Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(289)

Unified Diff: content/browser/child_process_security_policy_impl.cc

Issue 492873002: Collapse fileapi, webkit_blob, webkit_database, quota, and webkit_common namespaces into single sto… (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: fix chromeos build Created 6 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: content/browser/child_process_security_policy_impl.cc
diff --git a/content/browser/child_process_security_policy_impl.cc b/content/browser/child_process_security_policy_impl.cc
index 6ffe46f185e26edf01d8a76f65a08a62710d16f1..16e695877209aeaaaf761c42c0f69ccdc96b1ffa 100644
--- a/content/browser/child_process_security_policy_impl.cc
+++ b/content/browser/child_process_security_policy_impl.cc
@@ -76,8 +76,8 @@ class ChildProcessSecurityPolicyImpl::SecurityState {
~SecurityState() {
scheme_policy_.clear();
- fileapi::IsolatedContext* isolated_context =
- fileapi::IsolatedContext::GetInstance();
+ storage::IsolatedContext* isolated_context =
+ storage::IsolatedContext::GetInstance();
for (FileSystemMap::iterator iter = filesystem_permissions_.begin();
iter != filesystem_permissions_.end();
++iter) {
@@ -121,7 +121,7 @@ class ChildProcessSecurityPolicyImpl::SecurityState {
void GrantPermissionsForFileSystem(const std::string& filesystem_id,
int permissions) {
if (!ContainsKey(filesystem_permissions_, filesystem_id))
- fileapi::IsolatedContext::GetInstance()->AddReference(filesystem_id);
+ storage::IsolatedContext::GetInstance()->AddReference(filesystem_id);
filesystem_permissions_[filesystem_id] |= permissions;
}
@@ -697,7 +697,9 @@ bool ChildProcessSecurityPolicyImpl::HasPermissionsForFile(
}
bool ChildProcessSecurityPolicyImpl::HasPermissionsForFileSystemFile(
- int child_id, const fileapi::FileSystemURL& url, int permissions) {
+ int child_id,
+ const storage::FileSystemURL& url,
+ int permissions) {
if (!url.is_valid())
return false;
@@ -705,12 +707,12 @@ bool ChildProcessSecurityPolicyImpl::HasPermissionsForFileSystemFile(
return false;
// Any write access is disallowed on the root path.
- if (fileapi::VirtualPath::IsRootPath(url.path()) &&
+ if (storage::VirtualPath::IsRootPath(url.path()) &&
(permissions & ~READ_FILE_GRANT)) {
return false;
}
- if (url.mount_type() == fileapi::kFileSystemTypeIsolated) {
+ if (url.mount_type() == storage::kFileSystemTypeIsolated) {
// When Isolated filesystems is overlayed on top of another filesystem,
// its per-filesystem permission overrides the underlying filesystem
// permissions).
@@ -723,15 +725,15 @@ bool ChildProcessSecurityPolicyImpl::HasPermissionsForFileSystemFile(
if (found == file_system_policy_map_.end())
return false;
- if ((found->second & fileapi::FILE_PERMISSION_READ_ONLY) &&
+ if ((found->second & storage::FILE_PERMISSION_READ_ONLY) &&
permissions & ~READ_FILE_GRANT) {
return false;
}
- if (found->second & fileapi::FILE_PERMISSION_USE_FILE_PERMISSION)
+ if (found->second & storage::FILE_PERMISSION_USE_FILE_PERMISSION)
return HasPermissionsForFile(child_id, url.path(), permissions);
- if (found->second & fileapi::FILE_PERMISSION_SANDBOX)
+ if (found->second & storage::FILE_PERMISSION_SANDBOX)
return true;
return false;
@@ -739,38 +741,38 @@ bool ChildProcessSecurityPolicyImpl::HasPermissionsForFileSystemFile(
bool ChildProcessSecurityPolicyImpl::CanReadFileSystemFile(
int child_id,
- const fileapi::FileSystemURL& url) {
+ const storage::FileSystemURL& url) {
return HasPermissionsForFileSystemFile(child_id, url, READ_FILE_GRANT);
}
bool ChildProcessSecurityPolicyImpl::CanWriteFileSystemFile(
int child_id,
- const fileapi::FileSystemURL& url) {
+ const storage::FileSystemURL& url) {
return HasPermissionsForFileSystemFile(child_id, url, WRITE_FILE_GRANT);
}
bool ChildProcessSecurityPolicyImpl::CanCreateFileSystemFile(
int child_id,
- const fileapi::FileSystemURL& url) {
+ const storage::FileSystemURL& url) {
return HasPermissionsForFileSystemFile(child_id, url, CREATE_NEW_FILE_GRANT);
}
bool ChildProcessSecurityPolicyImpl::CanCreateReadWriteFileSystemFile(
int child_id,
- const fileapi::FileSystemURL& url) {
+ const storage::FileSystemURL& url) {
return HasPermissionsForFileSystemFile(child_id, url,
CREATE_READ_WRITE_FILE_GRANT);
}
bool ChildProcessSecurityPolicyImpl::CanCopyIntoFileSystemFile(
int child_id,
- const fileapi::FileSystemURL& url) {
+ const storage::FileSystemURL& url) {
return HasPermissionsForFileSystemFile(child_id, url, COPY_INTO_FILE_GRANT);
}
bool ChildProcessSecurityPolicyImpl::CanDeleteFileSystemFile(
int child_id,
- const fileapi::FileSystemURL& url) {
+ const storage::FileSystemURL& url) {
return HasPermissionsForFileSystemFile(child_id, url, DELETE_FILE_GRANT);
}
@@ -875,7 +877,7 @@ bool ChildProcessSecurityPolicyImpl::HasPermissionsForFileSystem(
}
void ChildProcessSecurityPolicyImpl::RegisterFileSystemPermissionPolicy(
- fileapi::FileSystemType type,
+ storage::FileSystemType type,
int policy) {
base::AutoLock lock(lock_);
file_system_policy_map_[type] = policy;
« no previous file with comments | « content/browser/child_process_security_policy_impl.h ('k') | content/browser/child_process_security_policy_unittest.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698