Chromium Code Reviews| Index: content/browser/renderer_host/pepper/pepper_security_helper.h |
| diff --git a/content/browser/renderer_host/pepper/pepper_security_helper.h b/content/browser/renderer_host/pepper/pepper_security_helper.h |
| new file mode 100644 |
| index 0000000000000000000000000000000000000000..13a0c0514c058ecd2076b196734882a1b853a9dc |
| --- /dev/null |
| +++ b/content/browser/renderer_host/pepper/pepper_security_helper.h |
| @@ -0,0 +1,21 @@ |
| +// Copyright 2013 The Chromium Authors. All rights reserved. |
| +// Use of this source code is governed by a BSD-style license that can be |
| +// found in the LICENSE file. |
| + |
| +#ifndef CONTENT_BROWSER_RENDERER_HOST_PEPPER_PEPPER_SECURITY_HELPER_H_ |
| +#define CONTENT_BROWSER_RENDERER_HOST_PEPPER_PEPPER_SECURITY_HELPER_H_ |
| + |
| +#include "base/files/file_path.h" |
| +#include "content/browser/child_process_security_policy_impl.h" |
|
jam
2013/07/30 16:07:12
nit: don't include the header here.
tommycli
2013/07/30 17:52:41
Done.
|
| + |
| +namespace content { |
| + |
| +// Helper method that returns whether or not the child process is allowed to |
| +// open the specified |file| with the specified |pp_open_flags|. |
| +CONTENT_EXPORT bool CanOpenWithPepperFlags(int pp_open_flags, |
| + int child_id, |
| + const base::FilePath& file); |
| + |
| +} // namespace content |
| + |
| +#endif // CONTENT_BROWSER_RENDERER_HOST_PEPPER_PEPPER_SECURITY_HELPER_H_ |