Chromium Code Reviews| Index: content/browser/child_process_security_policy_impl.cc |
| diff --git a/content/browser/child_process_security_policy_impl.cc b/content/browser/child_process_security_policy_impl.cc |
| index 0195c5159fa053833fddfce2ef2e586ea28d4ff9..4ce4f63bd4bf064713ba47ddf12dfcecfc9378fd 100644 |
| --- a/content/browser/child_process_security_policy_impl.cc |
| +++ b/content/browser/child_process_security_policy_impl.cc |
| @@ -791,39 +791,40 @@ bool ChildProcessSecurityPolicyImpl::HasPermissionsForFile( |
| bool ChildProcessSecurityPolicyImpl::HasPermissionsForFileSystemFile( |
| int child_id, |
| - const storage::FileSystemURL& url, |
| + const storage::FileSystemURL& filesystem_url, |
| int permissions) { |
| - if (!url.is_valid()) |
| + if (!filesystem_url.is_valid()) |
| return false; |
| - // If |url.origin()| is not committable in this process, then this page |
| + // If |filesystem_url.origin()| is not committable in this process, then this |
| + // page |
|
Charlie Reis
2016/10/04 23:25:58
nit: Fix line wrap.
ncarter (slow)
2016/10/06 18:11:24
Done.
|
| // should not be able to place content in that origin via the filesystem |
| // API either. |
| - bool can_commit_origin = CanCommitURL(child_id, url.origin()); |
| + bool can_commit_origin = CanCommitURL(child_id, filesystem_url.origin()); |
| UMA_HISTOGRAM_BOOLEAN("ChildProcessSecurityPolicy.FileSystemCanCommitOrigin", |
| can_commit_origin); |
| if (!can_commit_origin) |
| return false; |
| - if (url.path().ReferencesParent()) |
| + if (filesystem_url.path().ReferencesParent()) |
| return false; |
| // Any write access is disallowed on the root path. |
| - if (storage::VirtualPath::IsRootPath(url.path()) && |
| + if (storage::VirtualPath::IsRootPath(filesystem_url.path()) && |
| (permissions & ~READ_FILE_GRANT)) { |
| return false; |
| } |
| - if (url.mount_type() == storage::kFileSystemTypeIsolated) { |
| + if (filesystem_url.mount_type() == storage::kFileSystemTypeIsolated) { |
| // When Isolated filesystems is overlayed on top of another filesystem, |
| // its per-filesystem permission overrides the underlying filesystem |
| // permissions). |
| return HasPermissionsForFileSystem( |
| - child_id, url.mount_filesystem_id(), permissions); |
| + child_id, filesystem_url.mount_filesystem_id(), permissions); |
| } |
| FileSystemPermissionPolicyMap::iterator found = |
| - file_system_policy_map_.find(url.type()); |
| + file_system_policy_map_.find(filesystem_url.type()); |
| if (found == file_system_policy_map_.end()) |
| return false; |
| @@ -833,7 +834,7 @@ bool ChildProcessSecurityPolicyImpl::HasPermissionsForFileSystemFile( |
| } |
| if (found->second & storage::FILE_PERMISSION_USE_FILE_PERMISSION) |
| - return HasPermissionsForFile(child_id, url.path(), permissions); |
| + return HasPermissionsForFile(child_id, filesystem_url.path(), permissions); |
| if (found->second & storage::FILE_PERMISSION_SANDBOX) |
| return true; |
| @@ -843,39 +844,44 @@ bool ChildProcessSecurityPolicyImpl::HasPermissionsForFileSystemFile( |
| bool ChildProcessSecurityPolicyImpl::CanReadFileSystemFile( |
| int child_id, |
| - const storage::FileSystemURL& url) { |
| - return HasPermissionsForFileSystemFile(child_id, url, READ_FILE_GRANT); |
| + const storage::FileSystemURL& filesystem_url) { |
| + return HasPermissionsForFileSystemFile(child_id, filesystem_url, |
| + READ_FILE_GRANT); |
| } |
| bool ChildProcessSecurityPolicyImpl::CanWriteFileSystemFile( |
| int child_id, |
| - const storage::FileSystemURL& url) { |
| - return HasPermissionsForFileSystemFile(child_id, url, WRITE_FILE_GRANT); |
| + const storage::FileSystemURL& filesystem_url) { |
| + return HasPermissionsForFileSystemFile(child_id, filesystem_url, |
| + WRITE_FILE_GRANT); |
| } |
| bool ChildProcessSecurityPolicyImpl::CanCreateFileSystemFile( |
| int child_id, |
| - const storage::FileSystemURL& url) { |
| - return HasPermissionsForFileSystemFile(child_id, url, CREATE_NEW_FILE_GRANT); |
| + const storage::FileSystemURL& filesystem_url) { |
| + return HasPermissionsForFileSystemFile(child_id, filesystem_url, |
| + CREATE_NEW_FILE_GRANT); |
| } |
| bool ChildProcessSecurityPolicyImpl::CanCreateReadWriteFileSystemFile( |
| int child_id, |
| - const storage::FileSystemURL& url) { |
| - return HasPermissionsForFileSystemFile(child_id, url, |
| + const storage::FileSystemURL& filesystem_url) { |
| + return HasPermissionsForFileSystemFile(child_id, filesystem_url, |
| CREATE_READ_WRITE_FILE_GRANT); |
| } |
| bool ChildProcessSecurityPolicyImpl::CanCopyIntoFileSystemFile( |
| int child_id, |
| - const storage::FileSystemURL& url) { |
| - return HasPermissionsForFileSystemFile(child_id, url, COPY_INTO_FILE_GRANT); |
| + const storage::FileSystemURL& filesystem_url) { |
| + return HasPermissionsForFileSystemFile(child_id, filesystem_url, |
| + COPY_INTO_FILE_GRANT); |
| } |
| bool ChildProcessSecurityPolicyImpl::CanDeleteFileSystemFile( |
| int child_id, |
| - const storage::FileSystemURL& url) { |
| - return HasPermissionsForFileSystemFile(child_id, url, DELETE_FILE_GRANT); |
| + const storage::FileSystemURL& filesystem_url) { |
| + return HasPermissionsForFileSystemFile(child_id, filesystem_url, |
| + DELETE_FILE_GRANT); |
| } |
| bool ChildProcessSecurityPolicyImpl::HasWebUIBindings(int child_id) { |