Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(441)

Side by Side Diff: content/browser/fileapi/browser_file_system_helper.cc

Issue 14096022: Make MountPointProvider pluggable from outside webkit/fileapi (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Created 7 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "content/browser/fileapi/browser_file_system_helper.h" 5 #include "content/browser/fileapi/browser_file_system_helper.h"
6 6
7 #include <string> 7 #include <string>
8 #include <vector> 8 #include <vector>
9 9
10 #include "base/command_line.h" 10 #include "base/command_line.h"
11 #include "base/files/file_path.h" 11 #include "base/files/file_path.h"
12 #include "base/threading/sequenced_worker_pool.h" 12 #include "base/threading/sequenced_worker_pool.h"
13 #include "content/browser/child_process_security_policy_impl.h" 13 #include "content/browser/child_process_security_policy_impl.h"
14 #include "content/public/browser/browser_thread.h" 14 #include "content/public/browser/browser_thread.h"
15 #include "content/public/browser/content_browser_client.h" 15 #include "content/public/browser/content_browser_client.h"
16 #include "content/public/common/content_client.h" 16 #include "content/public/common/content_client.h"
17 #include "content/public/common/content_switches.h" 17 #include "content/public/common/content_switches.h"
18 #include "content/public/common/url_constants.h" 18 #include "content/public/common/url_constants.h"
19 #include "webkit/fileapi/external_mount_points.h" 19 #include "webkit/fileapi/external_mount_points.h"
20 #include "webkit/fileapi/file_permission_policy.h" 20 #include "webkit/fileapi/file_permission_policy.h"
21 #include "webkit/fileapi/file_system_options.h" 21 #include "webkit/fileapi/file_system_options.h"
22 #include "webkit/fileapi/file_system_task_runners.h" 22 #include "webkit/fileapi/file_system_task_runners.h"
23 #include "webkit/fileapi/isolated_context.h"
23 #include "webkit/fileapi/local_file_system_operation.h" 24 #include "webkit/fileapi/local_file_system_operation.h"
25 #include "webkit/fileapi/mount_points.h"
24 #include "webkit/fileapi/sandbox_mount_point_provider.h" 26 #include "webkit/fileapi/sandbox_mount_point_provider.h"
25 #include "webkit/quota/quota_manager.h" 27 #include "webkit/quota/quota_manager.h"
26 28
29 #if defined(OS_CHROMEOS)
30 #include "webkit/chromeos/fileapi/cros_mount_point_provider.h"
31 #endif
32
27 namespace content { 33 namespace content {
28 34
29 namespace { 35 namespace {
30 36
31 using fileapi::FileSystemOptions; 37 using fileapi::FileSystemOptions;
32 38
33 FileSystemOptions CreateBrowserFileSystemOptions(bool is_incognito) { 39 FileSystemOptions CreateBrowserFileSystemOptions(bool is_incognito) {
34 FileSystemOptions::ProfileMode profile_mode = 40 FileSystemOptions::ProfileMode profile_mode =
35 is_incognito ? FileSystemOptions::PROFILE_MODE_INCOGNITO 41 is_incognito ? FileSystemOptions::PROFILE_MODE_INCOGNITO
36 : FileSystemOptions::PROFILE_MODE_NORMAL; 42 : FileSystemOptions::PROFILE_MODE_NORMAL;
37 std::vector<std::string> additional_allowed_schemes; 43 std::vector<std::string> additional_allowed_schemes;
38 GetContentClient()->browser()->GetAdditionalAllowedSchemesForFileSystem( 44 GetContentClient()->browser()->GetAdditionalAllowedSchemesForFileSystem(
39 &additional_allowed_schemes); 45 &additional_allowed_schemes);
40 if (CommandLine::ForCurrentProcess()->HasSwitch( 46 if (CommandLine::ForCurrentProcess()->HasSwitch(
41 switches::kAllowFileAccessFromFiles)) { 47 switches::kAllowFileAccessFromFiles)) {
42 additional_allowed_schemes.push_back(chrome::kFileScheme); 48 additional_allowed_schemes.push_back(chrome::kFileScheme);
43 } 49 }
44 return FileSystemOptions(profile_mode, additional_allowed_schemes); 50 return FileSystemOptions(profile_mode, additional_allowed_schemes);
45 } 51 }
46 52
47 } // namespace 53 } // namespace
48 54
49 scoped_refptr<fileapi::FileSystemContext> CreateFileSystemContext( 55 scoped_refptr<fileapi::FileSystemContext> CreateFileSystemContext(
