diff options
author | skerner@chromium.org <skerner@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2010-07-30 15:33:28 +0000 |
---|---|---|
committer | skerner@chromium.org <skerner@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2010-07-30 15:33:28 +0000 |
commit | bd781d897ea507f9abc028462d04224ca273875a (patch) | |
tree | bf14c6237ec30d3e1815e3978807d1943ad22f9f /base | |
parent | 5021691cce9e56fe0bb778df3ad92e41c55c6ed0 (diff) | |
download | chromium_src-bd781d897ea507f9abc028462d04224ca273875a.zip chromium_src-bd781d897ea507f9abc028462d04224ca273875a.tar.gz chromium_src-bd781d897ea507f9abc028462d04224ca273875a.tar.bz2 |
Remove some debug switches:
--issue35198-crxdir-browser
--issue35198-permission
They were used to understand issue 35198. They are no longer needed. There is one more switch, --issue35198-logging, that is not being removed in this CL. The logging it adds may still be useful.
BUG=50604
TEST=manual
Review URL: http://codereview.chromium.org/3052023
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@54323 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'base')
-rw-r--r-- | base/file_util.h | 5 | ||||
-rw-r--r-- | base/file_util_posix.cc | 8 | ||||
-rw-r--r-- | base/file_util_unittest.cc | 1 | ||||
-rw-r--r-- | base/file_util_win.cc | 71 | ||||
-rw-r--r-- | base/scoped_temp_dir.cc | 9 | ||||
-rw-r--r-- | base/scoped_temp_dir.h | 3 | ||||
-rw-r--r-- | base/scoped_temp_dir_unittest.cc | 2 |
7 files changed, 6 insertions, 93 deletions
diff --git a/base/file_util.h b/base/file_util.h index 66e450a..bd973b23 100644 --- a/base/file_util.h +++ b/base/file_util.h @@ -273,13 +273,8 @@ bool CreateNewTempDirectory(const FilePath::StringType& prefix, // Create a directory within another directory. // Extra characters will be appended to |prefix| to ensure that the // new directory does not have the same name as an existing directory. -// If |loosen_permissions| is true, the new directory will be readable -// and writable to all users on windows. It is ignored on other platforms. -// |loosen_permissions| exists to allow debugging of crbug/35198, and will -// be removed when the issue is understood. bool CreateTemporaryDirInDir(const FilePath& base_dir, const FilePath::StringType& prefix, - bool loosen_permissions, FilePath* new_dir); // Creates a directory, as well as creating any parent directories, if they diff --git a/base/file_util_posix.cc b/base/file_util_posix.cc index 4d9cf42..13798d3 100644 --- a/base/file_util_posix.cc +++ b/base/file_util_posix.cc @@ -430,15 +430,7 @@ static bool CreateTemporaryDirInDirImpl(const FilePath& base_dir, bool CreateTemporaryDirInDir(const FilePath& base_dir, const FilePath::StringType& prefix, - bool loosen_permissions, FilePath* new_dir) { - // To understand crbug/35198, the ability to call this - // this function on windows while giving loose permissions - // to the resulting directory has been temporarily added. - // It should not be possible to call this function with - // loosen_permissions == true on non-windows platforms. - DCHECK(!loosen_permissions); - FilePath::StringType mkdtemp_template = prefix; mkdtemp_template.append(FILE_PATH_LITERAL("XXXXXX")); return CreateTemporaryDirInDirImpl(base_dir, mkdtemp_template, new_dir); diff --git a/base/file_util_unittest.cc b/base/file_util_unittest.cc index 7860111..4a1417a 100644 --- a/base/file_util_unittest.cc +++ b/base/file_util_unittest.cc @@ -1577,7 +1577,6 @@ TEST_F(FileUtilTest, CreateNewTemporaryDirInDirTest) { ASSERT_TRUE(file_util::CreateTemporaryDirInDir( test_dir_, FILE_PATH_LITERAL("CreateNewTemporaryDirInDirTest"), - false, &new_dir)); EXPECT_TRUE(file_util::PathExists(new_dir)); EXPECT_TRUE(test_dir_.IsParent(new_dir)); diff --git a/base/file_util_win.cc b/base/file_util_win.cc index 26955f2..b6a741b 100644 --- a/base/file_util_win.cc +++ b/base/file_util_win.cc @@ -64,56 +64,6 @@ bool DevicePathToDriveLetterPath(const FilePath& device_path, return true; } -// Build a security descriptor with the weakest possible file permissions. -bool InitLooseSecurityDescriptor(SECURITY_ATTRIBUTES *sa, - SECURITY_DESCRIPTOR *sd) { - DWORD last_error; - - if (!InitializeSecurityDescriptor(sd, SECURITY_DESCRIPTOR_REVISION)) { - last_error = GetLastError(); - LOG(ERROR) << "InitializeSecurityDescriptor failed: GetLastError() = " - << last_error; - return false; - } - - if (!SetSecurityDescriptorDacl(sd, - TRUE, // bDaclPresent: Add one to |sd|. - NULL, // pDacl: NULL