Chromium Code Reviews| Index: chrome/browser/chrome_content_browser_client.cc |
| diff --git a/chrome/browser/chrome_content_browser_client.cc b/chrome/browser/chrome_content_browser_client.cc |
| index c9edb552ce80079361bc4a3a87e28c4c00ca7968..cb82ef64dc8b8457c94cc91adc2a18299c9d4c9b 100644 |
| --- a/chrome/browser/chrome_content_browser_client.cc |
| +++ b/chrome/browser/chrome_content_browser_client.cc |
| @@ -277,6 +277,11 @@ namespace { |
| base::LazyInstance<std::string> g_io_thread_application_locale; |
| #if defined(ENABLE_PLUGINS) |
| +const char* const kPredefinedAllowedDevChannelOrigins[] = { |
| + "6EAED1924DB611B6EEF2A664BD077BE7EAD33B8F", // see crbug.com/234789 |
| + "4EB74897CB187C7633357C2FE832E0AD6A44883A" // see crbug.com/234789 |
|
dmichael (off chromium)
2014/06/13 21:07:26
I think you might want to reference 383937 instead
teravest
2014/06/13 21:13:00
Done.
|
| +}; |
| + |
| const char* const kPredefinedAllowedFileHandleOrigins[] = { |
| "6EAED1924DB611B6EEF2A664BD077BE7EAD33B8F", // see crbug.com/234789 |
| "4EB74897CB187C7633357C2FE832E0AD6A44883A" // see crbug.com/234789 |
| @@ -639,6 +644,8 @@ namespace chrome { |
| ChromeContentBrowserClient::ChromeContentBrowserClient() |
| : prerender_tracker_(NULL) { |
| #if defined(ENABLE_PLUGINS) |
| + for (size_t i = 0; i < arraysize(kPredefinedAllowedDevChannelOrigins); ++i) |
| + allowed_dev_channel_origins_.insert(kPredefinedAllowedDevChannelOrigins[i]); |
| for (size_t i = 0; i < arraysize(kPredefinedAllowedFileHandleOrigins); ++i) |
| allowed_file_handle_origins_.insert(kPredefinedAllowedFileHandleOrigins[i]); |
| for (size_t i = 0; i < arraysize(kPredefinedAllowedSocketOrigins); ++i) |
| @@ -2740,8 +2747,6 @@ bool ChromeContentBrowserClient::IsPluginAllowedToCallRequestOSFileHandle( |
| extension_set = extensions::ExtensionSystem::Get(profile)-> |
| extension_service()->extensions(); |
| } |
| - // TODO(teravest): Populate allowed_file_handle_origins_ when FileIO is moved |
| - // from the renderer to the browser. |
| return IsExtensionOrSharedModuleWhitelisted(url, extension_set, |
| allowed_file_handle_origins_) || |
| IsHostAllowedByCommandLine(url, extension_set, |
| @@ -2751,7 +2756,9 @@ bool ChromeContentBrowserClient::IsPluginAllowedToCallRequestOSFileHandle( |
| #endif |
| } |
| -bool ChromeContentBrowserClient::IsPluginAllowedToUseDevChannelAPIs() { |
| +bool ChromeContentBrowserClient::IsPluginAllowedToUseDevChannelAPIs( |
| + content::BrowserContext* browser_context, |
| + const GURL& url) { |
| #if defined(ENABLE_PLUGINS) |
| // Allow access for tests. |
| if (CommandLine::ForCurrentProcess()->HasSwitch( |
| @@ -2759,6 +2766,20 @@ bool ChromeContentBrowserClient::IsPluginAllowedToUseDevChannelAPIs() { |
| return true; |
| } |
| + Profile* profile = Profile::FromBrowserContext(browser_context); |
| + const extensions::ExtensionSet* extension_set = NULL; |
| + if (profile) { |
| + extension_set = extensions::ExtensionSystem::Get(profile)-> |
| + extension_service()->extensions(); |
| + } |
| + |
| + // Allow access for whitelisted applications. |
| + if (IsExtensionOrSharedModuleWhitelisted(url, |
| + extension_set, |
| + allowed_dev_channel_origins_)) { |
| + return true; |
| + } |
| + |
| chrome::VersionInfo::Channel channel = chrome::VersionInfo::GetChannel(); |
| // Allow dev channel APIs to be used on "Canary", "Dev", and "Unknown" |
| // releases of Chrome. Permitting "Unknown" allows these APIs to be used on |