OLD | NEW |
| (Empty) |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "content/renderer/pepper/pepper_file_io_host.h" | |
6 | |
7 #include "base/bind.h" | |
8 #include "base/callback.h" | |
9 #include "base/callback_helpers.h" | |
10 #include "base/command_line.h" | |
11 #include "base/files/file_util_proxy.h" | |
12 #include "content/child/child_thread.h" | |
13 #include "content/child/fileapi/file_system_dispatcher.h" | |
14 #include "content/child/quota_dispatcher.h" | |
15 #include "content/common/fileapi/file_system_messages.h" | |
16 #include "content/common/view_messages.h" | |
17 #include "content/public/common/content_client.h" | |
18 #include "content/public/renderer/content_renderer_client.h" | |
19 #include "content/renderer/pepper/pepper_file_ref_renderer_host.h" | |
20 #include "content/renderer/pepper/quota_file_io.h" | |
21 #include "content/renderer/pepper/renderer_ppapi_host_impl.h" | |
22 #include "content/renderer/render_thread_impl.h" | |
23 #include "ppapi/c/pp_errors.h" | |
24 #include "ppapi/c/ppb_file_io.h" | |
25 #include "ppapi/host/dispatch_host_message.h" | |
26 #include "ppapi/host/ppapi_host.h" | |
27 #include "ppapi/proxy/ppapi_messages.h" | |
28 #include "ppapi/shared_impl/file_type_conversion.h" | |
29 #include "ppapi/shared_impl/time_conversion.h" | |
30 #include "ppapi/thunk/enter.h" | |
31 #include "third_party/WebKit/public/web/WebPluginContainer.h" | |
32 | |
33 namespace content { | |
34 | |
35 using ppapi::FileIOStateManager; | |
36 using ppapi::PPTimeToTime; | |
37 using ppapi::host::ReplyMessageContext; | |
38 using ppapi::thunk::EnterResourceNoLock; | |
39 | |
40 namespace { | |
41 | |
42 typedef base::Callback<void (base::PlatformFileError)> PlatformGeneralCallback; | |
43 | |
44 int32_t ErrorOrByteNumber(int32_t pp_error, int32_t byte_number) { | |
45 // On the plugin side, some callbacks expect a parameter that means different | |
46 // things depending on whether is negative or not. We translate for those | |
47 // callbacks here. | |
48 return pp_error == PP_OK ? byte_number : pp_error; | |
49 } | |
50 | |
51 class QuotaCallbackTranslator : public QuotaDispatcher::Callback { | |
52 public: | |
53 typedef QuotaFileIO::Delegate::AvailableSpaceCallback PluginCallback; | |
54 explicit QuotaCallbackTranslator(const PluginCallback& cb) : callback_(cb) {} | |
55 virtual void DidQueryStorageUsageAndQuota(int64 usage, int64 quota) OVERRIDE { | |
56 callback_.Run(std::max(static_cast<int64>(0), quota - usage)); | |
57 } | |
58 virtual void DidGrantStorageQuota(int64 granted_quota) OVERRIDE { | |
59 NOTREACHED(); | |
60 } | |
61 virtual void DidFail(quota::QuotaStatusCode error) OVERRIDE { | |
62 callback_.Run(0); | |
63 } | |
64 private: | |
65 PluginCallback callback_; | |
66 }; | |
67 | |
68 class QuotaFileIODelegate : public QuotaFileIO::Delegate { | |
69 public: | |
70 QuotaFileIODelegate() {} | |
71 virtual ~QuotaFileIODelegate() {} | |
72 | |
73 virtual void QueryAvailableSpace( | |
74 const GURL& origin, | |
75 quota::StorageType type, | |
76 const AvailableSpaceCallback& callback) OVERRIDE { | |
77 ChildThread::current()->quota_dispatcher()->QueryStorageUsageAndQuota( | |
78 origin, type, new QuotaCallbackTranslator(callback)); | |
79 } | |
80 virtual void WillUpdateFile(const GURL& file_path) OVERRIDE { | |
81 ChildThread::current()->Send(new FileSystemHostMsg_WillUpdate(file_path)); | |
82 } | |
83 virtual void DidUpdateFile(const GURL& file_path, int64_t delta) OVERRIDE { | |
