| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #ifndef CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ | 5 #ifndef CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ |
| 6 #define CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ | 6 #define CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ |
| 7 | 7 |
| 8 #include <stddef.h> | 8 #include <stddef.h> |
| 9 | 9 |
| 10 #include <map> | 10 #include <map> |
| (...skipping 58 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 69 class CookieOptions; | 69 class CookieOptions; |
| 70 class NetLog; | 70 class NetLog; |
| 71 class SSLCertRequestInfo; | 71 class SSLCertRequestInfo; |
| 72 class SSLInfo; | 72 class SSLInfo; |
| 73 class URLRequest; | 73 class URLRequest; |
| 74 class URLRequestContext; | 74 class URLRequestContext; |
| 75 class URLRequestContextGetter; | 75 class URLRequestContextGetter; |
| 76 class X509Certificate; | 76 class X509Certificate; |
| 77 } | 77 } |
| 78 | 78 |
| 79 namespace sandbox { | |
| 80 class TargetPolicy; | |
| 81 } | |
| 82 | |
| 83 namespace ui { | 79 namespace ui { |
| 84 class SelectFilePolicy; | 80 class SelectFilePolicy; |
| 85 } | 81 } |
| 86 | 82 |
| 87 namespace url { | 83 namespace url { |
| 88 class Origin; | 84 class Origin; |
| 89 } | 85 } |
| 90 | 86 |
| 91 namespace storage { | 87 namespace storage { |
| 92 class ExternalMountPoints; | 88 class ExternalMountPoints; |
| (...skipping 640 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 733 virtual void GetAdditionalMappedFilesForChildProcess( | 729 virtual void GetAdditionalMappedFilesForChildProcess( |
| 734 const base::CommandLine& command_line, | 730 const base::CommandLine& command_line, |
| 735 int child_process_id, | 731 int child_process_id, |
| 736 content::FileDescriptorInfo* mappings) {} | 732 content::FileDescriptorInfo* mappings) {} |
| 737 #endif // defined(OS_ANDROID) | 733 #endif // defined(OS_ANDROID) |
| 738 | 734 |
| 739 #if defined(OS_WIN) | 735 #if defined(OS_WIN) |
| 740 // Returns the name of the dll that contains cursors and other resources. | 736 // Returns the name of the dll that contains cursors and other resources. |
| 741 virtual const wchar_t* GetResourceDllName(); | 737 virtual const wchar_t* GetResourceDllName(); |
| 742 | 738 |
| 743 // This is called on the PROCESS_LAUNCHER thread before the renderer process | |
| 744 // is launched. It gives the embedder a chance to add loosen the sandbox | |
| 745 // policy. | |
| 746 virtual bool PreSpawnRenderer(sandbox::TargetPolicy* policy); | |
| 747 | |
| 748 // Returns the AppContainer SID for the specified sandboxed process type, or | 739 // Returns the AppContainer SID for the specified sandboxed process type, or |
| 749 // empty string if this sandboxed process type does not support living inside | 740 // empty string if this sandboxed process type does not support living inside |
| 750 // an AppContainer. | 741 // an AppContainer. |
| 751 virtual base::string16 GetAppContainerSidForSandboxType( | 742 virtual base::string16 GetAppContainerSidForSandboxType( |
| 752 int sandbox_type) const; | 743 int sandbox_type) const; |
| 753 | 744 |
| 754 // Returns whether the Win32k lockdown process mitigation should be applied to | 745 // Returns whether the Win32k lockdown process mitigation should be applied to |
| 755 // a process hosting a plugin with the specified |mime_type|. | 746 // a process hosting a plugin with the specified |mime_type|. |
| 756 virtual bool IsWin32kLockdownEnabledForMimeType( | 747 virtual bool IsWin32kLockdownEnabledForMimeType( |
| 757 const std::string& mime_type) const; | 748 const std::string& mime_type) const; |
| 758 | 749 |
| 759 // Returns true if processes should be launched with a /prefetch:# argument. | 750 // Returns true if processes should be launched with a /prefetch:# argument. |
| 760 // See the kPrefetchArgument* constants in content_switches.cc for details. | 751 // See the kPrefetchArgument* constants in content_switches.cc for details. |
| 761 virtual bool ShouldUseWindowsPrefetchArgument() const; | 752 virtual bool ShouldUseWindowsPrefetchArgument() const; |
| 762 #endif | 753 #endif |
| 763 | 754 |
| 764 #if defined(VIDEO_HOLE) | 755 #if defined(VIDEO_HOLE) |
| 765 // Allows an embedder to provide its own ExternalVideoSurfaceContainer | 756 // Allows an embedder to provide its own ExternalVideoSurfaceContainer |
| 766 // implementation. Return nullptr to disable external surface video. | 757 // implementation. Return nullptr to disable external surface video. |
| 767 virtual ExternalVideoSurfaceContainer* | 758 virtual ExternalVideoSurfaceContainer* |
| 768 OverrideCreateExternalVideoSurfaceContainer(WebContents* web_contents); | 759 OverrideCreateExternalVideoSurfaceContainer(WebContents* web_contents); |
| 769 #endif | 760 #endif |
| 770 }; | 761 }; |
| 771 | 762 |
| 772 } // namespace content | 763 } // namespace content |
| 773 | 764 |
| 774 #endif // CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ | 765 #endif // CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ |
| OLD | NEW |