| Index: chrome_frame/navigation_constraints.cc
|
| diff --git a/chrome_frame/navigation_constraints.cc b/chrome_frame/navigation_constraints.cc
|
| deleted file mode 100644
|
| index ddb21e37f380a69a3df1e4635a0a880373f628a3..0000000000000000000000000000000000000000
|
| --- a/chrome_frame/navigation_constraints.cc
|
| +++ /dev/null
|
| @@ -1,86 +0,0 @@
|
| -// Copyright (c) 2010 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "chrome_frame/navigation_constraints.h"
|
| -
|
| -#include "base/strings/string_util.h"
|
| -#include "base/strings/utf_string_conversions.h"
|
| -#include "chrome/common/url_constants.h"
|
| -#include "chrome_frame/utils.h"
|
| -#include "extensions/common/constants.h"
|
| -
|
| -NavigationConstraintsImpl::NavigationConstraintsImpl() : is_privileged_(false) {
|
| -}
|
| -
|
| -// NavigationConstraintsImpl method definitions.
|
| -bool NavigationConstraintsImpl::AllowUnsafeUrls() {
|
| - // No sanity checks if unsafe URLs are allowed
|
| - return GetConfigBool(false, kAllowUnsafeURLs);
|
| -}
|
| -
|
| -bool NavigationConstraintsImpl::IsSchemeAllowed(const GURL& url) {
|
| - if (url.is_empty())
|
| - return false;
|
| -
|
| - if (!url.is_valid())
|
| - return false;
|
| -
|
| - if (url.SchemeIs(content::kHttpScheme) || url.SchemeIs(content::kHttpsScheme))
|
| - return true;
|
| -
|
| - // Additional checking for view-source. Allow only http and https
|
| - // URLs in view source.
|
| - if (url.SchemeIs(content::kViewSourceScheme)) {
|
| - GURL sub_url(url.GetContent());
|
| - if (sub_url.SchemeIs(content::kHttpScheme) ||
|
| - sub_url.SchemeIs(content::kHttpsScheme))
|
| - return true;
|
| - }
|
| -
|
| - // Allow only about:blank or about:version
|
| - if (url.SchemeIs(chrome::kAboutScheme)) {
|
| - if (LowerCaseEqualsASCII(url.spec(), content::kAboutBlankURL) ||
|
| - LowerCaseEqualsASCII(url.spec(), chrome::kAboutVersionURL)) {
|
| - return true;
|
| - }
|
| - }
|
| -
|
| - if (is_privileged_ &&
|
| - (url.SchemeIs(chrome::kDataScheme) ||
|
| - url.SchemeIs(extensions::kExtensionScheme))) {
|
| - return true;
|
| - }
|
| -
|
| - return false;
|
| -}
|
| -
|
| -bool NavigationConstraintsImpl::IsZoneAllowed(const GURL& url) {
|
| - if (!security_manager_) {
|
| - HRESULT hr = security_manager_.CreateInstance(
|
| - CLSID_InternetSecurityManager);
|
| - if (FAILED(hr)) {
|
| - NOTREACHED() << __FUNCTION__
|
| - << " Failed to create SecurityManager. Error: 0x%x"
|
| - << hr;
|
| - return true;
|
| - }
|
| - DWORD zone = URLZONE_INVALID;
|
| - std::wstring unicode_url = base::UTF8ToWide(url.spec());
|
| - security_manager_->MapUrlToZone(unicode_url.c_str(), &zone, 0);
|
| - if (zone == URLZONE_UNTRUSTED) {
|
| - DLOG(WARNING) << __FUNCTION__
|
| - << " Disallowing navigation to restricted url: " << url;
|
| - return false;
|
| - }
|
| - }
|
| - return true;
|
| -}
|
| -
|
| -bool NavigationConstraintsImpl::is_privileged() const {
|
| - return is_privileged_;
|
| -}
|
| -
|
| -void NavigationConstraintsImpl::set_is_privileged(bool is_privileged) {
|
| - is_privileged_ = is_privileged;
|
| -}
|
|
|