| Index: webkit/browser/fileapi/file_system_context.cc
|
| diff --git a/webkit/browser/fileapi/file_system_context.cc b/webkit/browser/fileapi/file_system_context.cc
|
| index 444ef46904c069759fd3e7bfab5bf8326e208ec8..17f9cf8f696570714dc1caed28eea061cfa48a80 100644
|
| --- a/webkit/browser/fileapi/file_system_context.cc
|
| +++ b/webkit/browser/fileapi/file_system_context.cc
|
| @@ -418,7 +418,7 @@ FileSystemURL FileSystemContext::CreateCrackedFileSystemURL(
|
| return CrackFileSystemURL(FileSystemURL(origin, type, path));
|
| }
|
|
|
| -#if defined(OS_CHROMEOS) && defined(GOOGLE_CHROME_BUILD)
|
| +#if defined(OS_CHROMEOS)
|
| void FileSystemContext::EnableTemporaryFileSystemInIncognito() {
|
| sandbox_backend_->set_enable_temporary_file_system_in_incognito(true);
|
| }
|
| @@ -428,7 +428,7 @@ bool FileSystemContext::CanServeURLRequest(const FileSystemURL& url) const {
|
| // We never support accessing files in isolated filesystems via an URL.
|
| if (url.mount_type() == kFileSystemTypeIsolated)
|
| return false;
|
| -#if defined(OS_CHROMEOS) && defined(GOOGLE_CHROME_BUILD)
|
| +#if defined(OS_CHROMEOS)
|
| if (url.type() == kFileSystemTypeTemporary &&
|
| sandbox_backend_->enable_temporary_file_system_in_incognito()) {
|
| return true;
|
|
|