summaryrefslogtreecommitdiff
path: root/chromium/content/browser/plugin_service_impl.cc
diff options
context:
space:
mode:
authorAllan Sandfeld Jensen <allan.jensen@qt.io>2020-10-29 10:46:47 +0100
committerAllan Sandfeld Jensen <allan.jensen@qt.io>2020-11-02 12:02:10 +0000
commit99677208ff3b216fdfec551fbe548da5520cd6fb (patch)
tree476a4865c10320249360e859d8fdd3e01833b03a /chromium/content/browser/plugin_service_impl.cc
parentc30a6232df03e1efbd9f3b226777b07e087a1122 (diff)
downloadqtwebengine-chromium-99677208ff3b216fdfec551fbe548da5520cd6fb.tar.gz
BASELINE: Update Chromium to 86.0.4240.124
Change-Id: Ide0ff151e94cd665ae6521a446995d34a9d1d644 Reviewed-by: Allan Sandfeld Jensen <allan.jensen@qt.io>
Diffstat (limited to 'chromium/content/browser/plugin_service_impl.cc')
-rw-r--r--chromium/content/browser/plugin_service_impl.cc11
1 files changed, 6 insertions, 5 deletions
diff --git a/chromium/content/browser/plugin_service_impl.cc b/chromium/content/browser/plugin_service_impl.cc
index 20035324c2a..e9cb48e03f1 100644
--- a/chromium/content/browser/plugin_service_impl.cc
+++ b/chromium/content/browser/plugin_service_impl.cc
@@ -208,7 +208,7 @@ PpapiPluginProcessHost* PluginServiceImpl::FindOrStartPpapiPluginProcess(
// https://www.chromium.org/flash-roadmap).
RenderProcessHostImpl::AddCorbExceptionForPlugin(render_process_id);
} else if (info->permissions & ppapi::PERMISSION_PDF) {
- // We want to limit ability to bypass |request_initiator_site_lock| to
+ // We want to limit ability to bypass |request_initiator_origin_lock| to
// trustworthy renderers. PDF plugin is okay, because it is always hosted
// by the PDF extension (mhjfbmdgcfjbbpaeojofohoefgiehjai) or
// chrome://print, both of which we assume are trustworthy (the extension
@@ -218,8 +218,9 @@ PpapiPluginProcessHost* PluginServiceImpl::FindOrStartPpapiPluginProcess(
// web-controlled content. This is a defense-in-depth for verifying that
// ShouldAllowPluginCreation called above is doing the right thing.
auto* policy = ChildProcessSecurityPolicyImpl::GetInstance();
- GURL renderer_lock = policy->GetOriginLock(render_process_id);
- CHECK(!renderer_lock.SchemeIsHTTPOrHTTPS());
+ ProcessLock renderer_lock = policy->GetProcessLock(render_process_id);
+ CHECK(!renderer_lock.matches_scheme(url::kHttpScheme) &&
+ !renderer_lock.matches_scheme(url::kHttpsScheme));
CHECK(embedder_origin.scheme() != url::kHttpScheme);
CHECK(embedder_origin.scheme() != url::kHttpsScheme);
CHECK(!embedder_origin.opaque());
@@ -389,14 +390,14 @@ base::string16 PluginServiceImpl::GetPluginDisplayNameByPath(
if (PluginService::GetInstance()->GetPluginInfoByPath(path, &info) &&
!info.name.empty()) {
plugin_name = info.name;
-#if defined(OS_MACOSX)
+#if defined(OS_MAC)
// Many plugins on the Mac have .plugin in the actual name, which looks
// terrible, so look for that and strip it off if present.
static const char kPluginExtension[] = ".plugin";
if (base::EndsWith(plugin_name, base::ASCIIToUTF16(kPluginExtension),
base::CompareCase::SENSITIVE))
plugin_name.erase(plugin_name.length() - strlen(kPluginExtension));
-#endif // defined(OS_MACOSX)
+#endif // defined(OS_MAC)
}
return plugin_name;
}