| OLD | NEW |
| (Empty) |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "webkit/browser/fileapi/obfuscated_file_util.h" | |
| 6 | |
| 7 #include <queue> | |
| 8 #include <string> | |
| 9 #include <vector> | |
| 10 | |
| 11 #include "base/file_util.h" | |
| 12 #include "base/format_macros.h" | |
| 13 #include "base/logging.h" | |
| 14 #include "base/message_loop/message_loop.h" | |
| 15 #include "base/metrics/histogram.h" | |
| 16 #include "base/stl_util.h" | |
| 17 #include "base/strings/string_number_conversions.h" | |
| 18 #include "base/strings/stringprintf.h" | |
| 19 #include "base/strings/sys_string_conversions.h" | |
| 20 #include "base/strings/utf_string_conversions.h" | |
| 21 #include "base/time/time.h" | |
| 22 #include "url/gurl.h" | |
| 23 #include "webkit/browser/fileapi/file_observers.h" | |
| 24 #include "webkit/browser/fileapi/file_system_context.h" | |
| 25 #include "webkit/browser/fileapi/file_system_operation_context.h" | |
| 26 #include "webkit/browser/fileapi/file_system_url.h" | |
| 27 #include "webkit/browser/fileapi/native_file_util.h" | |
| 28 #include "webkit/browser/fileapi/sandbox_file_system_backend.h" | |
| 29 #include "webkit/browser/fileapi/sandbox_isolated_origin_database.h" | |
| 30 #include "webkit/browser/fileapi/sandbox_origin_database.h" | |
| 31 #include "webkit/browser/fileapi/sandbox_prioritized_origin_database.h" | |
| 32 #include "webkit/browser/fileapi/timed_task_helper.h" | |
| 33 #include "webkit/browser/quota/quota_manager.h" | |
| 34 #include "webkit/common/database/database_identifier.h" | |
| 35 #include "webkit/common/fileapi/file_system_util.h" | |
| 36 | |
| 37 // Example of various paths: | |
| 38 // void ObfuscatedFileUtil::DoSomething(const FileSystemURL& url) { | |
| 39 // base::FilePath virtual_path = url.path(); | |
| 40 // base::FilePath local_path = GetLocalFilePath(url); | |
| 41 // | |
| 42 // NativeFileUtil::DoSomething(local_path); | |
| 43 // file_util::DoAnother(local_path); | |
| 44 // } | |
| 45 | |
| 46 namespace storage { | |
| 47 | |
| 48 namespace { | |
| 49 | |
| 50 typedef SandboxDirectoryDatabase::FileId FileId; | |
| 51 typedef SandboxDirectoryDatabase::FileInfo FileInfo; | |
| 52 | |
| 53 void InitFileInfo( | |
| 54 SandboxDirectoryDatabase::FileInfo* file_info, | |
| 55 SandboxDirectoryDatabase::FileId parent_id, | |
| 56 const base::FilePath::StringType& file_name) { | |
| 57 DCHECK(file_info); | |
| 58 file_info->parent_id = parent_id; | |
| 59 file_info->name = file_name; | |
| 60 } | |
| 61 | |
| 62 // Costs computed as per crbug.com/86114, based on the LevelDB implementation of | |
| 63 // path storage under Linux. It's not clear if that will differ on Windows, on | |
| 64 // which base::FilePath uses wide chars [since they're converted to UTF-8 for | |
| 65 // storage anyway], but as long as the cost is high enough that one can't cheat | |
| 66 // on quota by storing data in paths, it doesn't need to be all that accurate. | |
| 67 const int64 kPathCreationQuotaCost = 146; // Bytes per inode, basically. | |
| 68 const int64 kPathByteQuotaCost = 2; // Bytes per byte of path length in UTF-8. | |
| 69 | |
| 70 int64 UsageForPath(size_t length) { | |
| 71 return kPathCreationQuotaCost + | |
| 72 static_cast<int64>(length) * kPathByteQuotaCost; | |
| 73 } | |
| 74 | |
| 75 bool AllocateQuota(FileSystemOperationContext* context, int64 growth) { | |
| 76 if (context->allowed_bytes_growth() == storage::QuotaManager::kNoLimit) | |
| 77 return true; | |
| 78 | |
| 79 int64 new_quota = context->allowed_bytes_growth() - growth; | |
| 80 if (growth > 0 && new_quota < 0) | |
