Index: net/url_request/url_request_file_job.cc |
diff --git a/net/url_request/url_request_file_job.cc b/net/url_request/url_request_file_job.cc |
index 5f33508cb16a9f768532e05ac74df6887a26e929..5e14f0710b7e363ad94aa418708cee5ba734318a 100644 |
--- a/net/url_request/url_request_file_job.cc |
+++ b/net/url_request/url_request_file_job.cc |
@@ -91,34 +91,6 @@ URLRequestFileJob::URLRequestFileJob(URLRequest* request, |
remaining_bytes_(0) { |
} |
-// static |
-URLRequestJob* URLRequestFileJob::Factory(URLRequest* request, |
- NetworkDelegate* network_delegate, |
- const std::string& scheme) { |
- FilePath file_path; |
- const bool is_file = FileURLToFilePath(request->url(), &file_path); |
- |
- // Check file access permissions. |
- if (!network_delegate || |
- !network_delegate->CanAccessFile(*request, file_path)) { |
- return new URLRequestErrorJob(request, network_delegate, ERR_ACCESS_DENIED); |
- } |
- // We need to decide whether to create URLRequestFileJob for file access or |
- // URLRequestFileDirJob for directory access. To avoid accessing the |
- // filesystem, we only look at the path string here. |
- // The code in the URLRequestFileJob::Start() method discovers that a path, |
- // which doesn't end with a slash, should really be treated as a directory, |
- // and it then redirects to the URLRequestFileDirJob. |
- if (is_file && |
- file_util::EndsWithSeparator(file_path) && |
- file_path.IsAbsolute()) |
- return new URLRequestFileDirJob(request, network_delegate, file_path); |
- |
- // Use a regular file request job for all non-directories (including invalid |
- // file names). |
- return new URLRequestFileJob(request, network_delegate, file_path); |
-} |
- |
void URLRequestFileJob::Start() { |
DCHECK(!async_resolver_); |
async_resolver_ = new AsyncResolver(this); |