Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(946)

Unified Diff: content/browser/renderer_host/render_view_host_impl.cc

Issue 23283007: Move kJavaScriptScheme into content namespace. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: content:: is necessary in web_drag_source_mac.mm Created 7 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « content/browser/child_process_security_policy_unittest.cc ('k') | content/browser/site_instance_impl.cc » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: content/browser/renderer_host/render_view_host_impl.cc
diff --git a/content/browser/renderer_host/render_view_host_impl.cc b/content/browser/renderer_host/render_view_host_impl.cc
index 736bf51521218f79a550e44131a79eda2acd5d4d..3b12d64f31fc03c89fd55550e9d1ba8945e5b221 100644
--- a/content/browser/renderer_host/render_view_host_impl.cc
+++ b/content/browser/renderer_host/render_view_host_impl.cc
@@ -338,7 +338,7 @@ void RenderViewHostImpl::Navigate(const ViewMsg_Navigate_Params& params) {
//
// WebKit doesn't send throb notifications for JavaScript URLs, so we
// don't want to either.
- if (!params.url.SchemeIs(chrome::kJavaScriptScheme))
+ if (!params.url.SchemeIs(kJavaScriptScheme))
delegate_->DidStartLoading(this);
FOR_EACH_OBSERVER(RenderViewHostObserver, observers_, Navigate(params.url));
@@ -1463,7 +1463,7 @@ void RenderViewHostImpl::OnStartDragging(
ChildProcessSecurityPolicyImpl::GetInstance();
// Allow drag of Javascript URLs to enable bookmarklet drag to bookmark bar.
- if (!filtered_data.url.SchemeIs(chrome::kJavaScriptScheme))
+ if (!filtered_data.url.SchemeIs(kJavaScriptScheme))
FilterURL(policy, process, true, &filtered_data.url);
FilterURL(policy, process, false, &filtered_data.html_base_url);
// Filter out any paths that the renderer didn't have access to. This prevents
@@ -1952,7 +1952,7 @@ void RenderViewHostImpl::OnShowDesktopNotification(
// allows unwanted cross-domain access.
GURL url = params.contents_url;
if (params.is_html &&
- (url.SchemeIs(chrome::kJavaScriptScheme) ||
+ (url.SchemeIs(kJavaScriptScheme) ||
url.SchemeIs(chrome::kFileScheme))) {
return;
}
« no previous file with comments | « content/browser/child_process_security_policy_unittest.cc ('k') | content/browser/site_instance_impl.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698