Index: extensions/common/permissions/permissions_data.cc |
diff --git a/extensions/common/permissions/permissions_data.cc b/extensions/common/permissions/permissions_data.cc |
index 245040e6f542b703b342ffced51d3348ea3cc37b..96e82695a89ede3219f689bed002b7170ec8fbf4 100644 |
--- a/extensions/common/permissions/permissions_data.cc |
+++ b/extensions/common/permissions/permissions_data.cc |
@@ -280,7 +280,7 @@ URLPatternSet PermissionsData::GetEffectiveHostPermissions() const { |
bool PermissionsData::HasHostPermission(const GURL& url) const { |
base::AutoLock auto_lock(runtime_lock_); |
return active_permissions_unsafe_->HasExplicitAccessToOrigin(url) && |
- !IsRuntimeBlockedHost(url); |
+ !IsRuntimeBlockedHostUnsafe(url); |
} |
bool PermissionsData::HasEffectiveAccessToAllHosts() const { |
@@ -412,7 +412,7 @@ bool PermissionsData::HasTabSpecificPermissionToExecuteScript( |
return false; |
} |
-bool PermissionsData::IsRuntimeBlockedHost(const GURL& url) const { |
+bool PermissionsData::IsRuntimeBlockedHostUnsafe(const GURL& url) const { |
runtime_lock_.AssertAcquired(); |
return PolicyBlockedHostsUnsafe().MatchesURL(url) && |
!PolicyAllowedHostsUnsafe().MatchesURL(url); |
@@ -431,7 +431,7 @@ PermissionsData::AccessType PermissionsData::CanRunOnPage( |
return ACCESS_DENIED; |
if (extension->location() != Manifest::COMPONENT && |
- extension->permissions_data()->IsRuntimeBlockedHost(document_url)) { |
+ extension->permissions_data()->IsRuntimeBlockedHostUnsafe(document_url)) { |
if (error) |
*error = extension_misc::kPolicyBlockedScripting; |
return ACCESS_DENIED; |