Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(76)

Unified Diff: chrome/browser/chromeos/extensions/file_manager/file_browser_handler_api.cc

Issue 18344013: fileapi: Rename FileSystemMountProvider to FileSystemBackend (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: rebase Created 7 years, 5 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: chrome/browser/chromeos/extensions/file_manager/file_browser_handler_api.cc
diff --git a/chrome/browser/chromeos/extensions/file_manager/file_browser_handler_api.cc b/chrome/browser/chromeos/extensions/file_manager/file_browser_handler_api.cc
index cfe538bee9ec841b580c205ecb36cc4f6d82b1a2..16bf4fd2f28d438601b6bde52f65dd3619e0d385 100644
--- a/chrome/browser/chromeos/extensions/file_manager/file_browser_handler_api.cc
+++ b/chrome/browser/chromeos/extensions/file_manager/file_browser_handler_api.cc
@@ -21,7 +21,7 @@
// - The function grants permissions needed to read/write/create file under the
// selected path. To grant permissions to the caller, caller's extension ID
// has to be allowed to access the files virtual path (e.g. /Downloads/foo)
-// in ExternalFileSystemMountPointProvider. Additionally, the callers render
+// in ExternalFileSystemBackend. Additionally, the callers render
// process ID has to be granted read, write and create permissions for the
// selected file's full filesystem path (e.g.
// /home/chronos/user/Downloads/foo) in ChildProcessSecurityPolicy.
@@ -48,8 +48,8 @@
#include "content/public/browser/render_view_host.h"
#include "content/public/browser/storage_partition.h"
#include "ui/shell_dialogs/select_file_dialog.h"
+#include "webkit/browser/fileapi/file_system_backend.h"
#include "webkit/browser/fileapi/file_system_context.h"
-#include "webkit/browser/fileapi/file_system_mount_point_provider.h"
using content::BrowserContext;
using content::BrowserThread;
@@ -367,18 +367,18 @@ void FileBrowserHandlerInternalSelectFileFunction::OnFileSystemOpened(
void FileBrowserHandlerInternalSelectFileFunction::GrantPermissions() {
content::SiteInstance* site_instance = render_view_host()->GetSiteInstance();
- fileapi::ExternalFileSystemMountPointProvider* external_provider =
+ fileapi::ExternalFileSystemBackend* external_backend =
BrowserContext::GetStoragePartition(profile_, site_instance)->
- GetFileSystemContext()->external_provider();
- DCHECK(external_provider);
+ GetFileSystemContext()->external_backend();
+ DCHECK(external_backend);
- external_provider->GetVirtualPath(full_path_, &virtual_path_);
+ external_backend->GetVirtualPath(full_path_, &virtual_path_);
DCHECK(!virtual_path_.empty());
// Grant access to this particular file to target extension. This will
// ensure that the target extension can access only this FS entry and
// prevent from traversing FS hierarchy upward.
- external_provider->GrantFileAccessToExtension(extension_id(), virtual_path_);
+ external_backend->GrantFileAccessToExtension(extension_id(), virtual_path_);
// Grant access to the selected file to target extensions render view process.
content::ChildProcessSecurityPolicy::GetInstance()->GrantPermissionsForFile(

Powered by Google App Engine
This is Rietveld 408576698