OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #ifndef CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ | 5 #ifndef CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ |
6 #define CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ | 6 #define CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ |
7 | 7 |
8 #include <stddef.h> | 8 #include <stddef.h> |
9 | 9 |
10 #include <map> | 10 #include <map> |
(...skipping 58 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
69 class CookieOptions; | 69 class CookieOptions; |
70 class NetLog; | 70 class NetLog; |
71 class SSLCertRequestInfo; | 71 class SSLCertRequestInfo; |
72 class SSLInfo; | 72 class SSLInfo; |
73 class URLRequest; | 73 class URLRequest; |
74 class URLRequestContext; | 74 class URLRequestContext; |
75 class URLRequestContextGetter; | 75 class URLRequestContextGetter; |
76 class X509Certificate; | 76 class X509Certificate; |
77 } | 77 } |
78 | 78 |
79 namespace sandbox { | |
80 class TargetPolicy; | |
81 } | |
82 | |
83 namespace ui { | 79 namespace ui { |
84 class SelectFilePolicy; | 80 class SelectFilePolicy; |
85 } | 81 } |
86 | 82 |
87 namespace url { | 83 namespace url { |
88 class Origin; | 84 class Origin; |
89 } | 85 } |
90 | 86 |
91 namespace storage { | 87 namespace storage { |
92 class ExternalMountPoints; | 88 class ExternalMountPoints; |
(...skipping 640 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
733 virtual void GetAdditionalMappedFilesForChildProcess( | 729 virtual void GetAdditionalMappedFilesForChildProcess( |
734 const base::CommandLine& command_line, | 730 const base::CommandLine& command_line, |
735 int child_process_id, | 731 int child_process_id, |
736 content::FileDescriptorInfo* mappings) {} | 732 content::FileDescriptorInfo* mappings) {} |
737 #endif // defined(OS_ANDROID) | 733 #endif // defined(OS_ANDROID) |
738 | 734 |
739 #if defined(OS_WIN) | 735 #if defined(OS_WIN) |
740 // Returns the name of the dll that contains cursors and other resources. | 736 // Returns the name of the dll that contains cursors and other resources. |
741 virtual const wchar_t* GetResourceDllName(); | 737 virtual const wchar_t* GetResourceDllName(); |
742 | 738 |
743 // This is called on the PROCESS_LAUNCHER thread before the renderer process | |
744 // is launched. It gives the embedder a chance to add loosen the sandbox | |
745 // policy. | |
746 virtual bool PreSpawnRenderer(sandbox::TargetPolicy* policy); | |
747 | |
748 // Returns the AppContainer SID for the specified sandboxed process type, or | 739 // Returns the AppContainer SID for the specified sandboxed process type, or |
749 // empty string if this sandboxed process type does not support living inside | 740 // empty string if this sandboxed process type does not support living inside |
750 // an AppContainer. | 741 // an AppContainer. |
751 virtual base::string16 GetAppContainerSidForSandboxType( | 742 virtual base::string16 GetAppContainerSidForSandboxType( |
752 int sandbox_type) const; | 743 int sandbox_type) const; |
753 | 744 |
754 // Returns whether the Win32k lockdown process mitigation should be applied to | 745 // Returns whether the Win32k lockdown process mitigation should be applied to |
755 // a process hosting a plugin with the specified |mime_type|. | 746 // a process hosting a plugin with the specified |mime_type|. |
756 virtual bool IsWin32kLockdownEnabledForMimeType( | 747 virtual bool IsWin32kLockdownEnabledForMimeType( |
757 const std::string& mime_type) const; | 748 const std::string& mime_type) const; |
758 | 749 |
759 // Returns true if processes should be launched with a /prefetch:# argument. | 750 // Returns true if processes should be launched with a /prefetch:# argument. |
760 // See the kPrefetchArgument* constants in content_switches.cc for details. | 751 // See the kPrefetchArgument* constants in content_switches.cc for details. |
761 virtual bool ShouldUseWindowsPrefetchArgument() const; | 752 virtual bool ShouldUseWindowsPrefetchArgument() const; |
762 #endif | 753 #endif |
763 | 754 |
764 #if defined(VIDEO_HOLE) | 755 #if defined(VIDEO_HOLE) |
765 // Allows an embedder to provide its own ExternalVideoSurfaceContainer | 756 // Allows an embedder to provide its own ExternalVideoSurfaceContainer |
766 // implementation. Return nullptr to disable external surface video. | 757 // implementation. Return nullptr to disable external surface video. |
767 virtual ExternalVideoSurfaceContainer* | 758 virtual ExternalVideoSurfaceContainer* |
768 OverrideCreateExternalVideoSurfaceContainer(WebContents* web_contents); | 759 OverrideCreateExternalVideoSurfaceContainer(WebContents* web_contents); |
769 #endif | 760 #endif |
770 }; | 761 }; |
771 | 762 |
772 } // namespace content | 763 } // namespace content |
773 | 764 |
774 #endif // CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ | 765 #endif // CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ |
OLD | NEW |