summaryrefslogtreecommitdiffstats
path: root/content/browser/child_process_security_policy_impl.cc
Commit message (Expand)AuthorAgeFilesLines
* ChildProcessSecurityPolicy: Deprecate bitmask-based permissions checks for fi...tommycli@chromium.org2013-07-231-20/+54
* ChildProcessSecurityPolicy: Add CopyIntoFileSystem permission.tommycli@chromium.org2013-07-231-0/+17
* Update the child process security policy to use explicit permission grants.gbillock@chromium.org2013-07-111-0/+34
* content: Migrate from googleurl/ includes to url/ ones.tfarina@chromium.org2013-07-091-1/+1
* Implement ChildProcessSecurityPolicy::HasPermissionsForFileSystemFile()kinuko@chromium.org2013-07-011-0/+51
* Use a direct include of strings headers in content/browser/, part 1.avi@chromium.org2013-06-111-1/+1
* DisabledScheme policy existed before we had URLBlacklist. csorba@chromium.org2013-06-061-15/+0
* content: Move kViewSourceScheme constant into content namespace.tfarina@chromium.org2013-05-301-5/+5
* Move more browser-specific webkit/fileapi code to webkit/browser/fileapikinuko@chromium.org2013-05-241-1/+1
* content: Move two more url constants into content namespace.tfarina@chromium.org2013-05-151-1/+1
* Move file_path.h to base/files.brettw@chromium.org2013-02-241-1/+1
* Use base namespace for FilePath in content/browserbrettw@chromium.org2013-02-071-24/+24
* Implement a prototype to render cross-site iframes in a separate process from...nasko@chromium.org2013-01-231-9/+3
* Media Galleries: Add write support.thestig@chromium.org2013-01-171-5/+12
* Small extra validations on permission checks: reject "0" as a valid permissioncevans@chromium.org2013-01-071-0/+2
* Prevent cross-site pages if the --site-per-process flag is passedirobert@chromium.org2012-12-111-0/+32
* Apply missing kParentDirectory checktsepez@chromium.org2012-11-201-2/+11
* Add an experimental --site-per-process flag.creis@chromium.org2012-11-151-4/+38
* Move remaining files in content\browser to the content namespace.jam@chromium.org2012-10-301-5/+6
* Revert 164120 - content/browser: Move more files into the content namespace.sail@chromium.org2012-10-251-6/+5
* content/browser: Move more files into the content namespace.tfarina@chromium.org2012-10-251-5/+6
* Add isWritableFileEntry to the fileSystem APIthorogood@chromium.org2012-07-191-0/+8
* Remove ugly writable flags from IsolatedContextkinuko@chromium.org2012-06-301-1/+0
* Relanding r144115: Manage Isolated Context with reference counts w/o DCHECKkinuko@chromium.org2012-06-261-1/+4
* Revert 144115 - Manage IsolatedContext with reference countskinuko@chromium.org2012-06-261-4/+1
* Manage IsolatedContext with reference countskinuko@chromium.org2012-06-261-1/+4
* Retry: Make Isolated file system writable only if it is configured sokinuko@chromium.org2012-06-121-0/+1
* Revert 141395 - Make Isolated file system writable only if it is configured sokinuko@chromium.org2012-06-111-1/+0
* Make Isolated file system writable only if it is configured sokinuko@chromium.org2012-06-111-0/+1
* DragEnter grants RequestURL to entire file:// scheme.tsepez@chromium.org2012-06-081-9/+48
* Implement extension API chrome.fileSystem.getDisplayPath().benwells@chromium.org2012-06-081-1/+8
* Add more detailed access control to isolated file systemkinuko@chromium.org2012-06-011-17/+65
* Create a content public browser API around the ChildProcessSecurityPolicy cla...ananta@chromium.org2012-02-091-0/+526