Index: content/browser/child_process_security_policy_impl.cc |
diff --git a/content/browser/child_process_security_policy_impl.cc b/content/browser/child_process_security_policy_impl.cc |
index f9ba44eb79319ee4432e788c6c9ff7bac2bab330..db8229cb5a7d0dae1463901747e7cae8ef39bb4a 100644 |
--- a/content/browser/child_process_security_policy_impl.cc |
+++ b/content/browser/child_process_security_policy_impl.cc |
@@ -49,7 +49,7 @@ const int kEnumerateDirectoryPermissions = |
kReadFilePermissions | |
base::PLATFORM_FILE_ENUMERATE; |
-const int kReadWriteFilePermissions = |
+const int kCreateReadWriteFilePermissions = |
base::PLATFORM_FILE_OPEN | |
base::PLATFORM_FILE_CREATE | |
base::PLATFORM_FILE_OPEN_ALWAYS | |
@@ -63,15 +63,11 @@ const int kReadWriteFilePermissions = |
base::PLATFORM_FILE_WRITE_ATTRIBUTES; |
const int kCreateWriteFilePermissions = |
tommycli
2013/07/17 22:31:11
Here I added EXCLUSIVE_WRITE to the list. Otherwis
vandebo (ex-Chrome)
2013/07/18 15:16:59
Maybe... Please make sure the the security reviewe
|
- base::PLATFORM_FILE_CREATE | |
- base::PLATFORM_FILE_CREATE_ALWAYS | |
- base::PLATFORM_FILE_OPEN | |
- base::PLATFORM_FILE_OPEN_ALWAYS | |
- base::PLATFORM_FILE_OPEN_TRUNCATED | |
- base::PLATFORM_FILE_WRITE | |
- base::PLATFORM_FILE_WRITE_ATTRIBUTES | |
- base::PLATFORM_FILE_ASYNC; |
- // need EXCLUSIVE_WRITE in this mix? |
+ kCreateFilePermissions | |
+ kWriteFilePermissions | |
+ base::PLATFORM_FILE_CREATE_ALWAYS | |
+ base::PLATFORM_FILE_OPEN_ALWAYS | |
+ base::PLATFORM_FILE_OPEN_TRUNCATED; |
} // namespace |
@@ -434,7 +430,7 @@ void ChildProcessSecurityPolicyImpl::GrantReadFile(int child_id, |
void ChildProcessSecurityPolicyImpl::GrantCreateReadWriteFile( |
int child_id, const base::FilePath& file) { |
- GrantPermissionsForFile(child_id, file, kReadWriteFilePermissions); |
+ GrantPermissionsForFile(child_id, file, kCreateReadWriteFilePermissions); |
} |
void ChildProcessSecurityPolicyImpl::GrantCreateWriteFile( |
@@ -601,6 +597,22 @@ bool ChildProcessSecurityPolicyImpl::CanReadFile(int child_id, |
return HasPermissionsForFile(child_id, file, kReadFilePermissions); |
} |
+bool ChildProcessSecurityPolicyImpl::CanWriteFile(int child_id, |
+ const base::FilePath& file) { |
+ return HasPermissionsForFile(child_id, file, kWriteFilePermissions); |
+} |
+ |
+bool ChildProcessSecurityPolicyImpl::CanCreateFile(int child_id, |
+ const base::FilePath& file) { |
+ return HasPermissionsForFile(child_id, file, kCreateFilePermissions); |
+} |
+ |
+bool ChildProcessSecurityPolicyImpl::CanCreateReadWriteFile( |
+ int child_id, |
+ const base::FilePath& file) { |
+ return HasPermissionsForFile(child_id, file, kCreateReadWriteFilePermissions); |
+} |
+ |
bool ChildProcessSecurityPolicyImpl::CanReadDirectory( |
int child_id, const base::FilePath& directory) { |
return HasPermissionsForFile(child_id, |
@@ -681,6 +693,31 @@ bool ChildProcessSecurityPolicyImpl::HasPermissionsForFileSystemFile( |
return false; |
} |
+bool ChildProcessSecurityPolicyImpl::CanReadFileSystemFile( |
+ int child_id, |
+ const fileapi::FileSystemURL& url) { |
+ return HasPermissionsForFileSystemFile(child_id, url, kReadFilePermissions); |
+} |
+ |
+bool ChildProcessSecurityPolicyImpl::CanWriteFileSystemFile( |
+ int child_id, |
+ const fileapi::FileSystemURL& url) { |
+ return HasPermissionsForFileSystemFile(child_id, url, kWriteFilePermissions); |
+} |
+ |
+bool ChildProcessSecurityPolicyImpl::CanCreateFileSystemFile( |
+ int child_id, |
+ const fileapi::FileSystemURL& url) { |
+ return HasPermissionsForFileSystemFile(child_id, url, kCreateFilePermissions); |
+} |
+ |
+bool ChildProcessSecurityPolicyImpl::CanCreateReadWriteFileSystemFile( |
+ int child_id, |
+ const fileapi::FileSystemURL& url) { |
+ return HasPermissionsForFileSystemFile(child_id, url, |
+ kCreateReadWriteFilePermissions); |
+} |
+ |
bool ChildProcessSecurityPolicyImpl::HasWebUIBindings(int child_id) { |
base::AutoLock lock(lock_); |