Skip to content

Commit e5450fa

Browse files
blueboxbluebox
bluebox
authored and
bluebox
committed
Merge branch 'master' of https://chromium.googlesource.com/chromium/src into master.lion
2 parents 6e95dbb + 2b8a8e3 commit e5450fa

27 files changed

+170
-299
lines changed

DEPS

+2-2
Original file line numberDiff line numberDiff line change
@@ -204,7 +204,7 @@ vars = {
204204
# Three lines of non-changing comments so that
205205
# the commit queue can handle CLs rolling Skia
206206
# and whatever else without interference from each other.
207-
'skia_revision': 'e9b6e2f2a995b49d6c531be4916844f0db28a64f',
207+
'skia_revision': '91113acfd1d607e4218a13f3c9152f7547cef900',
208208
# Three lines of non-changing comments so that
209209
# the commit queue can handle CLs rolling V8
210210
# and whatever else without interference from each other.
@@ -283,7 +283,7 @@ vars = {
283283
# Three lines of non-changing comments so that
284284
# the commit queue can handle CLs rolling devtools-frontend
285285
# and whatever else without interference from each other.
286-
'devtools_frontend_revision': '4773d6b482d3f1699ce420326a11fccb94809b9c',
286+
'devtools_frontend_revision': 'b417167d58fa0ced80f01ebd6576b40777a98d03',
287287
# Three lines of non-changing comments so that
288288
# the commit queue can handle CLs rolling libprotobuf-mutator
289289
# and whatever else without interference from each other.

chrome/browser/site_isolation/prefs_observer.cc

+3-2
Original file line numberDiff line numberDiff line change
@@ -40,14 +40,15 @@ void SiteIsolationPrefsObserver::OnChangeInIsolatedOriginsPref() {
4040
if (!site_isolation::SiteIsolationPolicy::IsEnterprisePolicyApplicable())
4141
return;
4242

43-
// Add isolated origins based on the policy. Note that the policy may only
43+
// Add isolated origins based on the policy. The added origins will only be
44+
// isolated in future browsing context groups. Note that the policy may only
4445
// *add* origins (e.g. if policy changes from isolating A,B,C to isolating
4546
// B,C,D origins then *all* of A,B,C,D will be isolated until the next Chrome
4647
// restart).
4748
std::string isolated_origins =
4849
pref_change_registrar_.prefs()->GetString(prefs::kIsolateOrigins);
4950
auto* policy = content::ChildProcessSecurityPolicy::GetInstance();
50-
policy->AddIsolatedOrigins(
51+
policy->AddFutureIsolatedOrigins(
5152
isolated_origins,
5253
content::ChildProcessSecurityPolicy::IsolatedOriginSource::POLICY,
5354
/* browser_context = */ nullptr);

components/site_isolation/site_isolation_policy.cc

+2-2
Original file line numberDiff line numberDiff line change
@@ -122,8 +122,8 @@ void SiteIsolationPolicy::ApplyPersistedIsolatedOrigins(
122122
auto* policy = content::ChildProcessSecurityPolicy::GetInstance();
123123
using IsolatedOriginSource =
124124
content::ChildProcessSecurityPolicy::IsolatedOriginSource;
125-
policy->AddIsolatedOrigins(origins, IsolatedOriginSource::USER_TRIGGERED,
126-
browser_context);
125+
policy->AddFutureIsolatedOrigins(
126+
origins, IsolatedOriginSource::USER_TRIGGERED, browser_context);
127127
}
128128

129129
UMA_HISTOGRAM_COUNTS_1000(

content/browser/child_process_security_policy_impl.cc

+7-6
Original file line numberDiff line numberDiff line change
@@ -1880,7 +1880,7 @@ bool ChildProcessSecurityPolicyImpl::CanSendMidiSysExMessage(int child_id) {
18801880
return state->second->can_send_midi_sysex();
18811881
}
18821882

1883-
void ChildProcessSecurityPolicyImpl::AddIsolatedOrigins(
1883+
void ChildProcessSecurityPolicyImpl::AddFutureIsolatedOrigins(
18841884
const std::vector<url::Origin>& origins_to_add,
18851885
IsolatedOriginSource source,
18861886
BrowserContext* browser_context) {
@@ -1891,19 +1891,19 @@ void ChildProcessSecurityPolicyImpl::AddIsolatedOrigins(
18911891
[](const url::Origin& o) -> IsolatedOriginPattern {
18921892
return IsolatedOriginPattern(o);
18931893
});
1894-
AddIsolatedOrigins(patterns, source, browser_context);
1894+
AddFutureIsolatedOrigins(patterns, source, browser_context);
18951895
}
18961896

1897-
void ChildProcessSecurityPolicyImpl::AddIsolatedOrigins(
1897+
void ChildProcessSecurityPolicyImpl::AddFutureIsolatedOrigins(
18981898
base::StringPiece origins_to_add,
18991899
IsolatedOriginSource source,
19001900
BrowserContext* browser_context) {
19011901
std::vector<IsolatedOriginPattern> patterns =
19021902
ParseIsolatedOrigins(origins_to_add);
1903-
AddIsolatedOrigins(patterns, source, browser_context);
1903+
AddFutureIsolatedOrigins(patterns, source, browser_context);
19041904
}
19051905

