Chromium Code Reviews| Index: content/browser/child_process_security_policy_impl.h |
| diff --git a/content/browser/child_process_security_policy_impl.h b/content/browser/child_process_security_policy_impl.h |
| index 522a377c07e37ea5d0f500d600901060450e44af..12675091b12d75d2833472510fef0791fb4fd88a 100644 |
| --- a/content/browser/child_process_security_policy_impl.h |
| +++ b/content/browser/child_process_security_policy_impl.h |
| @@ -126,6 +126,12 @@ class CONTENT_EXPORT ChildProcessSecurityPolicyImpl |
| // request the URL. |
| bool CanRequestURL(int child_id, const GURL& url); |
| + // Whether the process is allowed to commit a page from the given URL. This is |
|
nasko
2015/08/14 22:14:42
nit: s/page/document/
Charlie Reis
2015/08/14 23:23:32
Done.
|
| + // more restrictive than CanRequestURL, since CanRequestURL allows requests |
| + // that might lead to cross-process navigations or ShellExecute (external to |
|
nasko
2015/08/14 22:14:42
nit: ShellExecute is a Windows specific API. This
Charlie Reis
2015/08/14 23:23:32
Done.
|
| + // the browser). |
| + bool CanCommitURL(int child_id, const GURL& url); |
| + |
| // Explicit permissions checks for FileSystemURL specified files. |
| bool CanReadFileSystemFile(int child_id, const storage::FileSystemURL& url); |
| bool CanWriteFileSystemFile(int child_id, const storage::FileSystemURL& url); |