 Chromium Code Reviews
 Chromium Code Reviews Issue 23842002:
  Whitelisting exts and plugins from cross-site document blocking  (Closed) 
  Base URL: https://chromium.googlesource.com/chromium/src.git@lkgr
    
  
    Issue 23842002:
  Whitelisting exts and plugins from cross-site document blocking  (Closed) 
  Base URL: https://chromium.googlesource.com/chromium/src.git@lkgr| OLD | NEW | 
|---|---|
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be | 
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. | 
| 4 | 4 | 
| 5 #ifndef CONTENT_PUBLIC_RENDERER_CONTENT_RENDERER_CLIENT_H_ | 5 #ifndef CONTENT_PUBLIC_RENDERER_CONTENT_RENDERER_CLIENT_H_ | 
| 6 #define CONTENT_PUBLIC_RENDERER_CONTENT_RENDERER_CLIENT_H_ | 6 #define CONTENT_PUBLIC_RENDERER_CONTENT_RENDERER_CLIENT_H_ | 
| 7 | 7 | 
| 8 #include <string> | 8 #include <string> | 
| 9 | 9 | 
| 10 #include "base/memory/weak_ptr.h" | 10 #include "base/memory/weak_ptr.h" | 
| (...skipping 232 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 243 | 243 | 
| 244 // Returns true if the page at |url| can use Pepper MediaStream APIs. | 244 // Returns true if the page at |url| can use Pepper MediaStream APIs. | 
| 245 virtual bool AllowPepperMediaStreamAPI(const GURL& url); | 245 virtual bool AllowPepperMediaStreamAPI(const GURL& url); | 
| 246 | 246 | 
| 247 // Returns true if we should report a detailed message (including a stack | 247 // Returns true if we should report a detailed message (including a stack | 
| 248 // trace) for console [logs|errors|exceptions]. |source| is the WebKit- | 248 // trace) for console [logs|errors|exceptions]. |source| is the WebKit- | 
| 249 // reported source for the error; this can point to a page or a script, | 249 // reported source for the error; this can point to a page or a script, | 
| 250 // and can be external or internal. | 250 // and can be external or internal. | 
| 251 virtual bool ShouldReportDetailedMessageForSource( | 251 virtual bool ShouldReportDetailedMessageForSource( | 
| 252 const base::string16& source) const; | 252 const base::string16& source) const; | 
| 253 | |
| 254 // Returns true if we apply the cross-site document blocking policy to this | |
| 255 // renderer process. Currently, we apply the policy only to a render process | |
| 
Charlie Reis
2013/09/03 20:22:10
render -> renderer
(here and below)
 
dsjang
2013/09/03 22:31:30
Done.
 | |
| 256 // running on a normal page from the internet, excluding render processes for | |
| 
Charlie Reis
2013/09/03 20:22:10
internet -> web
 
dsjang
2013/09/03 22:31:30
Done.
 | |
| 257 // extensions. Unfortunately, there's no easy way to exclude a renderer | |
| 
Charlie Reis
2013/09/03 20:22:10
nit: Drop "excluding render processes for extensio
 
dsjang
2013/09/03 22:31:30
Done.
 | |
| 258 // process for plugins here, but our ultimate goal is to exclude plugin | |
| 
Charlie Reis
2013/09/03 20:22:10
This last sentence is a bit confusing to me.  We d
 
dsjang
2013/09/03 22:31:30
Done.
 | |
| 259 // processes too. | |
| 260 virtual bool ShouldEnableSiteIsolationPolicy() const; | |
| 253 }; | 261 }; | 
| 254 | 262 | 
| 255 } // namespace content | 263 } // namespace content | 
| 256 | 264 | 
| 257 #endif // CONTENT_PUBLIC_RENDERER_CONTENT_RENDERER_CLIENT_H_ | 265 #endif // CONTENT_PUBLIC_RENDERER_CONTENT_RENDERER_CLIENT_H_ | 
| OLD | NEW |