Index: webkit/chromeos/fileapi/cros_mount_point_provider.cc |
diff --git a/webkit/chromeos/fileapi/cros_mount_point_provider.cc b/webkit/chromeos/fileapi/cros_mount_point_provider.cc |
index fcb71ce8396e82022a8dc43229cdc490cd280b3c..5073ed76d107cd5f59d976935d7244a84c1cceec 100644 |
--- a/webkit/chromeos/fileapi/cros_mount_point_provider.cc |
+++ b/webkit/chromeos/fileapi/cros_mount_point_provider.cc |
@@ -96,13 +96,13 @@ FilePath CrosMountPointProvider::GetFileSystemRootPathOnFileThread( |
return root_path; |
} |
-bool CrosMountPointProvider::IsAccessAllowed(const GURL& origin_url, |
- fileapi::FileSystemType type, |
- const FilePath& virtual_path) { |
- if (type != fileapi::kFileSystemTypeExternal) |
+bool CrosMountPointProvider::IsAccessAllowed( |
+ const fileapi::FileSystemURL& url) { |
+ if (url.type() != fileapi::kFileSystemTypeExternal) |
return false; |
// Permit access to mount points from internal WebUI. |
+ const GURL& origin_url = url.origin(); |
if (origin_url.SchemeIs(kChromeUIScheme)) |
return true; |
@@ -112,7 +112,7 @@ bool CrosMountPointProvider::IsAccessAllowed(const GURL& origin_url, |
return false; |
return file_access_permissions_->HasAccessPermission(extension_id, |
- virtual_path); |
+ url.path()); |
} |
// TODO(zelidrag): Share this code with SandboxMountPointProvider impl. |