| 81 return false; | |
| 82 context->set_allowed_bytes_growth(new_quota); | |
| 83 return true; | |
| 84 } | |
| 85 | |
| 86 void UpdateUsage( | |
| 87 FileSystemOperationContext* context, | |
| 88 const FileSystemURL& url, | |
| 89 int64 growth) { | |
| 90 context->update_observers()->Notify( | |
| 91 &FileUpdateObserver::OnUpdate, MakeTuple(url, growth)); | |
| 92 } | |
| 93 | |
| 94 void TouchDirectory(SandboxDirectoryDatabase* db, FileId dir_id) { | |
| 95 DCHECK(db); | |
| 96 if (!db->UpdateModificationTime(dir_id, base::Time::Now())) | |
| 97 NOTREACHED(); | |
| 98 } | |
| 99 | |
| 100 enum IsolatedOriginStatus { | |
| 101 kIsolatedOriginMatch, | |
| 102 kIsolatedOriginDontMatch, | |
| 103 kIsolatedOriginStatusMax, | |
| 104 }; | |
| 105 | |
| 106 } // namespace | |
| 107 | |
| 108 class ObfuscatedFileEnumerator | |
| 109 : public FileSystemFileUtil::AbstractFileEnumerator { | |
| 110 public: | |
| 111 ObfuscatedFileEnumerator( | |
| 112 SandboxDirectoryDatabase* db, | |
| 113 FileSystemOperationContext* context, | |
| 114 ObfuscatedFileUtil* obfuscated_file_util, | |
| 115 const FileSystemURL& root_url, | |
| 116 bool recursive) | |
| 117 : db_(db), | |
| 118 context_(context), | |
| 119 obfuscated_file_util_(obfuscated_file_util), | |
| 120 root_url_(root_url), | |
| 121 recursive_(recursive), | |
| 122 current_file_id_(0) { | |
| 123 base::FilePath root_virtual_path = root_url.path(); | |
| 124 FileId file_id; | |
| 125 | |
| 126 if (!db_->GetFileWithPath(root_virtual_path, &file_id)) | |
| 127 return; | |
| 128 | |
| 129 FileRecord record = { file_id, root_virtual_path }; | |
| 130 recurse_queue_.push(record); | |
| 131 } | |
| 132 | |
| 133 virtual ~ObfuscatedFileEnumerator() {} | |
| 134 | |
| 135 virtual base::FilePath Next() OVERRIDE { | |
| 136 ProcessRecurseQueue(); | |
| 137 if (display_stack_.empty()) | |
| 138 return base::FilePath(); | |
| 139 | |
| 140 current_file_id_ = display_stack_.back(); | |
| 141 display_stack_.pop_back(); | |
| 142 | |
| 143 FileInfo file_info; | |
| 144 base::FilePath platform_file_path; | |
| 145 base::File::Error error = | |
| 146 obfuscated_file_util_->GetFileInfoInternal( | |
| 147 db_, context_, root_url_, current_file_id_, | |
| 148 &file_info, ¤t_platform_file_info_, &platform_file_path); | |
| 149 if (error != base::File::FILE_OK) | |
| 150 return Next(); | |
| 151 | |
| 152 base::FilePath virtual_path = | |
| 153 current_parent_virtual_path_.Append(file_info.name); | |
| 154 if (recursive_ && file_info.is_directory()) { | |
| 155 FileRecord record = { current_file_id_, virtual_path }; | |
| 156 recurse_queue_.push(record); | |
| 157 } | |
| 158 return virtual_path; | |
| 159 } | |
| 160 | |
| 161 virtual int64 Size() OVERRIDE { | |
| 162 return current_platform_file_info_.size; | |
| 163 } | |
| 164 | |
| 165 virtual base::Time LastModifiedTime() OVERRIDE { | |
| 166 return current_platform_file_info_.last_modified; | |
| 167 } | |
| 168 | |
| 169 virtual bool IsDirectory() OVERRIDE { | |
| 170 return current_platform_file_info_.is_directory; | |
| 171 } | |
| 172 | |
| 173 private: | |
| 174 typedef SandboxDirectoryDatabase::FileId FileId; | |
| 175 typedef SandboxDirectoryDatabase::FileInfo FileInfo; | |
| 176 | |
| 177 struct FileRecord { | |
| 178 FileId file_id; | |
| 179 base::FilePath virtual_path; | |
| 180 }; | |
| 181 | |
| 182 void ProcessRecurseQueue() { | |
| 183 while (display_stack_.empty() && !recurse_queue_.empty()) { | |
| 184 FileRecord entry = recurse_queue_.front(); | |
| 185 recurse_queue_.pop(); | |
| 186 if (!db_->ListChildren(entry.file_id, &display_stack_)) { | |
