| Index: chromecast/shell/browser/cast_content_browser_client.cc
|
| diff --git a/chromecast/shell/browser/cast_content_browser_client.cc b/chromecast/shell/browser/cast_content_browser_client.cc
|
| deleted file mode 100644
|
| index ad1ea3f23d6720e9c3f47905e8be4d9fab15eec9..0000000000000000000000000000000000000000
|
| --- a/chromecast/shell/browser/cast_content_browser_client.cc
|
| +++ /dev/null
|
| @@ -1,262 +0,0 @@
|
| -// Copyright 2014 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "chromecast/shell/browser/cast_content_browser_client.h"
|
| -
|
| -#include "base/command_line.h"
|
| -#include "base/files/scoped_file.h"
|
| -#include "base/i18n/rtl.h"
|
| -#include "base/path_service.h"
|
| -#include "chromecast/common/cast_paths.h"
|
| -#include "chromecast/common/global_descriptors.h"
|
| -#include "chromecast/shell/browser/cast_browser_context.h"
|
| -#include "chromecast/shell/browser/cast_browser_main_parts.h"
|
| -#include "chromecast/shell/browser/cast_browser_process.h"
|
| -#include "chromecast/shell/browser/cast_network_delegate.h"
|
| -#include "chromecast/shell/browser/devtools/cast_dev_tools_delegate.h"
|
| -#include "chromecast/shell/browser/geolocation/cast_access_token_store.h"
|
| -#include "chromecast/shell/browser/url_request_context_factory.h"
|
| -#include "components/crash/app/breakpad_linux.h"
|
| -#include "content/public/browser/browser_thread.h"
|
| -#include "content/public/browser/certificate_request_result_type.h"
|
| -#include "content/public/browser/render_process_host.h"
|
| -#include "content/public/common/content_descriptors.h"
|
| -#include "content/public/common/content_switches.h"
|
| -#include "content/public/common/url_constants.h"
|
| -#include "content/public/common/web_preferences.h"
|
| -#include "net/ssl/ssl_cert_request_info.h"
|
| -
|
| -#if defined(OS_ANDROID)
|
| -#include "chromecast/shell/browser/android/external_video_surface_container_impl.h"
|
| -#endif // defined(OS_ANDROID)
|
| -
|
| -#if defined(OS_ANDROID)
|
| -#include "components/crash/browser/crash_dump_manager_android.h"
|
| -#endif // defined(OS_ANDROID)
|
| -
|
| -namespace chromecast {
|
| -namespace shell {
|
| -
|
| -CastContentBrowserClient::CastContentBrowserClient()
|
| - : url_request_context_factory_(new URLRequestContextFactory()) {
|
| -}
|
| -
|
| -CastContentBrowserClient::~CastContentBrowserClient() {
|
| - content::BrowserThread::DeleteSoon(
|
| - content::BrowserThread::IO,
|
| - FROM_HERE,
|
| - url_request_context_factory_.release());
|
| -}
|
| -
|
| -content::BrowserMainParts* CastContentBrowserClient::CreateBrowserMainParts(
|
| - const content::MainFunctionParams& parameters) {
|
| - return new CastBrowserMainParts(parameters,
|
| - url_request_context_factory_.get());
|
| -}
|
| -
|
| -void CastContentBrowserClient::RenderProcessWillLaunch(
|
| - content::RenderProcessHost* host) {
|
| -}
|
| -
|
| -net::URLRequestContextGetter* CastContentBrowserClient::CreateRequestContext(
|
| - content::BrowserContext* browser_context,
|
| - content::ProtocolHandlerMap* protocol_handlers,
|
| - content::URLRequestInterceptorScopedVector request_interceptors) {
|
| - return url_request_context_factory_->CreateMainGetter(
|
| - browser_context,
|
| - protocol_handlers,
|
| - request_interceptors.Pass());
|
| -}
|
| -
|
| -bool CastContentBrowserClient::IsHandledURL(const GURL& url) {
|
| - if (!url.is_valid())
|
| - return false;
|
| -
|
| - static const char* const kProtocolList[] = {
|
| - url::kBlobScheme,
|
| - url::kFileSystemScheme,
|
| - content::kChromeUIScheme,
|
| - content::kChromeDevToolsScheme,
|
| - url::kDataScheme,
|
| -#if defined(OS_ANDROID)
|
| - url::kFileScheme,
|
| -#endif // defined(OS_ANDROID)
|
| - };
|
| -
|
| - const std::string& scheme = url.scheme();
|
| - for (size_t i = 0; i < arraysize(kProtocolList); ++i) {
|
| - if (scheme == kProtocolList[i])
|
| - return true;
|
| - }
|
| - return false;
|
| -}
|
| -
|
| -void CastContentBrowserClient::AppendExtraCommandLineSwitches(
|
| - base::CommandLine* command_line,
|
| - int child_process_id) {
|
| -
|
| - std::string process_type =
|
| - command_line->GetSwitchValueNative(switches::kProcessType);
|
| - // Renderer process comamndline
|
| - if (process_type == switches::kRendererProcess) {
|
| - // Any browser command-line switches that should be propagated to
|
| - // the renderer go here.
