| Index: components/filesystem/directory_impl.cc
|
| diff --git a/components/filesystem/directory_impl.cc b/components/filesystem/directory_impl.cc
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..195875992bfce866a9351b73a8d72baaed82e461
|
| --- /dev/null
|
| +++ b/components/filesystem/directory_impl.cc
|
| @@ -0,0 +1,353 @@
|
| +// Copyright 2015 The Chromium Authors. All rights reserved.
|
| +// Use of this source code is governed by a BSD-style license that can be
|
| +// found in the LICENSE file.
|
| +
|
| +#include "components/filesystem/directory_impl.h"
|
| +
|
| +#include <dirent.h>
|
| +#include <errno.h>
|
| +#include <fcntl.h>
|
| +#include <stdio.h>
|
| +#include <sys/stat.h>
|
| +#include <sys/types.h>
|
| +#include <unistd.h>
|
| +
|
| +#include "base/files/scoped_temp_dir.h"
|
| +#include "base/logging.h"
|
| +#include "base/memory/scoped_ptr.h"
|
| +#include "base/posix/eintr_wrapper.h"
|
| +#include "build/build_config.h"
|
| +#include "components/filesystem/file_impl.h"
|
| +#include "components/filesystem/shared_impl.h"
|
| +#include "components/filesystem/util.h"
|
| +
|
| +namespace mojo {
|
| +namespace files {
|
| +
|
| +namespace {
|
| +
|
| +// Calls |closedir()| on a |DIR*|.
|
| +struct DIRDeleter {
|
| + void operator()(DIR* dir) const { PCHECK(closedir(dir) == 0); }
|
| +};
|
| +using ScopedDIR = scoped_ptr<DIR, DIRDeleter>;
|
| +
|
| +Error ValidateOpenFlags(uint32_t open_flags, bool is_directory) {
|
| + // Treat unknown flags as "unimplemented".
|
| + if ((open_flags &
|
| + ~(kOpenFlagRead | kOpenFlagWrite | kOpenFlagCreate | kOpenFlagExclusive |
|
| + kOpenFlagAppend | kOpenFlagTruncate)))
|
| + return ERROR_UNIMPLEMENTED;
|
| +
|
| + // At least one of |kOpenFlagRead| or |kOpenFlagWrite| must be set.
|
| + if (!(open_flags & (kOpenFlagRead | kOpenFlagWrite)))
|
| + return ERROR_INVALID_ARGUMENT;
|
| +
|
| + // |kOpenFlagCreate| requires |kOpenFlagWrite|.
|
| + if ((open_flags & kOpenFlagCreate) && !(open_flags & kOpenFlagWrite))
|
| + return ERROR_INVALID_ARGUMENT;
|
| +
|
| + // |kOpenFlagExclusive| requires |kOpenFlagCreate|.
|
| + if ((open_flags & kOpenFlagExclusive) && !(open_flags & kOpenFlagCreate))
|
| + return ERROR_INVALID_ARGUMENT;
|
| +
|
| + if (is_directory) {
|
| + // Check that file-only flags aren't set.
|
| + if ((open_flags & (kOpenFlagAppend | kOpenFlagTruncate)))
|
| + return ERROR_INVALID_ARGUMENT;
|
| + return ERROR_OK;
|
| + }
|
| +
|
| + // File-only flags:
|
| +
|
| + // |kOpenFlagAppend| requires |kOpenFlagWrite|.
|
| + if ((open_flags & kOpenFlagAppend) && !(open_flags & kOpenFlagWrite))
|
| + return ERROR_INVALID_ARGUMENT;
|
| +
|
| + // |kOpenFlagTruncate| requires |kOpenFlagWrite|.
|
| + if ((open_flags & kOpenFlagTruncate) && !(open_flags & kOpenFlagWrite))
|
| + return ERROR_INVALID_ARGUMENT;
|
| +
|
| + return ERROR_OK;
|
| +}
|
| +
|
| +Error ValidateDeleteFlags(uint32_t delete_flags) {
|
| + // Treat unknown flags as "unimplemented".