84 ChildThread::current()->Send(new FileSystemHostMsg_DidUpdate( | |
85 file_path, delta)); | |
86 } | |
87 virtual scoped_refptr<base::MessageLoopProxy> | |
88 GetFileThreadMessageLoopProxy() OVERRIDE { | |
89 return RenderThreadImpl::current()->GetFileThreadMessageLoopProxy(); | |
90 } | |
91 }; | |
92 | |
93 typedef base::Callback< | |
94 void (base::PlatformFileError error, | |
95 base::PassPlatformFile file, | |
96 quota::QuotaLimitType quota_policy, | |
97 const PepperFileIOHost::NotifyCloseFileCallback& close_file_callback)> | |
98 AsyncOpenFileSystemURLCallback; | |
99 | |
100 void DoNotifyCloseFile(int file_open_id, base::PlatformFileError error) { | |
101 ChildThread::current()->file_system_dispatcher()->NotifyCloseFile( | |
102 file_open_id); | |
103 } | |
104 | |
105 void DidOpenFileSystemURL(const AsyncOpenFileSystemURLCallback& callback, | |
106 base::PlatformFile file, | |
107 int file_open_id, | |
108 quota::QuotaLimitType quota_policy) { | |
109 callback.Run(base::PLATFORM_FILE_OK, | |
110 base::PassPlatformFile(&file), | |
111 quota_policy, | |
112 base::Bind(&DoNotifyCloseFile, file_open_id)); | |
113 // Make sure we won't leak file handle if the requester has died. | |
114 if (file != base::kInvalidPlatformFileValue) { | |
115 base::FileUtilProxy::Close( | |
116 RenderThreadImpl::current()->GetFileThreadMessageLoopProxy().get(), | |
117 file, | |
118 base::Bind(&DoNotifyCloseFile, file_open_id)); | |
119 } | |
120 } | |
121 | |
122 void DidFailOpenFileSystemURL(const AsyncOpenFileSystemURLCallback& callback, | |
123 base::PlatformFileError error_code) { | |
124 base::PlatformFile invalid_file = base::kInvalidPlatformFileValue; | |
125 callback.Run(error_code, | |
126 base::PassPlatformFile(&invalid_file), | |
127 quota::kQuotaLimitTypeUnknown, | |
128 PepperFileIOHost::NotifyCloseFileCallback()); | |
129 } | |
130 | |
131 } // namespace | |
132 | |
133 PepperFileIOHost::PepperFileIOHost(RendererPpapiHost* host, | |
134 PP_Instance instance, | |
135 PP_Resource resource) | |
136 : ResourceHost(host->GetPpapiHost(), instance, resource), | |
137 renderer_ppapi_host_(host), | |
138 file_(base::kInvalidPlatformFileValue), | |
139 file_system_type_(PP_FILESYSTEMTYPE_INVALID), | |
140 quota_policy_(quota::kQuotaLimitTypeUnknown), | |
141 open_flags_(0), | |
142 routing_id_(RenderThreadImpl::current()->GenerateRoutingID()), | |
143 weak_factory_(this) { | |
144 ChildThread::current()->AddRoute(routing_id_, this); | |
145 } | |
146 | |
147 PepperFileIOHost::~PepperFileIOHost() { | |
148 OnHostMsgClose(NULL); | |
149 ChildThread::current()->RemoveRoute(routing_id_); | |
150 } | |
151 | |
152 int32_t PepperFileIOHost::OnResourceMessageReceived( | |
153 const IPC::Message& msg, | |
154 ppapi::host::HostMessageContext* context) { | |
155 IPC_BEGIN_MESSAGE_MAP(PepperFileIOHost, msg) | |
156 PPAPI_DISPATCH_HOST_RESOURCE_CALL(PpapiHostMsg_FileIO_Open, | |
157 OnHostMsgOpen) | |
158 PPAPI_DISPATCH_HOST_RESOURCE_CALL(PpapiHostMsg_FileIO_Touch, | |
159 OnHostMsgTouch) | |
160 PPAPI_DISPATCH_HOST_RESOURCE_CALL(PpapiHostMsg_FileIO_Write, | |
161 OnHostMsgWrite) | |
162 PPAPI_DISPATCH_HOST_RESOURCE_CALL(PpapiHostMsg_FileIO_SetLength, | |
163 OnHostMsgSetLength) | |
164 PPAPI_DISPATCH_HOST_RESOURCE_CALL_0(PpapiHostMsg_FileIO_Flush, | |
165 OnHostMsgFlush) | |
166 PPAPI_DISPATCH_HOST_RESOURCE_CALL_0(PpapiHostMsg_FileIO_Close, | |
167 OnHostMsgClose) | |
