Chromium Code Reviews| Index: content/browser/fileapi/fileapi_message_filter.cc |
| diff --git a/content/browser/fileapi/fileapi_message_filter.cc b/content/browser/fileapi/fileapi_message_filter.cc |
| index 61b552bd329972a8403896889a54bef003a376b2..63641e13f01b1dfef03a66539d13034db3a90acf 100644 |
| --- a/content/browser/fileapi/fileapi_message_filter.cc |
| +++ b/content/browser/fileapi/fileapi_message_filter.cc |
| @@ -749,12 +749,14 @@ void FileAPIMessageFilter::DidCreateSnapshot( |
| // - the file comes from sandboxed filesystem. Reading sandboxed files is |
| // always permitted, but only implicitly. |
| // - the underlying filesystem returned newly created snapshot file. |
| - // - the file comes from an external drive filesystem. The renderer has |
| - // already been granted read permission for the file's nominal path, but |
| - // for drive files, platform paths differ from the nominal paths. |
| + // - the nominal path differs from the platform path. This can happen even |
| + // when the filesystem has been granted permissions. This happens with: |
| + // - Drive filesystems |
| + // - Picasa filesystems |
|
tommycli
2013/05/22 00:56:22
The Picasa filesystem has both filesystem read-acc
tommycli
2013/05/22 18:03:09
Done.
|
| DCHECK(snapshot_file || |
| fileapi::SandboxMountPointProvider::IsSandboxType(url.type()) || |
| - url.type() == fileapi::kFileSystemTypeDrive); |
| + url.type() == fileapi::kFileSystemTypeDrive || |
| + url.type() == fileapi::kFileSystemTypePicasa); |
| ChildProcessSecurityPolicyImpl::GetInstance()->GrantReadFile( |
| process_id_, platform_path); |
| if (snapshot_file) { |