Chromium Code Reviews| Index: chrome/browser/local_discovery/storage/privet_filesystem_backend.cc |
| diff --git a/chrome/browser/local_discovery/storage/privet_filesystem_backend.cc b/chrome/browser/local_discovery/storage/privet_filesystem_backend.cc |
| new file mode 100644 |
| index 0000000000000000000000000000000000000000..057005f6a5977e90d82a1c4c4e2498613dc7bfc3 |
| --- /dev/null |
| +++ b/chrome/browser/local_discovery/storage/privet_filesystem_backend.cc |
| @@ -0,0 +1,136 @@ |
| +// Copyright (c) 2014 The Chromium Authors. All rights reserved. |
| +// Use of this source code is governed by a BSD-style license that can be |
| +// found in the LICENSE file. |
| + |
| +#include "chrome/browser/local_discovery/storage/privet_filesystem_backend.h" |
| + |
| +#include <string> |
| + |
| +#include "chrome/browser/local_discovery/storage/privet_filesystem_async_util.h" |
| +#include "chrome/browser/local_discovery/storage/privet_filesystem_constants.h" |
| +#include "webkit/browser/fileapi/file_system_operation.h" |
| + |
| +namespace local_discovery { |
| + |
| +PrivetFileSystemBackend::PrivetFileSystemBackend( |
| + fileapi::ExternalMountPoints* mount_points) |
| + : mount_points_(mount_points), |
| + async_util_(new PrivetFileSystemAsyncUtil()) { |
| +} |
| + |
| +PrivetFileSystemBackend::~PrivetFileSystemBackend() { |
| +} |
| + |
| +bool PrivetFileSystemBackend::CanHandleType( |
| + fileapi::FileSystemType type) const { |
| + return (type == fileapi::kFileSystemTypePrivet); |
| +} |
| + |
| +void PrivetFileSystemBackend::Initialize(fileapi::FileSystemContext* context) { |
| + mount_points_->RegisterFileSystem( |
| + "privet", |
| + fileapi::kFileSystemTypePrivet, |
| + fileapi::FileSystemMountOption(), |
| + base::FilePath(kPrivetFilePath)); |
| +} |
| + |
| +void PrivetFileSystemBackend::OpenFileSystem( |
| + const GURL& origin_url, |
| + fileapi::FileSystemType type, |
| + fileapi::OpenFileSystemMode mode, |
| + const OpenFileSystemCallback& callback) { |
| + // Copied from src/chrome/browser/chromeos/fileapi/file_system_backend.cc |
| + // This is deprecated for non-sandboxed filesystems. |
| + NOTREACHED(); |
| + callback.Run(GURL(), std::string(), base::PLATFORM_FILE_ERROR_SECURITY); |
| +} |
| + |
| +fileapi::FileSystemQuotaUtil* PrivetFileSystemBackend::GetQuotaUtil() { |
| + // No quota support. |
| + return NULL; |
| +} |
| + |
| +// TODO(noamsml): Any access controls |
| + |
| +bool PrivetFileSystemBackend::IsAccessAllowed( |
| + const fileapi::FileSystemURL& url) const { |
| + // TODO(noamsml) |
|
Vitaly Buka (NO REVIEWS)
2014/01/07 21:08:49
it could be usefull to have bug ID to find context
Noam Samuel
2014/01/07 22:10:59
Done.
|
| + return true; |
| +} |
| + |
| +void PrivetFileSystemBackend::GrantFullAccessToExtension( |
| + const std::string& extension_id) { |
| + // TODO(noamsml) |
| +} |
| + |
| +void PrivetFileSystemBackend::GrantFileAccessToExtension( |
| + const std::string& extension_id, const base::FilePath& virtual_path) { |
| + // TODO(noamsml) |
| +} |
| + |
| +void PrivetFileSystemBackend::RevokeAccessForExtension( |
| + const std::string& extension_id) { |
| + // TODO(noamsml) |
| +} |
| + |
| +// Copied from file_system_backend.cc:193 |
| +std::vector<base::FilePath> |
| +PrivetFileSystemBackend::GetRootDirectories() const { |
| + std::vector<fileapi::MountPoints::MountPointInfo> mount_points; |
| + mount_points_->AddMountPointInfosTo(&mount_points); |
| + // System mount pints |
|
Vitaly Buka (NO REVIEWS)
2014/01/07 21:08:49
The line addressed by this comment is not clear.
a
Noam Samuel
2014/01/07 22:10:59
Removed.
|
| + |
| + std::vector<base::FilePath> root_dirs; |
| + for (size_t i = 0; i < mount_points.size(); ++i) |
| + root_dirs.push_back(mount_points[i].path); |
| + return root_dirs; |
| +} |
| + |
| +fileapi::AsyncFileUtil* PrivetFileSystemBackend::GetAsyncFileUtil( |
| + fileapi::FileSystemType type) { |
| + return async_util_.get(); |
| +} |
| + |
| +fileapi::CopyOrMoveFileValidatorFactory* |
| +PrivetFileSystemBackend::GetCopyOrMoveFileValidatorFactory( |
| + fileapi::FileSystemType type, base::PlatformFileError* error_code) { |
| + DCHECK(error_code); |
| + *error_code = base::PLATFORM_FILE_OK; |
| + return NULL; |
| +} |
| + |
| +fileapi::FileSystemOperation* |
| +PrivetFileSystemBackend::CreateFileSystemOperation( |
| + const fileapi::FileSystemURL& url, |
| + fileapi::FileSystemContext* context, |
| + base::PlatformFileError* error_code) const { |
| + return fileapi::FileSystemOperation::Create( |
| + url, context, |
| + make_scoped_ptr(new fileapi::FileSystemOperationContext(context))); |
| +} |
| + |
| +scoped_ptr<webkit_blob::FileStreamReader> |
| +PrivetFileSystemBackend::CreateFileStreamReader( |
| + const fileapi::FileSystemURL& url, |
| + int64 offset, |
| + const base::Time& expected_modification_time, |
| + fileapi::FileSystemContext* context) const { |
| + return scoped_ptr<webkit_blob::FileStreamReader>(); |
| +} |
| + |
| + |
| +scoped_ptr<fileapi::FileStreamWriter> |
| +PrivetFileSystemBackend::CreateFileStreamWriter( |
| + const fileapi::FileSystemURL& url, |
| + int64 offset, |
| + fileapi::FileSystemContext* context) const { |
| + return scoped_ptr<fileapi::FileStreamWriter>(); |
| +} |
| + |
| +bool PrivetFileSystemBackend::GetVirtualPath( |
| + const base::FilePath& filesystem_path, |
| + base::FilePath* virtual_path) { |
| + return mount_points_->GetVirtualPath(filesystem_path, virtual_path); |
| +} |
| + |
| +} // namespace local_discovery |