168 PPAPI_DISPATCH_HOST_RESOURCE_CALL_0(PpapiHostMsg_FileIO_RequestOSFileHandle, | |
169 OnHostMsgRequestOSFileHandle) | |
170 IPC_END_MESSAGE_MAP() | |
171 return PP_ERROR_FAILED; | |
172 } | |
173 | |
174 bool PepperFileIOHost::OnMessageReceived(const IPC::Message& msg) { | |
175 bool handled = true; | |
176 IPC_BEGIN_MESSAGE_MAP(PepperFileIOHost, msg) | |
177 IPC_MESSAGE_HANDLER(ViewMsg_AsyncOpenPepperFile_ACK, OnAsyncFileOpened) | |
178 IPC_MESSAGE_UNHANDLED(handled = false) | |
179 IPC_END_MESSAGE_MAP() | |
180 return handled; | |
181 } | |
182 | |
183 void PepperFileIOHost::OnAsyncFileOpened( | |
184 base::PlatformFileError error_code, | |
185 IPC::PlatformFileForTransit file_for_transit) { | |
186 DCHECK(!pending_open_callback_.is_null()); | |
187 base::PlatformFile file = | |
188 IPC::PlatformFileForTransitToPlatformFile(file_for_transit); | |
189 if (!pending_open_callback_.is_null()) | |
190 pending_open_callback_.Run(error_code, base::PassPlatformFile(&file)); | |
191 | |
192 // Make sure we won't leak file handle if the requester has died. | |
193 if (file != base::kInvalidPlatformFileValue) { | |
194 base::FileUtilProxy::Close( | |
195 RenderThreadImpl::current()->GetFileThreadMessageLoopProxy().get(), | |
196 file, | |
197 base::FileUtilProxy::StatusCallback()); | |
198 } | |
199 pending_open_callback_.Reset(); | |
200 } | |
201 | |
202 int32_t PepperFileIOHost::OnHostMsgOpen( | |
203 ppapi::host::HostMessageContext* context, | |
204 PP_Resource file_ref_resource, | |
205 int32_t open_flags) { | |
206 int32_t rv = state_manager_.CheckOperationState( | |
207 FileIOStateManager::OPERATION_EXCLUSIVE, false); | |
208 if (rv != PP_OK) | |
209 return rv; | |
210 | |
211 if (!ppapi::PepperFileOpenFlagsToPlatformFileFlags(open_flags, NULL)) | |
212 return PP_ERROR_BADARGUMENT; | |
213 | |
214 ppapi::host::ResourceHost* resource_host = | |
215 renderer_ppapi_host_->GetPpapiHost()->GetResourceHost(file_ref_resource); | |
216 if (!resource_host || !resource_host->IsFileRefHost()) | |
217 return PP_ERROR_BADRESOURCE; | |
218 | |
219 PepperFileRefRendererHost* file_ref_host = | |
220 static_cast<PepperFileRefRendererHost*>(resource_host); | |
221 if (file_ref_host->GetFileSystemType() == PP_FILESYSTEMTYPE_INVALID) | |
222 return PP_ERROR_FAILED; | |
223 | |
224 open_flags_ = open_flags; | |
225 file_system_type_ = file_ref_host->GetFileSystemType(); | |
226 | |
227 if (file_system_type_ != PP_FILESYSTEMTYPE_EXTERNAL) { | |
228 file_system_url_ = file_ref_host->GetFileSystemURL(); | |
229 FileSystemDispatcher* file_system_dispatcher = | |
230 ChildThread::current()->file_system_dispatcher(); | |
231 | |
232 AsyncOpenFileSystemURLCallback callback = base::Bind( | |
233 &PepperFileIOHost::ExecutePlatformOpenFileSystemURLCallback, | |
234 weak_factory_.GetWeakPtr(), | |
235 context->MakeReplyMessageContext()); | |
236 file_system_dispatcher->OpenPepperFile( | |
237 file_system_url_, open_flags, | |
238 base::Bind(&DidOpenFileSystemURL, callback), | |
239 base::Bind(&DidFailOpenFileSystemURL, callback)); | |
240 } else { | |
241 pending_open_callback_ = | |
242 base::Bind(&PepperFileIOHost::ExecutePlatformOpenFileCallback, | |
243 weak_factory_.GetWeakPtr(), | |
244 context->MakeReplyMessageContext()); | |
245 RenderThreadImpl::current()->Send(new ViewHostMsg_AsyncOpenPepperFile( | |
246 routing_id_, | |
247 file_ref_host->GetExternalFilePath(), | |
248 open_flags_)); | |
249 } | |
250 state_manager_.SetPendingOperation(FileIOStateManager::OPERATION_EXCLUSIVE); | |
