Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(510)

Unified Diff: content/browser/child_process_security_policy_impl.cc

Issue 2394673002: In ChildProcessSecurityPolicy, rename to |url| to |filesystem_url| (Closed)
Patch Set: Created 4 years, 2 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « content/browser/child_process_security_policy_impl.h ('k') | no next file » | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: content/browser/child_process_security_policy_impl.cc
diff --git a/content/browser/child_process_security_policy_impl.cc b/content/browser/child_process_security_policy_impl.cc
index 0195c5159fa053833fddfce2ef2e586ea28d4ff9..4ce4f63bd4bf064713ba47ddf12dfcecfc9378fd 100644
--- a/content/browser/child_process_security_policy_impl.cc
+++ b/content/browser/child_process_security_policy_impl.cc
@@ -791,39 +791,40 @@ bool ChildProcessSecurityPolicyImpl::HasPermissionsForFile(
bool ChildProcessSecurityPolicyImpl::HasPermissionsForFileSystemFile(
int child_id,
- const storage::FileSystemURL& url,
+ const storage::FileSystemURL& filesystem_url,
int permissions) {
- if (!url.is_valid())
+ if (!filesystem_url.is_valid())
return false;
- // If |url.origin()| is not committable in this process, then this page
+ // If |filesystem_url.origin()| is not committable in this process, then this
+ // page
Charlie Reis 2016/10/04 23:25:58 nit: Fix line wrap.
ncarter (slow) 2016/10/06 18:11:24 Done.
// should not be able to place content in that origin via the filesystem
// API either.
- bool can_commit_origin = CanCommitURL(child_id, url.origin());
+ bool can_commit_origin = CanCommitURL(child_id, filesystem_url.origin());
UMA_HISTOGRAM_BOOLEAN("ChildProcessSecurityPolicy.FileSystemCanCommitOrigin",
can_commit_origin);
if (!can_commit_origin)
return false;
- if (url.path().ReferencesParent())
+ if (filesystem_url.path().ReferencesParent())
return false;
// Any write access is disallowed on the root path.
- if (storage::VirtualPath::IsRootPath(url.path()) &&
+ if (storage::VirtualPath::IsRootPath(filesystem_url.path()) &&
(permissions & ~READ_FILE_GRANT)) {
return false;
}
- if (url.mount_type() == storage::kFileSystemTypeIsolated) {
+ if (filesystem_url.mount_type() == storage::kFileSystemTypeIsolated) {
// When Isolated filesystems is overlayed on top of another filesystem,
// its per-filesystem permission overrides the underlying filesystem
// permissions).
return HasPermissionsForFileSystem(
- child_id, url.mount_filesystem_id(), permissions);
+ child_id, filesystem_url.mount_filesystem_id(), permissions);
}
FileSystemPermissionPolicyMap::iterator found =
- file_system_policy_map_.find(url.type());
+ file_system_policy_map_.find(filesystem_url.type());
if (found == file_system_policy_map_.end())
return false;
@@ -833,7 +834,7 @@ bool ChildProcessSecurityPolicyImpl::HasPermissionsForFileSystemFile(
}
if (found->second & storage::FILE_PERMISSION_USE_FILE_PERMISSION)
- return HasPermissionsForFile(child_id, url.path(), permissions);
+ return HasPermissionsForFile(child_id, filesystem_url.path(), permissions);
if (found->second & storage::FILE_PERMISSION_SANDBOX)
return true;
@@ -843,39 +844,44 @@ bool ChildProcessSecurityPolicyImpl::HasPermissionsForFileSystemFile(
bool ChildProcessSecurityPolicyImpl::CanReadFileSystemFile(
int child_id,
- const storage::FileSystemURL& url) {
- return HasPermissionsForFileSystemFile(child_id, url, READ_FILE_GRANT);
+ const storage::FileSystemURL& filesystem_url) {
+ return HasPermissionsForFileSystemFile(child_id, filesystem_url,
+ READ_FILE_GRANT);
}
bool ChildProcessSecurityPolicyImpl::CanWriteFileSystemFile(
int child_id,
- const storage::FileSystemURL& url) {
- return HasPermissionsForFileSystemFile(child_id, url, WRITE_FILE_GRANT);
+ const storage::FileSystemURL& filesystem_url) {
+ return HasPermissionsForFileSystemFile(child_id, filesystem_url,
+ WRITE_FILE_GRANT);
}
bool ChildProcessSecurityPolicyImpl::CanCreateFileSystemFile(
int child_id,
- const storage::FileSystemURL& url) {
- return HasPermissionsForFileSystemFile(child_id, url, CREATE_NEW_FILE_GRANT);
+ const storage::FileSystemURL& filesystem_url) {
+ return HasPermissionsForFileSystemFile(child_id, filesystem_url,
+ CREATE_NEW_FILE_GRANT);
}
bool ChildProcessSecurityPolicyImpl::CanCreateReadWriteFileSystemFile(
int child_id,
- const storage::FileSystemURL& url) {
- return HasPermissionsForFileSystemFile(child_id, url,
+ const storage::FileSystemURL& filesystem_url) {
+ return HasPermissionsForFileSystemFile(child_id, filesystem_url,
CREATE_READ_WRITE_FILE_GRANT);
}
bool ChildProcessSecurityPolicyImpl::CanCopyIntoFileSystemFile(
int child_id,
- const storage::FileSystemURL& url) {
- return HasPermissionsForFileSystemFile(child_id, url, COPY_INTO_FILE_GRANT);
+ const storage::FileSystemURL& filesystem_url) {
+ return HasPermissionsForFileSystemFile(child_id, filesystem_url,
+ COPY_INTO_FILE_GRANT);
}
bool ChildProcessSecurityPolicyImpl::CanDeleteFileSystemFile(
int child_id,
- const storage::FileSystemURL& url) {
- return HasPermissionsForFileSystemFile(child_id, url, DELETE_FILE_GRANT);
+ const storage::FileSystemURL& filesystem_url) {
+ return HasPermissionsForFileSystemFile(child_id, filesystem_url,
+ DELETE_FILE_GRANT);
}
bool ChildProcessSecurityPolicyImpl::HasWebUIBindings(int child_id) {
« no previous file with comments | « content/browser/child_process_security_policy_impl.h ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698