diff options
author | vandebo@chromium.org <vandebo@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2014-03-28 21:06:48 +0000 |
---|---|---|
committer | vandebo@chromium.org <vandebo@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2014-03-28 21:06:48 +0000 |
commit | 65486ad7c53dd9da35c5464bf8f6ade16bca1f58 (patch) | |
tree | 54bd4e702efaf01d0abf5c2e2ae4edb4a7cc898a /webkit/browser/fileapi/file_system_context.cc | |
parent | 20e7cd1e49135d40d2d84f87358000defbf82cf6 (diff) | |
download | chromium_src-65486ad7c53dd9da35c5464bf8f6ade16bca1f58.zip chromium_src-65486ad7c53dd9da35c5464bf8f6ade16bca1f58.tar.gz chromium_src-65486ad7c53dd9da35c5464bf8f6ade16bca1f58.tar.bz2 |
Change media galleries to external file system type to add toURL support
BUG=160900
R=creis@chromium.org, joi@chromium.org, thestig@chromium.org, tsepez@chromium.org, tzik@chromium.org
Review URL: https://codereview.chromium.org/185393012
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@260276 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'webkit/browser/fileapi/file_system_context.cc')
-rw-r--r-- | webkit/browser/fileapi/file_system_context.cc | 10 |
1 files changed, 6 insertions, 4 deletions
diff --git a/webkit/browser/fileapi/file_system_context.cc b/webkit/browser/fileapi/file_system_context.cc index 3c75a8b..f6e7df3 100644 --- a/webkit/browser/fileapi/file_system_context.cc +++ b/webkit/browser/fileapi/file_system_context.cc @@ -78,15 +78,17 @@ int FileSystemContext::GetPermissionPolicy(FileSystemType type) { return FILE_PERMISSION_READ_ONLY | FILE_PERMISSION_USE_FILE_PERMISSION; - // Following types are only accessed via IsolatedFileSystem, and - // don't have their own permission policies. case kFileSystemTypeDeviceMedia: - case kFileSystemTypeDragged: - case kFileSystemTypeForTransientFile: case kFileSystemTypeIphoto: case kFileSystemTypeItunes: case kFileSystemTypeNativeMedia: case kFileSystemTypePicasa: + return FILE_PERMISSION_USE_FILE_PERMISSION; + + // Following types are only accessed via IsolatedFileSystem, and + // don't have their own permission policies. + case kFileSystemTypeDragged: + case kFileSystemTypeForTransientFile: case kFileSystemTypePluginPrivate: return FILE_PERMISSION_ALWAYS_DENY; |