OLD | NEW |
---|---|
1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "content/browser/renderer_host/pepper/pepper_internal_file_ref_backend. h" | 5 #include "content/browser/renderer_host/pepper/pepper_internal_file_ref_backend. h" |
6 | 6 |
7 #include <string> | 7 #include <string> |
8 | 8 |
9 #include "base/callback.h" | 9 #include "base/callback.h" |
10 #include "base/file_util.h" | 10 #include "base/file_util.h" |
11 #include "base/files/file_util_proxy.h" | 11 #include "base/files/file_util_proxy.h" |
12 #include "content/browser/child_process_security_policy_impl.h" | |
12 #include "content/browser/fileapi/browser_file_system_helper.h" | 13 #include "content/browser/fileapi/browser_file_system_helper.h" |
13 #include "content/browser/renderer_host/pepper/pepper_file_system_browser_host.h " | 14 #include "content/browser/renderer_host/pepper/pepper_file_system_browser_host.h " |
14 #include "content/public/browser/browser_context.h" | 15 #include "content/public/browser/browser_context.h" |
15 #include "content/public/browser/browser_thread.h" | 16 #include "content/public/browser/browser_thread.h" |
16 #include "content/public/browser/render_process_host.h" | 17 #include "content/public/browser/render_process_host.h" |
17 #include "content/public/browser/storage_partition.h" | 18 #include "content/public/browser/storage_partition.h" |
18 #include "net/base/escape.h" | 19 #include "net/base/escape.h" |
19 #include "ppapi/c/pp_errors.h" | 20 #include "ppapi/c/pp_errors.h" |
20 #include "ppapi/c/pp_file_info.h" | 21 #include "ppapi/c/pp_file_info.h" |
21 #include "ppapi/c/pp_instance.h" | 22 #include "ppapi/c/pp_instance.h" |
(...skipping 227 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
249 PpapiPluginMsg_FileRef_ReadDirectoryEntriesReply(infos, file_types)); | 250 PpapiPluginMsg_FileRef_ReadDirectoryEntriesReply(infos, file_types)); |
250 } | 251 } |
251 | 252 |
252 int32_t PepperInternalFileRefBackend::GetAbsolutePath( | 253 int32_t PepperInternalFileRefBackend::GetAbsolutePath( |
253 ppapi::host::ReplyMessageContext reply_context) { | 254 ppapi::host::ReplyMessageContext reply_context) { |
254 host_->SendReply(reply_context, | 255 host_->SendReply(reply_context, |
255 PpapiPluginMsg_FileRef_GetAbsolutePathReply(path_)); | 256 PpapiPluginMsg_FileRef_GetAbsolutePathReply(path_)); |
256 return PP_OK_COMPLETIONPENDING; | 257 return PP_OK_COMPLETIONPENDING; |
257 } | 258 } |
258 | 259 |
259 int32_t PepperInternalFileRefBackend::HasPermissions(int permissions) const { | 260 int32_t PepperInternalFileRefBackend::CanRead() const { |
260 base::PlatformFileError error; | 261 fileapi::FileSystemURL url = GetFileSystemURL(); |
261 CheckFileSystemPermissionsForProcess(GetFileSystemContext().get(), | 262 if (!FileSystemURLIsValid(GetFileSystemContext().get(), url)) |
262 render_process_id_, | 263 return PP_ERROR_FAILED; |
dmichael (off chromium)
2013/07/24 17:27:44
teravest: Do you know what we would do in the case
teravest
2013/07/24 17:51:21
I'll look into this; the old code would just pass
tommycli
2013/07/24 18:05:30
CheckFileSystemPermissionsForProcess would return
tommycli
2013/07/24 20:53:09
Yeah it's kind of weird. Probably because You have
| |
263 GetFileSystemURL(), | 264 if (!ChildProcessSecurityPolicyImpl::GetInstance()-> |
264 permissions, | 265 CanReadFileSystemFile(render_process_id_, url)) { |
265 &error); | 266 return PP_ERROR_NOACCESS; |
266 return ppapi::PlatformFileErrorToPepperError(error); | 267 } |
268 return PP_OK; | |
269 } | |
270 | |
271 int32_t PepperInternalFileRefBackend::CanWrite() const { | |
272 fileapi::FileSystemURL url = GetFileSystemURL(); | |
273 if (!FileSystemURLIsValid(GetFileSystemContext().get(), url)) | |
274 return PP_ERROR_FAILED; | |
275 if (!ChildProcessSecurityPolicyImpl::GetInstance()-> | |
276 CanWriteFileSystemFile(render_process_id_, url)) { | |
277 return PP_ERROR_NOACCESS; | |
278 } | |
279 return PP_OK; | |
280 } | |
281 | |
282 int32_t PepperInternalFileRefBackend::CanCreate() const { | |
283 fileapi::FileSystemURL url = GetFileSystemURL(); | |
284 if (!FileSystemURLIsValid(GetFileSystemContext().get(), url)) | |
285 return PP_ERROR_FAILED; | |
286 if (!ChildProcessSecurityPolicyImpl::GetInstance()-> | |
287 CanCreateFileSystemFile(render_process_id_, url)) { | |
288 return PP_ERROR_NOACCESS; | |
289 } | |
290 return PP_OK; | |
291 } | |
292 | |
293 int32_t PepperInternalFileRefBackend::CanReadWrite() const { | |
294 fileapi::FileSystemURL url = GetFileSystemURL(); | |
295 if (!FileSystemURLIsValid(GetFileSystemContext().get(), url)) | |
296 return PP_ERROR_FAILED; | |
297 ChildProcessSecurityPolicyImpl* policy = | |
298 ChildProcessSecurityPolicyImpl::GetInstance(); | |
299 if (!policy->CanReadFileSystemFile(render_process_id_, url) || | |
300 !policy->CanWriteFileSystemFile(render_process_id_, url)) { | |
301 return PP_ERROR_NOACCESS; | |
302 } | |
303 return PP_OK; | |
267 } | 304 } |
268 | 305 |
269 } // namespace content | 306 } // namespace content |
OLD | NEW |