|
| - }
|
| -}
|
| -
|
| -content::AccessTokenStore* CastContentBrowserClient::CreateAccessTokenStore() {
|
| - return new CastAccessTokenStore(
|
| - CastBrowserProcess::GetInstance()->browser_context());
|
| -}
|
| -
|
| -void CastContentBrowserClient::OverrideWebkitPrefs(
|
| - content::RenderViewHost* render_view_host,
|
| - const GURL& url,
|
| - content::WebPreferences* prefs) {
|
| - prefs->allow_scripts_to_close_windows = true;
|
| - // TODO(lcwu): http://crbug.com/391089. This pref is set to true by default
|
| - // because some content providers such as YouTube use plain http requests
|
| - // to retrieve media data chunks while running in a https page. This pref
|
| - // should be disabled once all the content providers are no longer doing that.
|
| - prefs->allow_running_insecure_content = true;
|
| -}
|
| -
|
| -std::string CastContentBrowserClient::GetApplicationLocale() {
|
| - const std::string locale(base::i18n::GetConfiguredLocale());
|
| - return locale.empty() ? "en-US" : locale;
|
| -}
|
| -
|
| -void CastContentBrowserClient::AllowCertificateError(
|
| - int render_process_id,
|
| - int render_view_id,
|
| - int cert_error,
|
| - const net::SSLInfo& ssl_info,
|
| - const GURL& request_url,
|
| - content::ResourceType resource_type,
|
| - bool overridable,
|
| - bool strict_enforcement,
|
| - bool expired_previous_decision,
|
| - const base::Callback<void(bool)>& callback,
|
| - content::CertificateRequestResultType* result) {
|
| - // Allow developers to override certificate errors.
|
| - // Otherwise, any fatal certificate errors will cause an abort.
|
| - *result = content::CERTIFICATE_REQUEST_RESULT_TYPE_CANCEL;
|
| - return;
|
| -}
|
| -
|
| -void CastContentBrowserClient::SelectClientCertificate(
|
| - int render_process_id,
|
| - int render_view_id,
|
| - const net::HttpNetworkSession* network_session,
|
| - net::SSLCertRequestInfo* cert_request_info,
|
| - const base::Callback<void(net::X509Certificate*)>& callback) {
|
| - GURL requesting_url("https://" + cert_request_info->host_and_port.ToString());
|
| -
|
| - if (!requesting_url.is_valid()) {
|
| - LOG(ERROR) << "Invalid URL string: "
|
| - << requesting_url.possibly_invalid_spec();
|
| - callback.Run(NULL);
|
| - return;
|
| - }
|
| -
|
| - // In our case there are no relevant certs in the cert_request_info. The cert
|
| - // we need to return (if permitted) is the Cast device cert, which we can
|
| - // access directly through the ClientAuthSigner instance. However, we need to
|
| - // be on the IO thread to determine whether the app is whitelisted to return
|
| - // it, because CastNetworkDelegate is bound to the IO thread.
|
| - // Subsequently, the callback must then itself be performed back here
|
| - // on the UI thread.
