Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(539)

Side by Side Diff: content/browser/child_process_security_policy_impl.cc

Issue 23658056: content: Move kHttpScheme constant into content namespace. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Created 7 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "content/browser/child_process_security_policy_impl.h" 5 #include "content/browser/child_process_security_policy_impl.h"
6 6
7 #include "base/command_line.h" 7 #include "base/command_line.h"
8 #include "base/files/file_path.h" 8 #include "base/files/file_path.h"
9 #include "base/logging.h" 9 #include "base/logging.h"
10 #include "base/metrics/histogram.h" 10 #include "base/metrics/histogram.h"
(...skipping 273 matching lines...) Expand 10 before | Expand all | Expand 10 after
284 GURL origin_lock_; 284 GURL origin_lock_;
285 285
286 // The set of isolated filesystems the child process is permitted to access. 286 // The set of isolated filesystems the child process is permitted to access.
287 FileSystemMap filesystem_permissions_; 287 FileSystemMap filesystem_permissions_;
288 288
289 DISALLOW_COPY_AND_ASSIGN(SecurityState); 289 DISALLOW_COPY_AND_ASSIGN(SecurityState);
290 }; 290 };
291 291
292 ChildProcessSecurityPolicyImpl::ChildProcessSecurityPolicyImpl() { 292 ChildProcessSecurityPolicyImpl::ChildProcessSecurityPolicyImpl() {
293 // We know about these schemes and believe them to be safe. 293 // We know about these schemes and believe them to be safe.
294 RegisterWebSafeScheme(chrome::kHttpScheme); 294 RegisterWebSafeScheme(kHttpScheme);
295 RegisterWebSafeScheme(kHttpsScheme); 295 RegisterWebSafeScheme(kHttpsScheme);
296 RegisterWebSafeScheme(chrome::kFtpScheme); 296 RegisterWebSafeScheme(chrome::kFtpScheme);
297 RegisterWebSafeScheme(chrome::kDataScheme); 297 RegisterWebSafeScheme(chrome::kDataScheme);
298 RegisterWebSafeScheme("feed"); 298 RegisterWebSafeScheme("feed");
299 RegisterWebSafeScheme(chrome::kBlobScheme); 299 RegisterWebSafeScheme(chrome::kBlobScheme);
300 RegisterWebSafeScheme(chrome::kFileSystemScheme); 300 RegisterWebSafeScheme(chrome::kFileSystemScheme);
301 301
302 // We know about the following pseudo schemes and treat them specially. 302 // We know about the following pseudo schemes and treat them specially.
303 RegisterPseudoScheme(chrome::kAboutScheme); 303 RegisterPseudoScheme(chrome::kAboutScheme);
304 RegisterPseudoScheme(kJavaScriptScheme); 304 RegisterPseudoScheme(kJavaScriptScheme);
(...skipping 549 matching lines...) Expand 10 before | Expand all | Expand 10 after
854 base::AutoLock lock(lock_); 854 base::AutoLock lock(lock_);
855 855
856 SecurityStateMap::iterator state = security_state_.find(child_id); 856 SecurityStateMap::iterator state = security_state_.find(child_id);
857 if (state == security_state_.end()) 857 if (state == security_state_.end())
858 return false; 858 return false;
859 859
860 return state->second->can_send_midi_sysex(); 860 return state->second->can_send_midi_sysex();
861 } 861 }
862 862
863 } // namespace content 863 } // namespace content
OLDNEW
« no previous file with comments | « content/browser/browser_url_handler_impl.cc ('k') | content/browser/child_process_security_policy_unittest.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698