summaryrefslogtreecommitdiffstats
path: root/content/browser/child_process_security_policy_impl.cc
diff options
context:
space:
mode:
authorkinuko@chromium.org <kinuko@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2012-06-12 12:16:38 +0000
committerkinuko@chromium.org <kinuko@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2012-06-12 12:16:38 +0000
commit7469890d06410b66a1bec630c8d67e11c22eb84a (patch)
tree5f6adc35e36ad9bcf1cba2402b8c4e4158e22984 /content/browser/child_process_security_policy_impl.cc
parent6a1d56a0ef3b8a73a57c98c271acac66b8bffc5b (diff)
downloadchromium_src-7469890d06410b66a1bec630c8d67e11c22eb84a.zip
chromium_src-7469890d06410b66a1bec630c8d67e11c22eb84a.tar.gz
chromium_src-7469890d06410b66a1bec630c8d67e11c22eb84a.tar.bz2
Retry: Make Isolated file system writable only if it is configured so
- CreateFileStreamWriter wiring in FSO - Add yet another write-protection at IsolatedContext (in addition to ChildProcessSecurityPolicy, so that we can make each fs read-only or writable in DRT/testing) BUG=none TEST=existing tests should pass Original review URL: https://chromiumcodereview.appspot.com/10540070 Review URL: https://chromiumcodereview.appspot.com/10532085 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@141650 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'content/browser/child_process_security_policy_impl.cc')
-rw-r--r--content/browser/child_process_security_policy_impl.cc1
1 files changed, 1 insertions, 0 deletions
diff --git a/content/browser/child_process_security_policy_impl.cc b/content/browser/child_process_security_policy_impl.cc
index 1f40966..90c0ead 100644
--- a/content/browser/child_process_security_policy_impl.cc
+++ b/content/browser/child_process_security_policy_impl.cc
@@ -399,6 +399,7 @@ void ChildProcessSecurityPolicyImpl::GrantReadFileSystem(
void ChildProcessSecurityPolicyImpl::GrantReadWriteFileSystem(
int child_id, const std::string& filesystem_id) {
+ fileapi::IsolatedContext::GetInstance()->SetWritable(filesystem_id, true);
GrantPermissionsForFileSystem(child_id, filesystem_id,
kReadFilePermissions |
kWriteFilePermissions);