| Index: webkit/fileapi/sandbox_mount_point_provider.cc
|
| diff --git a/webkit/fileapi/sandbox_mount_point_provider.cc b/webkit/fileapi/sandbox_mount_point_provider.cc
|
| index 854d264a93a5be3cf1ede2e474d3c72b5dc18b27..4a909ee265919dde9658f624f30e847d0968a4f1 100644
|
| --- a/webkit/fileapi/sandbox_mount_point_provider.cc
|
| +++ b/webkit/fileapi/sandbox_mount_point_provider.cc
|
| @@ -384,14 +384,13 @@ SandboxMountPointProvider::GetFileSystemRootPathOnFileThread(
|
| return GetBaseDirectoryForOriginAndType(origin_url, type, create);
|
| }
|
|
|
| -bool SandboxMountPointProvider::IsAccessAllowed(const GURL& origin_url,
|
| - FileSystemType type,
|
| - const FilePath& unused) {
|
| +bool SandboxMountPointProvider::IsAccessAllowed(const FileSystemURL& url) {
|
| + FileSystemType type = url.type();
|
| if (type != kFileSystemTypeTemporary && type != kFileSystemTypePersistent)
|
| return false;
|
| // We essentially depend on quota to do our access controls, so here
|
| // we only check if the requested scheme is allowed or not.
|
| - return IsAllowedScheme(origin_url);
|
| + return IsAllowedScheme(url.origin());
|
| }
|
|
|
| bool SandboxMountPointProvider::IsRestrictedFileName(const FilePath& filename)
|
|
|