Index: webkit/fileapi/sandbox_mount_point_provider.cc |
diff --git a/webkit/fileapi/sandbox_mount_point_provider.cc b/webkit/fileapi/sandbox_mount_point_provider.cc |
index 854d264a93a5be3cf1ede2e474d3c72b5dc18b27..4a909ee265919dde9658f624f30e847d0968a4f1 100644 |
--- a/webkit/fileapi/sandbox_mount_point_provider.cc |
+++ b/webkit/fileapi/sandbox_mount_point_provider.cc |
@@ -384,14 +384,13 @@ SandboxMountPointProvider::GetFileSystemRootPathOnFileThread( |
return GetBaseDirectoryForOriginAndType(origin_url, type, create); |
} |
-bool SandboxMountPointProvider::IsAccessAllowed(const GURL& origin_url, |
- FileSystemType type, |
- const FilePath& unused) { |
+bool SandboxMountPointProvider::IsAccessAllowed(const FileSystemURL& url) { |
+ FileSystemType type = url.type(); |
if (type != kFileSystemTypeTemporary && type != kFileSystemTypePersistent) |
return false; |
// We essentially depend on quota to do our access controls, so here |
// we only check if the requested scheme is allowed or not. |
- return IsAllowedScheme(origin_url); |
+ return IsAllowedScheme(url.origin()); |
} |
bool SandboxMountPointProvider::IsRestrictedFileName(const FilePath& filename) |