Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(287)

Side by Side Diff: content/public/browser/content_browser_client.h

Issue 1377933004: Modify --isolate-extensions to not isolate hosted apps. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@no_isolate_apps3
Patch Set: Fixes from charlie Created 5 years, 2 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #ifndef CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ 5 #ifndef CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_
6 #define CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ 6 #define CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_
7 7
8 #include <map> 8 #include <map>
9 #include <string> 9 #include <string>
10 #include <utility> 10 #include <utility>
(...skipping 162 matching lines...) Expand 10 before | Expand all | Expand 10 after
173 // Get the effective URL for the given actual URL, to allow an embedder to 173 // Get the effective URL for the given actual URL, to allow an embedder to
174 // group different url schemes in the same SiteInstance. 174 // group different url schemes in the same SiteInstance.
175 virtual GURL GetEffectiveURL(BrowserContext* browser_context, 175 virtual GURL GetEffectiveURL(BrowserContext* browser_context,
176 const GURL& url); 176 const GURL& url);
177 177
178 // Returns whether all instances of the specified effective URL should be 178 // Returns whether all instances of the specified effective URL should be
179 // rendered by the same process, rather than using process-per-site-instance. 179 // rendered by the same process, rather than using process-per-site-instance.
180 virtual bool ShouldUseProcessPerSite(BrowserContext* browser_context, 180 virtual bool ShouldUseProcessPerSite(BrowserContext* browser_context,
181 const GURL& effective_url); 181 const GURL& effective_url);
182 182
183 // Returns true if site isolation should be enabled for |effective_url|. This
184 // call allows the embedder to supplement the site isolation policy enforced
185 // by the content layer.
186 //
187 // Will only be called if both of the following happen:
188 // 1. The embedder asked to be consulted, by returning true from
189 // ContentClient::IsSupplementarySiteIsolationModeEnabled().
190 // 2. The content layer didn't decide to isolate |effective_url| according
191 // to its internal policy (e.g. because of --site-per-process).
192 virtual bool DoesSiteRequireDedicatedProcess(BrowserContext* browser_context,
193 const GURL& effective_url);
194
183 // Returns true unless the effective URL is part of a site that cannot live in 195 // Returns true unless the effective URL is part of a site that cannot live in
184 // a process dedicated to that site. This is only called if 196 // a process restricted to just that site. This is only called if site
185 // SiteIsolationPolicy::DoesSiteRequireDedicatedProcess returns true. 197 // isolation is enabled for this URL, and is a bug workaround.
198 //
186 // TODO(nick): Remove this function once https://crbug.com/160576 is fixed, 199 // TODO(nick): Remove this function once https://crbug.com/160576 is fixed,
187 // and origin lock can be applied to all URLs. 200 // and origin lock can be applied to all URLs.
188 virtual bool ShouldLockToOrigin(BrowserContext* browser_context, 201 virtual bool ShouldLockToOrigin(BrowserContext* browser_context,
189 const GURL& effective_url); 202 const GURL& effective_url);
190 203
191 // Returns a list additional WebUI schemes, if any. These additional schemes 204 // Returns a list additional WebUI schemes, if any. These additional schemes
192 // act as aliases to the chrome: scheme. The additional schemes may or may 205 // act as aliases to the chrome: scheme. The additional schemes may or may
193 // not serve specific WebUI pages depending on the particular URLDataSource 206 // not serve specific WebUI pages depending on the particular URLDataSource
194 // and its override of URLDataSource::ShouldServiceRequest. For all schemes 207 // and its override of URLDataSource::ShouldServiceRequest. For all schemes
195 // returned here, view-source is allowed. 208 // returned here, view-source is allowed.
(...skipping 524 matching lines...) Expand 10 before | Expand all | Expand 10 after
720 // Allows an embedder to provide its own ExternalVideoSurfaceContainer 733 // Allows an embedder to provide its own ExternalVideoSurfaceContainer
721 // implementation. Return nullptr to disable external surface video. 734 // implementation. Return nullptr to disable external surface video.
722 virtual ExternalVideoSurfaceContainer* 735 virtual ExternalVideoSurfaceContainer*
723 OverrideCreateExternalVideoSurfaceContainer(WebContents* web_contents); 736 OverrideCreateExternalVideoSurfaceContainer(WebContents* web_contents);
724 #endif 737 #endif
725 }; 738 };
726 739
727 } // namespace content 740 } // namespace content
728 741
729 #endif // CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ 742 #endif // CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_
OLDNEW
« no previous file with comments | « content/common/site_isolation_policy.cc ('k') | content/public/browser/content_browser_client.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698