From 30a822caa4185abec7da0874715b666045dd2fb4 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Henrik=20Rydg=C3=A5rd?= Date: Fri, 21 Jun 2024 15:02:08 +0200 Subject: [PATCH] Remote Disc Streaming on iOS: Don't accidentally force the game browser to local On iOS we enforce browsing the app directory only due to permission issues, but this should not apply when opening a HTTPS URL. Oops. --- UI/MainScreen.cpp | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/UI/MainScreen.cpp b/UI/MainScreen.cpp index e3f7c05e4b..4353e11c5e 100644 --- a/UI/MainScreen.cpp +++ b/UI/MainScreen.cpp @@ -519,7 +519,9 @@ GameBrowser::GameBrowser(int token, const Path &path, BrowseFlags browseFlags, b } else { path_.SetRootAlias("ms:/", memstickRoot); } - if (System_GetPropertyBool(SYSPROP_LIMITED_FILE_BROWSING)) { + if (System_GetPropertyBool(SYSPROP_LIMITED_FILE_BROWSING) && + (path.Type() == PathType::NATIVE || path.Type() == PathType::CONTENT_URI)) { + // Note: We don't restrict if the path is HTTPS, otherwise remote disc streaming breaks! path_.RestrictToRoot(GetSysDirectory(DIRECTORY_MEMSTICK_ROOT)); } path_.SetPath(path);