| Index: content/browser/fileapi/fileapi_message_filter.cc
|
| diff --git a/content/browser/fileapi/fileapi_message_filter.cc b/content/browser/fileapi/fileapi_message_filter.cc
|
| index 61b552bd329972a8403896889a54bef003a376b2..63641e13f01b1dfef03a66539d13034db3a90acf 100644
|
| --- a/content/browser/fileapi/fileapi_message_filter.cc
|
| +++ b/content/browser/fileapi/fileapi_message_filter.cc
|
| @@ -749,12 +749,14 @@ void FileAPIMessageFilter::DidCreateSnapshot(
|
| // - the file comes from sandboxed filesystem. Reading sandboxed files is
|
| // always permitted, but only implicitly.
|
| // - the underlying filesystem returned newly created snapshot file.
|
| - // - the file comes from an external drive filesystem. The renderer has
|
| - // already been granted read permission for the file's nominal path, but
|
| - // for drive files, platform paths differ from the nominal paths.
|
| + // - the nominal path differs from the platform path. This can happen even
|
| + // when the filesystem has been granted permissions. This happens with:
|
| + // - Drive filesystems
|
| + // - Picasa filesystems
|
| DCHECK(snapshot_file ||
|
| fileapi::SandboxMountPointProvider::IsSandboxType(url.type()) ||
|
| - url.type() == fileapi::kFileSystemTypeDrive);
|
| + url.type() == fileapi::kFileSystemTypeDrive ||
|
| + url.type() == fileapi::kFileSystemTypePicasa);
|
| ChildProcessSecurityPolicyImpl::GetInstance()->GrantReadFile(
|
| process_id_, platform_path);
|
| if (snapshot_file) {
|
|
|