| Index: webkit/fileapi/sandbox_mount_point_provider.cc
|
| ===================================================================
|
| --- webkit/fileapi/sandbox_mount_point_provider.cc (revision 81576)
|
| +++ webkit/fileapi/sandbox_mount_point_provider.cc (working copy)
|
| @@ -113,6 +113,7 @@
|
|
|
| const char SandboxMountPointProvider::kPersistentName[] = "Persistent";
|
| const char SandboxMountPointProvider::kTemporaryName[] = "Temporary";
|
| +const char SandboxMountPointProvider::kExternalName[] = "External";
|
|
|
| SandboxMountPointProvider::SandboxMountPointProvider(
|
| FileSystemPathManager* path_manager,
|
| @@ -126,7 +127,8 @@
|
| SandboxMountPointProvider::~SandboxMountPointProvider() {
|
| }
|
|
|
| -bool SandboxMountPointProvider::IsAccessAllowed(const GURL& origin_url) {
|
| +bool SandboxMountPointProvider::IsAccessAllowed(const GURL& origin_url,
|
| + const FilePath& unused) {
|
| // We essentially depend on quota to do our access controls.
|
| return path_manager_->IsAllowedScheme(origin_url);
|
| }
|
| @@ -211,6 +213,14 @@
|
| return false;
|
| }
|
|
|
| +std::vector<FilePath> SandboxMountPointProvider::GetRootDirectories() const {
|
| + NOTREACHED();
|
| + // TODO(ericu): Implement this method and check for access permissions as
|
| + // fileBrowserPrivate extension API does. We currently have another mechanism,
|
| + // but we should switch over.
|
| + return std::vector<FilePath>();
|
| +}
|
| +
|
| void SandboxMountPointProvider::GetFileSystemRootPath(
|
| const GURL& origin_url, fileapi::FileSystemType type,
|
| bool create, FileSystemPathManager::GetRootPathCallback* callback_ptr) {
|
|
|