OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #ifndef CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ | 5 #ifndef CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ |
6 #define CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ | 6 #define CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ |
7 | 7 |
8 #include <map> | 8 #include <map> |
9 #include <string> | 9 #include <string> |
10 #include <utility> | 10 #include <utility> |
(...skipping 162 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
173 // Get the effective URL for the given actual URL, to allow an embedder to | 173 // Get the effective URL for the given actual URL, to allow an embedder to |
174 // group different url schemes in the same SiteInstance. | 174 // group different url schemes in the same SiteInstance. |
175 virtual GURL GetEffectiveURL(BrowserContext* browser_context, | 175 virtual GURL GetEffectiveURL(BrowserContext* browser_context, |
176 const GURL& url); | 176 const GURL& url); |
177 | 177 |
178 // Returns whether all instances of the specified effective URL should be | 178 // Returns whether all instances of the specified effective URL should be |
179 // rendered by the same process, rather than using process-per-site-instance. | 179 // rendered by the same process, rather than using process-per-site-instance. |
180 virtual bool ShouldUseProcessPerSite(BrowserContext* browser_context, | 180 virtual bool ShouldUseProcessPerSite(BrowserContext* browser_context, |
181 const GURL& effective_url); | 181 const GURL& effective_url); |
182 | 182 |
| 183 // Returns true if site isolation should be enabled for |effective_url|. This |
| 184 // call allows the embedder to supplement the site isolation policy enforced |
| 185 // by the content layer. |
| 186 // |
| 187 // Will only be called if both of the following happen: |
| 188 // 1. The embedder asked to be consulted, by returning true from |
| 189 // ContentClient::IsSupplementarySiteIsolationModeEnabled(). |
| 190 // 2. The content layer didn't decide to isolate |effective_url| according |
| 191 // to its internal policy (e.g. because of --site-per-process). |
| 192 virtual bool DoesSiteRequireDedicatedProcess(BrowserContext* browser_context, |
| 193 const GURL& effective_url); |
| 194 |
183 // Returns true unless the effective URL is part of a site that cannot live in | 195 // Returns true unless the effective URL is part of a site that cannot live in |
184 // a process dedicated to that site. This is only called if | 196 // a process restricted to just that site. This is only called if site |
185 // SiteIsolationPolicy::DoesSiteRequireDedicatedProcess returns true. | 197 // isolation is enabled for this URL, and is a bug workaround. |
| 198 // |
186 // TODO(nick): Remove this function once https://crbug.com/160576 is fixed, | 199 // TODO(nick): Remove this function once https://crbug.com/160576 is fixed, |
187 // and origin lock can be applied to all URLs. | 200 // and origin lock can be applied to all URLs. |
188 virtual bool ShouldLockToOrigin(BrowserContext* browser_context, | 201 virtual bool ShouldLockToOrigin(BrowserContext* browser_context, |
189 const GURL& effective_url); | 202 const GURL& effective_url); |
190 | 203 |
191 // Returns a list additional WebUI schemes, if any. These additional schemes | 204 // Returns a list additional WebUI schemes, if any. These additional schemes |
192 // act as aliases to the chrome: scheme. The additional schemes may or may | 205 // act as aliases to the chrome: scheme. The additional schemes may or may |
193 // not serve specific WebUI pages depending on the particular URLDataSource | 206 // not serve specific WebUI pages depending on the particular URLDataSource |
194 // and its override of URLDataSource::ShouldServiceRequest. For all schemes | 207 // and its override of URLDataSource::ShouldServiceRequest. For all schemes |
195 // returned here, view-source is allowed. | 208 // returned here, view-source is allowed. |
(...skipping 524 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
720 // Allows an embedder to provide its own ExternalVideoSurfaceContainer | 733 // Allows an embedder to provide its own ExternalVideoSurfaceContainer |
721 // implementation. Return nullptr to disable external surface video. | 734 // implementation. Return nullptr to disable external surface video. |
722 virtual ExternalVideoSurfaceContainer* | 735 virtual ExternalVideoSurfaceContainer* |
723 OverrideCreateExternalVideoSurfaceContainer(WebContents* web_contents); | 736 OverrideCreateExternalVideoSurfaceContainer(WebContents* web_contents); |
724 #endif | 737 #endif |
725 }; | 738 }; |
726 | 739 |
727 } // namespace content | 740 } // namespace content |
728 | 741 |
729 #endif // CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ | 742 #endif // CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ |
OLD | NEW |