| Index: chrome/browser/extensions/extension_file_browser_private_api.cc
|
| diff --git a/chrome/browser/extensions/extension_file_browser_private_api.cc b/chrome/browser/extensions/extension_file_browser_private_api.cc
|
| index dc418f3dfc8e32e280adb6a82b5ac159d25650ee..ef336408158943df636b5ee62834fefad949b9ec 100644
|
| --- a/chrome/browser/extensions/extension_file_browser_private_api.cc
|
| +++ b/chrome/browser/extensions/extension_file_browser_private_api.cc
|
| @@ -47,7 +47,6 @@
|
| #include "webkit/fileapi/file_system_types.h"
|
| #include "webkit/fileapi/file_system_util.h"
|
| #include "webkit/fileapi/file_system_file_util.h"
|
| -#include "webkit/fileapi/local_file_system_file_util.h"
|
| #include "ui/base/l10n/l10n_util.h"
|
|
|
| #ifdef OS_CHROMEOS
|
| @@ -651,12 +650,17 @@ class ExecuteTasksFileSystemCallbackDispatcher
|
| false); // create
|
| FilePath final_file_path = root_path.Append(virtual_path);
|
|
|
| + fileapi::ExternalFileSystemMountPointProvider* external_provider =
|
| + path_manager->external_provider();
|
| + if (!external_provider)
|
| + return false;
|
| +
|
| // Check if this file system entry exists first.
|
| base::PlatformFileInfo file_info;
|
| FilePath platform_path;
|
| fileapi::FileSystemOperationContext file_system_operation_context(
|
| profile_->GetFileSystemContext(),
|
| - fileapi::LocalFileSystemFileUtil::GetInstance());
|
| + external_provider->GetFileSystemFileUtil());
|
| if (base::PLATFORM_FILE_OK !=
|
| fileapi::FileSystemFileUtil::GetInstance()->GetFileInfo(
|
| &file_system_operation_context, final_file_path, &file_info,
|
| @@ -664,11 +668,6 @@ class ExecuteTasksFileSystemCallbackDispatcher
|
| return false;
|
| }
|
|
|
| - fileapi::ExternalFileSystemMountPointProvider* external_provider =
|
| - path_manager->external_provider();
|
| - if (!external_provider)
|
| - return false;
|
| -
|
| // TODO(zelidrag): Let's just prevent all symlinks for now. We don't want a
|
| // USB drive content to point to something in the rest of the file system.
|
| // Ideally, we should permit symlinks within the boundary of the same
|
|
|