Index: webkit/browser/fileapi/file_system_context.cc |
diff --git a/webkit/browser/fileapi/file_system_context.cc b/webkit/browser/fileapi/file_system_context.cc |
index 444ef46904c069759fd3e7bfab5bf8326e208ec8..17f9cf8f696570714dc1caed28eea061cfa48a80 100644 |
--- a/webkit/browser/fileapi/file_system_context.cc |
+++ b/webkit/browser/fileapi/file_system_context.cc |
@@ -418,7 +418,7 @@ FileSystemURL FileSystemContext::CreateCrackedFileSystemURL( |
return CrackFileSystemURL(FileSystemURL(origin, type, path)); |
} |
-#if defined(OS_CHROMEOS) && defined(GOOGLE_CHROME_BUILD) |
+#if defined(OS_CHROMEOS) |
void FileSystemContext::EnableTemporaryFileSystemInIncognito() { |
sandbox_backend_->set_enable_temporary_file_system_in_incognito(true); |
} |
@@ -428,7 +428,7 @@ bool FileSystemContext::CanServeURLRequest(const FileSystemURL& url) const { |
// We never support accessing files in isolated filesystems via an URL. |
if (url.mount_type() == kFileSystemTypeIsolated) |
return false; |
-#if defined(OS_CHROMEOS) && defined(GOOGLE_CHROME_BUILD) |
+#if defined(OS_CHROMEOS) |
if (url.type() == kFileSystemTypeTemporary && |
sandbox_backend_->enable_temporary_file_system_in_incognito()) { |
return true; |