Index: content/browser/renderer_host/render_view_host_impl.cc |
diff --git a/content/browser/renderer_host/render_view_host_impl.cc b/content/browser/renderer_host/render_view_host_impl.cc |
index 84d790eabf8db891f818da53fe9f0021fc594714..6cbc87ff851bc2a6bea7e1b57499547eaddece07 100644 |
--- a/content/browser/renderer_host/render_view_host_impl.cc |
+++ b/content/browser/renderer_host/render_view_host_impl.cc |
@@ -80,6 +80,7 @@ |
#include "net/url_request/url_request_context_getter.h" |
#include "storage/browser/fileapi/isolated_context.h" |
#include "third_party/skia/include/core/SkBitmap.h" |
+#include "ui/base/clipboard/clipboard.h" |
#include "ui/base/touch/touch_device.h" |
#include "ui/base/touch/touch_enabled.h" |
#include "ui/base/ui_base_switches.h" |
@@ -142,6 +143,57 @@ void GetWindowsSpecificPrefs(RendererPreferences* prefs) { |
display::win::GetSystemMetricsInDIP(SM_CXHSCROLL); |
} |
#endif |
+ |
+std::vector<DropData::Metadata> DropDataToMetaData(const DropData& drop_data) { |
+ std::vector<DropData::Metadata> metadata; |
+ if (!drop_data.text.is_null()) { |
+ metadata.push_back(DropData::Metadata::CreateForMimeType( |
+ DropData::Kind::STRING, |
+ base::ASCIIToUTF16(ui::Clipboard::kMimeTypeText))); |
+ } |
+ |
+ if (drop_data.url.is_valid()) { |
+ metadata.push_back(DropData::Metadata::CreateForMimeType( |
+ DropData::Kind::STRING, |
+ base::ASCIIToUTF16(ui::Clipboard::kMimeTypeURIList))); |
+ } |
+ |
+ if (!drop_data.html.is_null()) { |
+ metadata.push_back(DropData::Metadata::CreateForMimeType( |
+ DropData::Kind::STRING, |
+ base::ASCIIToUTF16(ui::Clipboard::kMimeTypeHTML))); |
+ } |
+ |
+ // On Aura, filenames are available before drop. |
+ for (const auto& file_info : drop_data.filenames) { |
+ if (!file_info.path.empty()) { |
+ metadata.push_back(DropData::Metadata::CreateForFilePath(file_info.path)); |
+ } |
+ } |
+ |
+ // On Android, only files' mime types are available before drop. |
+ for (const auto& mime_type : drop_data.file_mime_types) { |
+ if (!mime_type.empty()) { |
+ metadata.push_back(DropData::Metadata::CreateForMimeType( |
+ DropData::Kind::FILENAME, mime_type)); |
+ } |
+ } |
+ |
+ for (const auto& file_system_file : drop_data.file_system_files) { |
+ if (!file_system_file.url.is_empty()) { |
+ metadata.push_back( |
+ DropData::Metadata::CreateForFileSystemUrl(file_system_file.url)); |
+ } |
+ } |
+ |
+ for (const auto& custom_data_item : drop_data.custom_data) { |
+ metadata.push_back(DropData::Metadata::CreateForMimeType( |
+ DropData::Kind::STRING, custom_data_item.first)); |
+ } |
+ |
+ return metadata; |
+} |
+ |
} // namespace |
// static |
@@ -570,96 +622,9 @@ void RenderViewHostImpl::DragTargetDragEnter( |
const gfx::Point& screen_pt, |
WebDragOperationsMask operations_allowed, |
int key_modifiers) { |
- const int renderer_id = GetProcess()->GetID(); |
- ChildProcessSecurityPolicyImpl* policy = |
- ChildProcessSecurityPolicyImpl::GetInstance(); |
- |
-#if defined(OS_CHROMEOS) |
- // The externalfile:// scheme is used in Chrome OS to open external files in a |
- // browser tab. |
- if (drop_data.url.SchemeIs(content::kExternalFileScheme)) |
- policy->GrantRequestURL(renderer_id, drop_data.url); |
-#endif |
- |
- // The URL could have been cobbled together from any highlighted text string, |
- // and can't be interpreted as a capability. |
- DropData filtered_data(drop_data); |
- GetProcess()->FilterURL(true, &filtered_data.url); |
- if (drop_data.did_originate_from_renderer) { |
- filtered_data.filenames.clear(); |
- } |
- |
- // The filenames vector, on the other hand, does represent a capability to |
- // access the given files. |
- storage::IsolatedContext::FileInfoSet files; |
- for (std::vector<ui::FileInfo>::iterator iter( |
- filtered_data.filenames.begin()); |
- iter != filtered_data.filenames.end(); |
- ++iter) { |
- // A dragged file may wind up as the value of an input element, or it |
