OLD | NEW |
1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/chromeos/fileapi/file_system_backend.h" | 5 #include "chrome/browser/chromeos/fileapi/file_system_backend.h" |
6 | 6 |
7 #include "base/logging.h" | 7 #include "base/logging.h" |
8 #include "base/memory/scoped_ptr.h" | 8 #include "base/memory/scoped_ptr.h" |
9 #include "base/message_loop/message_loop.h" | 9 #include "base/message_loop/message_loop.h" |
10 #include "base/strings/stringprintf.h" | 10 #include "base/strings/stringprintf.h" |
(...skipping 83 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
94 } | 94 } |
95 | 95 |
96 void FileSystemBackend::OpenFileSystem( | 96 void FileSystemBackend::OpenFileSystem( |
97 const GURL& origin_url, | 97 const GURL& origin_url, |
98 fileapi::FileSystemType type, | 98 fileapi::FileSystemType type, |
99 fileapi::OpenFileSystemMode mode, | 99 fileapi::OpenFileSystemMode mode, |
100 const OpenFileSystemCallback& callback) { | 100 const OpenFileSystemCallback& callback) { |
101 // TODO(nhiroki): Deprecate OpenFileSystem for non-sandboxed filesystem. | 101 // TODO(nhiroki): Deprecate OpenFileSystem for non-sandboxed filesystem. |
102 // (http://crbug.com/297412) | 102 // (http://crbug.com/297412) |
103 NOTREACHED(); | 103 NOTREACHED(); |
104 callback.Run(GURL(), std::string(), base::PLATFORM_FILE_ERROR_SECURITY); | 104 callback.Run(GURL(), std::string(), base::File::FILE_ERROR_SECURITY); |
105 } | 105 } |
106 | 106 |
107 fileapi::FileSystemQuotaUtil* FileSystemBackend::GetQuotaUtil() { | 107 fileapi::FileSystemQuotaUtil* FileSystemBackend::GetQuotaUtil() { |
108 // No quota support. | 108 // No quota support. |
109 return NULL; | 109 return NULL; |
110 } | 110 } |
111 | 111 |
112 bool FileSystemBackend::IsAccessAllowed( | 112 bool FileSystemBackend::IsAccessAllowed( |
113 const fileapi::FileSystemURL& url) const { | 113 const fileapi::FileSystemURL& url) const { |
114 if (!url.is_valid()) | 114 if (!url.is_valid()) |
(...skipping 91 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
206 if (type == fileapi::kFileSystemTypeDrive) | 206 if (type == fileapi::kFileSystemTypeDrive) |
207 return drive_delegate_->GetAsyncFileUtil(type); | 207 return drive_delegate_->GetAsyncFileUtil(type); |
208 | 208 |
209 DCHECK(type == fileapi::kFileSystemTypeNativeLocal || | 209 DCHECK(type == fileapi::kFileSystemTypeNativeLocal || |
210 type == fileapi::kFileSystemTypeRestrictedNativeLocal); | 210 type == fileapi::kFileSystemTypeRestrictedNativeLocal); |
211 return local_file_util_.get(); | 211 return local_file_util_.get(); |
212 } | 212 } |
213 | 213 |
214 fileapi::CopyOrMoveFileValidatorFactory* | 214 fileapi::CopyOrMoveFileValidatorFactory* |
215 FileSystemBackend::GetCopyOrMoveFileValidatorFactory( | 215 FileSystemBackend::GetCopyOrMoveFileValidatorFactory( |
216 fileapi::FileSystemType type, base::PlatformFileError* error_code) { | 216 fileapi::FileSystemType type, base::File::Error* error_code) { |
217 DCHECK(error_code); | 217 DCHECK(error_code); |
218 *error_code = base::PLATFORM_FILE_OK; | 218 *error_code = base::File::FILE_OK; |
219 return NULL; | 219 return NULL; |
220 } | 220 } |
221 | 221 |
222 fileapi::FileSystemOperation* FileSystemBackend::CreateFileSystemOperation( | 222 fileapi::FileSystemOperation* FileSystemBackend::CreateFileSystemOperation( |
223 const fileapi::FileSystemURL& url, | 223 const fileapi::FileSystemURL& url, |
224 fileapi::FileSystemContext* context, | 224 fileapi::FileSystemContext* context, |
225 base::PlatformFileError* error_code) const { | 225 base::File::Error* error_code) const { |
226 DCHECK(url.is_valid()); | 226 DCHECK(url.is_valid()); |
227 | 227 |
228 if (!IsAccessAllowed(url)) { | 228 if (!IsAccessAllowed(url)) { |
229 *error_code = base::PLATFORM_FILE_ERROR_SECURITY; | 229 *error_code = base::File::FILE_ERROR_SECURITY; |
230 return NULL; | 230 return NULL; |
231 } | 231 } |
232 | 232 |
233 DCHECK(url.type() == fileapi::kFileSystemTypeNativeLocal || | 233 DCHECK(url.type() == fileapi::kFileSystemTypeNativeLocal || |
234 url.type() == fileapi::kFileSystemTypeRestrictedNativeLocal || | 234 url.type() == fileapi::kFileSystemTypeRestrictedNativeLocal || |
235 url.type() == fileapi::kFileSystemTypeDrive); | 235 url.type() == fileapi::kFileSystemTypeDrive); |
236 return fileapi::FileSystemOperation::Create( | 236 return fileapi::FileSystemOperation::Create( |
237 url, context, | 237 url, context, |
238 make_scoped_ptr(new fileapi::FileSystemOperationContext(context))); | 238 make_scoped_ptr(new fileapi::FileSystemOperationContext(context))); |
239 } | 239 } |
(...skipping 42 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
282 } | 282 } |
283 | 283 |
284 bool FileSystemBackend::GetVirtualPath( | 284 bool FileSystemBackend::GetVirtualPath( |
285 const base::FilePath& filesystem_path, | 285 const base::FilePath& filesystem_path, |
286 base::FilePath* virtual_path) { | 286 base::FilePath* virtual_path) { |
287 return mount_points_->GetVirtualPath(filesystem_path, virtual_path) || | 287 return mount_points_->GetVirtualPath(filesystem_path, virtual_path) || |
288 system_mount_points_->GetVirtualPath(filesystem_path, virtual_path); | 288 system_mount_points_->GetVirtualPath(filesystem_path, virtual_path); |
289 } | 289 } |
290 | 290 |
291 } // namespace chromeos | 291 } // namespace chromeos |
OLD | NEW |