diff options
author | ananta@chromium.org <ananta@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2011-08-19 23:35:50 +0000 |
---|---|---|
committer | ananta@chromium.org <ananta@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2011-08-19 23:35:50 +0000 |
commit | 2ccf45c50fad0f2c3c20d95eef6d0040b565b291 (patch) | |
tree | 73eac41769a4678fcdb566e78d6e3bde7c10617c /chrome/renderer/chrome_content_renderer_client.cc | |
parent | da930e1b7adfb28f6895d95004c25984af627080 (diff) | |
download | chromium_src-2ccf45c50fad0f2c3c20d95eef6d0040b565b291.zip chromium_src-2ccf45c50fad0f2c3c20d95eef6d0040b565b291.tar.gz chromium_src-2ccf45c50fad0f2c3c20d95eef6d0040b565b291.tar.bz2 |
Prefix all IPC messages used by src\chrome with Chrome. For e.g ChromeViewMsg_, ChromeViewHostMsg, etc.
This makes it easier to identify which messages are specific to content and chrome.
This is a preparation CL for bug http://code.google.com/p/chromium/issues/detail?id=87335 which
requires IPC's to not span across content and chrome. When IPC's cross these boundaries they need
to be handled as API calls.
BUG=87335
Review URL: http://codereview.chromium.org/7631063
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@97536 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'chrome/renderer/chrome_content_renderer_client.cc')
-rw-r--r-- | chrome/renderer/chrome_content_renderer_client.cc | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/chrome/renderer/chrome_content_renderer_client.cc b/chrome/renderer/chrome_content_renderer_client.cc index c18df0d..c197af9 100644 --- a/chrome/renderer/chrome_content_renderer_client.cc +++ b/chrome/renderer/chrome_content_renderer_client.cc @@ -331,7 +331,7 @@ WebPlugin* ChromeContentRendererClient::CreatePluginImpl( std::string resource; if (cmd->HasSwitch(switches::kEnableResourceContentSettings)) resource = group->identifier(); - render_view->Send(new ViewHostMsg_GetPluginContentSetting( + render_view->Send(new ChromeViewHostMsg_GetPluginContentSetting( frame->top()->document().url(), resource, &plugin_setting)); DCHECK(plugin_setting != CONTENT_SETTING_DEFAULT); @@ -351,7 +351,7 @@ WebPlugin* ChromeContentRendererClient::CreatePluginImpl( if (group->IsVulnerable() || group->RequiresAuthorization()) { // These policies are dynamic and can changed at runtime, so they aren't // cached here. - render_view->Send(new ViewHostMsg_GetPluginPolicies( + render_view->Send(new ChromeViewHostMsg_GetPluginPolicies( &outdated_policy, &authorize_policy)); } @@ -359,7 +359,7 @@ WebPlugin* ChromeContentRendererClient::CreatePluginImpl( if (outdated_policy == CONTENT_SETTING_ASK || outdated_policy == CONTENT_SETTING_BLOCK) { if (outdated_policy == CONTENT_SETTING_ASK) { - render_view->Send(new ViewHostMsg_BlockedOutdatedPlugin( + render_view->Send(new ChromeViewHostMsg_BlockedOutdatedPlugin( render_view->routing_id(), group->GetGroupName(), GURL(group->GetUpdateURL()))); } @@ -380,7 +380,7 @@ WebPlugin* ChromeContentRendererClient::CreatePluginImpl( (plugin_setting == CONTENT_SETTING_ALLOW || plugin_setting == CONTENT_SETTING_ASK) && host_setting == CONTENT_SETTING_DEFAULT) { - render_view->Send(new ViewHostMsg_BlockedOutdatedPlugin( + render_view->Send(new ChromeViewHostMsg_BlockedOutdatedPlugin( render_view->routing_id(), group->GetGroupName(), GURL())); return CreatePluginPlaceholder( render_view, frame, params, *group, IDR_BLOCKED_PLUGIN_HTML, |