| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #ifndef CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ | 5 #ifndef CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ |
| 6 #define CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ | 6 #define CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ |
| 7 | 7 |
| 8 #include <map> | 8 #include <map> |
| 9 #include <string> | 9 #include <string> |
| 10 #include <utility> | 10 #include <utility> |
| (...skipping 174 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 185 virtual net::URLRequestContextGetter* CreateRequestContextForStoragePartition( | 185 virtual net::URLRequestContextGetter* CreateRequestContextForStoragePartition( |
| 186 BrowserContext* browser_context, | 186 BrowserContext* browser_context, |
| 187 const base::FilePath& partition_path, | 187 const base::FilePath& partition_path, |
| 188 bool in_memory, | 188 bool in_memory, |
| 189 ProtocolHandlerMap* protocol_handlers); | 189 ProtocolHandlerMap* protocol_handlers); |
| 190 | 190 |
| 191 // Returns whether a specified URL is handled by the embedder's internal | 191 // Returns whether a specified URL is handled by the embedder's internal |
| 192 // protocol handlers. | 192 // protocol handlers. |
| 193 virtual bool IsHandledURL(const GURL& url); | 193 virtual bool IsHandledURL(const GURL& url); |
| 194 | 194 |
| 195 // Returns whether the given process is allowed to commit |url|. This is a |
| 196 // more conservative check than IsSuitableHost, since it is used after a |
| 197 // navigation has committed to ensure that the process did not exceed its |
| 198 // authority. |
| 199 virtual bool CanCommitURL(RenderProcessHost* process_host, const GURL& url); |
| 200 |
| 195 // Returns whether a new view for a given |site_url| can be launched in a | 201 // Returns whether a new view for a given |site_url| can be launched in a |
| 196 // given |process_host|. | 202 // given |process_host|. |
| 197 virtual bool IsSuitableHost(RenderProcessHost* process_host, | 203 virtual bool IsSuitableHost(RenderProcessHost* process_host, |
| 198 const GURL& site_url); | 204 const GURL& site_url); |
| 199 | 205 |
| 200 // Returns whether a new process should be created or an existing one should | 206 // Returns whether a new process should be created or an existing one should |
| 201 // be reused based on the URL we want to load. This should return false, | 207 // be reused based on the URL we want to load. This should return false, |
| 202 // unless there is a good reason otherwise. | 208 // unless there is a good reason otherwise. |
| 203 virtual bool ShouldTryToUseExistingProcessHost( | 209 virtual bool ShouldTryToUseExistingProcessHost( |
| 204 BrowserContext* browser_context, const GURL& url); | 210 BrowserContext* browser_context, const GURL& url); |
| (...skipping 340 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 545 // This is called on a worker thread. | 551 // This is called on a worker thread. |
| 546 virtual | 552 virtual |
| 547 crypto::CryptoModuleBlockingPasswordDelegate* GetCryptoPasswordDelegate( | 553 crypto::CryptoModuleBlockingPasswordDelegate* GetCryptoPasswordDelegate( |
| 548 const GURL& url); | 554 const GURL& url); |
| 549 #endif | 555 #endif |
| 550 }; | 556 }; |
| 551 | 557 |
| 552 } // namespace content | 558 } // namespace content |
| 553 | 559 |
| 554 #endif // CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ | 560 #endif // CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ |
| OLD | NEW |