| Index: content/browser/child_process_security_policy_impl.cc
|
| diff --git a/content/browser/child_process_security_policy_impl.cc b/content/browser/child_process_security_policy_impl.cc
|
| index 0eb5ade6f4a3f8cbe8d310556ae4a064c2d100ae..a7b4d8854ed4893e2e40bdd26fda909b90c3f31f 100644
|
| --- a/content/browser/child_process_security_policy_impl.cc
|
| +++ b/content/browser/child_process_security_policy_impl.cc
|
| @@ -791,38 +791,38 @@ bool ChildProcessSecurityPolicyImpl::HasPermissionsForFile(
|
|
|
| bool ChildProcessSecurityPolicyImpl::HasPermissionsForFileSystemFile(
|
| int child_id,
|
| - const storage::FileSystemURL& url,
|
| + const storage::FileSystemURL& filesystem_url,
|
| int permissions) {
|
| - if (!url.is_valid())
|
| + if (!filesystem_url.is_valid())
|
| return false;
|
|
|
| - // If |url.origin()| is not committable in this process, then this page
|
| - // should not be able to place content in that origin via the filesystem
|
| + // If |filesystem_url.origin()| is not committable in this process, then this
|
| + // page should not be able to place content in that origin via the filesystem
|
| // API either.
|
| - if (!CanCommitURL(child_id, url.origin())) {
|
| + if (!CanCommitURL(child_id, filesystem_url.origin())) {
|
| UMA_HISTOGRAM_BOOLEAN("FileSystem.OriginFailedCanCommitURL", true);
|
| return false;
|
| }
|
|
|
| - if (url.path().ReferencesParent())
|
| + if (filesystem_url.path().ReferencesParent())
|
| return false;
|
|
|
| // Any write access is disallowed on the root path.
|
| - if (storage::VirtualPath::IsRootPath(url.path()) &&
|
| + if (storage::VirtualPath::IsRootPath(filesystem_url.path()) &&
|
| (permissions & ~READ_FILE_GRANT)) {
|
| return false;
|
| }
|
|
|
| - if (url.mount_type() == storage::kFileSystemTypeIsolated) {
|
| + if (filesystem_url.mount_type() == storage::kFileSystemTypeIsolated) {
|
| // When Isolated filesystems is overlayed on top of another filesystem,
|
| // its per-filesystem permission overrides the underlying filesystem
|
| // permissions).
|
| return HasPermissionsForFileSystem(
|
| - child_id, url.mount_filesystem_id(), permissions);
|
| + child_id, filesystem_url.mount_filesystem_id(), permissions);
|
| }
|
|
|
| FileSystemPermissionPolicyMap::iterator found =
|
| - file_system_policy_map_.find(url.type());
|
| + file_system_policy_map_.find(filesystem_url.type());
|
| if (found == file_system_policy_map_.end())
|
| return false;
|
|
|
| @@ -832,7 +832,7 @@ bool ChildProcessSecurityPolicyImpl::HasPermissionsForFileSystemFile(
|
| }
|
|
|
| if (found->second & storage::FILE_PERMISSION_USE_FILE_PERMISSION)
|
| - return HasPermissionsForFile(child_id, url.path(), permissions);
|
| + return HasPermissionsForFile(child_id, filesystem_url.path(), permissions);
|
|
|
| if (found->second & storage::FILE_PERMISSION_SANDBOX)
|
| return true;
|
| @@ -842,39 +842,44 @@ bool ChildProcessSecurityPolicyImpl::HasPermissionsForFileSystemFile(
|
|
|
| bool ChildProcessSecurityPolicyImpl::CanReadFileSystemFile(
|
| int child_id,
|
| - const storage::FileSystemURL& url) {
|
| - return HasPermissionsForFileSystemFile(child_id, url, READ_FILE_GRANT);
|
| + const storage::FileSystemURL& filesystem_url) {
|
| + return HasPermissionsForFileSystemFile(child_id, filesystem_url,
|
| + READ_FILE_GRANT);
|
| }
|
|
|
| bool ChildProcessSecurityPolicyImpl::CanWriteFileSystemFile(
|
| int child_id,
|
| - const storage::FileSystemURL& url) {
|
| - return HasPermissionsForFileSystemFile(child_id, url, WRITE_FILE_GRANT);
|
| + const storage::FileSystemURL& filesystem_url) {
|
| + return HasPermissionsForFileSystemFile(child_id, filesystem_url,
|
| + WRITE_FILE_GRANT);
|
| }
|
|
|
| bool ChildProcessSecurityPolicyImpl::CanCreateFileSystemFile(
|
| int child_id,
|
| - const storage::FileSystemURL& url) {
|
| - return HasPermissionsForFileSystemFile(child_id, url, CREATE_NEW_FILE_GRANT);
|
| + const storage::FileSystemURL& filesystem_url) {
|
| + return HasPermissionsForFileSystemFile(child_id, filesystem_url,
|
| + CREATE_NEW_FILE_GRANT);
|
| }
|
|
|
| bool ChildProcessSecurityPolicyImpl::CanCreateReadWriteFileSystemFile(
|
| int child_id,
|
| - const storage::FileSystemURL& url) {
|
| - return HasPermissionsForFileSystemFile(child_id, url,
|
| + const storage::FileSystemURL& filesystem_url) {
|
| + return HasPermissionsForFileSystemFile(child_id, filesystem_url,
|
| CREATE_READ_WRITE_FILE_GRANT);
|
| }
|
|
|
| bool ChildProcessSecurityPolicyImpl::CanCopyIntoFileSystemFile(
|
| int child_id,
|
| - const storage::FileSystemURL& url) {
|
| - return HasPermissionsForFileSystemFile(child_id, url, COPY_INTO_FILE_GRANT);
|
| + const storage::FileSystemURL& filesystem_url) {
|
| + return HasPermissionsForFileSystemFile(child_id, filesystem_url,
|
| + COPY_INTO_FILE_GRANT);
|
| }
|
|
|
| bool ChildProcessSecurityPolicyImpl::CanDeleteFileSystemFile(
|
| int child_id,
|
| - const storage::FileSystemURL& url) {
|
| - return HasPermissionsForFileSystemFile(child_id, url, DELETE_FILE_GRANT);
|
| + const storage::FileSystemURL& filesystem_url) {
|
| + return HasPermissionsForFileSystemFile(child_id, filesystem_url,
|
| + DELETE_FILE_GRANT);
|
| }
|
|
|
| bool ChildProcessSecurityPolicyImpl::HasWebUIBindings(int child_id) {
|
|
|