OLD | NEW |
1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "content/shell/browser/shell_content_browser_client.h" | 5 #include "content/shell/browser/shell_content_browser_client.h" |
6 | 6 |
7 #include "base/base_switches.h" | 7 #include "base/base_switches.h" |
8 #include "base/command_line.h" | 8 #include "base/command_line.h" |
9 #include "base/files/file.h" | 9 #include "base/files/file.h" |
10 #include "base/files/file_util.h" | 10 #include "base/files/file_util.h" |
(...skipping 339 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
350 | 350 |
351 DevToolsManagerDelegate* | 351 DevToolsManagerDelegate* |
352 ShellContentBrowserClient::GetDevToolsManagerDelegate() { | 352 ShellContentBrowserClient::GetDevToolsManagerDelegate() { |
353 return new ShellDevToolsManagerDelegate(browser_context()); | 353 return new ShellDevToolsManagerDelegate(browser_context()); |
354 } | 354 } |
355 | 355 |
356 #if defined(OS_POSIX) && !defined(OS_MACOSX) | 356 #if defined(OS_POSIX) && !defined(OS_MACOSX) |
357 void ShellContentBrowserClient::GetAdditionalMappedFilesForChildProcess( | 357 void ShellContentBrowserClient::GetAdditionalMappedFilesForChildProcess( |
358 const CommandLine& command_line, | 358 const CommandLine& command_line, |
359 int child_process_id, | 359 int child_process_id, |
360 std::vector<FileDescriptorInfo>* mappings) { | 360 FileDescriptorInfo* mappings) { |
361 #if defined(OS_ANDROID) | 361 #if defined(OS_ANDROID) |
362 int flags = base::File::FLAG_OPEN | base::File::FLAG_READ; | 362 int flags = base::File::FLAG_OPEN | base::File::FLAG_READ; |
363 base::FilePath pak_file; | 363 base::FilePath pak_file; |
364 bool r = PathService::Get(base::DIR_ANDROID_APP_DATA, &pak_file); | 364 bool r = PathService::Get(base::DIR_ANDROID_APP_DATA, &pak_file); |
365 CHECK(r); | 365 CHECK(r); |
366 pak_file = pak_file.Append(FILE_PATH_LITERAL("paks")); | 366 pak_file = pak_file.Append(FILE_PATH_LITERAL("paks")); |
367 pak_file = pak_file.Append(FILE_PATH_LITERAL("content_shell.pak")); | 367 pak_file = pak_file.Append(FILE_PATH_LITERAL("content_shell.pak")); |
368 | 368 |
369 base::File f(pak_file, flags); | 369 base::File f(pak_file, flags); |
370 if (!f.IsValid()) { | 370 if (!f.IsValid()) { |
371 NOTREACHED() << "Failed to open file when creating renderer process: " | 371 NOTREACHED() << "Failed to open file when creating renderer process: " |
372 << "content_shell.pak"; | 372 << "content_shell.pak"; |
373 } | 373 } |
374 mappings->push_back( | 374 |
375 FileDescriptorInfo(kShellPakDescriptor, base::FileDescriptor(f.Pass()))); | 375 mappings->Transfer(kShellPakDescriptor, base::ScopedFD(f.TakePlatformFile())); |
376 | 376 |
377 if (breakpad::IsCrashReporterEnabled()) { | 377 if (breakpad::IsCrashReporterEnabled()) { |
378 f = breakpad::CrashDumpManager::GetInstance()->CreateMinidumpFile( | 378 f = breakpad::CrashDumpManager::GetInstance()->CreateMinidumpFile( |
379 child_process_id); | 379 child_process_id); |
380 if (!f.IsValid()) { | 380 if (!f.IsValid()) { |
381 LOG(ERROR) << "Failed to create file for minidump, crash reporting will " | 381 LOG(ERROR) << "Failed to create file for minidump, crash reporting will " |
382 << "be disabled for this process."; | 382 << "be disabled for this process."; |
383 } else { | 383 } else { |
384 mappings->push_back( | 384 mappings->Transfer(kAndroidMinidumpDescriptor, |
385 FileDescriptorInfo(kAndroidMinidumpDescriptor, | 385 base::ScopedFD(f.TakePlatformFile())); |
386 base::FileDescriptor(f.Pass()))); | |
387 } | 386 } |
388 } | 387 } |
389 #else // !defined(OS_ANDROID) | 388 #else // !defined(OS_ANDROID) |
390 int crash_signal_fd = GetCrashSignalFD(command_line); | 389 int crash_signal_fd = GetCrashSignalFD(command_line); |
391 if (crash_signal_fd >= 0) { | 390 if (crash_signal_fd >= 0) { |
392 mappings->push_back(FileDescriptorInfo( | 391 mappings->Share(kCrashDumpSignal, crash_signal_fd); |
393 kCrashDumpSignal, base::FileDescriptor(crash_signal_fd, false))); | |
394 } | 392 } |
395 #endif // defined(OS_ANDROID) | 393 #endif // defined(OS_ANDROID) |
396 } | 394 } |
397 #endif // defined(OS_POSIX) && !defined(OS_MACOSX) | 395 #endif // defined(OS_POSIX) && !defined(OS_MACOSX) |
398 | 396 |
399 #if defined(OS_WIN) | 397 #if defined(OS_WIN) |
400 void ShellContentBrowserClient::PreSpawnRenderer(sandbox::TargetPolicy* policy, | 398 void ShellContentBrowserClient::PreSpawnRenderer(sandbox::TargetPolicy* policy, |
401 bool* success) { | 399 bool* success) { |
402 // Add sideloaded font files for testing. See also DIR_WINDOWS_FONTS | 400 // Add sideloaded font files for testing. See also DIR_WINDOWS_FONTS |
403 // addition in |StartSandboxedProcess|. | 401 // addition in |StartSandboxedProcess|. |
(...skipping 24 matching lines...) Expand all Loading... |
428 ShellBrowserContext* | 426 ShellBrowserContext* |
429 ShellContentBrowserClient::ShellBrowserContextForBrowserContext( | 427 ShellContentBrowserClient::ShellBrowserContextForBrowserContext( |
430 BrowserContext* content_browser_context) { | 428 BrowserContext* content_browser_context) { |
431 if (content_browser_context == browser_context()) | 429 if (content_browser_context == browser_context()) |
432 return browser_context(); | 430 return browser_context(); |
433 DCHECK_EQ(content_browser_context, off_the_record_browser_context()); | 431 DCHECK_EQ(content_browser_context, off_the_record_browser_context()); |
434 return off_the_record_browser_context(); | 432 return off_the_record_browser_context(); |
435 } | 433 } |
436 | 434 |
437 } // namespace content | 435 } // namespace content |
OLD | NEW |