Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(73)

Unified Diff: content/browser/worker_host/worker_process_host.cc

Issue 11308360: Merge 170159 (Closed) Base URL: svn://svn.chromium.org/chrome/branches/1312/src/
Patch Set: Created 8 years ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: content/browser/worker_host/worker_process_host.cc
===================================================================
--- content/browser/worker_host/worker_process_host.cc (revision 171066)
+++ content/browser/worker_host/worker_process_host.cc (working copy)
@@ -200,46 +200,6 @@
ChildProcessSecurityPolicyImpl::GetInstance()->AddWorker(
process_->GetData().id, render_process_id);
- if (!CommandLine::ForCurrentProcess()->HasSwitch(
- switches::kDisableFileSystem)) {
- // Grant most file permissions to this worker.
- // PLATFORM_FILE_TEMPORARY, PLATFORM_FILE_HIDDEN and
- // PLATFORM_FILE_DELETE_ON_CLOSE are not granted, because no existing API
- // requests them.
- // This is for the filesystem sandbox.
- ChildProcessSecurityPolicyImpl::GetInstance()->GrantPermissionsForFile(
- process_->GetData().id,
- partition_.filesystem_context()->sandbox_provider()->new_base_path(),
- base::PLATFORM_FILE_OPEN |
- base::PLATFORM_FILE_CREATE |
- base::PLATFORM_FILE_OPEN_ALWAYS |
- base::PLATFORM_FILE_CREATE_ALWAYS |
- base::PLATFORM_FILE_OPEN_TRUNCATED |
- base::PLATFORM_FILE_READ |
- base::PLATFORM_FILE_WRITE |
- base::PLATFORM_FILE_EXCLUSIVE_READ |
- base::PLATFORM_FILE_EXCLUSIVE_WRITE |
- base::PLATFORM_FILE_ASYNC |
- base::PLATFORM_FILE_WRITE_ATTRIBUTES |
- base::PLATFORM_FILE_ENUMERATE);
- // This is so that we can read and move stuff out of the old filesystem
- // sandbox.
- ChildProcessSecurityPolicyImpl::GetInstance()->GrantPermissionsForFile(
- process_->GetData().id,
- partition_.filesystem_context()->sandbox_provider()->old_base_path(),
- base::PLATFORM_FILE_READ | base::PLATFORM_FILE_WRITE |
- base::PLATFORM_FILE_WRITE_ATTRIBUTES |
- base::PLATFORM_FILE_ENUMERATE);
- // This is so that we can rename the old sandbox out of the way so that
- // we know we've taken care of it.
- ChildProcessSecurityPolicyImpl::GetInstance()->GrantPermissionsForFile(
- process_->GetData().id,
- partition_.filesystem_context()->sandbox_provider()->
- renamed_old_base_path(),
- base::PLATFORM_FILE_CREATE | base::PLATFORM_FILE_CREATE_ALWAYS |
- base::PLATFORM_FILE_WRITE);
- }
-
CreateMessageFilters(render_process_id);
return true;
« no previous file with comments | « content/browser/renderer_host/render_process_host_impl.cc ('k') | webkit/fileapi/file_system_directory_database.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698