Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(148)

Unified Diff: components/content_settings/core/browser/host_content_settings_map.cc

Issue 1442083002: Stop inheriting push notification permissions from regular to incognito (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Address review nits Created 5 years ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: components/content_settings/core/browser/host_content_settings_map.cc
diff --git a/components/content_settings/core/browser/host_content_settings_map.cc b/components/content_settings/core/browser/host_content_settings_map.cc
index 3887bb5f009c70b618a978e6969b8fc4723eba76..6870a6a76db22fb1502f20ec971a687c82a38b06 100644
--- a/components/content_settings/core/browser/host_content_settings_map.cc
+++ b/components/content_settings/core/browser/host_content_settings_map.cc
@@ -68,6 +68,26 @@ bool SchemeCanBeWhitelisted(const std::string& scheme) {
scheme == content_settings::kChromeUIScheme;
}
+// Prevents content settings marked INHERIT_IN_INCOGNITO_EXCEPT_ALLOW from
+// inheriting CONTENT_SETTING_ALLOW settings from regular to incognito.
+scoped_ptr<base::Value> CoerceSettingInheritedToIncognito(
+ ContentSettingsType content_type,
+ scoped_ptr<base::Value> value) {
+ const content_settings::ContentSettingsInfo* info =
+ content_settings::ContentSettingsRegistry::GetInstance()->Get(
+ content_type);
+ if (!info)
+ return value;
+ if (info->incognito_behavior() !=
+ content_settings::ContentSettingsInfo::INHERIT_IN_INCOGNITO_EXCEPT_ALLOW)
+ return value;
+ ContentSetting setting = content_settings::ValueToContentSetting(value.get());
+ if (setting != CONTENT_SETTING_ALLOW)
+ return value;
+ DCHECK(info->IsSettingValid(CONTENT_SETTING_ASK));
+ return content_settings::ContentSettingToValue(CONTENT_SETTING_ASK);
+}
+
} // namespace
HostContentSettingsMap::HostContentSettingsMap(PrefService* prefs,
@@ -157,6 +177,12 @@ ContentSetting HostContentSettingsMap::GetDefaultContentSetting(
continue;
ContentSetting default_setting =
GetDefaultContentSettingFromProvider(content_type, provider->second);
+ if (is_off_the_record_) {
+ default_setting = content_settings::ValueToContentSetting(
+ CoerceSettingInheritedToIncognito(
+ content_type,
+ content_settings::ContentSettingToValue(default_setting)).get());
+ }
if (default_setting != CONTENT_SETTING_DEFAULT) {
if (provider_id)
*provider_id = kProviderNamesSourceMap[provider->first].provider_name;
@@ -653,16 +679,10 @@ scoped_ptr<base::Value> HostContentSettingsMap::GetWebsiteSettingInternal(
for (ConstProviderIterator provider = content_settings_providers_.begin();
provider != content_settings_providers_.end();
++provider) {
-
- scoped_ptr<base::Value> value(
- content_settings::GetContentSettingValueAndPatterns(provider->second,
- primary_url,
- secondary_url,
- content_type,
- resource_identifier,
- is_off_the_record_,
- primary_pattern,
- secondary_pattern));
+ scoped_ptr<base::Value> value = GetContentSettingValueAndPatterns(
+ provider->second, primary_url, secondary_url, content_type,
+ resource_identifier, is_off_the_record_, primary_pattern,
+ secondary_pattern);
if (value) {
if (info)
info->source = kProviderNamesSourceMap[provider->first].provider_source;
@@ -677,3 +697,61 @@ scoped_ptr<base::Value> HostContentSettingsMap::GetWebsiteSettingInternal(
}
return scoped_ptr<base::Value>();
}
+
+// static
+scoped_ptr<base::Value>
+HostContentSettingsMap::GetContentSettingValueAndPatterns(
+ const content_settings::ProviderInterface* provider,
+ const GURL& primary_url,
+ const GURL& secondary_url,
+ ContentSettingsType content_type,
+ const std::string& resource_identifier,
+ bool include_incognito,
+ ContentSettingsPattern* primary_pattern,
+ ContentSettingsPattern* secondary_pattern) {
+ if (include_incognito) {
+ // Check incognito-only specific settings. It's essential that the
+ // |RuleIterator| gets out of scope before we get a rule iterator for the
+ // normal mode.
+ scoped_ptr<content_settings::RuleIterator> incognito_rule_iterator(
+ provider->GetRuleIterator(content_type, resource_identifier,
+ true /* incognito */));
+ scoped_ptr<base::Value> value = GetContentSettingValueAndPatterns(
+ incognito_rule_iterator.get(), primary_url, secondary_url,
+ primary_pattern, secondary_pattern);
+ if (value)
+ return value;
+ }
+ // No settings from the incognito; use the normal mode.
+ scoped_ptr<content_settings::RuleIterator> rule_iterator(
+ provider->GetRuleIterator(content_type, resource_identifier,
+ false /* incognito */));
+ scoped_ptr<base::Value> value = GetContentSettingValueAndPatterns(
+ rule_iterator.get(), primary_url, secondary_url, primary_pattern,
+ secondary_pattern);
+ if (value && include_incognito)
+ value = CoerceSettingInheritedToIncognito(content_type, value.Pass());
+ return value;
+}
+
+// static
+scoped_ptr<base::Value>
+HostContentSettingsMap::GetContentSettingValueAndPatterns(
+ content_settings::RuleIterator* rule_iterator,
+ const GURL& primary_url,
+ const GURL& secondary_url,
+ ContentSettingsPattern* primary_pattern,
+ ContentSettingsPattern* secondary_pattern) {
+ while (rule_iterator->HasNext()) {
+ const content_settings::Rule& rule = rule_iterator->Next();
+ if (rule.primary_pattern.Matches(primary_url) &&
+ rule.secondary_pattern.Matches(secondary_url)) {
+ if (primary_pattern)
+ *primary_pattern = rule.primary_pattern;
+ if (secondary_pattern)
+ *secondary_pattern = rule.secondary_pattern;
+ return make_scoped_ptr(rule.value.get()->DeepCopy());
+ }
+ }
+ return scoped_ptr<base::Value>();
+}

Powered by Google App Engine
This is Rietveld 408576698