath& path) { |
| 1307 // Only honor the request if appropriate persmissions are granted. | 1306 // Only honor the request if appropriate persmissions are granted. |
| 1308 if (ChildProcessSecurityPolicy::GetInstance()->CanReadFile(GetID(), path)) | 1307 if (ChildProcessSecurityPolicy::GetInstance()->CanReadFile(GetID(), path)) |
| 1309 content::GetContentClient()->browser()->OpenItem(path); | 1308 content::GetContentClient()->browser()->OpenItem(path); |
| 1310 } | 1309 } |
| 1311 | 1310 |
| 1312 void RenderProcessHostImpl::OnSavedPageAsMHTML(int job_id, int64 data_size) { | 1311 void RenderProcessHostImpl::OnSavedPageAsMHTML(int job_id, int64 data_size) { |
| 1313 content::GetContentClient()->browser()->GetMHTMLGenerationManager()-> | 1312 content::GetContentClient()->browser()->GetMHTMLGenerationManager()-> |
| 1314 MHTMLGenerated(job_id, data_size); | 1313 MHTMLGenerated(job_id, data_size); |
| 1315 } | 1314 } |
| OLD | NEW |