251 return PP_OK_COMPLETIONPENDING; | |
252 } | |
253 | |
254 int32_t PepperFileIOHost::OnHostMsgTouch( | |
255 ppapi::host::HostMessageContext* context, | |
256 PP_Time last_access_time, | |
257 PP_Time last_modified_time) { | |
258 int32_t rv = state_manager_.CheckOperationState( | |
259 FileIOStateManager::OPERATION_EXCLUSIVE, true); | |
260 if (rv != PP_OK) | |
261 return rv; | |
262 | |
263 if (file_system_type_ != PP_FILESYSTEMTYPE_EXTERNAL) { | |
264 FileSystemDispatcher* file_system_dispatcher = | |
265 ChildThread::current()->file_system_dispatcher(); | |
266 file_system_dispatcher->TouchFile( | |
267 file_system_url_, | |
268 PPTimeToTime(last_access_time), | |
269 PPTimeToTime(last_modified_time), | |
270 base::Bind(&PepperFileIOHost::ExecutePlatformGeneralCallback, | |
271 weak_factory_.GetWeakPtr(), | |
272 context->MakeReplyMessageContext())); | |
273 state_manager_.SetPendingOperation(FileIOStateManager::OPERATION_EXCLUSIVE); | |
274 return PP_OK_COMPLETIONPENDING; | |
275 } | |
276 | |
277 // TODO(nhiroki): fix a failure of FileIO.Touch for an external filesystem on | |
278 // Mac and Linux due to sandbox restrictions (http://crbug.com/101128). | |
279 if (!base::FileUtilProxy::Touch( | |
280 RenderThreadImpl::current()->GetFileThreadMessageLoopProxy().get(), | |
281 file_, | |
282 PPTimeToTime(last_access_time), | |
283 PPTimeToTime(last_modified_time), | |
284 base::Bind(&PepperFileIOHost::ExecutePlatformGeneralCallback, | |
285 weak_factory_.GetWeakPtr(), | |
286 context->MakeReplyMessageContext()))) | |
287 return PP_ERROR_FAILED; | |
288 | |
289 state_manager_.SetPendingOperation(FileIOStateManager::OPERATION_EXCLUSIVE); | |
290 return PP_OK_COMPLETIONPENDING; | |
291 } | |
292 | |
293 int32_t PepperFileIOHost::OnHostMsgWrite( | |
294 ppapi::host::HostMessageContext* context, | |
295 int64_t offset, | |
296 const std::string& buffer) { | |
297 int32_t rv = state_manager_.CheckOperationState( | |
298 FileIOStateManager::OPERATION_WRITE, true); | |
299 if (rv != PP_OK) | |
300 return rv; | |
301 | |
302 if (quota_file_io_) { | |
303 if (!quota_file_io_->Write( | |
304 offset, buffer.c_str(), buffer.size(), | |
305 base::Bind(&PepperFileIOHost::ExecutePlatformWriteCallback, | |
306 weak_factory_.GetWeakPtr(), | |
307 context->MakeReplyMessageContext()))) | |
308 return PP_ERROR_FAILED; | |
309 } else { | |
310 if (!base::FileUtilProxy::Write( | |
311 RenderThreadImpl::current()->GetFileThreadMessageLoopProxy().get(), | |
312 file_, | |
313 offset, | |
314 buffer.c_str(), | |
315 buffer.size(), | |
316 base::Bind(&PepperFileIOHost::ExecutePlatformWriteCallback, | |
317 weak_factory_.GetWeakPtr(), | |
318 context->MakeReplyMessageContext()))) | |
319 return PP_ERROR_FAILED; | |
320 } | |
321 | |
322 state_manager_.SetPendingOperation(FileIOStateManager::OPERATION_WRITE); | |
323 return PP_OK_COMPLETIONPENDING; | |
324 } | |
325 | |
326 int32_t PepperFileIOHost::OnHostMsgSetLength( | |
327 ppapi::host::HostMessageContext* context, | |
328 int64_t length) { | |
329 int32_t rv = state_manager_.CheckOperationState( | |
330 FileIOStateManager::OPERATION_EXCLUSIVE, true); | |
331 if (rv != PP_OK) | |
332 return rv; | |
333 | |
334 if (file_system_type_ != PP_FILESYSTEMTYPE_EXTERNAL) { | |
335 FileSystemDispatcher* file_system_dispatcher = | |
336 ChildThread::current()->file_system_dispatcher(); | |
337 file_system_dispatcher->Truncate( | |