|
| + if ((delete_flags &
|
| + ~(kDeleteFlagFileOnly | kDeleteFlagDirectoryOnly |
|
| + kDeleteFlagRecursive)))
|
| + return ERROR_UNIMPLEMENTED;
|
| +
|
| + // Only one of the three currently-defined flags may be set.
|
| + if ((delete_flags & kDeleteFlagFileOnly) &&
|
| + (delete_flags & (kDeleteFlagDirectoryOnly | kDeleteFlagRecursive)))
|
| + return ERROR_INVALID_ARGUMENT;
|
| + if ((delete_flags & kDeleteFlagDirectoryOnly) &&
|
| + (delete_flags & (kDeleteFlagFileOnly | kDeleteFlagRecursive)))
|
| + return ERROR_INVALID_ARGUMENT;
|
| + if ((delete_flags & kDeleteFlagRecursive) &&
|
| + (delete_flags & (kDeleteFlagFileOnly | kDeleteFlagDirectoryOnly)))
|
| + return ERROR_INVALID_ARGUMENT;
|
| +
|
| + return ERROR_OK;
|
| +}
|
| +
|
| +} // namespace
|
| +
|
| +DirectoryImpl::DirectoryImpl(InterfaceRequest<Directory> request,
|
| + base::ScopedFD dir_fd,
|
| + scoped_ptr<base::ScopedTempDir> temp_dir)
|
| + : binding_(this, request.Pass()),
|
| + dir_fd_(dir_fd.Pass()),
|
| + temp_dir_(temp_dir.Pass()) {
|
| + DCHECK(dir_fd_.is_valid());
|
| +}
|
| +
|
| +DirectoryImpl::~DirectoryImpl() {
|
| +}
|
| +
|
| +void DirectoryImpl::Read(const ReadCallback& callback) {
|
| + static const size_t kMaxReadCount = 1000;
|
| +
|
| + DCHECK(dir_fd_.is_valid());
|
| +
|
| + // |fdopendir()| takes ownership of the FD (giving it to the |DIR| --
|
| + // |closedir()| will close the FD)), so we need to |dup()| ours.
|
| + base::ScopedFD fd(dup(dir_fd_.get()));
|
| + if (!fd.is_valid()) {
|
| + callback.Run(ErrnoToError(errno), Array<DirectoryEntryPtr>());
|
| + return;
|
| + }
|
| +
|
| + ScopedDIR dir(fdopendir(fd.release()));
|
| + if (!dir) {
|
| + callback.Run(ErrnoToError(errno), Array<DirectoryEntryPtr>());
|
| + return;
|
| + }
|
| +
|
| + Array<DirectoryEntryPtr> result(0);
|
| +
|
| +// Warning: This is not portable (per POSIX.1 -- |buffer| may not be large
|
| +// enough), but it's fine for Linux.
|
| +#if !defined(OS_ANDROID) && !defined(OS_LINUX)
|
| +#error "Use of struct dirent for readdir_r() buffer not portable; please check."
|
| +#endif
|
| + struct dirent buffer;
|
| + for (size_t n = 0;;) {
|
| + struct dirent* entry = nullptr;
|
| + if (int error = readdir_r(dir.get(), &buffer, &entry)) {
|
| + // |error| is effectively an errno (for |readdir_r()|), AFAICT.
