OLD | NEW |
---|---|
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "android_webview/browser/aw_content_browser_client.h" | 5 #include "android_webview/browser/aw_content_browser_client.h" |
6 | 6 |
7 #include "android_webview/browser/aw_browser_main_parts.h" | 7 #include "android_webview/browser/aw_browser_main_parts.h" |
8 #include "android_webview/browser/aw_cookie_access_policy.h" | 8 #include "android_webview/browser/aw_cookie_access_policy.h" |
9 #include "android_webview/browser/aw_quota_permission_context.h" | 9 #include "android_webview/browser/aw_quota_permission_context.h" |
10 #include "android_webview/browser/net_disk_cache_remover.h" | 10 #include "android_webview/browser/net_disk_cache_remover.h" |
(...skipping 72 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
83 CHECK(content::RenderProcessHost::run_renderer_in_process()); | 83 CHECK(content::RenderProcessHost::run_renderer_in_process()); |
84 | 84 |
85 // Grant content: and file: scheme to the whole process, since we impose | 85 // Grant content: and file: scheme to the whole process, since we impose |
86 // per-view access checks. | 86 // per-view access checks. |
87 content::ChildProcessSecurityPolicy::GetInstance()->GrantScheme( | 87 content::ChildProcessSecurityPolicy::GetInstance()->GrantScheme( |
88 host->GetID(), android_webview::kContentScheme); | 88 host->GetID(), android_webview::kContentScheme); |
89 content::ChildProcessSecurityPolicy::GetInstance()->GrantScheme( | 89 content::ChildProcessSecurityPolicy::GetInstance()->GrantScheme( |
90 host->GetID(), chrome::kFileScheme); | 90 host->GetID(), chrome::kFileScheme); |
91 } | 91 } |
92 | 92 |
93 net::URLRequestContextGetter* | |
94 AwContentBrowserClient::CreateRequestContext( | |
95 content::BrowserContext* browser_context, | |
96 scoped_ptr<net::URLRequestJobFactory::ProtocolHandler> | |
97 blob_protocol_handler, | |
98 scoped_ptr<net::URLRequestJobFactory::ProtocolHandler> | |
99 file_system_protocol_handler, | |
100 scoped_ptr<net::URLRequestJobFactory::ProtocolHandler> | |
101 developer_protocol_handler, | |
102 scoped_ptr<net::URLRequestJobFactory::ProtocolHandler> | |
103 chrome_protocol_handler, | |
104 scoped_ptr<net::URLRequestJobFactory::ProtocolHandler> | |
105 chrome_devtools_protocol_handler) { | |
106 return browser_context_->CreateRequestContext( | |
joth
2013/02/07 00:41:41
might as well DCHECK(browser_context_ == browser_c
pauljensen
2013/02/07 14:10:54
Done.
| |
107 blob_protocol_handler.Pass(), file_system_protocol_handler.Pass(), | |
108 developer_protocol_handler.Pass(), chrome_protocol_handler.Pass(), | |
109 chrome_devtools_protocol_handler.Pass()); | |
110 } | |
111 | |
112 net::URLRequestContextGetter* | |
113 AwContentBrowserClient::CreateRequestContextForStoragePartition( | |
114 content::BrowserContext* browser_context, | |
115 const FilePath& partition_path, | |
116 bool in_memory, | |
117 scoped_ptr<net::URLRequestJobFactory::ProtocolHandler> | |
118 blob_protocol_handler, | |
119 scoped_ptr<net::URLRequestJobFactory::ProtocolHandler> | |
120 file_system_protocol_handler, | |
121 scoped_ptr<net::URLRequestJobFactory::ProtocolHandler> | |
122 developer_protocol_handler, | |
123 scoped_ptr<net::URLRequestJobFactory::ProtocolHandler> | |
124 chrome_protocol_handler, | |
125 scoped_ptr<net::URLRequestJobFactory::ProtocolHandler> | |
126 chrome_devtools_protocol_handler) { | |
127 return browser_context_->CreateRequestContextForStoragePartition( | |
128 partition_path, in_memory, blob_protocol_handler.Pass(), | |
129 file_system_protocol_handler.Pass(), | |
130 developer_protocol_handler.Pass(), chrome_protocol_handler.Pass(), | |
131 chrome_devtools_protocol_handler.Pass()); | |
132 } | |
133 | |
93 std::string AwContentBrowserClient::GetCanonicalEncodingNameByAliasName( | 134 std::string AwContentBrowserClient::GetCanonicalEncodingNameByAliasName( |
94 const std::string& alias_name) { | 135 const std::string& alias_name) { |
95 return alias_name; | 136 return alias_name; |
96 } | 137 } |
97 | 138 |
98 void AwContentBrowserClient::AppendExtraCommandLineSwitches( | 139 void AwContentBrowserClient::AppendExtraCommandLineSwitches( |
99 CommandLine* command_line, | 140 CommandLine* command_line, |
100 int child_process_id) { | 141 int child_process_id) { |
101 NOTREACHED() << "Android WebView does not support multi-process yet"; | 142 NOTREACHED() << "Android WebView does not support multi-process yet"; |
102 } | 143 } |
(...skipping 224 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
327 | 368 |
328 bool AwContentBrowserClient::AllowPepperSocketAPI( | 369 bool AwContentBrowserClient::AllowPepperSocketAPI( |
329 content::BrowserContext* browser_context, | 370 content::BrowserContext* browser_context, |
330 const GURL& url, | 371 const GURL& url, |
331 const content::SocketPermissionRequest& params) { | 372 const content::SocketPermissionRequest& params) { |
332 NOTREACHED() << "Android WebView does not support plugins"; | 373 NOTREACHED() << "Android WebView does not support plugins"; |
333 return false; | 374 return false; |
334 } | 375 } |
335 | 376 |
336 } // namespace android_webview | 377 } // namespace android_webview |
OLD | NEW |