50 const base::FilePath& profile_path, bool is_incognito, 56 const base::FilePath& partition_path,
51 fileapi::ExternalMountPoints* external_mount_points, 57 bool is_incognito,
52 quota::SpecialStoragePolicy* special_storage_policy, 58 fileapi::ExternalMountPoints* external_mount_points,
53 quota::QuotaManagerProxy* quota_manager_proxy) { 59 quota::SpecialStoragePolicy* special_storage_policy,
60 quota::QuotaManagerProxy* quota_manager_proxy) {
54 base::SequencedWorkerPool* pool = BrowserThread::GetBlockingPool(); 61 base::SequencedWorkerPool* pool = BrowserThread::GetBlockingPool();
55 base::SequencedWorkerPool::SequenceToken media_sequence_token = 62 base::SequencedWorkerPool::SequenceToken media_sequence_token =
56 pool->GetNamedSequenceToken(fileapi::kMediaTaskRunnerName); 63 pool->GetNamedSequenceToken(fileapi::kMediaTaskRunnerName);
57 64
58 scoped_ptr<fileapi::FileSystemTaskRunners> task_runners( 65 scoped_ptr<fileapi::FileSystemTaskRunners> task_runners(
59 new fileapi::FileSystemTaskRunners( 66 new fileapi::FileSystemTaskRunners(
60 BrowserThread::GetMessageLoopProxyForThread(BrowserThread::IO), 67 BrowserThread::GetMessageLoopProxyForThread(BrowserThread::IO),
61 BrowserThread::GetMessageLoopProxyForThread(BrowserThread::FILE), 68 BrowserThread::GetMessageLoopProxyForThread(BrowserThread::FILE),
62 pool->GetSequencedTaskRunner(media_sequence_token))); 69 pool->GetSequencedTaskRunner(media_sequence_token)));
63 70
71 fileapi::FileSystemOptions options(
72 CreateBrowserFileSystemOptions(is_incognito));
73
74 // Setting up mount points.
75 std::vector<fileapi::MountPoints*> additional_mount_points;
76 if (external_mount_points)
77 additional_mount_points.push_back(external_mount_points);
78
79 // Setting up additional mount point providers.
80 ScopedVector<fileapi::FileSystemMountPointProvider> additional_providers;
81 #if defined(OS_CHROMEOS)
82 // TODO(kinuko): Move this to chrome/.
83 additional_providers.push_back(
84 new chromeos::CrosMountPointProvider(
85 special_storage_policy,
86 external_mount_points,
87 fileapi::ExternalMountPoints::GetSystemInstance()));
88 #endif
89
64 return new fileapi::FileSystemContext( 90 return new fileapi::FileSystemContext(
65 task_runners.Pass(), 91 task_runners.Pass(),
66 external_mount_points,
67 special_storage_policy,
68 quota_manager_proxy, 92 quota_manager_proxy,
69 profile_path, 93 additional_providers.Pass(),
70 CreateBrowserFileSystemOptions(is_incognito)); 94 additional_mount_points,
95 partition_path,
96 options);
71 } 97 }
72 98
73 bool CheckFileSystemPermissionsForProcess( 99 bool CheckFileSystemPermissionsForProcess(
74 fileapi::FileSystemContext* context, int process_id, 100 fileapi::FileSystemContext* context, int process_id,
75 const fileapi::FileSystemURL& url, int permissions, 101 const fileapi::FileSystemURL& url, int permissions,
76 base::PlatformFileError* error) { 102 base::PlatformFileError* error) {
77 DCHECK(error); 103 DCHECK(error);
78 *error = base::PLATFORM_FILE_OK; 104 *error = base::PLATFORM_FILE_OK;
79 105
80 if (!url.is_valid()) { 106 if (!url.is_valid()) {
(...skipping 76 matching lines...) Expand 10 before | Expand all | Expand 10 after
157 // for the file. (We first need to check if it can already be read not to 183 // for the file. (We first need to check if it can already be read not to
158 // overwrite existing permissions) 184 // overwrite existing permissions)
159 if (!ChildProcessSecurityPolicyImpl::GetInstance()->CanReadFile( 185 if (!ChildProcessSecurityPolicyImpl::GetInstance()->CanReadFile(
160 process_id, *platform_path)) { 186 process_id, *platform_path)) {
161 ChildProcessSecurityPolicyImpl::GetInstance()->GrantReadFile( 187 ChildProcessSecurityPolicyImpl::GetInstance()->GrantReadFile(
162 process_id, *platform_path); 188 process_id, *platform_path);
163 } 189 }
164 } 190 }
165 191
166 } // namespace content 192 } // namespace content
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698