[Extensions] Rename RuntimeBlockedHosts to PolicyBlockedHosts
Enterprise policy allows for blocking extension access to a set of
hosts (defined by URLPatterns). In the code, these are referred to
frequently as RuntimeBlockedHosts; however, this is confusing with
the RuntimeHostPermissions feature. Instead, name the enterprise
policy-restricted hosts PolicyBlockedHosts to avoid ambiguity.
Leave the string entry in the policy the same for backwards
compatibility.
Bug: None
Change-Id: Icfa455e2912e3c05da58f0a0b0b8e53395d4e103
Reviewed-on: https://chromium-review.googlesource.com/1060526
Commit-Queue: Devlin <[email protected]>
Reviewed-by: Karan Bhatia <[email protected]>
Cr-Commit-Position: refs/heads/master@{#559160}
diff --git a/chrome/browser/extensions/api/web_request/web_request_apitest.cc b/chrome/browser/extensions/api/web_request/web_request_apitest.cc
index 245fcde..28eaeff 100644
--- a/chrome/browser/extensions/api/web_request/web_request_apitest.cc
+++ b/chrome/browser/extensions/api/web_request/web_request_apitest.cc
@@ -1594,7 +1594,7 @@
// means that the request to example.com will be seen by the extension.
{
ExtensionManagementPolicyUpdater pref(&policy_provider_);
- pref.AddRuntimeBlockedHost("*", "*://notexample.com");
+ pref.AddPolicyBlockedHost("*", "*://notexample.com");
}
ASSERT_TRUE(StartEmbeddedTestServer());
@@ -1649,7 +1649,7 @@
// will not be seen by the extension.
{
ExtensionManagementPolicyUpdater pref(&policy_provider_);
- pref.AddRuntimeBlockedHost("*", "*://" + example_com);
+ pref.AddPolicyBlockedHost("*", "*://" + example_com);
}
// Wait until all remote Javascript files have been pulled down.
@@ -1675,7 +1675,7 @@
{
ExtensionManagementPolicyUpdater pref(&policy_provider_);
- pref.AddRuntimeBlockedHost("*", "*://" + protected_domain);
+ pref.AddPolicyBlockedHost("*", "*://" + protected_domain);
}
ASSERT_TRUE(StartEmbeddedTestServer());
@@ -1731,7 +1731,7 @@
{
ExtensionManagementPolicyUpdater pref(&policy_provider_);
- pref.AddRuntimeBlockedHost("*", "*://" + protected_domain);
+ pref.AddPolicyBlockedHost("*", "*://" + protected_domain);
}
ASSERT_TRUE(StartEmbeddedTestServer());
diff --git a/chrome/browser/extensions/content_script_apitest.cc b/chrome/browser/extensions/content_script_apitest.cc
index 7af0f6e..6139066 100644
--- a/chrome/browser/extensions/content_script_apitest.cc
+++ b/chrome/browser/extensions/content_script_apitest.cc
@@ -402,7 +402,7 @@
// Set enterprise policy to block injection to policy specified host.
{
ExtensionManagementPolicyUpdater pref(&policy_provider_);
- pref.AddRuntimeBlockedHost("*", "*://example.com");
+ pref.AddPolicyBlockedHost("*", "*://example.com");
}
ASSERT_TRUE(StartEmbeddedTestServer());
ASSERT_TRUE(RunExtensionTest("content_scripts/policy")) << message_;
@@ -414,7 +414,7 @@
// Set enterprise policy to block injection to policy specified hosts.
{
ExtensionManagementPolicyUpdater pref(&policy_provider_);
- pref.AddRuntimeBlockedHost("*", "*://example.*");
+ pref.AddPolicyBlockedHost("*", "*://example.*");
}
ASSERT_TRUE(StartEmbeddedTestServer());
ASSERT_TRUE(RunExtensionTest("content_scripts/policy")) << message_;
@@ -441,7 +441,7 @@
// specified host.
