summaryrefslogtreecommitdiffstats
path: root/chrome/renderer/chrome_content_renderer_client.cc
diff options
context:
space:
mode:
authorananta@chromium.org <ananta@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2011-08-19 23:35:50 +0000
committerananta@chromium.org <ananta@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2011-08-19 23:35:50 +0000
commit2ccf45c50fad0f2c3c20d95eef6d0040b565b291 (patch)
tree73eac41769a4678fcdb566e78d6e3bde7c10617c /chrome/renderer/chrome_content_renderer_client.cc
parentda930e1b7adfb28f6895d95004c25984af627080 (diff)
downloadchromium_src-2ccf45c50fad0f2c3c20d95eef6d0040b565b291.zip
chromium_src-2ccf45c50fad0f2c3c20d95eef6d0040b565b291.tar.gz
chromium_src-2ccf45c50fad0f2c3c20d95eef6d0040b565b291.tar.bz2
Prefix all IPC messages used by src\chrome with Chrome. For e.g ChromeViewMsg_, ChromeViewHostMsg, etc.
This makes it easier to identify which messages are specific to content and chrome. This is a preparation CL for bug http://code.google.com/p/chromium/issues/detail?id=87335 which requires IPC's to not span across content and chrome. When IPC's cross these boundaries they need to be handled as API calls. BUG=87335 Review URL: http://codereview.chromium.org/7631063 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@97536 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'chrome/renderer/chrome_content_renderer_client.cc')
-rw-r--r--chrome/renderer/chrome_content_renderer_client.cc8
1 files changed, 4 insertions, 4 deletions
diff --git a/chrome/renderer/chrome_content_renderer_client.cc b/chrome/renderer/chrome_content_renderer_client.cc
index c18df0d..c197af9 100644
--- a/chrome/renderer/chrome_content_renderer_client.cc
+++ b/chrome/renderer/chrome_content_renderer_client.cc
@@ -331,7 +331,7 @@ WebPlugin* ChromeContentRendererClient::CreatePluginImpl(
std::string resource;
if (cmd->HasSwitch(switches::kEnableResourceContentSettings))
resource = group->identifier();
- render_view->Send(new ViewHostMsg_GetPluginContentSetting(
+ render_view->Send(new ChromeViewHostMsg_GetPluginContentSetting(
frame->top()->document().url(), resource, &plugin_setting));
DCHECK(plugin_setting != CONTENT_SETTING_DEFAULT);
@@ -351,7 +351,7 @@ WebPlugin* ChromeContentRendererClient::CreatePluginImpl(
if (group->IsVulnerable() || group->RequiresAuthorization()) {
// These policies are dynamic and can changed at runtime, so they aren't
// cached here.
- render_view->Send(new ViewHostMsg_GetPluginPolicies(
+ render_view->Send(new ChromeViewHostMsg_GetPluginPolicies(
&outdated_policy, &authorize_policy));
}
@@ -359,7 +359,7 @@ WebPlugin* ChromeContentRendererClient::CreatePluginImpl(
if (outdated_policy == CONTENT_SETTING_ASK ||
outdated_policy == CONTENT_SETTING_BLOCK) {
if (outdated_policy == CONTENT_SETTING_ASK) {
- render_view->Send(new ViewHostMsg_BlockedOutdatedPlugin(
+ render_view->Send(new ChromeViewHostMsg_BlockedOutdatedPlugin(
render_view->routing_id(), group->GetGroupName(),
GURL(group->GetUpdateURL())));
}
@@ -380,7 +380,7 @@ WebPlugin* ChromeContentRendererClient::CreatePluginImpl(
(plugin_setting == CONTENT_SETTING_ALLOW ||
plugin_setting == CONTENT_SETTING_ASK) &&
host_setting == CONTENT_SETTING_DEFAULT) {
- render_view->Send(new ViewHostMsg_BlockedOutdatedPlugin(
+ render_view->Send(new ChromeViewHostMsg_BlockedOutdatedPlugin(
render_view->routing_id(), group->GetGroupName(), GURL()));
return CreatePluginPlaceholder(
render_view, frame, params, *group, IDR_BLOCKED_PLUGIN_HTML,