Index: chrome/browser/browsing_data_helper.cc |
diff --git a/chrome/browser/browsing_data_helper.cc b/chrome/browser/browsing_data_helper.cc |
deleted file mode 100644 |
index 8e586d8134ff5f6dee2bc602a31b4d41cd8069b2..0000000000000000000000000000000000000000 |
--- a/chrome/browser/browsing_data_helper.cc |
+++ /dev/null |
@@ -1,81 +0,0 @@ |
-// Copyright (c) 2012 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#include "chrome/browser/browsing_data_helper.h" |
- |
-#include "base/command_line.h" |
-#include "base/utf_string_conversions.h" |
-#include "chrome/browser/extensions/extension_special_storage_policy.h" |
-#include "chrome/common/chrome_switches.h" |
-#include "chrome/common/url_constants.h" |
-#include "content/public/browser/child_process_security_policy.h" |
-#include "googleurl/src/gurl.h" |
-#include "third_party/WebKit/Source/WebKit/chromium/public/platform/WebString.h" |
- |
-// Static |
-bool BrowsingDataHelper::IsWebScheme(const std::string& scheme) { |
- // Special-case `file://` scheme iff cookies and site data are enabled via |
- // the `--allow-file-cookies` CLI flag. |
- if (scheme == chrome::kFileScheme) { |
- return CommandLine::ForCurrentProcess()->HasSwitch( |
- switches::kEnableFileCookies); |
- |
- // Otherwise, all "web safe" schemes are valid, except `chrome-extension://` |
- // and `chrome-devtools://`. |
- } else { |
- content::ChildProcessSecurityPolicy* policy = |
- content::ChildProcessSecurityPolicy::GetInstance(); |
- return (policy->IsWebSafeScheme(scheme) && |
- !BrowsingDataHelper::IsExtensionScheme(scheme) && |
- scheme != chrome::kChromeDevToolsScheme); |
- } |
-} |
- |
-// Static |
-bool BrowsingDataHelper::IsWebScheme(const WebKit::WebString& scheme) { |
- return BrowsingDataHelper::IsWebScheme(UTF16ToUTF8(scheme)); |
-} |
- |
-// Static |
-bool BrowsingDataHelper::HasWebScheme(const GURL& origin) { |
- return BrowsingDataHelper::IsWebScheme(origin.scheme()); |
-} |
- |
-// Static |
-bool BrowsingDataHelper::IsExtensionScheme(const std::string& scheme) { |
- return scheme == chrome::kExtensionScheme; |
-} |
- |
-// Static |
-bool BrowsingDataHelper::IsExtensionScheme(const WebKit::WebString& scheme) { |
- return BrowsingDataHelper::IsExtensionScheme(UTF16ToUTF8(scheme)); |
-} |
- |
-// Static |
-bool BrowsingDataHelper::HasExtensionScheme(const GURL& origin) { |
- return BrowsingDataHelper::IsExtensionScheme(origin.scheme()); |
-} |
- |
-// Static |
-bool BrowsingDataHelper::DoesOriginMatchMask(const GURL& origin, |
- int origin_set_mask, ExtensionSpecialStoragePolicy* policy) { |
- // Packaged apps and extensions match iff EXTENSION. |
- if (BrowsingDataHelper::HasExtensionScheme(origin.GetOrigin()) && |
- origin_set_mask & EXTENSION) |
- return true; |
- |
- // If a websafe origin is unprotected, it matches iff UNPROTECTED_WEB. |
- if (!policy->IsStorageProtected(origin.GetOrigin()) && |
- BrowsingDataHelper::HasWebScheme(origin.GetOrigin()) && |
- origin_set_mask & UNPROTECTED_WEB) |
- return true; |
- |
- // Hosted applications (protected and websafe origins) iff PROTECTED_WEB. |
- if (policy->IsStorageProtected(origin.GetOrigin()) && |
- BrowsingDataHelper::HasWebScheme(origin.GetOrigin()) && |
- origin_set_mask & PROTECTED_WEB) |
- return true; |
- |
- return false; |
-} |