Index: webkit/fileapi/sandbox_mount_point_provider.cc |
diff --git a/webkit/fileapi/sandbox_mount_point_provider.cc b/webkit/fileapi/sandbox_mount_point_provider.cc |
index baf7cac7fd76f29cf6377d59543cce30779ecbd0..a7121ac0a0d409ef2bc8baf77caf92dce691790a 100644 |
--- a/webkit/fileapi/sandbox_mount_point_provider.cc |
+++ b/webkit/fileapi/sandbox_mount_point_provider.cc |
@@ -63,12 +63,12 @@ const char kPersistentOriginsCountLabel[] = "FileSystem.PersistentOriginsCount"; |
// Restricted names. |
// http://dev.w3.org/2009/dap/file-system/file-dir-sys.html#naming-restrictions |
-const FilePath::CharType* const kRestrictedNames[] = { |
+const base::FilePath::CharType* const kRestrictedNames[] = { |
FILE_PATH_LITERAL("."), FILE_PATH_LITERAL(".."), |
}; |
// Restricted chars. |
-const FilePath::CharType kRestrictedChars[] = { |
+const base::FilePath::CharType kRestrictedChars[] = { |
FILE_PATH_LITERAL('/'), FILE_PATH_LITERAL('\\'), |
}; |
@@ -109,7 +109,7 @@ void ValidateRootOnFileThread( |
base::PlatformFileError* error_ptr) { |
DCHECK(error_ptr); |
- FilePath root_path = |
+ base::FilePath root_path = |
file_util->GetDirectoryForOriginAndType( |
origin_url, type, create, error_ptr); |
if (*error_ptr != base::PLATFORM_FILE_OK) { |
@@ -126,7 +126,7 @@ void ValidateRootOnFileThread( |
} // anonymous namespace |
-const FilePath::CharType SandboxMountPointProvider::kFileSystemDirectory[] = |
+const base::FilePath::CharType SandboxMountPointProvider::kFileSystemDirectory[] = |
FILE_PATH_LITERAL("File System"); |
// static |
@@ -139,7 +139,7 @@ bool SandboxMountPointProvider::CanHandleType(FileSystemType type) { |
SandboxMountPointProvider::SandboxMountPointProvider( |
quota::QuotaManagerProxy* quota_manager_proxy, |
base::SequencedTaskRunner* file_task_runner, |
- const FilePath& profile_path, |
+ const base::FilePath& profile_path, |
const FileSystemOptions& file_system_options) |
: file_task_runner_(file_task_runner), |
profile_path_(profile_path), |
@@ -211,16 +211,16 @@ void SandboxMountPointProvider::ValidateFileSystemRoot( |
callback, base::Owned(error_ptr))); |
}; |
-FilePath |
+base::FilePath |
SandboxMountPointProvider::GetFileSystemRootPathOnFileThread( |
const FileSystemURL& url, |
bool create) { |
if (file_system_options_.is_incognito()) |
// TODO(kinuko): return an isolated temporary directory. |
- return FilePath(); |
+ return base::FilePath(); |
if (!IsAllowedScheme(url.origin())) |
- return FilePath(); |
+ return base::FilePath(); |
return GetBaseDirectoryForOriginAndType(url.origin(), url.type(), create); |
} |
@@ -233,7 +233,7 @@ bool SandboxMountPointProvider::IsAccessAllowed(const FileSystemURL& url) { |
return IsAllowedScheme(url.origin()); |
} |
-bool SandboxMountPointProvider::IsRestrictedFileName(const FilePath& filename) |
+bool SandboxMountPointProvider::IsRestrictedFileName(const base::FilePath& filename) |
const { |
if (filename.value().empty()) |
return false; |
@@ -246,7 +246,7 @@ bool SandboxMountPointProvider::IsRestrictedFileName(const FilePath& filename) |
for (size_t i = 0; i < arraysize(kRestrictedChars); ++i) { |
if (filename.value().find(kRestrictedChars[i]) != |
- FilePath::StringType::npos) |
+ base::FilePath::StringType::npos) |
return true; |
} |
@@ -341,14 +341,14 @@ SandboxMountPointProvider::CreateOriginEnumerator() { |
return new ObfuscatedOriginEnumerator(sandbox_sync_file_util()); |
} |
-FilePath SandboxMountPointProvider::GetBaseDirectoryForOriginAndType( |
