Index: webkit/fileapi/sandbox_mount_point_provider.cc |
=================================================================== |
--- webkit/fileapi/sandbox_mount_point_provider.cc (revision 80841) |
+++ webkit/fileapi/sandbox_mount_point_provider.cc (working copy) |
@@ -126,11 +126,17 @@ |
SandboxMountPointProvider::~SandboxMountPointProvider() { |
} |
-bool SandboxMountPointProvider::IsAccessAllowed(const GURL& origin_url) { |
+bool SandboxMountPointProvider::IsAccessAllowed(const GURL& origin_url, |
+ const FilePath& unused) { |
// We essentially depend on quota to do our access controls. |
return path_manager_->IsAllowedScheme(origin_url); |
} |
+void SandboxMountPointProvider::GrantAccess(const GURL& origin_url, |
+ const FilePath& virtual_path) { |
+ NOTREACHED(); |
+} |
+ |
class SandboxMountPointProvider::GetFileSystemRootPathTask |
: public base::RefCountedThreadSafe< |
SandboxMountPointProvider::GetFileSystemRootPathTask> { |
@@ -211,6 +217,14 @@ |
return false; |
} |
+std::vector<FilePath> SandboxMountPointProvider::GetRootDirectories() const { |
+ NOTREACHED(); |
+ // TODO(ericu): Implement this method and check for access permissions as |
+ // fileBrowserPrivate extension API does. We currently have another mechanism, |
+ // but we should switch over. |
+ return std::vector<FilePath>(); |
+} |
+ |
void SandboxMountPointProvider::GetFileSystemRootPath( |
const GURL& origin_url, fileapi::FileSystemType type, |
bool create, FileSystemPathManager::GetRootPathCallback* callback_ptr) { |