{
ExtensionManagementPolicyUpdater pref(&policy_provider_);
- pref.AddRuntimeBlockedHost(extension_id, "*://example.com");
+ pref.AddPolicyBlockedHost(extension_id, "*://example.com");
}
// Some policy updating operations are performed asynchronuosly. Wait for them
// to complete before installing extension.
diff --git a/chrome/browser/extensions/extension_management.cc b/chrome/browser/extensions/extension_management.cc
index bc6fe02..eec107b 100644
--- a/chrome/browser/extensions/extension_management.cc
+++ b/chrome/browser/extensions/extension_management.cc
@@ -196,43 +196,41 @@
return default_settings_->blocked_permissions;
}
-const URLPatternSet& ExtensionManagement::GetDefaultRuntimeBlockedHosts()
- const {
- return default_settings_->runtime_blocked_hosts;
+const URLPatternSet& ExtensionManagement::GetDefaultPolicyBlockedHosts() const {
+ return default_settings_->policy_blocked_hosts;
}
-const URLPatternSet& ExtensionManagement::GetDefaultRuntimeAllowedHosts()
- const {
- return default_settings_->runtime_allowed_hosts;
+const URLPatternSet& ExtensionManagement::GetDefaultPolicyAllowedHosts() const {
+ return default_settings_->policy_allowed_hosts;
}
-const URLPatternSet& ExtensionManagement::GetRuntimeBlockedHosts(
+const URLPatternSet& ExtensionManagement::GetPolicyBlockedHosts(
const Extension* extension) const {
auto iter_id = settings_by_id_.find(extension->id());
if (iter_id != settings_by_id_.end())
- return iter_id->second->runtime_blocked_hosts;
- return default_settings_->runtime_blocked_hosts;
+ return iter_id->second->policy_blocked_hosts;
+ return default_settings_->policy_blocked_hosts;
}
-const URLPatternSet& ExtensionManagement::GetRuntimeAllowedHosts(
+const URLPatternSet& ExtensionManagement::GetPolicyAllowedHosts(
const Extension* extension) const {
auto iter_id = settings_by_id_.find(extension->id());
if (iter_id != settings_by_id_.end())
- return iter_id->second->runtime_allowed_hosts;
- return default_settings_->runtime_allowed_hosts;
+ return iter_id->second->policy_allowed_hosts;
+ return default_settings_->policy_allowed_hosts;
}
-bool ExtensionManagement::UsesDefaultRuntimeHostRestrictions(
+bool ExtensionManagement::UsesDefaultPolicyHostRestrictions(
const Extension* extension) const {
return settings_by_id_.find(extension->id()) == settings_by_id_.end();
}
-bool ExtensionManagement::IsRuntimeBlockedHost(const Extension* extension,
- const GURL& url) const {
+bool ExtensionManagement::IsPolicyBlockedHost(const Extension* extension,
+ const GURL& url) const {
auto iter_id = settings_by_id_.find(extension->id());
if (iter_id != settings_by_id_.end())
- return iter_id->second->runtime_blocked_hosts.MatchesURL(url);
- return default_settings_->runtime_blocked_hosts.MatchesURL(url);
+ return iter_id->second->policy_blocked_hosts.MatchesURL(url);
+ return default_settings_->policy_blocked_hosts.MatchesURL(url);
}
std::unique_ptr<const PermissionSet> ExtensionManagement::GetBlockedPermissions(
diff --git a/chrome/browser/extensions/extension_management.h b/chrome/browser/extensions/extension_management.h
index d7ffea9..e1899f5 100644
--- a/chrome/browser/extensions/extension_management.h
+++ b/chrome/browser/extensions/extension_management.h
@@ -115,32 +115,32 @@
APIPermissionSet GetBlockedAPIPermissions(const Extension* extension) const;
// Returns the list of hosts blocked by policy for |extension|.
- const URLPatternSet& GetRuntimeBlockedHosts(const Extension* extension) const;
+ const URLPatternSet& GetPolicyBlockedHosts(const Extension* extension) const;
- // Returns the hosts exempted by policy from the RuntimeBlockedHosts for
+ // Returns the hosts exempted by policy from the PolicyBlockedHosts for
// |extension|.
- const URLPatternSet& GetRuntimeAllowedHosts(const Extension* extension) const;
+ const URLPatternSet& GetPolicyAllowedHosts(const Extension* extension) const;
// Returns the list of hosts blocked by policy for Default scope. This can be
- // overridden by an invividual scope which is queried via
- // GetRuntimeBlockedHosts.
