Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(212)

Side by Side Diff: content/public/renderer/content_renderer_client.h

Issue 23842002: Whitelisting exts and plugins from cross-site document blocking (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@lkgr
Patch Set: Exclude plugins from cross-site document data collection/blocking. Created 7 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #ifndef CONTENT_PUBLIC_RENDERER_CONTENT_RENDERER_CLIENT_H_ 5 #ifndef CONTENT_PUBLIC_RENDERER_CONTENT_RENDERER_CLIENT_H_
6 #define CONTENT_PUBLIC_RENDERER_CONTENT_RENDERER_CLIENT_H_ 6 #define CONTENT_PUBLIC_RENDERER_CONTENT_RENDERER_CLIENT_H_
7 7
8 #include <string> 8 #include <string>
9 9
10 #include "base/memory/weak_ptr.h" 10 #include "base/memory/weak_ptr.h"
(...skipping 232 matching lines...) Expand 10 before | Expand all | Expand 10 after
243 243
244 // Returns true if the page at |url| can use Pepper MediaStream APIs. 244 // Returns true if the page at |url| can use Pepper MediaStream APIs.
245 virtual bool AllowPepperMediaStreamAPI(const GURL& url); 245 virtual bool AllowPepperMediaStreamAPI(const GURL& url);
246 246
247 // Returns true if we should report a detailed message (including a stack 247 // Returns true if we should report a detailed message (including a stack
248 // trace) for console [logs|errors|exceptions]. |source| is the WebKit- 248 // trace) for console [logs|errors|exceptions]. |source| is the WebKit-
249 // reported source for the error; this can point to a page or a script, 249 // reported source for the error; this can point to a page or a script,
250 // and can be external or internal. 250 // and can be external or internal.
251 virtual bool ShouldReportDetailedMessageForSource( 251 virtual bool ShouldReportDetailedMessageForSource(
252 const base::string16& source) const; 252 const base::string16& source) const;
253
254 // Returns true if we apply the cross-site document blocking policy to this
255 // renderer process. Currently, we apply the policy only to a render process
Charlie Reis 2013/09/03 20:22:10 render -> renderer (here and below)
dsjang 2013/09/03 22:31:30 Done.
256 // running on a normal page from the internet, excluding render processes for
Charlie Reis 2013/09/03 20:22:10 internet -> web
dsjang 2013/09/03 22:31:30 Done.
257 // extensions. Unfortunately, there's no easy way to exclude a renderer
Charlie Reis 2013/09/03 20:22:10 nit: Drop "excluding render processes for extensio
dsjang 2013/09/03 22:31:30 Done.
258 // process for plugins here, but our ultimate goal is to exclude plugin
Charlie Reis 2013/09/03 20:22:10 This last sentence is a bit confusing to me. We d
dsjang 2013/09/03 22:31:30 Done.
259 // processes too.
260 virtual bool ShouldEnableSiteIsolationPolicy() const;
253 }; 261 };
254 262
255 } // namespace content 263 } // namespace content
256 264
257 #endif // CONTENT_PUBLIC_RENDERER_CONTENT_RENDERER_CLIENT_H_ 265 #endif // CONTENT_PUBLIC_RENDERER_CONTENT_RENDERER_CLIENT_H_
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698