Index: remoting/host/win/elevated_controller.cc |
diff --git a/remoting/host/win/elevated_controller.cc b/remoting/host/win/elevated_controller.cc |
index a43203d1c1f7fcbe1a01eed8accc1762e61b1592..024ca3444ea04ef36fa176d6ad66b489cce123bc 100644 |
--- a/remoting/host/win/elevated_controller.cc |
+++ b/remoting/host/win/elevated_controller.cc |
@@ -32,14 +32,14 @@ namespace { |
const size_t kMaxConfigFileSize = 1024 * 1024; |
// The host configuration file name. |
-const FilePath::CharType kConfigFileName[] = FILE_PATH_LITERAL("host.json"); |
+const base::FilePath::CharType kConfigFileName[] = FILE_PATH_LITERAL("host.json"); |
// The unprivileged configuration file name. |
-const FilePath::CharType kUnprivilegedConfigFileName[] = |
+const base::FilePath::CharType kUnprivilegedConfigFileName[] = |
FILE_PATH_LITERAL("host_unprivileged.json"); |
// The extension for the temporary file. |
-const FilePath::CharType kTempFileExtension[] = FILE_PATH_LITERAL("json~"); |
+const base::FilePath::CharType kTempFileExtension[] = FILE_PATH_LITERAL("json~"); |
// The host configuration file security descriptor that enables full access to |
// Local System and built-in administrators only. |
@@ -92,7 +92,7 @@ bool IsClientAdmin() { |
// Reads and parses the configuration file up to |kMaxConfigFileSize| in |
// size. |
-HRESULT ReadConfig(const FilePath& filename, |
+HRESULT ReadConfig(const base::FilePath& filename, |
scoped_ptr<base::DictionaryValue>* config_out) { |
// Read raw data from the configuration file. |
@@ -137,12 +137,12 @@ HRESULT ReadConfig(const FilePath& filename, |
return S_OK; |
} |
-FilePath GetTempLocationFor(const FilePath& filename) { |
+base::FilePath GetTempLocationFor(const base::FilePath& filename) { |
return filename.ReplaceExtension(kTempFileExtension); |
} |
// Writes a config file to a temporary location. |
-HRESULT WriteConfigFileToTemp(const FilePath& filename, |
+HRESULT WriteConfigFileToTemp(const base::FilePath& filename, |
const char* security_descriptor, |
const char* content, |
size_t length) { |
@@ -161,7 +161,7 @@ HRESULT WriteConfigFileToTemp(const FilePath& filename, |
security_attributes.bInheritHandle = FALSE; |
// Create a temporary file and write configuration to it. |
- FilePath tempname = GetTempLocationFor(filename); |
+ base::FilePath tempname = GetTempLocationFor(filename); |
base::win::ScopedHandle file( |
CreateFileW(tempname.value().c_str(), |
GENERIC_WRITE, |
@@ -190,10 +190,10 @@ HRESULT WriteConfigFileToTemp(const FilePath& filename, |
} |
// Moves a config file from its temporary location to its permanent location. |
-HRESULT MoveConfigFileFromTemp(const FilePath& filename) { |
+HRESULT MoveConfigFileFromTemp(const base::FilePath& filename) { |
// Now that the configuration is stored successfully replace the actual |
// configuration file. |
- FilePath tempname = GetTempLocationFor(filename); |
+ base::FilePath tempname = GetTempLocationFor(filename); |
if (!MoveFileExW(tempname.value().c_str(), |
filename.value().c_str(), |
MOVEFILE_REPLACE_EXISTING)) { |
@@ -253,7 +253,7 @@ HRESULT WriteConfig(const char* content, size_t length, HWND owner_window) { |
base::JSONWriter::Write(&unprivileged_config_dict, &unprivileged_config_str); |
// Write the full configuration file to a temporary location. |
- FilePath full_config_file_path = |
+ base::FilePath full_config_file_path = |
remoting::GetConfigDir().Append(kConfigFileName); |
HRESULT hr = WriteConfigFileToTemp(full_config_file_path, |
kConfigFileSecurityDescriptor, |
@@ -264,7 +264,7 @@ HRESULT WriteConfig(const char* content, size_t length, HWND owner_window) { |
} |
// Write the unprivileged configuration file to a temporary location. |
- FilePath unprivileged_config_file_path = |
+ base::FilePath unprivileged_config_file_path = |
remoting::GetConfigDir().Append(kUnprivilegedConfigFileName); |
hr = WriteConfigFileToTemp(unprivileged_config_file_path, |
kUnprivilegedConfigFileSecurityDescriptor, |
@@ -302,7 +302,7 @@ void ElevatedController::FinalRelease() { |
} |
STDMETHODIMP ElevatedController::GetConfig(BSTR* config_out) { |
- FilePath config_dir = remoting::GetConfigDir(); |
+ base::FilePath config_dir = remoting::GetConfigDir(); |
// Read the unprivileged part of host configuration. |
scoped_ptr<base::DictionaryValue> config; |
@@ -347,7 +347,7 @@ STDMETHODIMP ElevatedController::GetVersion(BSTR* version_out) { |
STDMETHODIMP ElevatedController::SetConfig(BSTR config) { |
// Determine the config directory path and create it if necessary. |
- FilePath config_dir = remoting::GetConfigDir(); |
+ base::FilePath config_dir = remoting::GetConfigDir(); |
if (!file_util::CreateDirectory(config_dir)) { |
return HRESULT_FROM_WIN32(ERROR_ACCESS_DENIED); |
} |
@@ -462,7 +462,7 @@ STDMETHODIMP ElevatedController::UpdateConfig(BSTR config) { |
} |
} |
// Get the old config. |
- FilePath config_dir = remoting::GetConfigDir(); |
+ base::FilePath config_dir = remoting::GetConfigDir(); |
scoped_ptr<base::DictionaryValue> config_old; |
HRESULT hr = ReadConfig(config_dir.Append(kConfigFileName), &config_old); |
if (FAILED(hr)) { |