- const URLPatternSet& GetDefaultRuntimeBlockedHosts() const;
+ // overridden by an individual scope which is queried via
+ // GetPolicyBlockedHosts.
+ const URLPatternSet& GetDefaultPolicyBlockedHosts() const;
- // Returns the hosts exempted by policy from RuntimeBlockedHosts for
+ // Returns the hosts exempted by policy from PolicyBlockedHosts for
// the default scope. This can be overridden by an individual scope which is
- // queries via GetRuntimeAllowedHosts. This should only be used to
+ // queries via GetPolicyAllowedHosts. This should only be used to
// initialize a new renderer.
- const URLPatternSet& GetDefaultRuntimeAllowedHosts() const;
+ const URLPatternSet& GetDefaultPolicyAllowedHosts() const;
// Checks if an |extension| has its own runtime_blocked_hosts or
// runtime_allowed_hosts defined in the individual scope of the
// ExtensionSettings policy.
// Returns false if an individual scoped setting isn't defined.
- bool UsesDefaultRuntimeHostRestrictions(const Extension* extension) const;
+ bool UsesDefaultPolicyHostRestrictions(const Extension* extension) const;
// Checks if a URL is on the blocked host permissions list for a specific
// extension.
- bool IsRuntimeBlockedHost(const Extension* extension, const GURL& url) const;
+ bool IsPolicyBlockedHost(const Extension* extension, const GURL& url) const;
// Returns blocked permission set for |extension|.
std::unique_ptr<const PermissionSet> GetBlockedPermissions(
diff --git a/chrome/browser/extensions/extension_management_constants.cc b/chrome/browser/extensions/extension_management_constants.cc
index 1377308..46638ff 100644
--- a/chrome/browser/extensions/extension_management_constants.cc
+++ b/chrome/browser/extensions/extension_management_constants.cc
@@ -20,8 +20,8 @@
const char kBlockedPermissions[] = "blocked_permissions";
const char kAllowedPermissions[] = "allowed_permissions";
-const char kRuntimeBlockedHosts[] = "runtime_blocked_hosts";
-const char kRuntimeAllowedHosts[] = "runtime_allowed_hosts";
+const char kPolicyBlockedHosts[] = "runtime_blocked_hosts";
+const char kPolicyAllowedHosts[] = "runtime_allowed_hosts";
const size_t kMaxItemsURLPatternSet = 100;
const char kUpdateUrl[] = "update_url";
diff --git a/chrome/browser/extensions/extension_management_constants.h b/chrome/browser/extensions/extension_management_constants.h
index ae27652..421e6d2 100644
--- a/chrome/browser/extensions/extension_management_constants.h
+++ b/chrome/browser/extensions/extension_management_constants.h
@@ -25,8 +25,8 @@
extern const char kBlockedPermissions[];
extern const char kAllowedPermissions[];
-extern const char kRuntimeBlockedHosts[];
-extern const char kRuntimeAllowedHosts[];
+extern const char kPolicyBlockedHosts[];
+extern const char kPolicyAllowedHosts[];
extern const size_t kMaxItemsURLPatternSet;
extern const char kUpdateUrl[];
diff --git a/chrome/browser/extensions/extension_management_internal.cc b/chrome/browser/extensions/extension_management_internal.cc
index 3a1e4211f..df1030d0 100644
--- a/chrome/browser/extensions/extension_management_internal.cc
+++ b/chrome/browser/extensions/extension_management_internal.cc
@@ -149,12 +149,12 @@
return true;
};
- if (!parse_url_pattern_set(dict, schema_constants::kRuntimeBlockedHosts,
- &runtime_blocked_hosts))
+ if (!parse_url_pattern_set(dict, schema_constants::kPolicyBlockedHosts,
+ &policy_blocked_hosts))
return false;
- if (!parse_url_pattern_set(dict, schema_constants::kRuntimeAllowedHosts,
- &runtime_allowed_hosts))
+ if (!parse_url_pattern_set(dict, schema_constants::kPolicyAllowedHosts,
+ &policy_allowed_hosts))
return false;
// Parses the minimum version settings.
