Chromium Code Reviews| Index: webkit/common/fileapi/file_system_util.cc |
| diff --git a/webkit/common/fileapi/file_system_util.cc b/webkit/common/fileapi/file_system_util.cc |
| index a19136a1e9e20acf7add98ae88eb4f896a112350..ded3457ccf3efb2626c51f6491701a7adefefca5 100644 |
| --- a/webkit/common/fileapi/file_system_util.cc |
| +++ b/webkit/common/fileapi/file_system_util.cc |
| @@ -454,12 +454,12 @@ std::string GetIsolatedFileSystemRootURIString( |
| kFileSystemTypeIsolated).spec(); |
| if (base::FilePath::FromUTF8Unsafe(filesystem_id).ReferencesParent()) |
| return std::string(); |
| - root.append(filesystem_id); |
| + root.append(net::EscapePath(filesystem_id)); |
|
kinaba
2014/06/06 05:40:11
Maybe EscapeQueryParamValue is more appropriate?
mtomasz
2014/06/06 05:45:37
Mount point names must not contain "/", per:
https
kinaba
2014/06/06 06:10:47
Ah, thanks, I hope I've got your point.
So, the as
mtomasz
2014/06/06 06:14:43
You're right. In mount_path_util.cc, "." need to b
|
| root.append("/"); |
| if (!optional_root_name.empty()) { |
| if (base::FilePath::FromUTF8Unsafe(optional_root_name).ReferencesParent()) |
| return std::string(); |
| - root.append(optional_root_name); |
| + root.append(net::EscapePath(optional_root_name)); |
| root.append("/"); |
| } |
| return root; |
| @@ -472,7 +472,7 @@ std::string GetExternalFileSystemRootURIString( |
| kFileSystemTypeExternal).spec(); |
| if (base::FilePath::FromUTF8Unsafe(mount_name).ReferencesParent()) |
| return std::string(); |
| - root.append(mount_name); |
| + root.append(net::EscapePath(mount_name)); |
| root.append("/"); |
| return root; |
| } |