Index: webkit/fileapi/isolated_mount_point_provider.cc |
diff --git a/webkit/fileapi/isolated_mount_point_provider.cc b/webkit/fileapi/isolated_mount_point_provider.cc |
index f21909c36df252e7dae9668df3ac9e9c289ae75c..160a71c189aeb5c2752402c8278d7139b49e7000 100644 |
--- a/webkit/fileapi/isolated_mount_point_provider.cc |
+++ b/webkit/fileapi/isolated_mount_point_provider.cc |
@@ -35,7 +35,7 @@ |
namespace fileapi { |
IsolatedMountPointProvider::IsolatedMountPointProvider( |
- const FilePath& profile_path) |
+ const base::FilePath& profile_path) |
: profile_path_(profile_path), |
media_path_filter_(new MediaPathFilter()), |
isolated_file_util_(new AsyncFileUtilAdapter(new IsolatedFileUtil())), |
@@ -64,12 +64,12 @@ void IsolatedMountPointProvider::ValidateFileSystemRoot( |
base::Bind(callback, base::PLATFORM_FILE_ERROR_SECURITY)); |
} |
-FilePath IsolatedMountPointProvider::GetFileSystemRootPathOnFileThread( |
+base::FilePath IsolatedMountPointProvider::GetFileSystemRootPathOnFileThread( |
const FileSystemURL& url, |
bool create) { |
// This is not supposed to be used. |
NOTREACHED(); |
- return FilePath(); |
+ return base::FilePath(); |
} |
bool IsolatedMountPointProvider::IsAccessAllowed(const FileSystemURL& url) { |
@@ -77,7 +77,7 @@ bool IsolatedMountPointProvider::IsAccessAllowed(const FileSystemURL& url) { |
} |
bool IsolatedMountPointProvider::IsRestrictedFileName( |
- const FilePath& filename) const { |
+ const base::FilePath& filename) const { |
// TODO(kinuko): We need to check platform-specific restricted file names |
// before we actually start allowing file creation in isolated file systems. |
return false; |