338 file_system_url_, length, NULL, | |
339 base::Bind(&PepperFileIOHost::ExecutePlatformGeneralCallback, | |
340 weak_factory_.GetWeakPtr(), | |
341 context->MakeReplyMessageContext())); | |
342 } else { | |
343 // TODO(nhiroki): fix a failure of FileIO.SetLength for an external | |
344 // filesystem on Mac due to sandbox restrictions (http://crbug.com/156077). | |
345 if (!base::FileUtilProxy::Truncate( | |
346 RenderThreadImpl::current()->GetFileThreadMessageLoopProxy().get(), | |
347 file_, | |
348 length, | |
349 base::Bind(&PepperFileIOHost::ExecutePlatformGeneralCallback, | |
350 weak_factory_.GetWeakPtr(), | |
351 context->MakeReplyMessageContext()))) | |
352 return PP_ERROR_FAILED; | |
353 } | |
354 | |
355 state_manager_.SetPendingOperation(FileIOStateManager::OPERATION_EXCLUSIVE); | |
356 return PP_OK_COMPLETIONPENDING; | |
357 } | |
358 | |
359 int32_t PepperFileIOHost::OnHostMsgFlush( | |
360 ppapi::host::HostMessageContext* context) { | |
361 int32_t rv = state_manager_.CheckOperationState( | |
362 FileIOStateManager::OPERATION_EXCLUSIVE, true); | |
363 if (rv != PP_OK) | |
364 return rv; | |
365 | |
366 if (!base::FileUtilProxy::Flush( | |
367 RenderThreadImpl::current()->GetFileThreadMessageLoopProxy().get(), | |
368 file_, | |
369 base::Bind(&PepperFileIOHost::ExecutePlatformGeneralCallback, | |
370 weak_factory_.GetWeakPtr(), | |
371 context->MakeReplyMessageContext()))) | |
372 return PP_ERROR_FAILED; | |
373 | |
374 state_manager_.SetPendingOperation(FileIOStateManager::OPERATION_EXCLUSIVE); | |
375 return PP_OK_COMPLETIONPENDING; | |
376 } | |
377 | |
378 int32_t PepperFileIOHost::OnHostMsgClose( | |
379 ppapi::host::HostMessageContext* context) { | |
380 if (file_ != base::kInvalidPlatformFileValue) { | |
381 base::FileUtilProxy::Close( | |
382 RenderThreadImpl::current()->GetFileThreadMessageLoopProxy().get(), | |
383 file_, | |
384 base::ResetAndReturn(¬ify_close_file_callback_)); | |
385 file_ = base::kInvalidPlatformFileValue; | |
386 quota_file_io_.reset(); | |
387 } | |
388 return PP_OK; | |
389 } | |
390 | |
391 int32_t PepperFileIOHost::OnHostMsgRequestOSFileHandle( | |
392 ppapi::host::HostMessageContext* context) { | |
393 if (open_flags_ != PP_FILEOPENFLAG_READ && | |
394 quota_policy_ != quota::kQuotaLimitTypeUnlimited) | |
395 return PP_ERROR_FAILED; | |
396 | |
397 // Whitelist to make it privately accessible. | |
398 if (!host()->permissions().HasPermission(ppapi::PERMISSION_PRIVATE) && | |
399 !GetContentClient()->renderer()->IsPluginAllowedToCallRequestOSFileHandle( | |
400 renderer_ppapi_host_->GetContainerForInstance(pp_instance()))) | |
401 return PP_ERROR_NOACCESS; | |
402 | |
403 IPC::PlatformFileForTransit file = | |
404 renderer_ppapi_host_->ShareHandleWithRemote(file_, false); | |
405 if (file == IPC::InvalidPlatformFileForTransit()) | |
406 return PP_ERROR_FAILED; | |
407 ppapi::host::ReplyMessageContext reply_context = | |
408 context->MakeReplyMessageContext(); | |
409 ppapi::proxy::SerializedHandle file_handle; | |
410 file_handle.set_file_handle(file, open_flags_); | |
411 reply_context.params.AppendHandle(file_handle); | |
412 host()->SendReply(reply_context, | |
413 PpapiPluginMsg_FileIO_RequestOSFileHandleReply()); | |
414 return PP_OK_COMPLETIONPENDING; | |
415 } | |
416 | |
417 void PepperFileIOHost::ExecutePlatformGeneralCallback( | |
418 ppapi::host::ReplyMessageContext reply_context, | |
419 base::PlatformFileError error_code) { | |
420 reply_context.params.set_result( | |
