-
Notifications
You must be signed in to change notification settings - Fork 870
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Extensions protected urls 4928 #2779
Conversation
if (IsRestrictedUrl(document_url, error)) | ||
return PageAccess::kDenied; | ||
|
||
+ if (IsBraveRestrictedUrl(document_url, extension_id_, location_, error)) { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
per dm this patch can be removed by using an ExtensionRegistryObserver to add the withheld patterns in either OnExtensionLoaded
or OnExtensionReady
. At that point we can check extensions::PermissionsData::CanExecuteScriptEverywhere
for the extension and decide whether or not to add it and no patch will be necessary
patches/extensions-browser-api-web_request-web_request_permissions.cc.patch
Outdated
Show resolved
Hide resolved
e8b04d2
to
a28c1ff
Compare
a28c1ff
to
a4e19bd
Compare
a4e19bd
to
802d463
Compare
802d463
to
4105f86
Compare
Superseded by #2946 |
Draft PR to fix brave/brave-browser#4928.
@bridiver Do you think an override is the best way to patch this?
Submitter Checklist:
npm run lint
)git rebase master
(if needed).git rebase -i
to squash commits (if needed).Test Plan:
The webRequest hack can manually tested using https://github.com/fmarier/webrequest-demo and the contentScript one using https://github.com/fmarier/contentscript-demo.
Reviewer Checklist:
After-merge Checklist:
changes has landed on.