Chromium Code Reviews| Index: content/browser/child_process_security_policy_impl.h |
| diff --git a/content/browser/child_process_security_policy_impl.h b/content/browser/child_process_security_policy_impl.h |
| index 646b3e631b92b635a4eb103ba10b8f77de50bf36..206edbfcd5ac11fa82bf52298a0a43392239bbc3 100644 |
| --- a/content/browser/child_process_security_policy_impl.h |
| +++ b/content/browser/child_process_security_policy_impl.h |
| @@ -74,6 +74,12 @@ class CONTENT_EXPORT ChildProcessSecurityPolicyImpl |
| virtual bool CanDeleteFromFileSystem( |
| int child_id, |
| const std::string& filesystem_id) OVERRIDE; |
| +#if defined(OS_ANDROID) |
| + virtual void GrantReadContentUrl(int child_id, |
| + const GURL& content_url) OVERRIDE; |
| + virtual bool CanReadContentUrl(int child_id, |
| + const GURL& content_url) OVERRIDE; |
| +#endif |
| // Pseudo schemes are treated differently than other schemes because they |
| // cannot be requested like normal URLs. There is no mechanism for revoking |
| @@ -246,6 +252,21 @@ class CONTENT_EXPORT ChildProcessSecurityPolicyImpl |
| const fileapi::FileSystemURL& url, |
| int permissions); |
| +#if defined(OS_ANDROID) |
| + // Grant a particular permission set for a content url. |permissions| is a |
| + // bit-set of base::PlatformFileFlags. |
|
kinuko
2013/10/29 02:52:31
nit: we no longer use base::PlatformFileFlags for
qinmin
2013/10/29 19:14:21
Done.
|
| + void GrantPermissionsForContentUrl(int child_id, |
| + const GURL& content_url, |
| + int permissions); |
| + |
| + // Determines if certain permissions were granted for a content url to given |
| + // child process. |permissions| must be a bitwise-or'd value of |
| + // base::PlatformFileFlags. |
| + bool ChildProcessHasPermissionsForContentUrl(int child_id, |
| + const GURL& content_url, |
| + int permissions); |
| +#endif |
| + |
| // You must acquire this lock before reading or writing any members of this |
| // class. You must not block while holding this lock. |
| base::Lock lock_; |