421 ppapi::PlatformFileErrorToPepperError(error_code)); | |
422 host()->SendReply(reply_context, PpapiPluginMsg_FileIO_GeneralReply()); | |
423 state_manager_.SetOperationFinished(); | |
424 } | |
425 | |
426 void PepperFileIOHost::ExecutePlatformOpenFileCallback( | |
427 ppapi::host::ReplyMessageContext reply_context, | |
428 base::PlatformFileError error_code, | |
429 base::PassPlatformFile file) { | |
430 int32_t pp_error = ppapi::PlatformFileErrorToPepperError(error_code); | |
431 if (pp_error == PP_OK) | |
432 state_manager_.SetOpenSucceed(); | |
433 | |
434 DCHECK(file_ == base::kInvalidPlatformFileValue); | |
435 file_ = file.ReleaseValue(); | |
436 | |
437 DCHECK(!quota_file_io_.get()); | |
438 if (file_ != base::kInvalidPlatformFileValue) { | |
439 if (file_system_type_ == PP_FILESYSTEMTYPE_LOCALTEMPORARY || | |
440 file_system_type_ == PP_FILESYSTEMTYPE_LOCALPERSISTENT) { | |
441 quota_file_io_.reset(new QuotaFileIO( | |
442 new QuotaFileIODelegate, file_, file_system_url_, file_system_type_)); | |
443 } | |
444 | |
445 IPC::PlatformFileForTransit file_for_transit = | |
446 renderer_ppapi_host_->ShareHandleWithRemote(file_, false); | |
447 if (!(file_for_transit == IPC::InvalidPlatformFileForTransit())) { | |
448 // Send the file descriptor to the plugin process. This is used in the | |
449 // plugin for any file operations that can be done there. | |
450 int32_t flags_to_send = open_flags_; | |
451 if (!host()->permissions().HasPermission(ppapi::PERMISSION_DEV)) { | |
452 // IMPORTANT: Clear PP_FILEOPENFLAG_WRITE and PP_FILEOPENFLAG_APPEND so | |
453 // the plugin can't write and so bypass our quota checks. | |
454 flags_to_send = | |
455 open_flags_ & ~(PP_FILEOPENFLAG_WRITE | PP_FILEOPENFLAG_APPEND); | |
456 } | |
457 ppapi::proxy::SerializedHandle file_handle; | |
458 file_handle.set_file_handle(file_for_transit, flags_to_send); | |
459 reply_context.params.AppendHandle(file_handle); | |
460 } | |
461 } | |
462 | |
463 reply_context.params.set_result(pp_error); | |
464 host()->SendReply(reply_context, PpapiPluginMsg_FileIO_OpenReply()); | |
465 state_manager_.SetOperationFinished(); | |
466 } | |
467 | |
468 void PepperFileIOHost::ExecutePlatformOpenFileSystemURLCallback( | |
469 ppapi::host::ReplyMessageContext reply_context, | |
470 base::PlatformFileError error_code, | |
471 base::PassPlatformFile file, | |
472 quota::QuotaLimitType quota_policy, | |
473 const PepperFileIOHost::NotifyCloseFileCallback& callback) { | |
474 if (error_code == base::PLATFORM_FILE_OK) | |
475 notify_close_file_callback_ = callback; | |
476 quota_policy_ = quota_policy; | |
477 ExecutePlatformOpenFileCallback(reply_context, error_code, file); | |
478 } | |
479 | |
480 void PepperFileIOHost::ExecutePlatformWriteCallback( | |
481 ppapi::host::ReplyMessageContext reply_context, | |
482 base::PlatformFileError error_code, | |
483 int bytes_written) { | |
484 // On the plugin side, the callback expects a parameter with different meaning | |
485 // depends on whether is negative or not. It is the result here. We translate | |
486 // for the callback. | |
487 int32_t pp_error = ppapi::PlatformFileErrorToPepperError(error_code); | |
488 reply_context.params.set_result(ErrorOrByteNumber(pp_error, bytes_written)); | |
489 host()->SendReply(reply_context, PpapiPluginMsg_FileIO_GeneralReply()); | |
490 state_manager_.SetOperationFinished(); | |
491 } | |
492 | |
493 } // namespace content | |
OLD | NEW |