| Index: webkit/fileapi/sandbox_mount_point_provider.cc
 | 
| ===================================================================
 | 
| --- webkit/fileapi/sandbox_mount_point_provider.cc	(revision 81576)
 | 
| +++ webkit/fileapi/sandbox_mount_point_provider.cc	(working copy)
 | 
| @@ -113,6 +113,7 @@
 | 
|  
 | 
|  const char SandboxMountPointProvider::kPersistentName[] = "Persistent";
 | 
|  const char SandboxMountPointProvider::kTemporaryName[] = "Temporary";
 | 
| +const char SandboxMountPointProvider::kExternalName[] = "External";
 | 
|  
 | 
|  SandboxMountPointProvider::SandboxMountPointProvider(
 | 
|      FileSystemPathManager* path_manager,
 | 
| @@ -126,7 +127,8 @@
 | 
|  SandboxMountPointProvider::~SandboxMountPointProvider() {
 | 
|  }
 | 
|  
 | 
| -bool SandboxMountPointProvider::IsAccessAllowed(const GURL& origin_url) {
 | 
| +bool SandboxMountPointProvider::IsAccessAllowed(const GURL& origin_url,
 | 
| +                                                const FilePath& unused) {
 | 
|    // We essentially depend on quota to do our access controls.
 | 
|    return path_manager_->IsAllowedScheme(origin_url);
 | 
|  }
 | 
| @@ -211,6 +213,14 @@
 | 
|    return false;
 | 
|  }
 | 
|  
 | 
| +std::vector<FilePath> SandboxMountPointProvider::GetRootDirectories() const {
 | 
| +  NOTREACHED();
 | 
| +  // TODO(ericu): Implement this method and check for access permissions as
 | 
| +  // fileBrowserPrivate extension API does. We currently have another mechanism,
 | 
| +  // but we should switch over.
 | 
| +  return  std::vector<FilePath>();
 | 
| +}
 | 
| +
 | 
|  void SandboxMountPointProvider::GetFileSystemRootPath(
 | 
|      const GURL& origin_url, fileapi::FileSystemType type,
 | 
|      bool create, FileSystemPathManager::GetRootPathCallback* callback_ptr) {
 | 
| 
 |