Index: chrome/common/chrome_content_client.cc |
diff --git a/chrome/common/chrome_content_client.cc b/chrome/common/chrome_content_client.cc |
index 88e6e7908aadbb28e0e8e00553e63d4934fb383e..4cf646b0e4ac2376c58466ba811aadd621171a02 100644 |
--- a/chrome/common/chrome_content_client.cc |
+++ b/chrome/common/chrome_content_client.cc |
@@ -555,31 +555,37 @@ void ChromeContentClient::AddContentDecryptionModules( |
// TODO(jrummell): Add External Clear Key CDM for testing, if it's available. |
} |
-static const url::SchemeWithType kChromeStandardURLSchemes[] = { |
- {extensions::kExtensionScheme, url::SCHEME_WITHOUT_PORT}, |
- {chrome::kChromeNativeScheme, url::SCHEME_WITHOUT_PORT}, |
- {chrome::kChromeSearchScheme, url::SCHEME_WITHOUT_PORT}, |
- {dom_distiller::kDomDistillerScheme, url::SCHEME_WITHOUT_PORT}, |
+static const char* const kChromeStandardURLSchemes[] = { |
+ extensions::kExtensionScheme, |
+ chrome::kChromeNativeScheme, |
+ chrome::kChromeSearchScheme, |
+ dom_distiller::kDomDistillerScheme, |
#if defined(OS_CHROMEOS) |
- {chrome::kCrosScheme, url::SCHEME_WITHOUT_PORT}, |
+ chrome::kCrosScheme, |
#endif |
}; |
-void ChromeContentClient::AddAdditionalSchemes( |
- std::vector<url::SchemeWithType>* standard_schemes, |
- std::vector<url::SchemeWithType>* referrer_schemes, |
- std::vector<std::string>* savable_schemes) { |
- for (const url::SchemeWithType& standard_scheme : kChromeStandardURLSchemes) |
- standard_schemes->push_back(standard_scheme); |
+void ChromeContentClient::AddAdditionalSchemes(Schemes* schemes) { |
+ for (auto& standard_scheme : kChromeStandardURLSchemes) |
+ schemes->standard_schemes.push_back(standard_scheme); |
#if defined(OS_ANDROID) |
- referrer_schemes->push_back( |
- {chrome::kAndroidAppScheme, url::SCHEME_WITHOUT_PORT}); |
+ schemes->referrer_schemes.push_back(chrome::kAndroidAppScheme); |
#endif |
- savable_schemes->push_back(extensions::kExtensionScheme); |
- savable_schemes->push_back(chrome::kChromeSearchScheme); |
- savable_schemes->push_back(dom_distiller::kDomDistillerScheme); |
+ schemes->savable_schemes.push_back(extensions::kExtensionScheme); |
+ schemes->savable_schemes.push_back(chrome::kChromeSearchScheme); |
+ schemes->savable_schemes.push_back(dom_distiller::kDomDistillerScheme); |
+ |
+ schemes->secure_schemes.push_back(chrome::kChromeSearchScheme); |
+ schemes->secure_schemes.push_back(content::kChromeUIScheme); |
+ schemes->secure_schemes.push_back(extensions::kExtensionScheme); |
+ schemes->secure_origins = GetSecureOriginWhitelist(); |
+ |
+#if BUILDFLAG(ENABLE_EXTENSIONS) |
+ if (extensions::feature_util::ExtensionServiceWorkersEnabled()) |
+ schemes->service_worker_schemes.push_back(extensions::kExtensionScheme); |
+#endif |
} |
std::string ChromeContentClient::GetProduct() const { |
@@ -639,23 +645,6 @@ bool ChromeContentClient::GetSandboxProfileForSandboxType( |
} |
#endif |
-void ChromeContentClient::AddSecureSchemesAndOrigins( |
- std::set<std::string>* schemes, |
- std::set<GURL>* origins) { |
- schemes->insert(chrome::kChromeSearchScheme); |
- schemes->insert(content::kChromeUIScheme); |
- schemes->insert(extensions::kExtensionScheme); |
- GetSecureOriginWhitelist(origins); |
-} |
- |
-void ChromeContentClient::AddServiceWorkerSchemes( |
- std::set<std::string>* schemes) { |
-#if BUILDFLAG(ENABLE_EXTENSIONS) |
- if (extensions::feature_util::ExtensionServiceWorkersEnabled()) |
- schemes->insert(extensions::kExtensionScheme); |
-#endif |
-} |
- |
bool ChromeContentClient::AllowScriptExtensionForServiceWorker( |
const GURL& script_url) { |
#if BUILDFLAG(ENABLE_EXTENSIONS) |