summaryrefslogtreecommitdiffstats
path: root/chrome/common/extensions/extension_process_policy.cc
diff options
context:
space:
mode:
authorjamesr@chromium.org <jamesr@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2013-07-18 09:28:55 +0000
committerjamesr@chromium.org <jamesr@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2013-07-18 09:28:55 +0000
commitbe9915fbccfaab301759501d888579976427acfb (patch)
treec7072e00db4305cb6b65a33895dbd1dbb47e709a /chrome/common/extensions/extension_process_policy.cc
parentacdaa9963d419b7b72bd8201857a23f29f626959 (diff)
downloadchromium_src-be9915fbccfaab301759501d888579976427acfb.zip
chromium_src-be9915fbccfaab301759501d888579976427acfb.tar.gz
chromium_src-be9915fbccfaab301759501d888579976427acfb.tar.bz2
Remove ExtensionURLInfo, make security decisions in render process
When asking if an extension should have access to a given frame, we need to consider the frame's URL and also if the frame is sandboxed. We check the latter by asking if the frame's security origin is the unique origin. However, we can only usefully do this in the render process when examining a frame. In the browser process or other common code, there's no useful origin to use other than one that duplicates information in the URL. This does security checks in the render process before doing any URL-based lookups and then uses URLs from that point on. R=abarth, mpcomplete BUG=259982,237267 Review URL: https://chromiumcodereview.appspot.com/16625012 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@212302 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'chrome/common/extensions/extension_process_policy.cc')
-rw-r--r--chrome/common/extensions/extension_process_policy.cc6
1 files changed, 3 insertions, 3 deletions
diff --git a/chrome/common/extensions/extension_process_policy.cc b/chrome/common/extensions/extension_process_policy.cc
index b38f397..cb938ee 100644
--- a/chrome/common/extensions/extension_process_policy.cc
+++ b/chrome/common/extensions/extension_process_policy.cc
@@ -11,7 +11,7 @@
namespace extensions {
const extensions::Extension* GetNonBookmarkAppExtension(
- const ExtensionSet& extensions, const ExtensionURLInfo& url) {
+ const ExtensionSet& extensions, const GURL& url) {
// Exclude bookmark apps, which do not use the app process model.
const extensions::Extension* extension =
extensions.GetExtensionOrAppByURL(url);
@@ -22,8 +22,8 @@ const extensions::Extension* GetNonBookmarkAppExtension(
bool CrossesExtensionProcessBoundary(
const ExtensionSet& extensions,
- const ExtensionURLInfo& old_url,
- const ExtensionURLInfo& new_url,
+ const GURL& old_url,
+ const GURL& new_url,
bool should_consider_workaround) {
const extensions::Extension* old_url_extension = GetNonBookmarkAppExtension(
extensions,