OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #ifndef CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ | 5 #ifndef CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ |
6 #define CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ | 6 #define CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ |
7 | 7 |
8 #include <map> | 8 #include <map> |
9 #include <string> | 9 #include <string> |
10 #include <utility> | 10 #include <utility> |
(...skipping 174 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
185 virtual net::URLRequestContextGetter* CreateRequestContextForStoragePartition( | 185 virtual net::URLRequestContextGetter* CreateRequestContextForStoragePartition( |
186 BrowserContext* browser_context, | 186 BrowserContext* browser_context, |
187 const base::FilePath& partition_path, | 187 const base::FilePath& partition_path, |
188 bool in_memory, | 188 bool in_memory, |
189 ProtocolHandlerMap* protocol_handlers); | 189 ProtocolHandlerMap* protocol_handlers); |
190 | 190 |
191 // Returns whether a specified URL is handled by the embedder's internal | 191 // Returns whether a specified URL is handled by the embedder's internal |
192 // protocol handlers. | 192 // protocol handlers. |
193 virtual bool IsHandledURL(const GURL& url); | 193 virtual bool IsHandledURL(const GURL& url); |
194 | 194 |
| 195 // Returns whether the given process is allowed to commit |url|. This is a |
| 196 // more conservative check than IsSuitableHost, since it is used after a |
| 197 // navigation has committed to ensure that the process did not exceed its |
| 198 // authority. |
| 199 virtual bool CanCommitURL(RenderProcessHost* process_host, const GURL& url); |
| 200 |
195 // Returns whether a new view for a given |site_url| can be launched in a | 201 // Returns whether a new view for a given |site_url| can be launched in a |
196 // given |process_host|. | 202 // given |process_host|. |
197 virtual bool IsSuitableHost(RenderProcessHost* process_host, | 203 virtual bool IsSuitableHost(RenderProcessHost* process_host, |
198 const GURL& site_url); | 204 const GURL& site_url); |
199 | 205 |
200 // Returns whether a new process should be created or an existing one should | 206 // Returns whether a new process should be created or an existing one should |
201 // be reused based on the URL we want to load. This should return false, | 207 // be reused based on the URL we want to load. This should return false, |
202 // unless there is a good reason otherwise. | 208 // unless there is a good reason otherwise. |
203 virtual bool ShouldTryToUseExistingProcessHost( | 209 virtual bool ShouldTryToUseExistingProcessHost( |
204 BrowserContext* browser_context, const GURL& url); | 210 BrowserContext* browser_context, const GURL& url); |
(...skipping 340 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
545 // This is called on a worker thread. | 551 // This is called on a worker thread. |
546 virtual | 552 virtual |
547 crypto::CryptoModuleBlockingPasswordDelegate* GetCryptoPasswordDelegate( | 553 crypto::CryptoModuleBlockingPasswordDelegate* GetCryptoPasswordDelegate( |
548 const GURL& url); | 554 const GURL& url); |
549 #endif | 555 #endif |
550 }; | 556 }; |
551 | 557 |
552 } // namespace content | 558 } // namespace content |
553 | 559 |
554 #endif // CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ | 560 #endif // CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ |
OLD | NEW |