|
| + callback.Run(ErrnoToError(error), Array<DirectoryEntryPtr>());
|
| + return;
|
| + }
|
| +
|
| + if (!entry)
|
| + break;
|
| +
|
| + n++;
|
| + if (n > kMaxReadCount) {
|
| + LOG(WARNING) << "Directory contents truncated";
|
| + callback.Run(ERROR_OUT_OF_RANGE, result.Pass());
|
| + return;
|
| + }
|
| +
|
| + DirectoryEntryPtr e = DirectoryEntry::New();
|
| + switch (entry->d_type) {
|
| + case DT_DIR:
|
| + e->type = FILE_TYPE_DIRECTORY;
|
| + break;
|
| + case DT_REG:
|
| + e->type = FILE_TYPE_REGULAR_FILE;
|
| + break;
|
| + default:
|
| + e->type = FILE_TYPE_UNKNOWN;
|
| + break;
|
| + }
|
| + e->name = String(entry->d_name);
|
| + result.push_back(e.Pass());
|
| + }
|
| +
|
| + callback.Run(ERROR_OK, result.Pass());
|
| +}
|
| +
|
| +void DirectoryImpl::Stat(const StatCallback& callback) {
|
| + DCHECK(dir_fd_.is_valid());
|
| + StatFD(dir_fd_.get(), FILE_TYPE_DIRECTORY, callback);
|
| +}
|
| +
|
| +void DirectoryImpl::Touch(TimespecOrNowPtr atime,
|
| + TimespecOrNowPtr mtime,
|
| + const TouchCallback& callback) {
|
| + DCHECK(dir_fd_.is_valid());
|
| + TouchFD(dir_fd_.get(), atime.Pass(), mtime.Pass(), callback);
|
| +}
|
| +
|
| +// TODO(vtl): Move the implementation to a thread pool.
|
| +void DirectoryImpl::OpenFile(const String& path,
|
| + InterfaceRequest<File> file,
|
| + uint32_t open_flags,
|
| + const OpenFileCallback& callback) {
|
| + DCHECK(!path.is_null());
|
| + DCHECK(dir_fd_.is_valid());
|
| +
|
| + if (Error error = IsPathValid(path)) {
|
| + callback.Run(error);
|
| + return;
|
| + }
|
| + // TODO(vtl): Make sure the path doesn't exit this directory (if appropriate).
|
| + // TODO(vtl): Maybe allow absolute paths?
|
| +
|
| + if (Error error = ValidateOpenFlags(open_flags, false)) {
|
| + callback.Run(error);
|
| + return;
|
| + }
|
| +
|
| + int flags = 0;
|
| + if ((open_flags & kOpenFlagRead))
|
| + flags |= (open_flags & kOpenFlagWrite) ? O_RDWR : O_RDONLY;
|
| + else
|
| + flags |= O_WRONLY;
|
| + if ((open_flags & kOpenFlagCreate))
|
| + flags |= O_CREAT;
|
| + if ((open_flags & kOpenFlagExclusive))
|
| + flags |= O_EXCL;
|
| + if ((open_flags & kOpenFlagAppend))
|
| + flags |= O_APPEND;
|
| + if ((open_flags & kOpenFlagTruncate))
|
| + flags |= O_TRUNC;
|
| +
|
| + base::ScopedFD file_fd(
|
| + HANDLE_EINTR(openat(dir_fd_.get(), path.get().c_str(), flags, 0600)));
|
| + if (!file_fd.is_valid()) {
|
| + callback.Run(ErrnoToError(errno));
|
| + return;
|
| + }
|
| +
|
| + if (file.is_pending())
|
| + new FileImpl(file.Pass(), file_fd.Pass());
|
| + callback.Run(ERROR_OK);
|
| +}
|
| +
|
| +void DirectoryImpl::OpenDirectory(const String& path,
|
| + InterfaceRequest<Directory> directory,
|
| + uint32_t open_flags,
|
| + const OpenDirectoryCallback& callback) {
|
| + DCHECK(!path.is_null());
|
| + DCHECK(dir_fd_.is_valid());
|
| +
|
| + if (Error error = IsPathValid(path)) {
|
| + callback.Run(error);
|
| + return;
|
| + }
|
| + // TODO(vtl): Make sure the path doesn't exit this directory (if appropriate).
|
| + // TODO(vtl): Maybe allow absolute paths?
|
| +
|
| + if (Error error = ValidateOpenFlags(open_flags, false)) {
|
| + callback.Run(error);
|
| + return;
|
| + }
|
| +
|
| + // TODO(vtl): Implement read-only (whatever that means).