- // may be used as the target of a navigation instead. We don't know |
- // which will happen at this point, so generously grant both access |
- // and request permissions to the specific file to cover both cases. |
- // We do not give it the permission to request all file:// URLs. |
- |
- // Make sure we have the same display_name as the one we register. |
- if (iter->display_name.empty()) { |
- std::string name; |
- files.AddPath(iter->path, &name); |
- iter->display_name = base::FilePath::FromUTF8Unsafe(name); |
- } else { |
- files.AddPathWithName(iter->path, iter->display_name.AsUTF8Unsafe()); |
- } |
- |
- policy->GrantRequestSpecificFileURL(renderer_id, |
- net::FilePathToFileURL(iter->path)); |
- |
- // If the renderer already has permission to read these paths, we don't need |
- // to re-grant them. This prevents problems with DnD for files in the CrOS |
- // file manager--the file manager already had read/write access to those |
- // directories, but dragging a file would cause the read/write access to be |
- // overwritten with read-only access, making them impossible to delete or |
- // rename until the renderer was killed. |
- if (!policy->CanReadFile(renderer_id, iter->path)) |
- policy->GrantReadFile(renderer_id, iter->path); |
- } |
- |
- storage::IsolatedContext* isolated_context = |
- storage::IsolatedContext::GetInstance(); |
- DCHECK(isolated_context); |
- std::string filesystem_id = isolated_context->RegisterDraggedFileSystem( |
- files); |
- if (!filesystem_id.empty()) { |
- // Grant the permission iff the ID is valid. |
- policy->GrantReadFileSystem(renderer_id, filesystem_id); |
- } |
- filtered_data.filesystem_id = base::UTF8ToUTF16(filesystem_id); |
- |
- storage::FileSystemContext* file_system_context = |
- BrowserContext::GetStoragePartition(GetProcess()->GetBrowserContext(), |
- GetSiteInstance()) |
- ->GetFileSystemContext(); |
- for (size_t i = 0; i < filtered_data.file_system_files.size(); ++i) { |
- storage::FileSystemURL file_system_url = |
- file_system_context->CrackURL(filtered_data.file_system_files[i].url); |
- |
- std::string register_name; |
- std::string filesystem_id = isolated_context->RegisterFileSystemForPath( |
- file_system_url.type(), file_system_url.filesystem_id(), |
- file_system_url.path(), ®ister_name); |
- policy->GrantReadFileSystem(renderer_id, filesystem_id); |
- |
- // Note: We are using the origin URL provided by the sender here. It may be |
- // different from the receiver's. |
- filtered_data.file_system_files[i].url = |
- GURL(storage::GetIsolatedFileSystemRootURIString( |
- file_system_url.origin(), filesystem_id, std::string()) |
- .append(register_name)); |
- } |
- |
- Send(new DragMsg_TargetDragEnter(GetRoutingID(), filtered_data, client_pt, |
- screen_pt, operations_allowed, |
- key_modifiers)); |
+ Send(new DragMsg_TargetDragEnter( |
+ GetRoutingID(), DropDataToMetaData(drop_data), client_pt, screen_pt, |
+ operations_allowed, key_modifiers)); |
} |
void RenderViewHostImpl::DragTargetDragOver( |
@@ -675,12 +640,25 @@ void RenderViewHostImpl::DragTargetDragLeave() { |
Send(new DragMsg_TargetDragLeave(GetRoutingID())); |
} |
-void RenderViewHostImpl::DragTargetDrop( |
- const gfx::Point& client_pt, |
- const gfx::Point& screen_pt, |
- int key_modifiers) { |
- Send(new DragMsg_TargetDrop(GetRoutingID(), client_pt, screen_pt, |
- key_modifiers)); |
+void RenderViewHostImpl::DragTargetDrop(const DropData& drop_data, |
+ const gfx::Point& client_pt, |
+ const gfx::Point& screen_pt, |
+ int key_modifiers) { |
+ DropData drop_data_with_permissions(drop_data); |
+ GrantFileAccessFromDropData(&drop_data_with_permissions); |
+ Send(new DragMsg_TargetDrop(GetRoutingID(), drop_data_with_permissions, |
+ client_pt, screen_pt, key_modifiers)); |
+} |
+ |
+void RenderViewHostImpl::FilterDropData(DropData* drop_data) { |
+#if DCHECK_IS_ON() |
+ drop_data->view_id = GetRoutingID(); |
+#endif // DCHECK_IS_ON() |
