diff options
author | jamesr@chromium.org <jamesr@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2013-07-18 09:28:55 +0000 |
---|---|---|
committer | jamesr@chromium.org <jamesr@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2013-07-18 09:28:55 +0000 |
commit | be9915fbccfaab301759501d888579976427acfb (patch) | |
tree | c7072e00db4305cb6b65a33895dbd1dbb47e709a /chrome/common/extensions/extension_process_policy.cc | |
parent | acdaa9963d419b7b72bd8201857a23f29f626959 (diff) | |
download | chromium_src-be9915fbccfaab301759501d888579976427acfb.zip chromium_src-be9915fbccfaab301759501d888579976427acfb.tar.gz chromium_src-be9915fbccfaab301759501d888579976427acfb.tar.bz2 |
Remove ExtensionURLInfo, make security decisions in render process
When asking if an extension should have access to a given frame, we need to
consider the frame's URL and also if the frame is sandboxed. We check the latter
by asking if the frame's security origin is the unique origin. However, we can
only usefully do this in the render process when examining a frame. In the
browser process or other common code, there's no useful origin to use other than
one that duplicates information in the URL.
This does security checks in the render process before doing any URL-based
lookups and then uses URLs from that point on.
R=abarth, mpcomplete
BUG=259982,237267
Review URL: https://chromiumcodereview.appspot.com/16625012
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@212302 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'chrome/common/extensions/extension_process_policy.cc')
-rw-r--r-- | chrome/common/extensions/extension_process_policy.cc | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/chrome/common/extensions/extension_process_policy.cc b/chrome/common/extensions/extension_process_policy.cc index b38f397..cb938ee 100644 --- a/chrome/common/extensions/extension_process_policy.cc +++ b/chrome/common/extensions/extension_process_policy.cc @@ -11,7 +11,7 @@ namespace extensions { const extensions::Extension* GetNonBookmarkAppExtension( - const ExtensionSet& extensions, const ExtensionURLInfo& url) { + const ExtensionSet& extensions, const GURL& url) { // Exclude bookmark apps, which do not use the app process model. const extensions::Extension* extension = extensions.GetExtensionOrAppByURL(url); @@ -22,8 +22,8 @@ const extensions::Extension* GetNonBookmarkAppExtension( bool CrossesExtensionProcessBoundary( const ExtensionSet& extensions, - const ExtensionURLInfo& old_url, - const ExtensionURLInfo& new_url, + const GURL& old_url, + const GURL& new_url, bool should_consider_workaround) { const extensions::Extension* old_url_extension = GetNonBookmarkAppExtension( extensions, |