Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(233)

Side by Side Diff: content/browser/fileapi/browser_file_system_helper.cc

Issue 442383002: Move storage-related files from webkit/ to new top-level directory storage/ (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: . Created 6 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "content/browser/fileapi/browser_file_system_helper.h" 5 #include "content/browser/fileapi/browser_file_system_helper.h"
6 6
7 #include <string> 7 #include <string>
8 #include <vector> 8 #include <vector>
9 9
10 #include "base/command_line.h" 10 #include "base/command_line.h"
11 #include "base/files/file_path.h" 11 #include "base/files/file_path.h"
12 #include "base/sequenced_task_runner.h" 12 #include "base/sequenced_task_runner.h"
13 #include "base/threading/sequenced_worker_pool.h" 13 #include "base/threading/sequenced_worker_pool.h"
14 #include "content/browser/child_process_security_policy_impl.h" 14 #include "content/browser/child_process_security_policy_impl.h"
15 #include "content/public/browser/browser_context.h" 15 #include "content/public/browser/browser_context.h"
16 #include "content/public/browser/browser_thread.h" 16 #include "content/public/browser/browser_thread.h"
17 #include "content/public/browser/content_browser_client.h" 17 #include "content/public/browser/content_browser_client.h"
18 #include "content/public/common/content_client.h" 18 #include "content/public/common/content_client.h"
19 #include "content/public/common/content_switches.h" 19 #include "content/public/common/content_switches.h"
20 #include "url/url_constants.h" 20 #include "url/url_constants.h"
21 #include "webkit/browser/fileapi/external_mount_points.h" 21 #include "storage/browser/fileapi/external_mount_points.h"
22 #include "webkit/browser/fileapi/file_permission_policy.h" 22 #include "storage/browser/fileapi/file_permission_policy.h"
23 #include "webkit/browser/fileapi/file_system_backend.h" 23 #include "storage/browser/fileapi/file_system_backend.h"
24 #include "webkit/browser/fileapi/file_system_context.h" 24 #include "storage/browser/fileapi/file_system_context.h"
25 #include "webkit/browser/fileapi/file_system_operation_runner.h" 25 #include "storage/browser/fileapi/file_system_operation_runner.h"
26 #include "webkit/browser/fileapi/file_system_options.h" 26 #include "storage/browser/fileapi/file_system_options.h"
27 #include "webkit/browser/quota/quota_manager.h" 27 #include "storage/browser/quota/quota_manager.h"
28 28
29 namespace content { 29 namespace content {
30 30
31 namespace { 31 namespace {
32 32
33 using fileapi::FileSystemOptions; 33 using storage::FileSystemOptions;
34 34
35 FileSystemOptions CreateBrowserFileSystemOptions(bool is_incognito) { 35 FileSystemOptions CreateBrowserFileSystemOptions(bool is_incognito) {
36 FileSystemOptions::ProfileMode profile_mode = 36 FileSystemOptions::ProfileMode profile_mode =
37 is_incognito ? FileSystemOptions::PROFILE_MODE_INCOGNITO 37 is_incognito ? FileSystemOptions::PROFILE_MODE_INCOGNITO
38 : FileSystemOptions::PROFILE_MODE_NORMAL; 38 : FileSystemOptions::PROFILE_MODE_NORMAL;
39 std::vector<std::string> additional_allowed_schemes; 39 std::vector<std::string> additional_allowed_schemes;
40 GetContentClient()->browser()->GetAdditionalAllowedSchemesForFileSystem( 40 GetContentClient()->browser()->GetAdditionalAllowedSchemesForFileSystem(
41 &additional_allowed_schemes); 41 &additional_allowed_schemes);
42 if (CommandLine::ForCurrentProcess()->HasSwitch( 42 if (CommandLine::ForCurrentProcess()->HasSwitch(