| 187 display_stack_.clear(); | |
| 188 return; | |
| 189 } | |
| 190 current_parent_virtual_path_ = entry.virtual_path; | |
| 191 } | |
| 192 } | |
| 193 | |
| 194 SandboxDirectoryDatabase* db_; | |
| 195 FileSystemOperationContext* context_; | |
| 196 ObfuscatedFileUtil* obfuscated_file_util_; | |
| 197 FileSystemURL root_url_; | |
| 198 bool recursive_; | |
| 199 | |
| 200 std::queue<FileRecord> recurse_queue_; | |
| 201 std::vector<FileId> display_stack_; | |
| 202 base::FilePath current_parent_virtual_path_; | |
| 203 | |
| 204 FileId current_file_id_; | |
| 205 base::File::Info current_platform_file_info_; | |
| 206 }; | |
| 207 | |
| 208 class ObfuscatedOriginEnumerator | |
| 209 : public ObfuscatedFileUtil::AbstractOriginEnumerator { | |
| 210 public: | |
| 211 typedef SandboxOriginDatabase::OriginRecord OriginRecord; | |
| 212 ObfuscatedOriginEnumerator( | |
| 213 SandboxOriginDatabaseInterface* origin_database, | |
| 214 const base::FilePath& base_file_path) | |
| 215 : base_file_path_(base_file_path) { | |
| 216 if (origin_database) | |
| 217 origin_database->ListAllOrigins(&origins_); | |
| 218 } | |
| 219 | |
| 220 virtual ~ObfuscatedOriginEnumerator() {} | |
| 221 | |
| 222 // Returns the next origin. Returns empty if there are no more origins. | |
| 223 virtual GURL Next() OVERRIDE { | |
| 224 OriginRecord record; | |
| 225 if (!origins_.empty()) { | |
| 226 record = origins_.back(); | |
| 227 origins_.pop_back(); | |
| 228 } | |
| 229 current_ = record; | |
| 230 return storage::GetOriginFromIdentifier(record.origin); | |
| 231 } | |
| 232 | |
| 233 // Returns the current origin's information. | |
| 234 virtual bool HasTypeDirectory(const std::string& type_string) const OVERRIDE { | |
| 235 if (current_.path.empty()) | |
| 236 return false; | |
| 237 if (type_string.empty()) { | |
| 238 NOTREACHED(); | |
| 239 return false; | |
| 240 } | |
| 241 base::FilePath path = | |
| 242 base_file_path_.Append(current_.path).AppendASCII(type_string); | |
| 243 return base::DirectoryExists(path); | |
| 244 } | |
| 245 | |
| 246 private: | |
| 247 std::vector<OriginRecord> origins_; | |
| 248 OriginRecord current_; | |
| 249 base::FilePath base_file_path_; | |
| 250 }; | |
| 251 | |
| 252 ObfuscatedFileUtil::ObfuscatedFileUtil( | |
| 253 storage::SpecialStoragePolicy* special_storage_policy, | |
| 254 const base::FilePath& file_system_directory, | |
| 255 leveldb::Env* env_override, | |
| 256 base::SequencedTaskRunner* file_task_runner, | |
| 257 const GetTypeStringForURLCallback& get_type_string_for_url, | |
| 258 const std::set<std::string>& known_type_strings, | |
| 259 SandboxFileSystemBackendDelegate* sandbox_delegate) | |
| 260 : special_storage_policy_(special_storage_policy), | |
| 261 file_system_directory_(file_system_directory), | |
| 262 env_override_(env_override), | |
| 263 db_flush_delay_seconds_(10 * 60), // 10 mins. | |
| 264 file_task_runner_(file_task_runner), | |
| 265 get_type_string_for_url_(get_type_string_for_url), | |
| 266 known_type_strings_(known_type_strings), | |
| 267 sandbox_delegate_(sandbox_delegate) { | |
| 268 } | |
| 269 | |
| 270 ObfuscatedFileUtil::~ObfuscatedFileUtil() { | |
| 271 DropDatabases(); | |
| 272 } | |
| 273 | |
| 274 base::File ObfuscatedFileUtil::CreateOrOpen( | |
| 275 FileSystemOperationContext* context, | |
| 276 const FileSystemURL& url, int file_flags) { | |
| 277 base::File file = CreateOrOpenInternal(context, url, file_flags); | |
| 278 if (file.IsValid() && file_flags & base::File::FLAG_WRITE && | |
| 279 context->quota_limit_type() == storage::kQuotaLimitTypeUnlimited && | |
| 280 sandbox_delegate_) { | |
