| Index: chrome/browser/media/media_stream_devices_controller.cc
|
| diff --git a/chrome/browser/media/media_stream_devices_controller.cc b/chrome/browser/media/media_stream_devices_controller.cc
|
| index f6d6ecad7ea0e79e93979bfed0b560f1ee28260e..fe6054c5d9930599873757c45822bcc35817095b 100644
|
| --- a/chrome/browser/media/media_stream_devices_controller.cc
|
| +++ b/chrome/browser/media/media_stream_devices_controller.cc
|
| @@ -15,6 +15,7 @@
|
| #include "chrome/browser/profiles/profile.h"
|
| #include "chrome/browser/ui/browser.h"
|
| #include "chrome/common/chrome_switches.h"
|
| +#include "chrome/common/origin_util.h"
|
| #include "chrome/common/pref_names.h"
|
| #include "chrome/grit/generated_resources.h"
|
| #include "components/content_settings/core/browser/host_content_settings_map.h"
|
| @@ -382,7 +383,7 @@ void MediaStreamDevicesController::Accept(bool update_content_setting) {
|
| // websites for Pepper requests as well. This is temporary and should be
|
| // removed.
|
| if (update_content_setting) {
|
| - if ((IsSchemeSecure() && !devices.empty()) ||
|
| + if ((IsOriginSecure(request_.security_origin) && !devices.empty()) ||
|
| request_.request_type == content::MEDIA_OPEN_DEVICE) {
|
| StorePermission(true);
|
| }
|
| @@ -471,7 +472,7 @@ GURL MediaStreamDevicesController::GetRequestingHostname() const {
|
|
|
| void MediaStreamDevicesController::PermissionGranted() {
|
| GURL origin(GetSecurityOriginSpec());
|
| - if (origin.SchemeIsSecure()) {
|
| + if (IsOriginSecure(origin)) {
|
| UMA_HISTOGRAM_ENUMERATION("Media.DevicePermissionActions",
|
| kAllowHttps, kPermissionActionsMax);
|
| } else {
|
| @@ -537,7 +538,7 @@ bool MediaStreamDevicesController::IsRequestAllowedByDefault() const {
|
| if (policy == POLICY_NOT_SET) {
|
| // Only load content settings from secure origins unless it is a
|
| // content::MEDIA_OPEN_DEVICE (Pepper) request.
|
| - if (!IsSchemeSecure() &&
|
| + if (!IsOriginSecure(request_.security_origin) &&
|
| request_.request_type != content::MEDIA_OPEN_DEVICE) {
|
| return false;
|
| }
|
| @@ -601,11 +602,6 @@ bool MediaStreamDevicesController::IsDefaultMediaAccessBlocked() const {
|
| == CONTENT_SETTING_BLOCK);
|
| }
|
|
|
| -bool MediaStreamDevicesController::IsSchemeSecure() const {
|
| - return request_.security_origin.SchemeIsSecure() ||
|
| - request_.security_origin.SchemeIs(extensions::kExtensionScheme);
|
| -}
|
| -
|
| void MediaStreamDevicesController::StorePermission(bool allowed) const {
|
| DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
|
| ContentSettingsPattern primary_pattern =
|
|
|