diff options
author | mtomasz@chromium.org <mtomasz@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2013-08-15 07:30:39 +0000 |
---|---|---|
committer | mtomasz@chromium.org <mtomasz@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2013-08-15 07:30:39 +0000 |
commit | e6a7b4f7d1f43b9b1efd8e3347c3be9af962e332 (patch) | |
tree | da305409d677ff920d016c406676a16cac0704c5 | |
parent | 60afe1ef7493ed50bbbe5f82a436cc8d5c95bcb5 (diff) | |
download | chromium_src-e6a7b4f7d1f43b9b1efd8e3347c3be9af962e332.zip chromium_src-e6a7b4f7d1f43b9b1efd8e3347c3be9af962e332.tar.gz chromium_src-e6a7b4f7d1f43b9b1efd8e3347c3be9af962e332.tar.bz2 |
Whitelist TimeScapes to access restricted native local filesystem.
Recently, access to oem data has been disabled by default, and it is enabled only for Files.app. However, TimeScapes is an external extension and lost ability to play the movie which is in the oem directory. This patch temporarily whitelists TimeScapes to let it access the video.
Note, that this is just a temporary solution, and we should either restore access to read only native file systems to everyone, or grant it to TimeScapes in a proper way.
TEST=TimeScapes should play correctly in M-30.
BUG=262265
Review URL: https://chromiumcodereview.appspot.com/23233002
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@217764 0039d316-1c4b-4281-b951-d872f2087c98
-rw-r--r-- | chrome/browser/chromeos/fileapi/file_system_backend.cc | 7 |
1 files changed, 7 insertions, 0 deletions
diff --git a/chrome/browser/chromeos/fileapi/file_system_backend.cc b/chrome/browser/chromeos/fileapi/file_system_backend.cc index f25daa0..43a62c1 100644 --- a/chrome/browser/chromeos/fileapi/file_system_backend.cc +++ b/chrome/browser/chromeos/fileapi/file_system_backend.cc @@ -142,6 +142,13 @@ bool FileSystemBackend::IsAccessAllowed( return false; std::string extension_id = origin_url.host(); + // TODO(mtomasz): Temporarily whitelist TimeScapes. Remove this in M-31. + // See: crbug.com/271946 + if (extension_id == "mppoamgbcpnkpacolchbacppkflagjbp" && + url.type() == fileapi::kFileSystemTypeRestrictedNativeLocal) { + return true; + } + // Check first to make sure this extension has fileBrowserHander permissions. if (!special_storage_policy_->IsFileHandler(extension_id)) return false; |