| 281 sandbox_delegate_->StickyInvalidateUsageCache(url.origin(), url.type()); | |
| 282 } | |
| 283 return file.Pass(); | |
| 284 } | |
| 285 | |
| 286 base::File::Error ObfuscatedFileUtil::EnsureFileExists( | |
| 287 FileSystemOperationContext* context, | |
| 288 const FileSystemURL& url, | |
| 289 bool* created) { | |
| 290 SandboxDirectoryDatabase* db = GetDirectoryDatabase(url, true); | |
| 291 if (!db) | |
| 292 return base::File::FILE_ERROR_FAILED; | |
| 293 | |
| 294 FileId file_id; | |
| 295 if (db->GetFileWithPath(url.path(), &file_id)) { | |
| 296 FileInfo file_info; | |
| 297 if (!db->GetFileInfo(file_id, &file_info)) { | |
| 298 NOTREACHED(); | |
| 299 return base::File::FILE_ERROR_FAILED; | |
| 300 } | |
| 301 if (file_info.is_directory()) | |
| 302 return base::File::FILE_ERROR_NOT_A_FILE; | |
| 303 if (created) | |
| 304 *created = false; | |
| 305 return base::File::FILE_OK; | |
| 306 } | |
| 307 FileId parent_id; | |
| 308 if (!db->GetFileWithPath(VirtualPath::DirName(url.path()), &parent_id)) | |
| 309 return base::File::FILE_ERROR_NOT_FOUND; | |
| 310 | |
| 311 FileInfo file_info; | |
| 312 InitFileInfo(&file_info, parent_id, | |
| 313 VirtualPath::BaseName(url.path()).value()); | |
| 314 | |
| 315 int64 growth = UsageForPath(file_info.name.size()); | |
| 316 if (!AllocateQuota(context, growth)) | |
| 317 return base::File::FILE_ERROR_NO_SPACE; | |
| 318 base::File::Error error = CreateFile(context, base::FilePath(), url, | |
| 319 &file_info); | |
| 320 if (created && base::File::FILE_OK == error) { | |
| 321 *created = true; | |
| 322 UpdateUsage(context, url, growth); | |
| 323 context->change_observers()->Notify( | |
| 324 &FileChangeObserver::OnCreateFile, MakeTuple(url)); | |
| 325 } | |
| 326 return error; | |
| 327 } | |
| 328 | |
| 329 base::File::Error ObfuscatedFileUtil::CreateDirectory( | |
| 330 FileSystemOperationContext* context, | |
| 331 const FileSystemURL& url, | |
| 332 bool exclusive, | |
| 333 bool recursive) { | |
| 334 SandboxDirectoryDatabase* db = GetDirectoryDatabase(url, true); | |
| 335 if (!db) | |
| 336 return base::File::FILE_ERROR_FAILED; | |
| 337 | |
| 338 FileId file_id; | |
| 339 if (db->GetFileWithPath(url.path(), &file_id)) { | |
| 340 FileInfo file_info; | |
| 341 if (exclusive) | |
| 342 return base::File::FILE_ERROR_EXISTS; | |
| 343 if (!db->GetFileInfo(file_id, &file_info)) { | |
| 344 NOTREACHED(); | |
| 345 return base::File::FILE_ERROR_FAILED; | |
| 346 } | |
| 347 if (!file_info.is_directory()) | |
| 348 return base::File::FILE_ERROR_NOT_A_DIRECTORY; | |
| 349 return base::File::FILE_OK; | |
| 350 } | |
| 351 | |
| 352 std::vector<base::FilePath::StringType> components; | |
| 353 VirtualPath::GetComponents(url.path(), &components); | |
| 354 FileId parent_id = 0; | |
| 355 size_t index; | |
| 356 for (index = 0; index < components.size(); ++index) { | |
| 357 base::FilePath::StringType name = components[index]; | |
| 358 if (name == FILE_PATH_LITERAL("/")) | |
| 359 continue; | |
| 360 if (!db->GetChildWithName(parent_id, name, &parent_id)) | |
| 361 break; | |
| 362 } | |
| 363 if (!db->IsDirectory(parent_id)) | |
| 364 return base::File::FILE_ERROR_NOT_A_DIRECTORY; | |
| 365 if (!recursive && components.size() - index > 1) | |
| 366 return base::File::FILE_ERROR_NOT_FOUND; | |
| 367 bool first = true; | |
| 368 for (; index < components.size(); ++index) { | |
| 369 FileInfo file_info; | |
| 370 file_info.name = components[index]; | |
| 371 if (file_info.name == FILE_PATH_LITERAL("/")) | |
| 372 continue; | |
| 373 file_info.modification_time = base::Time::Now(); | |