|
| + if (!(open_flags & kOpenFlagWrite)) {
|
| + callback.Run(ERROR_UNIMPLEMENTED);
|
| + return;
|
| + }
|
| +
|
| + if ((open_flags & kOpenFlagCreate)) {
|
| + if (mkdirat(dir_fd_.get(), path.get().c_str(), 0700) != 0) {
|
| + // Allow |EEXIST| if |kOpenFlagExclusive| is not set. Note, however, that
|
| + // it does not guarantee that |path| is a directory.
|
| + // TODO(vtl): Hrm, ponder if we should check that |path| is a directory.
|
| + if (errno != EEXIST || !(open_flags & kOpenFlagExclusive)) {
|
| + callback.Run(ErrnoToError(errno));
|
| + return;
|
| + }
|
| + }
|
| + }
|
| +
|
| + base::ScopedFD new_dir_fd(
|
| + HANDLE_EINTR(openat(dir_fd_.get(), path.get().c_str(), O_DIRECTORY, 0)));
|
| + if (!new_dir_fd.is_valid()) {
|
| + callback.Run(ErrnoToError(errno));
|
| + return;
|
| + }
|
| +
|
| + if (directory.is_pending())
|
| + new DirectoryImpl(directory.Pass(), new_dir_fd.Pass(), nullptr);
|
| + callback.Run(ERROR_OK);
|
| +}
|
| +
|
| +void DirectoryImpl::Rename(const String& path,
|
| + const String& new_path,
|
| + const RenameCallback& callback) {
|
| + DCHECK(!path.is_null());
|
| + DCHECK(!new_path.is_null());
|
| + DCHECK(dir_fd_.is_valid());
|
| +
|
| + if (Error error = IsPathValid(path)) {
|
| + callback.Run(error);
|
| + return;
|
| + }
|
| + if (Error error = IsPathValid(new_path)) {
|
| + callback.Run(error);
|
| + return;
|
| + }
|
| + // TODO(vtl): See TODOs about |path| in OpenFile().
|
| +
|
| + if (renameat(dir_fd_.get(), path.get().c_str(), dir_fd_.get(),
|
| + new_path.get().c_str())) {
|
| + callback.Run(ErrnoToError(errno));
|
| + return;
|
| + }
|
| +
|
| + callback.Run(ERROR_OK);
|
| +}
|
| +
|
| +void DirectoryImpl::Delete(const String& path,
|
| + uint32_t delete_flags,
|
| + const DeleteCallback& callback) {
|
| + DCHECK(!path.is_null());
|
| + DCHECK(dir_fd_.is_valid());
|
| +
|
| + if (Error error = IsPathValid(path)) {
|
| + callback.Run(error);
|
| + return;
|
| + }
|
| + // TODO(vtl): See TODOs about |path| in OpenFile().
|
| +
|
| + if (Error error = ValidateDeleteFlags(delete_flags)) {
|
| + callback.Run(error);
|
| + return;
|
| + }
|
| +
|
| + // TODO(vtl): Recursive not yet supported.
|
| + if ((delete_flags & kDeleteFlagRecursive)) {
|
| + callback.Run(ERROR_UNIMPLEMENTED);
|
| + return;
|
| + }
|
| +
|
| + // First try deleting it as a file, unless we're told to do directory-only.
|
| + if (!(delete_flags & kDeleteFlagDirectoryOnly)) {
|
| + if (unlinkat(dir_fd_.get(), path.get().c_str(), 0) == 0) {
|
| + callback.Run(ERROR_OK);
|
| + return;
|
| + }
|
| +
|
| + // If file-only, don't continue.
|
| + if ((delete_flags & kDeleteFlagFileOnly)) {
|
| + callback.Run(ErrnoToError(errno));
|
| + return;
|
| + }
|
| + }
|
| +
|
| + // Try deleting it as a directory.
|
| + if (unlinkat(dir_fd_.get(), path.get().c_str(), AT_REMOVEDIR) == 0) {
|
| + callback.Run(ERROR_OK);
|
| + return;
|
| + }
|
| +
|
| + callback.Run(ErrnoToError(errno));
|
| +}
|
| +
|
| +} // namespace files
|
| +} // namespace mojo
|
|
|