Index: webkit/fileapi/sandbox_mount_point_provider.cc |
=================================================================== |
--- webkit/fileapi/sandbox_mount_point_provider.cc (revision 81576) |
+++ webkit/fileapi/sandbox_mount_point_provider.cc (working copy) |
@@ -113,6 +113,7 @@ |
const char SandboxMountPointProvider::kPersistentName[] = "Persistent"; |
const char SandboxMountPointProvider::kTemporaryName[] = "Temporary"; |
+const char SandboxMountPointProvider::kExternalName[] = "External"; |
SandboxMountPointProvider::SandboxMountPointProvider( |
FileSystemPathManager* path_manager, |
@@ -126,7 +127,8 @@ |
SandboxMountPointProvider::~SandboxMountPointProvider() { |
} |
-bool SandboxMountPointProvider::IsAccessAllowed(const GURL& origin_url) { |
+bool SandboxMountPointProvider::IsAccessAllowed(const GURL& origin_url, |
+ const FilePath& unused) { |
// We essentially depend on quota to do our access controls. |
return path_manager_->IsAllowedScheme(origin_url); |
} |
@@ -211,6 +213,14 @@ |
return false; |
} |
+std::vector<FilePath> SandboxMountPointProvider::GetRootDirectories() const { |
+ NOTREACHED(); |
+ // TODO(ericu): Implement this method and check for access permissions as |
+ // fileBrowserPrivate extension API does. We currently have another mechanism, |
+ // but we should switch over. |
+ return std::vector<FilePath>(); |
+} |
+ |
void SandboxMountPointProvider::GetFileSystemRootPath( |
const GURL& origin_url, fileapi::FileSystemType type, |
bool create, FileSystemPathManager::GetRootPathCallback* callback_ptr) { |