| 374 file_info.parent_id = parent_id; | |
| 375 int64 growth = UsageForPath(file_info.name.size()); | |
| 376 if (!AllocateQuota(context, growth)) | |
| 377 return base::File::FILE_ERROR_NO_SPACE; | |
| 378 base::File::Error error = db->AddFileInfo(file_info, &parent_id); | |
| 379 if (error != base::File::FILE_OK) | |
| 380 return error; | |
| 381 UpdateUsage(context, url, growth); | |
| 382 context->change_observers()->Notify( | |
| 383 &FileChangeObserver::OnCreateDirectory, MakeTuple(url)); | |
| 384 if (first) { | |
| 385 first = false; | |
| 386 TouchDirectory(db, file_info.parent_id); | |
| 387 } | |
| 388 } | |
| 389 return base::File::FILE_OK; | |
| 390 } | |
| 391 | |
| 392 base::File::Error ObfuscatedFileUtil::GetFileInfo( | |
| 393 FileSystemOperationContext* context, | |
| 394 const FileSystemURL& url, | |
| 395 base::File::Info* file_info, | |
| 396 base::FilePath* platform_file_path) { | |
| 397 SandboxDirectoryDatabase* db = GetDirectoryDatabase(url, false); | |
| 398 if (!db) | |
| 399 return base::File::FILE_ERROR_NOT_FOUND; | |
| 400 FileId file_id; | |
| 401 if (!db->GetFileWithPath(url.path(), &file_id)) | |
| 402 return base::File::FILE_ERROR_NOT_FOUND; | |
| 403 FileInfo local_info; | |
| 404 return GetFileInfoInternal(db, context, url, | |
| 405 file_id, &local_info, | |
| 406 file_info, platform_file_path); | |
| 407 } | |
| 408 | |
| 409 scoped_ptr<FileSystemFileUtil::AbstractFileEnumerator> | |
| 410 ObfuscatedFileUtil::CreateFileEnumerator( | |
| 411 FileSystemOperationContext* context, | |
| 412 const FileSystemURL& root_url) { | |
| 413 return CreateFileEnumerator(context, root_url, false /* recursive */); | |
| 414 } | |
| 415 | |
| 416 base::File::Error ObfuscatedFileUtil::GetLocalFilePath( | |
| 417 FileSystemOperationContext* context, | |
| 418 const FileSystemURL& url, | |
| 419 base::FilePath* local_path) { | |
| 420 SandboxDirectoryDatabase* db = GetDirectoryDatabase(url, false); | |
| 421 if (!db) | |
| 422 return base::File::FILE_ERROR_NOT_FOUND; | |
| 423 FileId file_id; | |
| 424 if (!db->GetFileWithPath(url.path(), &file_id)) | |
| 425 return base::File::FILE_ERROR_NOT_FOUND; | |
| 426 FileInfo file_info; | |
| 427 if (!db->GetFileInfo(file_id, &file_info) || file_info.is_directory()) { | |
| 428 NOTREACHED(); | |
| 429 // Directories have no local file path. | |
| 430 return base::File::FILE_ERROR_NOT_FOUND; | |
| 431 } | |
| 432 *local_path = DataPathToLocalPath(url, file_info.data_path); | |
| 433 | |
| 434 if (local_path->empty()) | |
| 435 return base::File::FILE_ERROR_NOT_FOUND; | |
| 436 return base::File::FILE_OK; | |
| 437 } | |
| 438 | |
| 439 base::File::Error ObfuscatedFileUtil::Touch( | |
| 440 FileSystemOperationContext* context, | |
| 441 const FileSystemURL& url, | |
| 442 const base::Time& last_access_time, | |
| 443 const base::Time& last_modified_time) { | |
| 444 SandboxDirectoryDatabase* db = GetDirectoryDatabase(url, false); | |
| 445 if (!db) | |
| 446 return base::File::FILE_ERROR_NOT_FOUND; | |
| 447 FileId file_id; | |
| 448 if (!db->GetFileWithPath(url.path(), &file_id)) | |
| 449 return base::File::FILE_ERROR_NOT_FOUND; | |
| 450 | |
| 451 FileInfo file_info; | |
| 452 if (!db->GetFileInfo(file_id, &file_info)) { | |
| 453 NOTREACHED(); | |
| 454 return base::File::FILE_ERROR_FAILED; | |
| 455 } | |
| 456 if (file_info.is_directory()) { | |
| 457 if (!db->UpdateModificationTime(file_id, last_modified_time)) | |
| 458 return base::File::FILE_ERROR_FAILED; | |
| 459 return base::File::FILE_OK; | |
| 460 } | |
| 461 return NativeFileUtil::Touch( | |
| 462 DataPathToLocalPath(url, file_info.data_path), | |
