OLD | NEW |
1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 // See http://dev.chromium.org/developers/design-documents/multi-process-resourc
e-loading | 5 // See http://dev.chromium.org/developers/design-documents/multi-process-resourc
e-loading |
6 | 6 |
7 #include "chrome/browser/renderer_host/resource_dispatcher_host.h" | 7 #include "chrome/browser/renderer_host/resource_dispatcher_host.h" |
8 | 8 |
9 #include <vector> | 9 #include <vector> |
10 | 10 |
(...skipping 114 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
125 | 125 |
126 // Check if the renderer is permitted to request the requested URL. | 126 // Check if the renderer is permitted to request the requested URL. |
127 if (!policy->CanRequestURL(child_id, request_data.url)) { | 127 if (!policy->CanRequestURL(child_id, request_data.url)) { |
128 LOG(INFO) << "Denied unauthorized request for " << | 128 LOG(INFO) << "Denied unauthorized request for " << |
129 request_data.url.possibly_invalid_spec(); | 129 request_data.url.possibly_invalid_spec(); |
130 return false; | 130 return false; |
131 } | 131 } |
132 | 132 |
133 // Check if the renderer is permitted to upload the requested files. | 133 // Check if the renderer is permitted to upload the requested files. |
134 if (request_data.upload_data) { | 134 if (request_data.upload_data) { |
135 const std::vector<net::UploadData::Element>& uploads = | 135 const std::vector<net::UploadData::Element>* uploads = |
136 request_data.upload_data->elements(); | 136 request_data.upload_data->elements(); |
137 std::vector<net::UploadData::Element>::const_iterator iter; | 137 std::vector<net::UploadData::Element>::const_iterator iter; |
138 for (iter = uploads.begin(); iter != uploads.end(); ++iter) { | 138 for (iter = uploads->begin(); iter != uploads->end(); ++iter) { |
139 if (iter->type() == net::UploadData::TYPE_FILE && | 139 if (iter->type() == net::UploadData::TYPE_FILE && |
140 !policy->CanUploadFile(child_id, iter->file_path())) { | 140 !policy->CanUploadFile(child_id, iter->file_path())) { |
141 NOTREACHED() << "Denied unauthorized upload of " | 141 NOTREACHED() << "Denied unauthorized upload of " |
142 << iter->file_path().value(); | 142 << iter->file_path().value(); |
143 return false; | 143 return false; |
144 } | 144 } |
145 } | 145 } |
146 } | 146 } |
147 | 147 |
148 return true; | 148 return true; |
(...skipping 1610 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
1759 const ResourceType::Type& resource_type, | 1759 const ResourceType::Type& resource_type, |
1760 ResourceDispatcherHostRequestInfo* request_info) { | 1760 ResourceDispatcherHostRequestInfo* request_info) { |
1761 // Apply filter only to chrome extension css files that don't have | 1761 // Apply filter only to chrome extension css files that don't have |
1762 // security filter already set. | 1762 // security filter already set. |
1763 if (url.SchemeIs(chrome::kExtensionScheme) && | 1763 if (url.SchemeIs(chrome::kExtensionScheme) && |
1764 request_info->filter_policy() == FilterPolicy::DONT_FILTER && | 1764 request_info->filter_policy() == FilterPolicy::DONT_FILTER && |
1765 resource_type == ResourceType::STYLESHEET) { | 1765 resource_type == ResourceType::STYLESHEET) { |
1766 request_info->set_filter_policy(FilterPolicy::FILTER_EXTENSION_MESSAGES); | 1766 request_info->set_filter_policy(FilterPolicy::FILTER_EXTENSION_MESSAGES); |
1767 } | 1767 } |
1768 } | 1768 } |
OLD | NEW |