@@ -189,8 +189,8 @@
installation_mode = ExtensionManagement::INSTALLATION_ALLOWED;
update_url.clear();
blocked_permissions.clear();
- runtime_blocked_hosts.ClearPatterns();
- runtime_allowed_hosts.ClearPatterns();
+ policy_blocked_hosts.ClearPatterns();
+ policy_allowed_hosts.ClearPatterns();
blocked_install_message.clear();
}
diff --git a/chrome/browser/extensions/extension_management_internal.h b/chrome/browser/extensions/extension_management_internal.h
index 411705f..4dafdb3a 100644
--- a/chrome/browser/extensions/extension_management_internal.h
+++ b/chrome/browser/extensions/extension_management_internal.h
@@ -92,34 +92,34 @@
// This setting will provide a list of hosts that are blocked for each
// extension at runtime. That is, if an extension attempts to use an API
- // call which requires a host permission specified in runtime_blocked_hosts
+ // call which requires a host permission specified in policy_blocked_hosts
// it will fail no matter which host permissions are declared in the
// extension manifest. This setting will NOT merge from the default settings.
// Either the default settings will be applied, or an extension specific
// setting.
- // If a URL is specified in the runtime_allowed_hosts, and in the
- // runtime_blocked_hosts, the runtime_allowed_hosts wins and the call will be
+ // If a URL is specified in the policy_allowed_hosts, and in the
+ // policy_blocked_hosts, the policy_allowed_hosts wins and the call will be
// allowed.
// This setting is only supported per-extensions or default
// (per-update-url not supported)
- URLPatternSet runtime_blocked_hosts;
+ URLPatternSet policy_blocked_hosts;
// This setting will provide a list of hosts that are exempted from the
- // runtime_blocked_hosts setting and may be used at runtime. That is,
+ // policy_blocked_hosts setting and may be used at runtime. That is,
// if an extension attempts to use an API call which requires a host
- // permission that was blocked using runtime_blocked_hosts it will
+ // permission that was blocked using policy_blocked_hosts it will
// fail unless also declared here.
- // A generic pattern may be declared in runtime_blocked_hosts and a
+ // A generic pattern may be declared in policy_blocked_hosts and a
// more specific pattern declared here. For example, if we block
- // "*://*.example.com/*" with runtime_blocked_hosts we can then
- // allow "http://good.example.com/*" in runtime_allowed_hosts.
+ // "*://*.example.com/*" with policy_blocked_hosts we can then
+ // allow "http://good.example.com/*" in policy_allowed_hosts.
// This setting will NOT merge from the default settings. Either the
// default settings will be applied, or an extension specific setting.
- // If a URL is specified in runtime_blocked_hosts, and in
- // runtime_allowed_hosts, the allowed list wins.
+ // If a URL is specified in policy_blocked_hosts, and in
+ // policy_allowed_hosts, the allowed list wins.
// This setting is only supported per-extensions or default
// (per-update-url not supported)
- URLPatternSet runtime_allowed_hosts;
+ URLPatternSet policy_allowed_hosts;
// Minimum version required for an extensions, applies to per-extension
// settings only. Extension (with specified extension ID) with version older
diff --git a/chrome/browser/extensions/extension_management_test_util.cc b/chrome/browser/extensions/extension_management_test_util.cc
index a4dca0f..21b667b 100644
--- a/chrome/browser/extensions/extension_management_test_util.cc