| 463 last_access_time, last_modified_time); | |
| 464 } | |
| 465 | |
| 466 base::File::Error ObfuscatedFileUtil::Truncate( | |
| 467 FileSystemOperationContext* context, | |
| 468 const FileSystemURL& url, | |
| 469 int64 length) { | |
| 470 base::File::Info file_info; | |
| 471 base::FilePath local_path; | |
| 472 base::File::Error error = | |
| 473 GetFileInfo(context, url, &file_info, &local_path); | |
| 474 if (error != base::File::FILE_OK) | |
| 475 return error; | |
| 476 | |
| 477 int64 growth = length - file_info.size; | |
| 478 if (!AllocateQuota(context, growth)) | |
| 479 return base::File::FILE_ERROR_NO_SPACE; | |
| 480 error = NativeFileUtil::Truncate(local_path, length); | |
| 481 if (error == base::File::FILE_OK) { | |
| 482 UpdateUsage(context, url, growth); | |
| 483 context->change_observers()->Notify( | |
| 484 &FileChangeObserver::OnModifyFile, MakeTuple(url)); | |
| 485 } | |
| 486 return error; | |
| 487 } | |
| 488 | |
| 489 base::File::Error ObfuscatedFileUtil::CopyOrMoveFile( | |
| 490 FileSystemOperationContext* context, | |
| 491 const FileSystemURL& src_url, | |
| 492 const FileSystemURL& dest_url, | |
| 493 CopyOrMoveOption option, | |
| 494 bool copy) { | |
| 495 // Cross-filesystem copies and moves should be handled via CopyInForeignFile. | |
| 496 DCHECK(src_url.origin() == dest_url.origin()); | |
| 497 DCHECK(src_url.type() == dest_url.type()); | |
| 498 | |
| 499 SandboxDirectoryDatabase* db = GetDirectoryDatabase(src_url, true); | |
| 500 if (!db) | |
| 501 return base::File::FILE_ERROR_FAILED; | |
| 502 | |
| 503 FileId src_file_id; | |
| 504 if (!db->GetFileWithPath(src_url.path(), &src_file_id)) | |
| 505 return base::File::FILE_ERROR_NOT_FOUND; | |
| 506 | |
| 507 FileId dest_file_id; | |
| 508 bool overwrite = db->GetFileWithPath(dest_url.path(), | |
| 509 &dest_file_id); | |
| 510 | |
| 511 FileInfo src_file_info; | |
| 512 base::File::Info src_platform_file_info; | |
| 513 base::FilePath src_local_path; | |
| 514 base::File::Error error = GetFileInfoInternal( | |
| 515 db, context, src_url, src_file_id, | |
| 516 &src_file_info, &src_platform_file_info, &src_local_path); | |
| 517 if (error != base::File::FILE_OK) | |
| 518 return error; | |
| 519 if (src_file_info.is_directory()) | |
| 520 return base::File::FILE_ERROR_NOT_A_FILE; | |
| 521 | |
| 522 FileInfo dest_file_info; | |
| 523 base::File::Info dest_platform_file_info; // overwrite case only | |
| 524 base::FilePath dest_local_path; // overwrite case only | |
| 525 if (overwrite) { | |
| 526 base::File::Error error = GetFileInfoInternal( | |
| 527 db, context, dest_url, dest_file_id, | |
| 528 &dest_file_info, &dest_platform_file_info, &dest_local_path); | |
| 529 if (error == base::File::FILE_ERROR_NOT_FOUND) | |
| 530 overwrite = false; // fallback to non-overwrite case | |
| 531 else if (error != base::File::FILE_OK) | |
| 532 return error; | |
| 533 else if (dest_file_info.is_directory()) | |
| 534 return base::File::FILE_ERROR_INVALID_OPERATION; | |
| 535 } | |
| 536 if (!overwrite) { | |
| 537 FileId dest_parent_id; | |
| 538 if (!db->GetFileWithPath(VirtualPath::DirName(dest_url.path()), | |
| 539 &dest_parent_id)) { | |
| 540 return base::File::FILE_ERROR_NOT_FOUND; | |
| 541 } | |
| 542 | |
| 543 dest_file_info = src_file_info; | |
| 544 dest_file_info.parent_id = dest_parent_id; | |
| 545 dest_file_info.name = | |
| 546 VirtualPath::BaseName(dest_url.path()).value(); | |
| 547 } | |
| 548 | |
| 549 int64 growth = 0; | |
| 550 if (copy) | |
| 551 growth += src_platform_file_info.size; | |
| 552 else | |
