Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(81)

Unified Diff: extensions/common/extension_messages.cc

Issue 2499493004: Communicate ExtensionSettings policy to renderers (Closed)
Patch Set: Fix effective TLD wildcard bug, move to Leaky LazyInstance in PermissionsData, removed unnecessary … Created 3 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: extensions/common/extension_messages.cc
diff --git a/extensions/common/extension_messages.cc b/extensions/common/extension_messages.cc
index 34b15ed89879781b77bbc59636d0d0a2420a2d89..c646b57f5e3334fa57f2b5c80c6a7f87fc2e91ec 100644
--- a/extensions/common/extension_messages.cc
+++ b/extensions/common/extension_messages.cc
@@ -63,8 +63,14 @@ ExtensionMsg_Loaded_Params::ExtensionMsg_Loaded_Params(
location(extension->location()),
path(extension->path()),
active_permissions(extension->permissions_data()->active_permissions()),
- withheld_permissions(extension->permissions_data()
- ->withheld_permissions()),
+ withheld_permissions(
+ extension->permissions_data()->withheld_permissions()),
+ policy_blocked_hosts(
+ extension->permissions_data()->policy_blocked_hosts()),
+ policy_allowed_hosts(
+ extension->permissions_data()->policy_allowed_hosts()),
+ is_default_policy_blocked_allowed_hosts(
+ extension->permissions_data()->UsesDefaultPolicyHostRestrictions()),
id(extension->id()),
creation_flags(extension->creation_flags()) {
if (include_tab_permissions) {
@@ -91,6 +97,9 @@ scoped_refptr<Extension> ExtensionMsg_Loaded_Params::ConvertToExtension(
extension->permissions_data();
permissions_data->SetPermissions(active_permissions.ToPermissionSet(),
withheld_permissions.ToPermissionSet());
+ permissions_data->SetPolicyHostRestrictions(
+ policy_blocked_hosts, policy_allowed_hosts,
+ is_default_policy_blocked_allowed_hosts);
for (const auto& pair : tab_specific_permissions) {
permissions_data->UpdateTabSpecificPermissions(
pair.first, *pair.second.ToPermissionSet());
@@ -343,6 +352,9 @@ void ParamTraits<ExtensionMsg_PermissionSetStruct>::GetSize(
GetParamSize(s, p.manifest_permissions);
GetParamSize(s, p.explicit_hosts);
GetParamSize(s, p.scriptable_hosts);
+ GetParamSize(s, p.policy_blocked_hosts);
+ GetParamSize(s, p.policy_allowed_hosts);
+ GetParamSize(s, p.uses_default_policy_host_restrictions);
}
void ParamTraits<ExtensionMsg_PermissionSetStruct>::Write(base::Pickle* m,
@@ -351,6 +363,9 @@ void ParamTraits<ExtensionMsg_PermissionSetStruct>::Write(base::Pickle* m,
WriteParam(m, p.manifest_permissions);
WriteParam(m, p.explicit_hosts);
WriteParam(m, p.scriptable_hosts);
+ WriteParam(m, p.policy_blocked_hosts);
+ WriteParam(m, p.policy_allowed_hosts);
+ WriteParam(m, p.uses_default_policy_host_restrictions);
}
bool ParamTraits<ExtensionMsg_PermissionSetStruct>::Read(
@@ -360,7 +375,10 @@ bool ParamTraits<ExtensionMsg_PermissionSetStruct>::Read(
return ReadParam(m, iter, &p->apis) &&
ReadParam(m, iter, &p->manifest_permissions) &&
ReadParam(m, iter, &p->explicit_hosts) &&
- ReadParam(m, iter, &p->scriptable_hosts);
+ ReadParam(m, iter, &p->scriptable_hosts) &&
+ ReadParam(m, iter, &p->policy_blocked_hosts) &&
+ ReadParam(m, iter, &p->policy_allowed_hosts) &&
+ ReadParam(m, iter, &p->uses_default_policy_host_restrictions);
}
void ParamTraits<ExtensionMsg_PermissionSetStruct>::Log(const param_type& p,
@@ -369,6 +387,9 @@ void ParamTraits<ExtensionMsg_PermissionSetStruct>::Log(const param_type& p,
LogParam(p.manifest_permissions, l);
LogParam(p.explicit_hosts, l);
LogParam(p.scriptable_hosts, l);
+ LogParam(p.policy_blocked_hosts, l);
+ LogParam(p.policy_allowed_hosts, l);
+ LogParam(p.uses_default_policy_host_restrictions, l);
}
void ParamTraits<ExtensionMsg_Loaded_Params>::Write(base::Pickle* m,
@@ -381,6 +402,9 @@ void ParamTraits<ExtensionMsg_Loaded_Params>::Write(base::Pickle* m,
WriteParam(m, p.active_permissions);
WriteParam(m, p.withheld_permissions);
WriteParam(m, p.tab_specific_permissions);
+ WriteParam(m, p.policy_blocked_hosts);
+ WriteParam(m, p.policy_allowed_hosts);
+ WriteParam(m, p.is_default_policy_blocked_allowed_hosts);
}
bool ParamTraits<ExtensionMsg_Loaded_Params>::Read(const base::Pickle* m,
@@ -392,7 +416,10 @@ bool ParamTraits<ExtensionMsg_Loaded_Params>::Read(const base::Pickle* m,
ReadParam(m, iter, &p->creation_flags) && ReadParam(m, iter, &p->id) &&
ReadParam(m, iter, &p->active_permissions) &&
ReadParam(m, iter, &p->withheld_permissions) &&
- ReadParam(m, iter, &p->tab_specific_permissions);
+ ReadParam(m, iter, &p->tab_specific_permissions) &&
+ ReadParam(m, iter, &p->policy_blocked_hosts) &&
+ ReadParam(m, iter, &p->policy_allowed_hosts) &&
+ ReadParam(m, iter, &p->is_default_policy_blocked_allowed_hosts);
}
void ParamTraits<ExtensionMsg_Loaded_Params>::Log(const param_type& p,

Powered by Google App Engine
This is Rietveld 408576698