+++ b/chrome/browser/extensions/extension_management_test_util.cc
@@ -172,30 +172,30 @@
// Helper functions for 'runtime_blocked_hosts' manipulation ------------------
-void ExtensionManagementPrefUpdaterBase::UnsetRuntimeBlockedHosts(
+void ExtensionManagementPrefUpdaterBase::UnsetPolicyBlockedHosts(
const std::string& prefix) {
DCHECK(prefix == schema::kWildcard || crx_file::id_util::IdIsValid(prefix));
- pref_->Remove(make_path(prefix, schema::kRuntimeBlockedHosts), nullptr);
+ pref_->Remove(make_path(prefix, schema::kPolicyBlockedHosts), nullptr);
}
-void ExtensionManagementPrefUpdaterBase::ClearRuntimeBlockedHosts(
+void ExtensionManagementPrefUpdaterBase::ClearPolicyBlockedHosts(
const std::string& prefix) {
DCHECK(prefix == schema::kWildcard || crx_file::id_util::IdIsValid(prefix));
- ClearList(make_path(prefix, schema::kRuntimeBlockedHosts));
+ ClearList(make_path(prefix, schema::kPolicyBlockedHosts));
}
-void ExtensionManagementPrefUpdaterBase::AddRuntimeBlockedHost(
+void ExtensionManagementPrefUpdaterBase::AddPolicyBlockedHost(
const std::string& prefix,
const std::string& host) {
DCHECK(prefix == schema::kWildcard || crx_file::id_util::IdIsValid(prefix));
- AddStringToList(make_path(prefix, schema::kRuntimeBlockedHosts), host);
+ AddStringToList(make_path(prefix, schema::kPolicyBlockedHosts), host);
}
-void ExtensionManagementPrefUpdaterBase::RemoveRuntimeBlockedHost(
+void ExtensionManagementPrefUpdaterBase::RemovePolicyBlockedHost(
const std::string& prefix,
const std::string& host) {
DCHECK(prefix == schema::kWildcard || crx_file::id_util::IdIsValid(prefix));
- RemoveStringFromList(make_path(prefix, schema::kRuntimeBlockedHosts), host);
+ RemoveStringFromList(make_path(prefix, schema::kPolicyBlockedHosts), host);
}
// Helper functions for 'allowed_permissions' manipulation ---------------------
diff --git a/chrome/browser/extensions/extension_management_test_util.h b/chrome/browser/extensions/extension_management_test_util.h
index e6f8dfd2..dd05cc1 100644
--- a/chrome/browser/extensions/extension_management_test_util.h
+++ b/chrome/browser/extensions/extension_management_test_util.h
@@ -68,12 +68,11 @@
// Helper functions for 'runtime_blocked_hosts' manipulation. |prefix| can be
// kWildCard or a valid extension ID.
- void UnsetRuntimeBlockedHosts(const std::string& prefix);
- void ClearRuntimeBlockedHosts(const std::string& prefix);
- void AddRuntimeBlockedHost(const std::string& prefix,
- const std::string& host);
- void RemoveRuntimeBlockedHost(const std::string& prefix,
- const std::string& host);
+ void UnsetPolicyBlockedHosts(const std::string& prefix);
+ void ClearPolicyBlockedHosts(const std::string& prefix);
+ void AddPolicyBlockedHost(const std::string& prefix, const std::string& host);
+ void RemovePolicyBlockedHost(const std::string& prefix,
+ const std::string& host);
// Helper functions for 'allowed_permissions' manipulation. |id| must be a
// valid extension ID.
diff --git a/chrome/browser/extensions/extension_management_unittest.cc b/chrome/browser/extensions/extension_management_unittest.cc
index d0bdc45..14eb5d9 100644
--- a/chrome/browser/extensions/extension_management_unittest.cc
+++ b/chrome/browser/extensions/extension_management_unittest.cc
@@ -185,12 +185,12 @@
return extension_management_->GetInstallationMode(extension.get());
}
- // Wrapper of ExtensionManagement::GetRuntimeBlockedHosts, |id| is used
+ // Wrapper of ExtensionManagement::GetPolicyBlockedHosts, |id| is used
// to construct an Extension for testing.