| 553 growth -= UsageForPath(src_file_info.name.size()); | |
| 554 if (overwrite) | |
| 555 growth -= dest_platform_file_info.size; | |
| 556 else | |
| 557 growth += UsageForPath(dest_file_info.name.size()); | |
| 558 if (!AllocateQuota(context, growth)) | |
| 559 return base::File::FILE_ERROR_NO_SPACE; | |
| 560 | |
| 561 /* | |
| 562 * Copy-with-overwrite | |
| 563 * Just overwrite data file | |
| 564 * Copy-without-overwrite | |
| 565 * Copy backing file | |
| 566 * Create new metadata pointing to new backing file. | |
| 567 * Move-with-overwrite | |
| 568 * transaction: | |
| 569 * Remove source entry. | |
| 570 * Point target entry to source entry's backing file. | |
| 571 * Delete target entry's old backing file | |
| 572 * Move-without-overwrite | |
| 573 * Just update metadata | |
| 574 */ | |
| 575 error = base::File::FILE_ERROR_FAILED; | |
| 576 if (copy) { | |
| 577 if (overwrite) { | |
| 578 error = NativeFileUtil::CopyOrMoveFile( | |
| 579 src_local_path, | |
| 580 dest_local_path, | |
| 581 option, | |
| 582 storage::NativeFileUtil::CopyOrMoveModeForDestination( | |
| 583 dest_url, true /* copy */)); | |
| 584 } else { // non-overwrite | |
| 585 error = CreateFile(context, src_local_path, dest_url, &dest_file_info); | |
| 586 } | |
| 587 } else { | |
| 588 if (overwrite) { | |
| 589 if (db->OverwritingMoveFile(src_file_id, dest_file_id)) { | |
| 590 if (base::File::FILE_OK != | |
| 591 NativeFileUtil::DeleteFile(dest_local_path)) | |
| 592 LOG(WARNING) << "Leaked a backing file."; | |
| 593 error = base::File::FILE_OK; | |
| 594 } else { | |
| 595 error = base::File::FILE_ERROR_FAILED; | |
| 596 } | |
| 597 } else { // non-overwrite | |
| 598 if (db->UpdateFileInfo(src_file_id, dest_file_info)) | |
| 599 error = base::File::FILE_OK; | |
| 600 else | |
| 601 error = base::File::FILE_ERROR_FAILED; | |
| 602 } | |
| 603 } | |
| 604 | |
| 605 if (error != base::File::FILE_OK) | |
| 606 return error; | |
| 607 | |
| 608 if (overwrite) { | |
| 609 context->change_observers()->Notify( | |
| 610 &FileChangeObserver::OnModifyFile, | |
| 611 MakeTuple(dest_url)); | |
| 612 } else { | |
| 613 context->change_observers()->Notify( | |
| 614 &FileChangeObserver::OnCreateFileFrom, | |
| 615 MakeTuple(dest_url, src_url)); | |
| 616 } | |
| 617 | |
| 618 if (!copy) { | |
| 619 context->change_observers()->Notify( | |
| 620 &FileChangeObserver::OnRemoveFile, MakeTuple(src_url)); | |
| 621 TouchDirectory(db, src_file_info.parent_id); | |
| 622 } | |
| 623 | |
| 624 TouchDirectory(db, dest_file_info.parent_id); | |
| 625 | |
| 626 UpdateUsage(context, dest_url, growth); | |
| 627 return error; | |
| 628 } | |
| 629 | |
| 630 base::File::Error ObfuscatedFileUtil::CopyInForeignFile( | |
| 631 FileSystemOperationContext* context, | |
| 632 const base::FilePath& src_file_path, | |
| 633 const FileSystemURL& dest_url) { | |
| 634 SandboxDirectoryDatabase* db = GetDirectoryDatabase(dest_url, true); | |
| 635 if (!db) | |
| 636 return base::File::FILE_ERROR_FAILED; | |
| 637 | |
| 638 base::File::Info src_platform_file_info; | |
| 639 if (!base::GetFileInfo(src_file_path, &src_platform_file_info)) | |
| 640 return base::File::FILE_ERROR_NOT_FOUND; | |
| 641 | |
| 642 FileId dest_file_id; | |
| 643 bool overwrite = db->GetFileWithPath(dest_url.path(), | |
| 644 &dest_file_id); | |
| 645 | |
| 646 FileInfo dest_file_info; | |
| 647 base::File::Info dest_platform_file_info; // overwrite case only | |
| 648 if (overwrite) { | |
| 649 base::FilePath dest_local_path; | |
| 650 base::File::Error error = GetFileInfoInternal( | |
| 651 db, context, dest_url, dest_file_id, | |