|
| - DCHECK_CURRENTLY_ON(content::BrowserThread::UI);
|
| - content::BrowserThread::PostTaskAndReplyWithResult(
|
| - content::BrowserThread::IO,
|
| - FROM_HERE,
|
| - base::Bind(
|
| - &CastContentBrowserClient::SelectClientCertificateOnIOThread,
|
| - base::Unretained(this),
|
| - requesting_url),
|
| - callback);
|
| -}
|
| -
|
| -net::X509Certificate*
|
| -CastContentBrowserClient::SelectClientCertificateOnIOThread(
|
| - GURL requesting_url) {
|
| - DCHECK_CURRENTLY_ON(content::BrowserThread::IO);
|
| - CastNetworkDelegate* network_delegate =
|
| - url_request_context_factory_->app_network_delegate();
|
| - if (network_delegate->IsWhitelisted(requesting_url, false)) {
|
| - return CastNetworkDelegate::DeviceCert();
|
| - } else {
|
| - LOG(ERROR) << "Invalid host for client certificate request: "
|
| - << requesting_url.host();
|
| - return NULL;
|
| - }
|
| -}
|
| -
|
| -bool CastContentBrowserClient::CanCreateWindow(
|
| - const GURL& opener_url,
|
| - const GURL& opener_top_level_frame_url,
|
| - const GURL& source_origin,
|
| - WindowContainerType container_type,
|
| - const GURL& target_url,
|
| - const content::Referrer& referrer,
|
| - WindowOpenDisposition disposition,
|
| - const blink::WebWindowFeatures& features,
|
| - bool user_gesture,
|
| - bool opener_suppressed,
|
| - content::ResourceContext* context,
|
| - int render_process_id,
|
| - int opener_id,
|
| - bool* no_javascript_access) {
|
| - *no_javascript_access = true;
|
| - return false;
|
| -}
|
| -
|
| -content::DevToolsManagerDelegate*
|
| -CastContentBrowserClient::GetDevToolsManagerDelegate() {
|
| - return new CastDevToolsManagerDelegate();
|
| -}
|
| -
|
| -void CastContentBrowserClient::GetAdditionalMappedFilesForChildProcess(
|
| - const base::CommandLine& command_line,
|
| - int child_process_id,
|
| - content::FileDescriptorInfo* mappings) {
|
| -#if defined(OS_ANDROID)
|
| - int flags = base::File::FLAG_OPEN | base::File::FLAG_READ;
|
| - base::FilePath pak_file;
|
| - CHECK(PathService::Get(FILE_CAST_PAK, &pak_file));
|
| - base::File pak_with_flags(pak_file, flags);
|
| - if (!pak_with_flags.IsValid()) {
|
| - NOTREACHED() << "Failed to open file when creating renderer process: "
|
| - << "cast_shell.pak";
|
| - }
|
| - mappings->Transfer(
|
| - kAndroidPakDescriptor,
|
| - base::ScopedFD(pak_with_flags.TakePlatformFile()));
|
| -
|
| - if (breakpad::IsCrashReporterEnabled()) {
|
| - base::File minidump_file(
|
| - breakpad::CrashDumpManager::GetInstance()->CreateMinidumpFile(
|
| - child_process_id));
|
| - if (!minidump_file.IsValid()) {
|
| - LOG(ERROR) << "Failed to create file for minidump, crash reporting will "
|
| - << "be disabled for this process.";
|
| - } else {
|
| - mappings->Transfer(kAndroidMinidumpDescriptor,
|
| - base::ScopedFD(minidump_file.TakePlatformFile()));
|
| - }
|
| - }
|
| -#endif // defined(OS_ANDROID)
|
| -}
|
| -
|
| -#if defined(OS_ANDROID) && defined(VIDEO_HOLE)
|
| -content::ExternalVideoSurfaceContainer*
|
| -CastContentBrowserClient::OverrideCreateExternalVideoSurfaceContainer(
|
| - content::WebContents* web_contents) {
|
| - return new ExternalVideoSurfaceContainerImpl(web_contents);
|
| -}
|
| -#endif // defined(OS_ANDROID) && defined(VIDEO_HOLE)
|
| -
|
| -
|
| -} // namespace shell
|
| -} // namespace chromecast
|
|
|