43 switches::kAllowFileAccessFromFiles)) { 43 switches::kAllowFileAccessFromFiles)) {
44 additional_allowed_schemes.push_back(url::kFileScheme); 44 additional_allowed_schemes.push_back(url::kFileScheme);
45 } 45 }
46 return FileSystemOptions(profile_mode, additional_allowed_schemes, NULL); 46 return FileSystemOptions(profile_mode, additional_allowed_schemes, NULL);
47 } 47 }
48 48
49 } // namespace 49 } // namespace
50 50
51 scoped_refptr<fileapi::FileSystemContext> CreateFileSystemContext( 51 scoped_refptr<storage::FileSystemContext> CreateFileSystemContext(
52 BrowserContext* browser_context, 52 BrowserContext* browser_context,
53 const base::FilePath& profile_path, 53 const base::FilePath& profile_path,
54 bool is_incognito, 54 bool is_incognito,
55 quota::QuotaManagerProxy* quota_manager_proxy) { 55 quota::QuotaManagerProxy* quota_manager_proxy) {
56
57 base::SequencedWorkerPool* pool = BrowserThread::GetBlockingPool(); 56 base::SequencedWorkerPool* pool = BrowserThread::GetBlockingPool();
58 scoped_refptr<base::SequencedTaskRunner> file_task_runner = 57 scoped_refptr<base::SequencedTaskRunner> file_task_runner =
59 pool->GetSequencedTaskRunnerWithShutdownBehavior( 58 pool->GetSequencedTaskRunnerWithShutdownBehavior(
60 pool->GetNamedSequenceToken("FileAPI"), 59 pool->GetNamedSequenceToken("FileAPI"),
61 base::SequencedWorkerPool::SKIP_ON_SHUTDOWN); 60 base::SequencedWorkerPool::SKIP_ON_SHUTDOWN);
62 61
63 // Setting up additional filesystem backends. 62 // Setting up additional filesystem backends.
64 ScopedVector<fileapi::FileSystemBackend> additional_backends; 63 ScopedVector<storage::FileSystemBackend> additional_backends;
65 GetContentClient()->browser()->GetAdditionalFileSystemBackends( 64 GetContentClient()->browser()->GetAdditionalFileSystemBackends(
66 browser_context, 65 browser_context,
67 profile_path, 66 profile_path,
68 &additional_backends); 67 &additional_backends);
69 68
70 // Set up the auto mount handlers for url requests. 69 // Set up the auto mount handlers for url requests.
71 std::vector<fileapi::URLRequestAutoMountHandler> 70 std::vector<storage::URLRequestAutoMountHandler>
72 url_request_auto_mount_handlers; 71 url_request_auto_mount_handlers;
73 GetContentClient()->browser()->GetURLRequestAutoMountHandlers( 72 GetContentClient()->browser()->GetURLRequestAutoMountHandlers(
74 &url_request_auto_mount_handlers); 73 &url_request_auto_mount_handlers);
75 74
76 scoped_refptr<fileapi::FileSystemContext> file_system_context = 75 scoped_refptr<storage::FileSystemContext> file_system_context =
77 new fileapi::FileSystemContext( 76 new storage::FileSystemContext(
78 BrowserThread::GetMessageLoopProxyForThread(BrowserThread::IO).get(), 77 BrowserThread::GetMessageLoopProxyForThread(BrowserThread::IO).get(),
79 file_task_runner.get(), 78 file_task_runner.get(),
80 BrowserContext::GetMountPoints(browser_context), 79 BrowserContext::GetMountPoints(browser_context),
81 browser_context->GetSpecialStoragePolicy(), 80 browser_context->GetSpecialStoragePolicy(),
82 quota_manager_proxy, 81 quota_manager_proxy,
83 additional_backends.Pass(), 82 additional_backends.Pass(),
84 url_request_auto_mount_handlers, 83 url_request_auto_mount_handlers,
85 profile_path, 84 profile_path,
86 CreateBrowserFileSystemOptions(is_incognito)); 85 CreateBrowserFileSystemOptions(is_incognito));
87 86
88 std::vector<fileapi::FileSystemType> types; 87 std::vector<storage::FileSystemType> types;
89 file_system_context->GetFileSystemTypes(&types); 88 file_system_context->GetFileSystemTypes(&types);
90 for (size_t i = 0; i < types.size(); ++i) { 89 for (size_t i = 0; i < types.size(); ++i) {
