| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "chrome/browser/safe_browsing/sandboxed_zip_analyzer.h" | 5 #include "chrome/browser/safe_browsing/sandboxed_zip_analyzer.h" |
| 6 | 6 |
| 7 #include <utility> | 7 #include <utility> |
| 8 | 8 |
| 9 #include "base/bind.h" | 9 #include "base/bind.h" |
| 10 #include "base/files/file_util.h" | 10 #include "base/files/file_util.h" |
| 11 #include "base/task_scheduler/post_task.h" | 11 #include "base/task_scheduler/post_task.h" |
| 12 #include "chrome/common/safe_browsing/zip_analyzer_results.h" | 12 #include "chrome/common/safe_browsing/zip_analyzer_results.h" |
| 13 #include "chrome/grit/generated_resources.h" | 13 #include "chrome/grit/generated_resources.h" |
| 14 #include "content/public/browser/browser_thread.h" | 14 #include "content/public/browser/browser_thread.h" |
| 15 #include "ui/base/l10n/l10n_util.h" | 15 #include "ui/base/l10n/l10n_util.h" |
| 16 | 16 |
| 17 namespace safe_browsing { | 17 namespace safe_browsing { |
| 18 | 18 |
| 19 SandboxedZipAnalyzer::SandboxedZipAnalyzer(const base::FilePath& zip_file, | 19 SandboxedZipAnalyzer::SandboxedZipAnalyzer(const base::FilePath& zip_file, |
| 20 const ResultCallback& callback) | 20 const ResultCallback& callback) |
| 21 : file_path_(zip_file), callback_(callback) { | 21 : file_path_(zip_file), callback_(callback) { |
| 22 DCHECK(callback); | 22 DCHECK(callback); |
| 23 } | 23 } |
| 24 | 24 |
| 25 void SandboxedZipAnalyzer::Start() { | 25 void SandboxedZipAnalyzer::Start() { |
| 26 DCHECK_CURRENTLY_ON(content::BrowserThread::UI); | 26 DCHECK_CURRENTLY_ON(content::BrowserThread::UI); |
| 27 | 27 |
| 28 base::PostTaskWithTraits( | 28 base::PostTaskWithTraits( |
| 29 FROM_HERE, | 29 FROM_HERE, |
| 30 base::TaskTraits() | 30 {base::MayBlock(), base::TaskPriority::BACKGROUND, |
| 31 .MayBlock() | 31 base::TaskShutdownBehavior::CONTINUE_ON_SHUTDOWN}, |
| 32 .WithPriority(base::TaskPriority::BACKGROUND) | |
| 33 .WithShutdownBehavior( | |
| 34 base::TaskShutdownBehavior::CONTINUE_ON_SHUTDOWN), | |
| 35 base::BindOnce(&SandboxedZipAnalyzer::PrepareFileToAnalyze, this)); | 32 base::BindOnce(&SandboxedZipAnalyzer::PrepareFileToAnalyze, this)); |
| 36 } | 33 } |
| 37 | 34 |
| 38 SandboxedZipAnalyzer::~SandboxedZipAnalyzer() = default; | 35 SandboxedZipAnalyzer::~SandboxedZipAnalyzer() = default; |
| 39 | 36 |
| 40 void SandboxedZipAnalyzer::PrepareFileToAnalyze() { | 37 void SandboxedZipAnalyzer::PrepareFileToAnalyze() { |
| 41 base::File file(file_path_, base::File::FLAG_OPEN | base::File::FLAG_READ); | 38 base::File file(file_path_, base::File::FLAG_OPEN | base::File::FLAG_READ); |
| 42 | 39 |
| 43 if (!file.IsValid()) { | 40 if (!file.IsValid()) { |
| 44 DLOG(ERROR) << "Could not open file: " << file_path_.value(); | 41 DLOG(ERROR) << "Could not open file: " << file_path_.value(); |
| (...skipping 48 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 93 } | 90 } |
| 94 | 91 |
| 95 void SandboxedZipAnalyzer::AnalyzeFileDone(const Results& results) { | 92 void SandboxedZipAnalyzer::AnalyzeFileDone(const Results& results) { |
| 96 DCHECK_CURRENTLY_ON(content::BrowserThread::UI); | 93 DCHECK_CURRENTLY_ON(content::BrowserThread::UI); |
| 97 | 94 |
| 98 utility_process_mojo_client_.reset(); | 95 utility_process_mojo_client_.reset(); |
| 99 callback_.Run(results); | 96 callback_.Run(results); |
| 100 } | 97 } |
| 101 | 98 |
| 102 } // namespace safe_browsing | 99 } // namespace safe_browsing |
| OLD | NEW |