means allow all access. - FALSE // bDaclDefaulted: Not defaulted. - )) { - last_error = GetLastError(); - LOG(ERROR) << "SetSecurityDescriptorDacl() failed: GetLastError() = " - << last_error; - return false; - } - - if (!SetSecurityDescriptorGroup(sd, - NULL, // pGroup: No no primary group. - FALSE // bGroupDefaulted: Not defaulted. - )) { - last_error = GetLastError(); - LOG(ERROR) << "SetSecurityDescriptorGroup() failed: GetLastError() = " - << last_error; - return false; - } - - if (!SetSecurityDescriptorSacl(sd, - FALSE, // bSaclPresent: No SACL. - NULL, - FALSE - )) { - last_error = GetLastError(); - LOG(ERROR) << "SetSecurityDescriptorSacl() failed: GetLastError() = " - << last_error; - return false; - } - - sa->nLength = sizeof(SECURITY_ATTRIBUTES); - sa->lpSecurityDescriptor = sd; - sa->bInheritHandle = TRUE; - return true; -} - } // namespace std::wstring GetDirectoryFromPath(const std::wstring& path) { @@ -601,19 +551,7 @@ bool CreateTemporaryFileInDir(const FilePath& dir, bool CreateTemporaryDirInDir(const FilePath& base_dir, const FilePath::StringType& prefix, - bool loosen_permissions, FilePath* new_dir) { - SECURITY_ATTRIBUTES sa; - SECURITY_DESCRIPTOR sd; - - LPSECURITY_ATTRIBUTES directory_security_attributes = NULL; - if (loosen_permissions) { - if (InitLooseSecurityDescriptor(&sa, &sd)) - directory_security_attributes = &sa; - else - LOG(ERROR) << "Failed to init security attributes, fall back to NULL."; - } - FilePath path_to_create; srand(static_cast<uint32>(time(NULL))); @@ -628,8 +566,7 @@ bool CreateTemporaryDirInDir(const FilePath& base_dir, new_dir_name.append(IntToWString(rand() % kint16max)); path_to_create = path_to_create.Append(new_dir_name); - if (::CreateDirectory(path_to_create.value().c_str(), - directory_security_attributes)) + if (::CreateDirectory(path_to_create.value().c_str(), NULL)) break; count++; } @@ -639,7 +576,6 @@ bool CreateTemporaryDirInDir(const FilePath& base_dir, } *new_dir = path_to_create; - return true; } @@ -649,10 +585,7 @@ bool CreateNewTempDirectory(const FilePath::StringType& prefix, if (!GetTempDir(&system_temp_dir)) return false; - return CreateTemporaryDirInDir(system_temp_dir, - prefix, - false, - new_temp_path); + return CreateTemporaryDirInDir(system_temp_dir, prefix, new_temp_path); } bool CreateDirectory(const FilePath& full_path) { diff --git a/base/scoped_temp_dir.cc b/base/scoped_temp_dir.cc index 28f59bf..53452f1 100644 --- a/base/scoped_temp_dir.cc +++ b/base/scoped_temp_dir.cc @@ -4,7 +4,6 @@ #include "base/scoped_temp_dir.h" -#include "base/command_line.h" #include "base/file_util.h" #include "base/logging.h" #include "base/string_util.h" @@ -27,19 +26,15 @@ bool ScopedTempDir::CreateUniqueTempDir() { return true; } -bool ScopedTempDir::CreateUniqueTempDirUnderPath(const FilePath& base_path, - bool loose_permissions) { +bool ScopedTempDir::CreateUniqueTempDirUnderPath(const FilePath& base_path) { // If |path| does not exist, create it. - if (!file_util::CreateDirectory(base_path)) { - LOG(ERROR) << "Failed to create base directory " << base_path.value(); + if (!file_util::CreateDirectory(base_path)) return false; - } // Create a new, uniquely named directory under |base_path|. if (!file_util::CreateTemporaryDirInDir( base_path, FILE_PATH_LITERAL("scoped_dir_"), - loose_permissions, &path_)) { return false; } diff --git a/base/scoped_temp_dir.h b/base/scoped_temp_dir.h index c24891d..702c2bc 100644 --- a/base/scoped_temp_dir.h +++ b/base/scoped_temp_dir.h @@ -27,8 +27,7 @@ class ScopedTempDir { bool CreateUniqueTempDir(); // Creates a unique directory under a given path, and takes ownership of it. - bool CreateUniqueTempDirUnderPath(const FilePath& path, - bool loose_permissions); + bool CreateUniqueTempDirUnderPath(const FilePath& path); // Takes ownership of directory at |path|, creating it if necessary. // Don't call multiple times unless Take() has been called first. diff --git a/base/scoped_temp_dir_unittest.cc b/base/scoped_temp_dir_unittest.cc index e180119..4be0d07 100644 --- a/base/scoped_temp_dir_unittest.cc +++ b/base/scoped_temp_dir_unittest.cc @@ -65,7 +65,7 @@ TEST(ScopedTempDir, UniqueTempDirUnderPath) { FilePath test_path; { ScopedTempDir dir; - EXPECT_TRUE(dir.CreateUniqueTempDirUnderPath(base_path, false)); + EXPECT_TRUE(dir.CreateUniqueTempDirUnderPath(base_path)); test_path = dir.path(); EXPECT_TRUE(file_util::DirectoryExists(test_path)); EXPECT_TRUE(base_path.IsParent(test_path)); |