| Index: chrome/browser/chromeos/extensions/file_manager/file_browser_handler_api.cc
|
| diff --git a/chrome/browser/chromeos/extensions/file_manager/file_browser_handler_api.cc b/chrome/browser/chromeos/extensions/file_manager/file_browser_handler_api.cc
|
| index cfe538bee9ec841b580c205ecb36cc4f6d82b1a2..16bf4fd2f28d438601b6bde52f65dd3619e0d385 100644
|
| --- a/chrome/browser/chromeos/extensions/file_manager/file_browser_handler_api.cc
|
| +++ b/chrome/browser/chromeos/extensions/file_manager/file_browser_handler_api.cc
|
| @@ -21,7 +21,7 @@
|
| // - The function grants permissions needed to read/write/create file under the
|
| // selected path. To grant permissions to the caller, caller's extension ID
|
| // has to be allowed to access the files virtual path (e.g. /Downloads/foo)
|
| -// in ExternalFileSystemMountPointProvider. Additionally, the callers render
|
| +// in ExternalFileSystemBackend. Additionally, the callers render
|
| // process ID has to be granted read, write and create permissions for the
|
| // selected file's full filesystem path (e.g.
|
| // /home/chronos/user/Downloads/foo) in ChildProcessSecurityPolicy.
|
| @@ -48,8 +48,8 @@
|
| #include "content/public/browser/render_view_host.h"
|
| #include "content/public/browser/storage_partition.h"
|
| #include "ui/shell_dialogs/select_file_dialog.h"
|
| +#include "webkit/browser/fileapi/file_system_backend.h"
|
| #include "webkit/browser/fileapi/file_system_context.h"
|
| -#include "webkit/browser/fileapi/file_system_mount_point_provider.h"
|
|
|
| using content::BrowserContext;
|
| using content::BrowserThread;
|
| @@ -367,18 +367,18 @@ void FileBrowserHandlerInternalSelectFileFunction::OnFileSystemOpened(
|
|
|
| void FileBrowserHandlerInternalSelectFileFunction::GrantPermissions() {
|
| content::SiteInstance* site_instance = render_view_host()->GetSiteInstance();
|
| - fileapi::ExternalFileSystemMountPointProvider* external_provider =
|
| + fileapi::ExternalFileSystemBackend* external_backend =
|
| BrowserContext::GetStoragePartition(profile_, site_instance)->
|
| - GetFileSystemContext()->external_provider();
|
| - DCHECK(external_provider);
|
| + GetFileSystemContext()->external_backend();
|
| + DCHECK(external_backend);
|
|
|
| - external_provider->GetVirtualPath(full_path_, &virtual_path_);
|
| + external_backend->GetVirtualPath(full_path_, &virtual_path_);
|
| DCHECK(!virtual_path_.empty());
|
|
|
| // Grant access to this particular file to target extension. This will
|
| // ensure that the target extension can access only this FS entry and
|
| // prevent from traversing FS hierarchy upward.
|
| - external_provider->GrantFileAccessToExtension(extension_id(), virtual_path_);
|
| + external_backend->GrantFileAccessToExtension(extension_id(), virtual_path_);
|
|
|
| // Grant access to the selected file to target extensions render view process.
|
| content::ChildProcessSecurityPolicy::GetInstance()->GrantPermissionsForFile(
|
|
|