Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(328)

Unified Diff: trunk/src/net/base/sdch_manager.cc

Issue 130893005: Revert 243957 "Enable SDCH support over HTTPS if --enable-sdch=2..." (Closed) Base URL: svn://svn.chromium.org/chrome/
Patch Set: Created 6 years, 11 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « trunk/src/net/base/sdch_manager.h ('k') | no next file » | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: trunk/src/net/base/sdch_manager.cc
===================================================================
--- trunk/src/net/base/sdch_manager.cc (revision 244037)
+++ trunk/src/net/base/sdch_manager.cc (working copy)
@@ -28,9 +28,6 @@
// static
bool SdchManager::g_sdch_enabled_ = true;
-// static
-bool SdchManager::g_secure_scheme_supported_ = false;
-
//------------------------------------------------------------------------------
SdchManager::Dictionary::Dictionary(const std::string& dictionary_text,
size_t offset,
@@ -66,8 +63,6 @@
ports listed in the Port attribute.
3. The request URI path-matches the path header of the dictionary.
4. The request is not an HTTPS request.
- We can override (ignore) item (4) only when we have explicitly enabled
- HTTPS support AND dictionary has been acquired over HTTPS.
*/
if (!DomainMatch(target_url, domain_))
return false;
@@ -75,10 +70,8 @@
return false;
if (path_.size() && !PathMatch(target_url.path(), path_))
return false;
- if (!SdchManager::secure_scheme_supported() && target_url.SchemeIsSecure())
+ if (target_url.SchemeIsSecure())
return false;
- if (target_url.SchemeIsSecure() && !url_.SchemeIsSecure())
- return false;
if (base::Time::Now() > expiration_)
return false;
return true;
@@ -159,8 +152,6 @@
ports listed in the Port attribute.
3. The request URL path-matches the path attribute of the dictionary.
4. The request is not an HTTPS request.
- We can override (ignore) item (4) only when we have explicitly enabled
- HTTPS support AND dictionary has been acquired over HTTPS.
*/
if (!DomainMatch(referring_url, domain_)) {
SdchErrorRecovery(DICTIONARY_FOUND_HAS_WRONG_DOMAIN);
@@ -175,19 +166,14 @@
SdchErrorRecovery(DICTIONARY_FOUND_HAS_WRONG_PATH);
return false;
}
- if (!SdchManager::secure_scheme_supported() &&
- referring_url.SchemeIsSecure()) {
+ if (referring_url.SchemeIsSecure()) {
SdchErrorRecovery(DICTIONARY_FOUND_HAS_WRONG_SCHEME);
return false;
}
- if (referring_url.SchemeIsSecure() && !url_.SchemeIsSecure()) {
- SdchErrorRecovery(DICTIONARY_FOUND_HAS_WRONG_SCHEME);
- return false;
- }
// TODO(jar): Remove overly restrictive failsafe test (added per security
// review) when we have a need to be more general.
- if (!referring_url.SchemeIsHTTPOrHTTPS()) {
+ if (!referring_url.SchemeIs("http")) {
SdchErrorRecovery(ATTEMPT_TO_DECODE_NON_HTTP_DATA);
return false;
}
@@ -266,11 +252,6 @@
}
// static
-void SdchManager::EnableSecureSchemeSupport(bool enabled) {
- g_secure_scheme_supported_ = enabled;
-}
-
-// static
void SdchManager::BlacklistDomain(const GURL& url) {
if (!global_ )
return;
@@ -363,8 +344,7 @@
DCHECK(CalledOnValidThread());
/* The user agent may retrieve a dictionary from the dictionary URL if all of
the following are true:
- 1 The dictionary URL host name matches the referrer URL host name and
- scheme.
+ 1 The dictionary URL host name matches the referrer URL host name
2 The dictionary URL host name domain matches the parent domain of the
referrer URL host name
3 The parent domain of the referrer URL host name is not a top level
@@ -373,19 +353,18 @@
*/
// Item (1) above implies item (2). Spec should be updated.
// I take "host name match" to be "is identical to"
- if (referring_url.host() != dictionary_url.host() ||
- referring_url.scheme() != dictionary_url.scheme()) {
+ if (referring_url.host() != dictionary_url.host()) {
SdchErrorRecovery(DICTIONARY_LOAD_ATTEMPT_FROM_DIFFERENT_HOST);
return false;
}
- if (!secure_scheme_supported() && referring_url.SchemeIsSecure()) {
+ if (referring_url.SchemeIs("https")) {
SdchErrorRecovery(DICTIONARY_SELECTED_FOR_SSL);
return false;
}
// TODO(jar): Remove this failsafe conservative hack which is more restrictive
// than current SDCH spec when needed, and justified by security audit.
- if (!referring_url.SchemeIsHTTPOrHTTPS()) {
+ if (!referring_url.SchemeIs("http")) {
SdchErrorRecovery(DICTIONARY_SELECTED_FROM_NON_HTTP);
return false;
}
« no previous file with comments | « trunk/src/net/base/sdch_manager.h ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698