summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authormtomasz@chromium.org <mtomasz@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2013-08-15 07:30:39 +0000
committermtomasz@chromium.org <mtomasz@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2013-08-15 07:30:39 +0000
commite6a7b4f7d1f43b9b1efd8e3347c3be9af962e332 (patch)
treeda305409d677ff920d016c406676a16cac0704c5
parent60afe1ef7493ed50bbbe5f82a436cc8d5c95bcb5 (diff)
downloadchromium_src-e6a7b4f7d1f43b9b1efd8e3347c3be9af962e332.zip
chromium_src-e6a7b4f7d1f43b9b1efd8e3347c3be9af962e332.tar.gz
chromium_src-e6a7b4f7d1f43b9b1efd8e3347c3be9af962e332.tar.bz2
Whitelist TimeScapes to access restricted native local filesystem.
Recently, access to oem data has been disabled by default, and it is enabled only for Files.app. However, TimeScapes is an external extension and lost ability to play the movie which is in the oem directory. This patch temporarily whitelists TimeScapes to let it access the video. Note, that this is just a temporary solution, and we should either restore access to read only native file systems to everyone, or grant it to TimeScapes in a proper way. TEST=TimeScapes should play correctly in M-30. BUG=262265 Review URL: https://chromiumcodereview.appspot.com/23233002 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@217764 0039d316-1c4b-4281-b951-d872f2087c98
-rw-r--r--chrome/browser/chromeos/fileapi/file_system_backend.cc7
1 files changed, 7 insertions, 0 deletions
diff --git a/chrome/browser/chromeos/fileapi/file_system_backend.cc b/chrome/browser/chromeos/fileapi/file_system_backend.cc
index f25daa0..43a62c1 100644
--- a/chrome/browser/chromeos/fileapi/file_system_backend.cc
+++ b/chrome/browser/chromeos/fileapi/file_system_backend.cc
@@ -142,6 +142,13 @@ bool FileSystemBackend::IsAccessAllowed(
return false;
std::string extension_id = origin_url.host();
+ // TODO(mtomasz): Temporarily whitelist TimeScapes. Remove this in M-31.
+ // See: crbug.com/271946
+ if (extension_id == "mppoamgbcpnkpacolchbacppkflagjbp" &&
+ url.type() == fileapi::kFileSystemTypeRestrictedNativeLocal) {
+ return true;
+ }
+
// Check first to make sure this extension has fileBrowserHander permissions.
if (!special_storage_policy_->IsFileHandler(extension_id))
return false;