- URLPatternSet GetRuntimeBlockedHosts(const std::string& id) {
+ URLPatternSet GetPolicyBlockedHosts(const std::string& id) {
scoped_refptr<const Extension> extension =
CreateExtension(Manifest::UNPACKED, "0.1", id, kNonExistingUpdateUrl);
- return extension_management_->GetRuntimeBlockedHosts(extension.get());
+ return extension_management_->GetPolicyBlockedHosts(extension.get());
}
// Wrapper of ExtensionManagement::BlockedInstallMessage, |id| is used
@@ -454,10 +454,10 @@
ExtensionManagement::INSTALLATION_BLOCKED);
EXPECT_EQ(GetInstallationModeByUpdateUrl(kExampleUpdateUrl),
ExtensionManagement::INSTALLATION_ALLOWED);
- EXPECT_TRUE(GetRuntimeBlockedHosts(kTargetExtension).is_empty());
- EXPECT_TRUE(GetRuntimeBlockedHosts(kTargetExtension4)
+ EXPECT_TRUE(GetPolicyBlockedHosts(kTargetExtension).is_empty());
+ EXPECT_TRUE(GetPolicyBlockedHosts(kTargetExtension4)
.MatchesURL(GURL("http://test.foo.com/test")));
- EXPECT_TRUE(GetRuntimeBlockedHosts(kTargetExtension4)
+ EXPECT_TRUE(GetPolicyBlockedHosts(kTargetExtension4)
.MatchesURL(GURL("https://bar.org/test")));
EXPECT_TRUE(GetBlockedInstallMessage(kTargetExtension).empty());
EXPECT_EQ("Custom Error Extension4",
@@ -471,7 +471,7 @@
EXPECT_EQ(allowed_sites.size(), 1u);
EXPECT_TRUE(allowed_sites.MatchesURL(GURL("http://foo.com/entry")));
EXPECT_FALSE(allowed_sites.MatchesURL(GURL("http://bar.com/entry")));
- EXPECT_TRUE(GetRuntimeBlockedHosts(kNonExistingExtension)
+ EXPECT_TRUE(GetPolicyBlockedHosts(kNonExistingExtension)
.MatchesURL(GURL("http://example.com/default")));
EXPECT_TRUE(ReadGlobalSettings()->has_restricted_allowed_types);
diff --git a/chrome/browser/extensions/extension_service.cc b/chrome/browser/extensions/extension_service.cc
index de88ce5..30e3aa4 100644
--- a/chrome/browser/extensions/extension_service.cc
+++ b/chrome/browser/extensions/extension_service.cc
@@ -982,18 +982,18 @@
extensions::ExtensionManagement* management =
extensions::ExtensionManagementFactory::GetForBrowserContext(profile());
extensions::PermissionsUpdater(profile()).SetDefaultPolicyHostRestrictions(
- management->GetDefaultRuntimeBlockedHosts(),
- management->GetDefaultRuntimeAllowedHosts());
+ management->GetDefaultPolicyBlockedHosts(),
+ management->GetDefaultPolicyAllowedHosts());
for (const auto& extension : registry_->enabled_extensions()) {
bool uses_default =
- management->UsesDefaultRuntimeHostRestrictions(extension.get());
+ management->UsesDefaultPolicyHostRestrictions(extension.get());
if (uses_default) {
extensions::PermissionsUpdater(profile()).SetUsesDefaultHostRestrictions(
extension.get());
} else {
extensions::PermissionsUpdater(profile()).SetPolicyHostRestrictions(
- extension.get(), management->GetRuntimeBlockedHosts(extension.get()),
- management->GetRuntimeAllowedHosts(extension.get()));
+ extension.get(), management->GetPolicyBlockedHosts(extension.get()),
+ management->GetPolicyAllowedHosts(extension.get()));
}
}
diff --git a/chrome/browser/extensions/permissions_updater.cc b/chrome/browser/extensions/permissions_updater.cc
index 42705ea..6eaf151b9 100644
--- a/chrome/browser/extensions/permissions_updater.cc
+++ b/chrome/browser/extensions/permissions_updater.cc
@@ -256,10 +256,10 @@
// Apply per-extension policy if set.
ExtensionManagement* management =
ExtensionManagementFactory::GetForBrowserContext(browser_context_);
- if (!management->UsesDefaultRuntimeHostRestrictions(extension)) {
+ if (!management->UsesDefaultPolicyHostRestrictions(extension)) {
SetPolicyHostRestrictions(extension,
- management->GetRuntimeBlockedHosts(extension),
- management->GetRuntimeAllowedHosts(extension));
+ management->GetPolicyBlockedHosts(extension),
+ management->GetPolicyAllowedHosts(extension));
}
}
diff --git a/chrome/browser/extensions/policy_handlers.cc b/chrome/browser/extensions/policy_handlers.cc
index 6050a47..4fb60d0 100644
--- a/chrome/browser/extensions/policy_handlers.cc
+++ b/chrome/browser/extensions/policy_handlers.cc
@@ -293,8 +293,8 @@
}
}
// Host keys that don't support user defined paths.
