| Index: webkit/chromeos/fileapi/cros_mount_point_provider.cc
|
| diff --git a/webkit/chromeos/fileapi/cros_mount_point_provider.cc b/webkit/chromeos/fileapi/cros_mount_point_provider.cc
|
| index fcb71ce8396e82022a8dc43229cdc490cd280b3c..5073ed76d107cd5f59d976935d7244a84c1cceec 100644
|
| --- a/webkit/chromeos/fileapi/cros_mount_point_provider.cc
|
| +++ b/webkit/chromeos/fileapi/cros_mount_point_provider.cc
|
| @@ -96,13 +96,13 @@ FilePath CrosMountPointProvider::GetFileSystemRootPathOnFileThread(
|
| return root_path;
|
| }
|
|
|
| -bool CrosMountPointProvider::IsAccessAllowed(const GURL& origin_url,
|
| - fileapi::FileSystemType type,
|
| - const FilePath& virtual_path) {
|
| - if (type != fileapi::kFileSystemTypeExternal)
|
| +bool CrosMountPointProvider::IsAccessAllowed(
|
| + const fileapi::FileSystemURL& url) {
|
| + if (url.type() != fileapi::kFileSystemTypeExternal)
|
| return false;
|
|
|
| // Permit access to mount points from internal WebUI.
|
| + const GURL& origin_url = url.origin();
|
| if (origin_url.SchemeIs(kChromeUIScheme))
|
| return true;
|
|
|
| @@ -112,7 +112,7 @@ bool CrosMountPointProvider::IsAccessAllowed(const GURL& origin_url,
|
| return false;
|
|
|
| return file_access_permissions_->HasAccessPermission(extension_id,
|
| - virtual_path);
|
| + url.path());
|
| }
|
|
|
| // TODO(zelidrag): Share this code with SandboxMountPointProvider impl.
|
|
|