1906-
void ChildProcessSecurityPolicyImpl::AddIsolatedOrigins(
1906+
void ChildProcessSecurityPolicyImpl::AddFutureIsolatedOrigins(
19071907
const std::vector<IsolatedOriginPattern>& patterns,
19081908
IsolatedOriginSource source,
19091909
BrowserContext* browser_context) {
@@ -2442,7 +2442,8 @@ void ChildProcessSecurityPolicyImpl::AddIsolatedOriginForBrowsingInstance(
24422442
// Explicitly set `applies_to_future_browsing_instances` to false to only
24432443
// isolate `origin` within the provided BrowsingInstance, but not future
24442444
// ones. Note that it's possible for `origin` to also become isolated for
2445-
// future BrowsingInstances if AddIsolatedOrigins() is called for it later.
2445+
// future BrowsingInstances if AddFutureIsolatedOrigins() is called for it
2446+
// later.
24462447
AddIsolatedOriginInternal(
24472448
isolation_context.browser_or_resource_context().ToBrowserContext(),
24482449
origin, false /* applies_to_future_browsing_instances */,

content/browser/child_process_security_policy_impl.h

+16-12
Original file line numberDiff line numberDiff line change
@@ -240,7 +240,7 @@ class CONTENT_EXPORT ChildProcessSecurityPolicyImpl
240240
// This can only return false for processes locked to a particular origin,
241241
// which can happen for any origin when the --site-per-process flag is used,
242242
// or for isolated origins that require a dedicated process (see
243-
// AddIsolatedOrigins).
243+
// AddFutureIsolatedOrigins and AddIsolatedOriginForBrowsingInstance).
244244
bool CanAccessDataForOrigin(const url::Origin& origin);
245245

246246
private:
@@ -308,12 +308,14 @@ class CONTENT_EXPORT ChildProcessSecurityPolicyImpl
308308
bool HasWebUIBindings(int child_id) override;
309309
void GrantSendMidiSysExMessage(int child_id) override;
310310
bool CanAccessDataForOrigin(int child_id, const url::Origin& origin) override;
311-
void AddIsolatedOrigins(base::StringPiece origins_list,
312-
IsolatedOriginSource source,
313-
BrowserContext* browser_context = nullptr) override;
314-
void AddIsolatedOrigins(const std::vector<url::Origin>& origins,
315-
IsolatedOriginSource source,
316-
BrowserContext* browser_context = nullptr) override;
311+
void AddFutureIsolatedOrigins(
312+
base::StringPiece origins_list,
313+
IsolatedOriginSource source,
314+
BrowserContext* browser_context = nullptr) override;
315+
void AddFutureIsolatedOrigins(
316+
const std::vector<url::Origin>& origins,
317+
IsolatedOriginSource source,
318+
BrowserContext* browser_context = nullptr) override;
317319
bool IsGloballyIsolatedOriginForTesting(const url::Origin& origin) override;
318320
std::vector<url::Origin> GetIsolatedOrigins(
319321
base::Optional<IsolatedOriginSource> source = base::nullopt,
@@ -650,7 +652,8 @@ class CONTENT_EXPORT ChildProcessSecurityPolicyImpl
650652
FRIEND_TEST_ALL_PREFIXES(ChildProcessSecurityPolicyInProcessBrowserTest,
651653
NoLeak);
652654
FRIEND_TEST_ALL_PREFIXES(ChildProcessSecurityPolicyTest, FilePermissions);
653-
FRIEND_TEST_ALL_PREFIXES(ChildProcessSecurityPolicyTest, AddIsolatedOrigins);
655+
FRIEND_TEST_ALL_PREFIXES(ChildProcessSecurityPolicyTest,
656+
AddFutureIsolatedOrigins);
654657
FRIEND_TEST_ALL_PREFIXES(ChildProcessSecurityPolicyTest,
655658
DynamicIsolatedOrigins);
656659
FRIEND_TEST_ALL_PREFIXES(ChildProcessSecurityPolicyTest,
@@ -840,13 +843,14 @@ class CONTENT_EXPORT ChildProcessSecurityPolicyImpl
840843
// Convert a list of comma separated isolated origins in |pattern_list|,
841844
// specified either as wildcard origins, non-wildcard origins or a mix of the
842845
// two into IsolatedOriginPatterns, suitable for addition via
843-
// AddIsolatedOrigins().
846+
// AddFutureIsolatedOrigins().
844847
static std::vector<IsolatedOriginPattern> ParseIsolatedOrigins(
845848
base::StringPiece pattern_list);
846849

847-
void AddIsolatedOrigins(const std::vector<IsolatedOriginPattern>& patterns,
848-
IsolatedOriginSource source,
849-
BrowserContext* browser_context = nullptr);
850+
void AddFutureIsolatedOrigins(
851+
const std::vector<IsolatedOriginPattern>& patterns,
852+
IsolatedOriginSource source,
853+
BrowserContext* browser_context = nullptr);
850854

851855
// Internal helper used for adding a particular isolated origin. See
852856
// IsolatedOriginEntry for descriptions of various parameters.

0 commit comments

Comments
 (0)