+base::FilePath SandboxMountPointProvider::GetBaseDirectoryForOriginAndType( |
const GURL& origin_url, fileapi::FileSystemType type, bool create) { |
base::PlatformFileError error = base::PLATFORM_FILE_OK; |
- FilePath path = sandbox_sync_file_util()->GetDirectoryForOriginAndType( |
+ base::FilePath path = sandbox_sync_file_util()->GetDirectoryForOriginAndType( |
origin_url, type, create, &error); |
if (error != base::PLATFORM_FILE_OK) |
- return FilePath(); |
+ return base::FilePath(); |
return path; |
} |
@@ -418,10 +418,10 @@ int64 SandboxMountPointProvider::GetOriginUsageOnFileThread( |
const GURL& origin_url, |
fileapi::FileSystemType type) { |
DCHECK(CanHandleType(type)); |
- FilePath base_path = |
+ base::FilePath base_path = |
GetBaseDirectoryForOriginAndType(origin_url, type, false); |
if (base_path.empty() || !file_util::DirectoryExists(base_path)) return 0; |
- FilePath usage_file_path = |
+ base::FilePath usage_file_path = |
base_path.Append(FileSystemUsageCache::kUsageFileName); |
bool is_valid = FileSystemUsageCache::IsValid(usage_file_path); |
@@ -439,11 +439,11 @@ int64 SandboxMountPointProvider::GetOriginUsageOnFileThread( |
FileSystemOperationContext context(file_system_context); |
FileSystemURL url = file_system_context->CreateCrackedFileSystemURL( |
- origin_url, type, FilePath()); |
+ origin_url, type, base::FilePath()); |
scoped_ptr<FileSystemFileUtil::AbstractFileEnumerator> enumerator( |
sandbox_sync_file_util()->CreateFileEnumerator(&context, url, true)); |
- FilePath file_path_each; |
+ base::FilePath file_path_each; |
int64 usage = 0; |
while (!(file_path_each = enumerator->Next()).empty()) { |
@@ -459,7 +459,7 @@ void SandboxMountPointProvider::InvalidateUsageCache( |
const GURL& origin_url, fileapi::FileSystemType type) { |
DCHECK(CanHandleType(type)); |
base::PlatformFileError error = base::PLATFORM_FILE_OK; |
- FilePath usage_file_path = GetUsageCachePathForOriginAndType( |
+ base::FilePath usage_file_path = GetUsageCachePathForOriginAndType( |
sandbox_sync_file_util(), origin_url, type, &error); |
if (error != base::PLATFORM_FILE_OK) |
return; |
@@ -540,29 +540,29 @@ SandboxMountPointProvider::CreateFileSystemOperationForSync( |
operation_context.Pass()); |
} |
-FilePath SandboxMountPointProvider::GetUsageCachePathForOriginAndType( |
+base::FilePath SandboxMountPointProvider::GetUsageCachePathForOriginAndType( |
const GURL& origin_url, |
FileSystemType type) { |
base::PlatformFileError error; |
- FilePath path = GetUsageCachePathForOriginAndType( |
+ base::FilePath path = GetUsageCachePathForOriginAndType( |
sandbox_sync_file_util(), origin_url, type, &error); |
if (error != base::PLATFORM_FILE_OK) |
- return FilePath(); |
+ return base::FilePath(); |
return path; |
} |
// static |
-FilePath SandboxMountPointProvider::GetUsageCachePathForOriginAndType( |
+base::FilePath SandboxMountPointProvider::GetUsageCachePathForOriginAndType( |
ObfuscatedFileUtil* sandbox_file_util, |
const GURL& origin_url, |
fileapi::FileSystemType type, |
base::PlatformFileError* error_out) { |
DCHECK(error_out); |
*error_out = base::PLATFORM_FILE_OK; |
- FilePath base_path = sandbox_file_util->GetDirectoryForOriginAndType( |
+ base::FilePath base_path = sandbox_file_util->GetDirectoryForOriginAndType( |
origin_url, type, false /* create */, error_out); |
if (*error_out != base::PLATFORM_FILE_OK) |
- return FilePath(); |
+ return base::FilePath(); |
return base_path.Append(FileSystemUsageCache::kUsageFileName); |
} |