| Index: webkit/fileapi/sandboxed_file_system_operation.cc
|
| ===================================================================
|
| --- webkit/fileapi/sandboxed_file_system_operation.cc (revision 72915)
|
| +++ webkit/fileapi/sandboxed_file_system_operation.cc (working copy)
|
| @@ -150,6 +150,10 @@
|
| FileSystemOperation::TouchFile(path, last_access_time, last_modified_time);
|
| }
|
|
|
| +base::FileUtilProxyBase* SandboxedFileSystemOperation::file_util_proxy() const {
|
| + return file_system_context_->file_util_proxy();
|
| +}
|
| +
|
| void SandboxedFileSystemOperation::DidGetRootPath(
|
| bool success, const FilePath& path, const std::string& name) {
|
| DCHECK(success || path.empty());
|
| @@ -162,7 +166,7 @@
|
| // We may want do more checks, but for now it just checks if the given
|
| // |path| is under the valid FileSystem root path for this host context.
|
| if (!file_system_context_->path_manager()->CrackFileSystemPath(
|
| - path, NULL, NULL, NULL)) {
|
| + path, NULL, NULL, NULL, NULL)) {
|
| dispatcher()->DidFail(base::PLATFORM_FILE_ERROR_SECURITY);
|
| return false;
|
| }
|
| @@ -174,7 +178,7 @@
|
| GURL origin_url;
|
| FilePath virtual_path;
|
| if (!file_system_context_->path_manager()->CrackFileSystemPath(
|
| - path, &origin_url, NULL, &virtual_path)) {
|
| + path, &origin_url, NULL, NULL, &virtual_path)) {
|
| dispatcher()->DidFail(base::PLATFORM_FILE_ERROR_SECURITY);
|
| return false;
|
| }
|
|
|