Index: webkit/fileapi/sandbox_mount_point_provider.cc |
=================================================================== |
--- webkit/fileapi/sandbox_mount_point_provider.cc (revision 80624) |
+++ webkit/fileapi/sandbox_mount_point_provider.cc (working copy) |
@@ -126,11 +126,17 @@ |
SandboxMountPointProvider::~SandboxMountPointProvider() { |
} |
-bool SandboxMountPointProvider::IsAccessAllowed(const GURL& origin_url) { |
+bool SandboxMountPointProvider::IsAccessAllowed(const GURL& origin_url, |
+ const FilePath& unused) { |
// We essentially depend on quota to do our access controls. |
return path_manager_->IsAllowedScheme(origin_url); |
} |
+void SandboxMountPointProvider::GrantAccess(const GURL& origin_url, |
+ const FilePath& virtual_path) { |
+ NOTREACHED(); |
+} |
+ |
class SandboxMountPointProvider::GetFileSystemRootPathTask |
: public base::RefCountedThreadSafe< |
SandboxMountPointProvider::GetFileSystemRootPathTask> { |
@@ -211,6 +217,11 @@ |
return false; |
} |
+std::vector<FilePath> SandboxMountPointProvider::GetRootDirectories() const { |
+ NOTREACHED(); |
+ return std::vector<FilePath>(); |
ericu
2011/04/08 02:12:14
Please add a TODO(ericu) to implement this and use
zel
2011/04/08 04:16:36
Done.
|
+} |
+ |
void SandboxMountPointProvider::GetFileSystemRootPath( |
const GURL& origin_url, fileapi::FileSystemType type, |
bool create, FileSystemPathManager::GetRootPathCallback* callback_ptr) { |