Index: content/browser/child_process_security_policy_impl.cc |
diff --git a/content/browser/child_process_security_policy_impl.cc b/content/browser/child_process_security_policy_impl.cc |
index 210a3c3c7cb5c9e7c2c9ab5e7c957a6a69c6cbc9..94af97eaa2cbc37dcb39c0684b5b0df00f07ca03 100644 |
--- a/content/browser/child_process_security_policy_impl.cc |
+++ b/content/browser/child_process_security_policy_impl.cc |
@@ -18,7 +18,6 @@ |
#include "base/strings/string_util.h" |
#include "build/build_config.h" |
#include "content/browser/site_instance_impl.h" |
-#include "content/common/resource_request_body_impl.h" |
#include "content/common/site_isolation_policy.h" |
#include "content/public/browser/browser_context.h" |
#include "content/public/browser/browser_thread.h" |
@@ -27,6 +26,7 @@ |
#include "content/public/browser/render_process_host.h" |
#include "content/public/browser/storage_partition.h" |
#include "content/public/common/bindings_policy.h" |
+#include "content/public/common/resource_request_body.h" |
#include "content/public/common/url_constants.h" |
#include "net/base/filename_util.h" |
#include "net/url_request/url_request.h" |
@@ -763,40 +763,40 @@ bool ChildProcessSecurityPolicyImpl::CanReadAllFiles( |
bool ChildProcessSecurityPolicyImpl::CanReadRequestBody( |
int child_id, |
const storage::FileSystemContext* file_system_context, |
- const scoped_refptr<ResourceRequestBodyImpl>& body) { |
+ const scoped_refptr<ResourceRequestBody>& body) { |
if (!body) |
return true; |
- for (const ResourceRequestBodyImpl::Element& element : *body->elements()) { |
+ for (const ResourceRequestBody::Element& element : *body->elements()) { |
switch (element.type()) { |
- case ResourceRequestBodyImpl::Element::TYPE_FILE: |
+ case ResourceRequestBody::Element::TYPE_FILE: |
if (!CanReadFile(child_id, element.path())) |
return false; |
break; |
- case ResourceRequestBodyImpl::Element::TYPE_FILE_FILESYSTEM: |
+ case ResourceRequestBody::Element::TYPE_FILE_FILESYSTEM: |
if (!CanReadFileSystemFile(child_id, file_system_context->CrackURL( |
element.filesystem_url()))) |
return false; |
break; |
- case ResourceRequestBodyImpl::Element::TYPE_DISK_CACHE_ENTRY: |
+ case ResourceRequestBody::Element::TYPE_DISK_CACHE_ENTRY: |
// TYPE_DISK_CACHE_ENTRY can't be sent via IPC according to |
// content/common/resource_messages.cc |
NOTREACHED(); |
return false; |
- case ResourceRequestBodyImpl::Element::TYPE_BYTES: |
- case ResourceRequestBodyImpl::Element::TYPE_BYTES_DESCRIPTION: |
+ case ResourceRequestBody::Element::TYPE_BYTES: |
+ case ResourceRequestBody::Element::TYPE_BYTES_DESCRIPTION: |
// Data is self-contained within |body| - no need to check access. |
break; |
- case ResourceRequestBodyImpl::Element::TYPE_BLOB: |
+ case ResourceRequestBody::Element::TYPE_BLOB: |
// No need to validate - the unguessability of the uuid of the blob is a |
// sufficient defense against access from an unrelated renderer. |
break; |
- case ResourceRequestBodyImpl::Element::TYPE_UNKNOWN: |
+ case ResourceRequestBody::Element::TYPE_UNKNOWN: |
default: |
// Fail safe - deny access. |
NOTREACHED(); |
@@ -808,7 +808,7 @@ bool ChildProcessSecurityPolicyImpl::CanReadRequestBody( |
bool ChildProcessSecurityPolicyImpl::CanReadRequestBody( |
SiteInstance* site_instance, |
- const scoped_refptr<ResourceRequestBodyImpl>& body) { |
+ const scoped_refptr<ResourceRequestBody>& body) { |
DCHECK(site_instance); |
DCHECK_CURRENTLY_ON(BrowserThread::UI); |