| Index: content/common/sandbox_mac.mm
|
| diff --git a/content/common/sandbox_mac.mm b/content/common/sandbox_mac.mm
|
| index c90b672435998786996c1fe6a27b739f838fe764..7034bbcee37c51369ca621c039a6b6f9a395845f 100644
|
| --- a/content/common/sandbox_mac.mm
|
| +++ b/content/common/sandbox_mac.mm
|
| @@ -282,7 +282,7 @@ NSString* Sandbox::BuildAllowDirectoryAccessSandboxString(
|
| SandboxVariableSubstitions* substitutions) {
|
| // A whitelist is used to determine which directories can be statted
|
| // This means that in the case of an /a/b/c/d/ directory, we may be able to
|
| - // stat the leaf directory, but not it's parent.
|
| + // stat the leaf directory, but not its parent.
|
| // The extension code in Chrome calls realpath() which fails if it can't call
|
| // stat() on one of the parent directories in the path.
|
| // The solution to this is to allow statting the parent directories themselves
|
| @@ -324,7 +324,7 @@ NSString* Sandbox::BuildAllowDirectoryAccessSandboxString(
|
| subdir_escaped_ns];
|
| }
|
|
|
| - // Finally append the leaf directory. Unlike it's parents (for which only
|
| + // Finally append the leaf directory. Unlike its parents (for which only
|
| // stat() should be allowed), the leaf directory needs full access.
|
| (*substitutions)["ALLOWED_DIR"] =
|
| SandboxSubstring(allowed_dir_canonical.value(),
|
|
|