| Index: content/browser/renderer_host/render_view_host_impl.cc
|
| diff --git a/content/browser/renderer_host/render_view_host_impl.cc b/content/browser/renderer_host/render_view_host_impl.cc
|
| index 075b3f8aa96c8da369ca3f39d9ebe75997bdc935..84d790eabf8db891f818da53fe9f0021fc594714 100644
|
| --- a/content/browser/renderer_host/render_view_host_impl.cc
|
| +++ b/content/browser/renderer_host/render_view_host_impl.cc
|
| @@ -777,33 +777,6 @@ void RenderViewHostImpl::SetInitialFocus(bool reverse) {
|
| Send(new ViewMsg_SetInitialFocus(GetRoutingID(), reverse));
|
| }
|
|
|
| -void RenderViewHostImpl::FilesSelectedInChooser(
|
| - const std::vector<content::FileChooserFileInfo>& files,
|
| - FileChooserParams::Mode permissions) {
|
| - storage::FileSystemContext* const file_system_context =
|
| - BrowserContext::GetStoragePartition(GetProcess()->GetBrowserContext(),
|
| - GetSiteInstance())
|
| - ->GetFileSystemContext();
|
| - // Grant the security access requested to the given files.
|
| - for (size_t i = 0; i < files.size(); ++i) {
|
| - const content::FileChooserFileInfo& file = files[i];
|
| - if (permissions == FileChooserParams::Save) {
|
| - ChildProcessSecurityPolicyImpl::GetInstance()->GrantCreateReadWriteFile(
|
| - GetProcess()->GetID(), file.file_path);
|
| - } else {
|
| - ChildProcessSecurityPolicyImpl::GetInstance()->GrantReadFile(
|
| - GetProcess()->GetID(), file.file_path);
|
| - }
|
| - if (file.file_system_url.is_valid()) {
|
| - ChildProcessSecurityPolicyImpl::GetInstance()->GrantReadFileSystem(
|
| - GetProcess()->GetID(),
|
| - file_system_context->CrackURL(file.file_system_url)
|
| - .mount_filesystem_id());
|
| - }
|
| - }
|
| - Send(new ViewMsg_RunFileChooserResponse(GetRoutingID(), files));
|
| -}
|
| -
|
| void RenderViewHostImpl::DirectoryEnumerationFinished(
|
| int request_id,
|
| const std::vector<base::FilePath>& files) {
|
| @@ -891,7 +864,6 @@ bool RenderViewHostImpl::OnMessageReceived(const IPC::Message& msg) {
|
| IPC_MESSAGE_HANDLER(ViewHostMsg_FocusedNodeChanged, OnFocusedNodeChanged)
|
| IPC_MESSAGE_HANDLER(ViewHostMsg_ClosePage_ACK, OnClosePageACK)
|
| IPC_MESSAGE_HANDLER(ViewHostMsg_DidZoomURL, OnDidZoomURL)
|
| - IPC_MESSAGE_HANDLER(ViewHostMsg_RunFileChooser, OnRunFileChooser)
|
| IPC_MESSAGE_HANDLER(ViewHostMsg_Focus, OnFocus)
|
| IPC_MESSAGE_HANDLER(ViewHostMsg_FocusedNodeTouched, OnFocusedNodeTouched)
|
| IPC_MESSAGE_UNHANDLED(handled = false)
|
| @@ -1253,19 +1225,6 @@ void RenderViewHostImpl::OnDidZoomURL(double zoom_level,
|
| net::GetHostOrSpecFromURL(url));
|
| }
|
|
|
| -void RenderViewHostImpl::OnRunFileChooser(const FileChooserParams& params) {
|
| - // Do not allow messages with absolute paths in them as this can permit a
|
| - // renderer to coerce the browser to perform I/O on a renderer controlled
|
| - // path.
|
| - if (params.default_file_name != params.default_file_name.BaseName()) {
|
| - bad_message::ReceivedBadMessage(GetProcess(),
|
| - bad_message::RVH_FILE_CHOOSER_PATH);
|
| - return;
|
| - }
|
| -
|
| - delegate_->RunFileChooser(this, params);
|
| -}
|
| -
|
| void RenderViewHostImpl::OnFocusedNodeTouched(bool editable) {
|
| #if defined(OS_WIN)
|
| // We use the cursor position to determine where the touch occurred.
|
|
|