Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(172)

Side by Side Diff: content/public/browser/content_browser_client.h

Issue 2399853003: [M54 merge] Lock down creation of blob:chrome-extension URLs from non-extension processes. (Closed)
Patch Set: Rebase Created 4 years, 2 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #ifndef CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ 5 #ifndef CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_
6 #define CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ 6 #define CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_
7 7
8 #include <stddef.h> 8 #include <stddef.h>
9 9
10 #include <map> 10 #include <map>
(...skipping 173 matching lines...) Expand 10 before | Expand all | Expand 10 after
184 // Get the effective URL for the given actual URL, to allow an embedder to 184 // Get the effective URL for the given actual URL, to allow an embedder to
185 // group different url schemes in the same SiteInstance. 185 // group different url schemes in the same SiteInstance.
186 virtual GURL GetEffectiveURL(BrowserContext* browser_context, 186 virtual GURL GetEffectiveURL(BrowserContext* browser_context,
187 const GURL& url); 187 const GURL& url);
188 188
189 // Returns whether all instances of the specified effective URL should be 189 // Returns whether all instances of the specified effective URL should be
190 // rendered by the same process, rather than using process-per-site-instance. 190 // rendered by the same process, rather than using process-per-site-instance.
191 virtual bool ShouldUseProcessPerSite(BrowserContext* browser_context, 191 virtual bool ShouldUseProcessPerSite(BrowserContext* browser_context,
192 const GURL& effective_url); 192 const GURL& effective_url);
193 193
194 // Returns true if site isolation should be enabled for |effective_url|. This 194 // Returns true if site isolation should be enabled for |effective_site_url|.
195 // call allows the embedder to supplement the site isolation policy enforced 195 // This call allows the embedder to supplement the site isolation policy
196 // by the content layer. 196 // enforced by the content layer.
197 // 197 //
198 // Will only be called if both of the following happen: 198 // Will only be called if both of the following happen:
199 // 1. The embedder asked to be consulted, by returning true from 199 // 1. The embedder asked to be consulted, by returning true from
200 // ContentClient::IsSupplementarySiteIsolationModeEnabled(). 200 // ContentClient::IsSupplementarySiteIsolationModeEnabled().
201 // 2. The content layer didn't decide to isolate |effective_url| according 201 // 2. The content layer didn't decide to isolate |effective_site_url|
202 // to its internal policy (e.g. because of --site-per-process). 202 // according to its internal policy (e.g. because of --site-per-process).
203 virtual bool DoesSiteRequireDedicatedProcess(BrowserContext* browser_context, 203 virtual bool DoesSiteRequireDedicatedProcess(BrowserContext* browser_context,
204 const GURL& effective_url); 204 const GURL& effective_site_url);
205 205
206 // Returns true unless the effective URL is part of a site that cannot live in 206 // Returns true unless the effective URL is part of a site that cannot live in
207 // a process restricted to just that site. This is only called if site 207 // a process restricted to just that site. This is only called if site
208 // isolation is enabled for this URL, and is a bug workaround. 208 // isolation is enabled for this URL, and is a bug workaround.
209 // 209 //
210 // TODO(nick): Remove this function once https://crbug.com/160576 is fixed, 210 // TODO(nick): Remove this function once https://crbug.com/160576 is fixed,
211 // and origin lock can be applied to all URLs. 211 // and origin lock can be applied to all URLs.
212 virtual bool ShouldLockToOrigin(BrowserContext* browser_context, 212 virtual bool ShouldLockToOrigin(BrowserContext* browser_context,
213 const GURL& effective_url); 213 const GURL& effective_url);
214 214
(...skipping 580 matching lines...) Expand 10 before | Expand all | Expand 10 after
795 // Allows an embedder to provide its own ExternalVideoSurfaceContainer 795 // Allows an embedder to provide its own ExternalVideoSurfaceContainer
796 // implementation. Return nullptr to disable external surface video. 796 // implementation. Return nullptr to disable external surface video.
797 virtual ExternalVideoSurfaceContainer* 797 virtual ExternalVideoSurfaceContainer*
798 OverrideCreateExternalVideoSurfaceContainer(WebContents* web_contents); 798 OverrideCreateExternalVideoSurfaceContainer(WebContents* web_contents);
799 #endif 799 #endif
800 }; 800 };
801 801
802 } // namespace content 802 } // namespace content
803 803
804 #endif // CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ 804 #endif // CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_
OLDNEW
« no previous file with comments | « content/public/browser/child_process_security_policy.h ('k') | content/public/browser/content_browser_client.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698