+ |
+ GetProcess()->FilterURL(true, &drop_data->url); |
+ if (drop_data->did_originate_from_renderer) { |
+ drop_data->filenames.clear(); |
+ } |
} |
void RenderViewHostImpl::DragSourceEndedAt( |
@@ -1288,4 +1266,88 @@ void RenderViewHostImpl::RenderViewReady() { |
delegate_->RenderViewReady(this); |
} |
+void RenderViewHostImpl::GrantFileAccessFromDropData(DropData* drop_data) { |
+ DCHECK_EQ(GetRoutingID(), drop_data->view_id); |
+ const int renderer_id = GetProcess()->GetID(); |
+ ChildProcessSecurityPolicyImpl* policy = |
+ ChildProcessSecurityPolicyImpl::GetInstance(); |
+ |
+#if defined(OS_CHROMEOS) |
+ // The externalfile:// scheme is used in Chrome OS to open external files in a |
+ // browser tab. |
+ if (drop_data->url.SchemeIs(content::kExternalFileScheme)) |
+ policy->GrantRequestURL(renderer_id, drop_data->url); |
+#endif |
+ |
+ // The filenames vector represents a capability to access the given files. |
+ storage::IsolatedContext::FileInfoSet files; |
+ for (auto& filename : drop_data->filenames) { |
+ // Make sure we have the same display_name as the one we register. |
+ if (filename.display_name.empty()) { |
+ std::string name; |
+ files.AddPath(filename.path, &name); |
+ filename.display_name = base::FilePath::FromUTF8Unsafe(name); |
+ } else { |
+ files.AddPathWithName(filename.path, |
+ filename.display_name.AsUTF8Unsafe()); |
+ } |
+ // A dragged file may wind up as the value of an input element, or it |
+ // may be used as the target of a navigation instead. We don't know |
+ // which will happen at this point, so generously grant both access |
+ // and request permissions to the specific file to cover both cases. |
+ // We do not give it the permission to request all file:// URLs. |
+ policy->GrantRequestSpecificFileURL(renderer_id, |
+ net::FilePathToFileURL(filename.path)); |
+ |
+ // If the renderer already has permission to read these paths, we don't need |
+ // to re-grant them. This prevents problems with DnD for files in the CrOS |
+ // file manager--the file manager already had read/write access to those |
+ // directories, but dragging a file would cause the read/write access to be |
+ // overwritten with read-only access, making them impossible to delete or |
+ // rename until the renderer was killed. |
+ if (!policy->CanReadFile(renderer_id, filename.path)) |
+ policy->GrantReadFile(renderer_id, filename.path); |
+ } |
+ |
+ storage::IsolatedContext* isolated_context = |
+ storage::IsolatedContext::GetInstance(); |
+ DCHECK(isolated_context); |
+ |
+ if (!files.fileset().empty()) { |
+ std::string filesystem_id = |
+ isolated_context->RegisterDraggedFileSystem(files); |
+ if (!filesystem_id.empty()) { |
+ // Grant the permission iff the ID is valid. |
+ policy->GrantReadFileSystem(renderer_id, filesystem_id); |
+ } |
+ drop_data->filesystem_id = base::UTF8ToUTF16(filesystem_id); |
+ } |
+ |
+ storage::FileSystemContext* file_system_context = |
+ BrowserContext::GetStoragePartition(GetProcess()->GetBrowserContext(), |
+ GetSiteInstance()) |
+ ->GetFileSystemContext(); |
+ for (auto& file_system_file : drop_data->file_system_files) { |
+ storage::FileSystemURL file_system_url = |
+ file_system_context->CrackURL(file_system_file.url); |
+ |
+ std::string register_name; |
+ std::string filesystem_id = isolated_context->RegisterFileSystemForPath( |
+ file_system_url.type(), file_system_url.filesystem_id(), |
+ file_system_url.path(), ®ister_name); |
+ |
+ if (!filesystem_id.empty()) { |
+ // Grant the permission iff the ID is valid. |
+ policy->GrantReadFileSystem(renderer_id, filesystem_id); |
+ } |
+ |
+ // Note: We are using the origin URL provided by the sender here. It may be |
+ // different from the receiver's. |
+ file_system_file.url = |
+ GURL(storage::GetIsolatedFileSystemRootURIString( |
+ file_system_url.origin(), filesystem_id, std::string()) |
+ .append(register_name)); |
+ } |
+} |
+ |
} // namespace content |