Index: webkit/fileapi/sandboxed_file_system_operation.cc |
diff --git a/webkit/fileapi/sandboxed_file_system_operation.cc b/webkit/fileapi/sandboxed_file_system_operation.cc |
index fc77ce319a6a00182cb14adbce171a72ff396fa7..1acac0cf56608b965c1b244157eebcc3b28f0d26 100644 |
--- a/webkit/fileapi/sandboxed_file_system_operation.cc |
+++ b/webkit/fileapi/sandboxed_file_system_operation.cc |
@@ -126,7 +126,7 @@ void SandboxedFileSystemOperation::TouchFile(const FilePath& path, |
void SandboxedFileSystemOperation::DidGetRootPath( |
bool success, const FilePath& path, const std::string& name) { |
DCHECK(success || path.empty()); |
- dispatcher()->DidOpenFileSystem(name, path); |
+ destructive_dispatcher()->DidOpenFileSystem(name, path); |
} |
bool SandboxedFileSystemOperation::VerifyFileSystemPathForRead( |
@@ -135,7 +135,7 @@ bool SandboxedFileSystemOperation::VerifyFileSystemPathForRead( |
// |path| is under the valid FileSystem root path for this host context. |
if (!file_system_context_->path_manager()->CrackFileSystemPath( |
path, NULL, NULL, NULL)) { |
- dispatcher()->DidFail(base::PLATFORM_FILE_ERROR_SECURITY); |
+ destructive_dispatcher()->DidFail(base::PLATFORM_FILE_ERROR_SECURITY); |
return false; |
} |
return true; |
@@ -147,25 +147,25 @@ bool SandboxedFileSystemOperation::VerifyFileSystemPathForWrite( |
FilePath virtual_path; |
if (!file_system_context_->path_manager()->CrackFileSystemPath( |
path, &origin_url, NULL, &virtual_path)) { |
- dispatcher()->DidFail(base::PLATFORM_FILE_ERROR_SECURITY); |
+ destructive_dispatcher()->DidFail(base::PLATFORM_FILE_ERROR_SECURITY); |
return false; |
} |
// Any write access is disallowed on the root path. |
if (virtual_path.value().length() == 0 || |
virtual_path.DirName().value() == virtual_path.value()) { |
- dispatcher()->DidFail(base::PLATFORM_FILE_ERROR_SECURITY); |
+ destructive_dispatcher()->DidFail(base::PLATFORM_FILE_ERROR_SECURITY); |
return false; |
} |
if (create && file_system_context_->path_manager()->IsRestrictedFileName( |
path.BaseName())) { |
- dispatcher()->DidFail(base::PLATFORM_FILE_ERROR_SECURITY); |
+ destructive_dispatcher()->DidFail(base::PLATFORM_FILE_ERROR_SECURITY); |
return false; |
} |
// TODO(kinuko): For operations with kUnknownSize we'll eventually |
// need to resolve what amount of size it's going to write. |
if (!file_system_context_->quota_manager()->CheckOriginQuota( |
origin_url, growth)) { |
- dispatcher()->DidFail(base::PLATFORM_FILE_ERROR_NO_SPACE); |
+ destructive_dispatcher()->DidFail(base::PLATFORM_FILE_ERROR_NO_SPACE); |
return false; |
} |
return true; |
@@ -175,7 +175,7 @@ bool SandboxedFileSystemOperation::CheckIfFilePathIsSafe( |
const FilePath& path) { |
if (file_system_context_->path_manager()->IsRestrictedFileName( |
path.BaseName())) { |
- dispatcher()->DidFail(base::PLATFORM_FILE_ERROR_SECURITY); |
+ destructive_dispatcher()->DidFail(base::PLATFORM_FILE_ERROR_SECURITY); |
return false; |
} |
return true; |