| Index: extensions/browser/api/web_request/web_request_permissions.cc
|
| diff --git a/extensions/browser/api/web_request/web_request_permissions.cc b/extensions/browser/api/web_request/web_request_permissions.cc
|
| index c4ac79580cec811af010da24ee14d79d50018e26..b98ab2b88ae97c68d8cffd9a608400d0d6fc0231 100644
|
| --- a/extensions/browser/api/web_request/web_request_permissions.cc
|
| +++ b/extensions/browser/api/web_request/web_request_permissions.cc
|
| @@ -4,6 +4,7 @@
|
|
|
| #include "extensions/browser/api/web_request/web_request_permissions.h"
|
|
|
| +#include "base/strings/string_piece.h"
|
| #include "base/strings/string_util.h"
|
| #include "base/strings/stringprintf.h"
|
| #include "content/public/browser/resource_request_info.h"
|
| @@ -23,6 +24,19 @@ using extensions::PermissionsData;
|
|
|
| namespace {
|
|
|
| +// Returns true if the scheme is one we want to allow extensions to have access
|
| +// to. Extensions still need specific permissions for a given URL, which is
|
| +// covered by CanExtensionAccessURL.
|
| +bool HasWebRequestScheme(const GURL& url) {
|
| + return (url.SchemeIs(url::kAboutScheme) || url.SchemeIs(url::kFileScheme) ||
|
| + url.SchemeIs(url::kFileSystemScheme) ||
|
| + url.SchemeIs(url::kFtpScheme) || url.SchemeIs(url::kHttpScheme) ||
|
| + url.SchemeIs(url::kHttpsScheme) ||
|
| + url.SchemeIs(extensions::kExtensionScheme));
|
| +}
|
| +
|
| +} // namespace
|
| +
|
| // Returns true if the URL is sensitive and requests to this URL must not be
|
| // modified/canceled by extensions, e.g. because it is targeted to the webstore
|
| // to check for updates, extension blacklisting, etc.
|
| @@ -30,18 +44,20 @@ bool IsSensitiveURL(const GURL& url) {
|
| // TODO(battre) Merge this, CanExtensionAccessURL and
|
| // PermissionsData::CanAccessPage into one function.
|
| bool sensitive_chrome_url = false;
|
| - const std::string host = url.host();
|
| - const char kGoogleCom[] = ".google.com";
|
| + const base::StringPiece& host = url.host_piece();
|
| + const char kGoogleCom[] = "google.com";
|
| const char kClient[] = "clients";
|
| - if (base::EndsWith(host, kGoogleCom, base::CompareCase::SENSITIVE)) {
|
| + if (url.DomainIs(kGoogleCom)) {
|
| // Check for "clients[0-9]*.google.com" hosts.
|
| // This protects requests to several internal services such as sync,
|
| // extension update pings, captive portal detection, fraudulent certificate
|
| // reporting, autofill and others.
|
| if (base::StartsWith(host, kClient, base::CompareCase::SENSITIVE)) {
|
| bool match = true;
|
| - for (std::string::const_iterator i = host.begin() + strlen(kClient),
|
| - end = host.end() - strlen(kGoogleCom); i != end; ++i) {
|
| + for (base::StringPiece::const_iterator
|
| + i = host.begin() + strlen(kClient),
|
| + end = host.end() - (strlen(kGoogleCom) + 1);
|
| + i != end; ++i) {
|
| if (!isdigit(*i)) {
|
| match = false;
|
| break;
|
| @@ -51,37 +67,17 @@ bool IsSensitiveURL(const GURL& url) {
|
| }
|
| // This protects requests to safe browsing, link doctor, and possibly
|
| // others.
|
| - sensitive_chrome_url =
|
| - sensitive_chrome_url ||
|
| - base::EndsWith(url.host(), ".clients.google.com",
|
| - base::CompareCase::SENSITIVE) ||
|
| - url.host() == "sb-ssl.google.com" ||
|
| - (url.host() == "chrome.google.com" &&
|
| - base::StartsWith(url.path(), "/webstore",
|
| - base::CompareCase::SENSITIVE));
|
| + sensitive_chrome_url = sensitive_chrome_url ||
|
| + url.DomainIs("clients.google.com") ||
|
| + url.DomainIs("sb-ssl.google.com") ||
|
| + (url.DomainIs("chrome.google.com") &&
|
| + base::StartsWith(url.path_piece(), "/webstore",
|
| + base::CompareCase::SENSITIVE));
|
| }
|
| - GURL::Replacements replacements;
|
| - replacements.ClearQuery();
|
| - replacements.ClearRef();
|
| - GURL url_without_query = url.ReplaceComponents(replacements);
|
| - return sensitive_chrome_url ||
|
| - extension_urls::IsWebstoreUpdateUrl(url_without_query) ||
|
| - extension_urls::IsBlacklistUpdateUrl(url);
|
| + return sensitive_chrome_url || extension_urls::IsWebstoreUpdateUrl(url) ||
|
| + extension_urls::IsBlacklistUpdateUrl(url);
|
| }
|
|
|
| -// Returns true if the scheme is one we want to allow extensions to have access
|
| -// to. Extensions still need specific permissions for a given URL, which is
|
| -// covered by CanExtensionAccessURL.
|
| -bool HasWebRequestScheme(const GURL& url) {
|
| - return (url.SchemeIs(url::kAboutScheme) || url.SchemeIs(url::kFileScheme) ||
|
| - url.SchemeIs(url::kFileSystemScheme) ||
|
| - url.SchemeIs(url::kFtpScheme) || url.SchemeIs(url::kHttpScheme) ||
|
| - url.SchemeIs(url::kHttpsScheme) ||
|
| - url.SchemeIs(extensions::kExtensionScheme));
|
| -}
|
| -
|
| -} // namespace
|
| -
|
| // static
|
| bool WebRequestPermissions::HideRequest(
|
| const extensions::InfoMap* extension_info_map,
|
|
|