- const char* host_keys[] = {schema_constants::kRuntimeBlockedHosts,
- schema_constants::kRuntimeAllowedHosts};
+ const char* host_keys[] = {schema_constants::kPolicyBlockedHosts,
+ schema_constants::kPolicyAllowedHosts};
const int extension_scheme_mask =
URLPattern::GetValidSchemeMaskForExtensions();
for (const char* key : host_keys) {
diff --git a/extensions/browser/api/web_request/web_request_permissions.cc b/extensions/browser/api/web_request/web_request_permissions.cc
index 025e8e6..aad89d2 100644
--- a/extensions/browser/api/web_request/web_request_permissions.cc
+++ b/extensions/browser/api/web_request/web_request_permissions.cc
@@ -249,7 +249,7 @@
// Prevent viewing / modifying requests initiated by a host protected by
// policy.
if (initiator &&
- extension->permissions_data()->IsRuntimeBlockedHost(initiator->GetURL()))
+ extension->permissions_data()->IsPolicyBlockedHost(initiator->GetURL()))
return PermissionsData::PageAccess::kDenied;
// When we are in a Public Session, allow all URLs for webRequests initiated
diff --git a/extensions/common/permissions/permissions_data.cc b/extensions/common/permissions/permissions_data.cc
index 995ca60..7c710a49 100644
--- a/extensions/common/permissions/permissions_data.cc
+++ b/extensions/common/permissions/permissions_data.cc
@@ -31,7 +31,7 @@
PermissionsData::PolicyDelegate* g_policy_delegate = nullptr;
-struct DefaultRuntimePolicy {
+struct DefaultPolicyRestrictions {
URLPatternSet blocked_hosts;
URLPatternSet allowed_hosts;
};
@@ -39,8 +39,8 @@
// URLs an extension can't interact with. An extension can override these
// settings by declaring its own list of blocked and allowed hosts using
// policy_blocked_hosts and policy_allowed_hosts.
-base::LazyInstance<DefaultRuntimePolicy>::Leaky default_runtime_policy =
- LAZY_INSTANCE_INITIALIZER;
+base::LazyInstance<DefaultPolicyRestrictions>::Leaky
+ default_policy_restrictions = LAZY_INSTANCE_INITIALIZER;
class AutoLockOnValidThread {
public:
@@ -150,11 +150,11 @@
}
const URLPatternSet& PermissionsData::default_policy_blocked_hosts() {
- return default_runtime_policy.Get().blocked_hosts;
+ return default_policy_restrictions.Get().blocked_hosts;
}
const URLPatternSet& PermissionsData::default_policy_allowed_hosts() {
- return default_runtime_policy.Get().allowed_hosts;
+ return default_policy_restrictions.Get().allowed_hosts;
}
const URLPatternSet PermissionsData::policy_blocked_hosts() const {
@@ -195,11 +195,11 @@
}
void PermissionsData::SetPolicyHostRestrictions(
- const URLPatternSet& runtime_blocked_hosts,
- const URLPatternSet& runtime_allowed_hosts) const {
+ const URLPatternSet& policy_blocked_hosts,
+ const URLPatternSet& policy_allowed_hosts) const {
AutoLockOnValidThread lock(runtime_lock_, thread_checker_.get());
- policy_blocked_hosts_unsafe_ = runtime_blocked_hosts;
- policy_allowed_hosts_unsafe_ = runtime_allowed_hosts;
+ policy_blocked_hosts_unsafe_ = policy_blocked_hosts;
+ policy_allowed_hosts_unsafe_ = policy_allowed_hosts;
uses_default_policy_host_restrictions = false;
}
@@ -210,10 +210,12 @@
// static
void PermissionsData::SetDefaultPolicyHostRestrictions(
- const URLPatternSet& default_runtime_blocked_hosts,
- const URLPatternSet& default_runtime_allowed_hosts) {
- default_runtime_policy.Get().blocked_hosts = default_runtime_blocked_hosts;
- default_runtime_policy.Get().allowed_hosts = default_runtime_allowed_hosts;
+ const URLPatternSet& default_policy_blocked_hosts,