91 ChildProcessSecurityPolicyImpl::GetInstance()-> 90 ChildProcessSecurityPolicyImpl::GetInstance()
92 RegisterFileSystemPermissionPolicy( 91 ->RegisterFileSystemPermissionPolicy(
93 types[i], 92 types[i],
94 fileapi::FileSystemContext::GetPermissionPolicy(types[i])); 93 storage::FileSystemContext::GetPermissionPolicy(types[i]));
95 } 94 }
96 95
97 return file_system_context; 96 return file_system_context;
98 } 97 }
99 98
100 bool FileSystemURLIsValid( 99 bool FileSystemURLIsValid(storage::FileSystemContext* context,
101 fileapi::FileSystemContext* context, 100 const storage::FileSystemURL& url) {
102 const fileapi::FileSystemURL& url) {
103 if (!url.is_valid()) 101 if (!url.is_valid())
104 return false; 102 return false;
105 103
106 return context->GetFileSystemBackend(url.type()) != NULL; 104 return context->GetFileSystemBackend(url.type()) != NULL;
107 } 105 }
108 106
109 void SyncGetPlatformPath(fileapi::FileSystemContext* context, 107 void SyncGetPlatformPath(storage::FileSystemContext* context,
110 int process_id, 108 int process_id,
111 const GURL& path, 109 const GURL& path,
112 base::FilePath* platform_path) { 110 base::FilePath* platform_path) {
113 DCHECK(context->default_file_task_runner()-> 111 DCHECK(context->default_file_task_runner()->
114 RunsTasksOnCurrentThread()); 112 RunsTasksOnCurrentThread());
115 DCHECK(platform_path); 113 DCHECK(platform_path);
116 *platform_path = base::FilePath(); 114 *platform_path = base::FilePath();
117 fileapi::FileSystemURL url(context->CrackURL(path)); 115 storage::FileSystemURL url(context->CrackURL(path));
118 if (!FileSystemURLIsValid(context, url)) 116 if (!FileSystemURLIsValid(context, url))
119 return; 117 return;
120 118
121 // Make sure if this file is ok to be read (in the current architecture 119 // Make sure if this file is ok to be read (in the current architecture
122 // which means roughly same as the renderer is allowed to get the platform 120 // which means roughly same as the renderer is allowed to get the platform
123 // path to the file). 121 // path to the file).
124 ChildProcessSecurityPolicyImpl* policy = 122 ChildProcessSecurityPolicyImpl* policy =
125 ChildProcessSecurityPolicyImpl::GetInstance(); 123 ChildProcessSecurityPolicyImpl::GetInstance();
126 if (!policy->CanReadFileSystemFile(process_id, url)) 124 if (!policy->CanReadFileSystemFile(process_id, url))
127 return; 125 return;
128 126
129 context->operation_runner()->SyncGetPlatformPath(url, platform_path); 127 context->operation_runner()->SyncGetPlatformPath(url, platform_path);
130 128
131 // The path is to be attached to URLLoader so we grant read permission 129 // The path is to be attached to URLLoader so we grant read permission
132 // for the file. (We need to check first because a parent directory may 130 // for the file. (We need to check first because a parent directory may
133 // already have the permissions and we don't need to grant it to the file.) 131 // already have the permissions and we don't need to grant it to the file.)
134 if (!policy->CanReadFile(process_id, *platform_path)) 132 if (!policy->CanReadFile(process_id, *platform_path))
135 policy->GrantReadFile(process_id, *platform_path); 133 policy->GrantReadFile(process_id, *platform_path);
136 } 134 }
137 135
138 } // namespace content 136 } // namespace content
OLDNEW
« no previous file with comments | « content/browser/fileapi/browser_file_system_helper.h ('k') | content/browser/fileapi/chrome_blob_storage_context.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698