Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1443)

Side by Side Diff: content/public/renderer/content_renderer_client.h

Issue 23842002: Whitelisting exts and plugins from cross-site document blocking (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@lkgr
Patch Set: Another bug is fixed in test cases. Created 7 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #ifndef CONTENT_PUBLIC_RENDERER_CONTENT_RENDERER_CLIENT_H_ 5 #ifndef CONTENT_PUBLIC_RENDERER_CONTENT_RENDERER_CLIENT_H_
6 #define CONTENT_PUBLIC_RENDERER_CONTENT_RENDERER_CLIENT_H_ 6 #define CONTENT_PUBLIC_RENDERER_CONTENT_RENDERER_CLIENT_H_
7 7
8 #include <string> 8 #include <string>
9 9
10 #include "base/memory/weak_ptr.h" 10 #include "base/memory/weak_ptr.h"
(...skipping 232 matching lines...) Expand 10 before | Expand all | Expand 10 after
243 243
244 // Returns true if the page at |url| can use Pepper MediaStream APIs. 244 // Returns true if the page at |url| can use Pepper MediaStream APIs.
245 virtual bool AllowPepperMediaStreamAPI(const GURL& url); 245 virtual bool AllowPepperMediaStreamAPI(const GURL& url);
246 246
247 // Returns true if we should report a detailed message (including a stack 247 // Returns true if we should report a detailed message (including a stack
248 // trace) for console [logs|errors|exceptions]. |source| is the WebKit- 248 // trace) for console [logs|errors|exceptions]. |source| is the WebKit-
249 // reported source for the error; this can point to a page or a script, 249 // reported source for the error; this can point to a page or a script,
250 // and can be external or internal. 250 // and can be external or internal.
251 virtual bool ShouldReportDetailedMessageForSource( 251 virtual bool ShouldReportDetailedMessageForSource(
252 const base::string16& source) const; 252 const base::string16& source) const;
253
254 // Returns true if we apply the cross-site document blocking policy to this
Charlie Reis 2013/09/03 22:59:17 nit: if we should
dsjang 2013/09/04 00:37:37 Done.
255 // renderer process. Currently, we apply the policy only to a renderer process
256 // running on a normal page from the web. The cross-site document blocking
257 // policy is not applied to plugin processes too, and it's done in
Charlie Reis 2013/09/03 22:59:17 Better, but I'm still having trouble following the
dsjang 2013/09/04 00:37:37 Done.
258 // SiteIsolationPolicy at runtime since requests from a plugin are proxed via
259 // the renderer process that spawned the plugin.
260 virtual bool ShouldEnableSiteIsolationPolicy() const;
253 }; 261 };
254 262
255 } // namespace content 263 } // namespace content
256 264
257 #endif // CONTENT_PUBLIC_RENDERER_CONTENT_RENDERER_CLIENT_H_ 265 #endif // CONTENT_PUBLIC_RENDERER_CONTENT_RENDERER_CLIENT_H_
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698