+ const URLPatternSet& default_policy_allowed_hosts) {
+ default_policy_restrictions.Get().blocked_hosts =
+ default_policy_blocked_hosts;
+ default_policy_restrictions.Get().allowed_hosts =
+ default_policy_allowed_hosts;
}
void PermissionsData::SetActivePermissions(
@@ -285,7 +287,7 @@
bool PermissionsData::HasHostPermission(const GURL& url) const {
base::AutoLock auto_lock(runtime_lock_);
return active_permissions_unsafe_->HasExplicitAccessToOrigin(url) &&
- !IsRuntimeBlockedHostUnsafe(url);
+ !IsPolicyBlockedHostUnsafe(url);
}
bool PermissionsData::HasEffectiveAccessToAllHosts() const {
@@ -437,7 +439,7 @@
return iter != tab_specific_permissions_.end() ? iter->second.get() : nullptr;
}
-bool PermissionsData::IsRuntimeBlockedHostUnsafe(const GURL& url) const {
+bool PermissionsData::IsPolicyBlockedHostUnsafe(const GURL& url) const {
runtime_lock_.AssertAcquired();
return PolicyBlockedHostsUnsafe().MatchesURL(url) &&
!PolicyAllowedHostsUnsafe().MatchesURL(url);
@@ -453,7 +455,7 @@
std::string* error) const {
runtime_lock_.AssertAcquired();
if (extension->location() != Manifest::COMPONENT &&
- extension->permissions_data()->IsRuntimeBlockedHostUnsafe(document_url)) {
+ extension->permissions_data()->IsPolicyBlockedHostUnsafe(document_url)) {
if (error)
*error = extension_misc::kPolicyBlockedScripting;
return PageAccess::kDenied;
diff --git a/extensions/common/permissions/permissions_data.h b/extensions/common/permissions/permissions_data.h
index 5be5fd2..a7b95f5 100644
--- a/extensions/common/permissions/permissions_data.h
+++ b/extensions/common/permissions/permissions_data.h
@@ -104,8 +104,8 @@
// of URL restrictions using SetDefaultPolicyHostRestrictions. This function
// overrides any default host restriction policy.
void SetPolicyHostRestrictions(
- const URLPatternSet& runtime_blocked_hosts,
- const URLPatternSet& runtime_allowed_hosts) const;
+ const URLPatternSet& policy_blocked_hosts,
+ const URLPatternSet& policy_allowed_hosts) const;
// Marks this extension as using default enterprise policy limiting
// which URLs extensions can interact with. A default policy can be set with
@@ -117,8 +117,8 @@
// extensions can interact with. This restriction can be overridden on a
// per-extension basis with SetPolicyHostRestrictions.
static void SetDefaultPolicyHostRestrictions(
- const URLPatternSet& default_runtime_blocked_hosts,
- const URLPatternSet& default_runtime_allowed_hosts);
+ const URLPatternSet& default_policy_blocked_hosts,
+ const URLPatternSet& default_policy_allowed_hosts);
// Sets the active permissions, leaving withheld the same.
void SetActivePermissions(std::unique_ptr<const PermissionSet> active) const;
@@ -269,9 +269,9 @@
const URLPatternSet policy_allowed_hosts() const;
// Check if a specific URL is blocked by policy from extension use at runtime.
- bool IsRuntimeBlockedHost(const GURL& url) const {
+ bool IsPolicyBlockedHost(const GURL& url) const {
base::AutoLock auto_lock(runtime_lock_);
- return IsRuntimeBlockedHostUnsafe(url);
+ return IsPolicyBlockedHostUnsafe(url);
}
#if defined(UNIT_TEST)
@@ -301,7 +301,7 @@
// Check if a specific URL is blocked by policy from extension use at runtime.
// You must acquire the runtime_lock_ before calling.
- bool IsRuntimeBlockedHostUnsafe(const GURL& url) const;
+ bool IsPolicyBlockedHostUnsafe(const GURL& url) const;
// Same as policy_blocked_hosts but instead returns a reference.
// You must acquire runtime_lock_ before calling this.