| 652 &dest_file_info, &dest_platform_file_info, &dest_local_path); | |
| 653 if (error == base::File::FILE_ERROR_NOT_FOUND) | |
| 654 overwrite = false; // fallback to non-overwrite case | |
| 655 else if (error != base::File::FILE_OK) | |
| 656 return error; | |
| 657 else if (dest_file_info.is_directory()) | |
| 658 return base::File::FILE_ERROR_INVALID_OPERATION; | |
| 659 } | |
| 660 if (!overwrite) { | |
| 661 FileId dest_parent_id; | |
| 662 if (!db->GetFileWithPath(VirtualPath::DirName(dest_url.path()), | |
| 663 &dest_parent_id)) { | |
| 664 return base::File::FILE_ERROR_NOT_FOUND; | |
| 665 } | |
| 666 if (!dest_file_info.is_directory()) | |
| 667 return base::File::FILE_ERROR_FAILED; | |
| 668 InitFileInfo(&dest_file_info, dest_parent_id, | |
| 669 VirtualPath::BaseName(dest_url.path()).value()); | |
| 670 } | |
| 671 | |
| 672 int64 growth = src_platform_file_info.size; | |
| 673 if (overwrite) | |
| 674 growth -= dest_platform_file_info.size; | |
| 675 else | |
| 676 growth += UsageForPath(dest_file_info.name.size()); | |
| 677 if (!AllocateQuota(context, growth)) | |
| 678 return base::File::FILE_ERROR_NO_SPACE; | |
| 679 | |
| 680 base::File::Error error; | |
| 681 if (overwrite) { | |
| 682 base::FilePath dest_local_path = | |
| 683 DataPathToLocalPath(dest_url, dest_file_info.data_path); | |
| 684 error = NativeFileUtil::CopyOrMoveFile( | |
| 685 src_file_path, | |
| 686 dest_local_path, | |
| 687 FileSystemOperation::OPTION_NONE, | |
| 688 storage::NativeFileUtil::CopyOrMoveModeForDestination(dest_url, | |
| 689 true /* copy */)); | |
| 690 } else { | |
| 691 error = CreateFile(context, src_file_path, dest_url, &dest_file_info); | |
| 692 } | |
| 693 | |
| 694 if (error != base::File::FILE_OK) | |
| 695 return error; | |
| 696 | |
| 697 if (overwrite) { | |
| 698 context->change_observers()->Notify( | |
| 699 &FileChangeObserver::OnModifyFile, MakeTuple(dest_url)); | |
| 700 } else { | |
| 701 context->change_observers()->Notify( | |
| 702 &FileChangeObserver::OnCreateFile, MakeTuple(dest_url)); | |
| 703 } | |
| 704 | |
| 705 UpdateUsage(context, dest_url, growth); | |
| 706 TouchDirectory(db, dest_file_info.parent_id); | |
| 707 return base::File::FILE_OK; | |
| 708 } | |
| 709 | |
| 710 base::File::Error ObfuscatedFileUtil::DeleteFile( | |
| 711 FileSystemOperationContext* context, | |
| 712 const FileSystemURL& url) { | |
| 713 SandboxDirectoryDatabase* db = GetDirectoryDatabase(url, true); | |
| 714 if (!db) | |
| 715 return base::File::FILE_ERROR_FAILED; | |
| 716 FileId file_id; | |
| 717 if (!db->GetFileWithPath(url.path(), &file_id)) | |
| 718 return base::File::FILE_ERROR_NOT_FOUND; | |
| 719 | |
| 720 FileInfo file_info; | |
| 721 base::File::Info platform_file_info; | |
| 722 base::FilePath local_path; | |
| 723 base::File::Error error = GetFileInfoInternal( | |
| 724 db, context, url, file_id, &file_info, &platform_file_info, &local_path); | |
| 725 if (error != base::File::FILE_ERROR_NOT_FOUND && | |
| 726 error != base::File::FILE_OK) | |
| 727 return error; | |
| 728 | |
| 729 if (file_info.is_directory()) | |
| 730 return base::File::FILE_ERROR_NOT_A_FILE; | |
| 731 | |
| 732 int64 growth = -UsageForPath(file_info.name.size()) - platform_file_info.size; | |
| 733 AllocateQuota(context, growth); | |
| 734 if (!db->RemoveFileInfo(file_id)) { | |
| 735 NOTREACHED(); | |
| 736 return base::File::FILE_ERROR_FAILED; | |
| 737 } | |
| 738 UpdateUsage(context, url, growth); | |
| 739 TouchDirectory(db, file_info.parent_id); | |
| 740 | |
| 741 context->change_observers()->Notify( | |
| 742 &FileChangeObserver::OnRemoveFile, MakeTuple(url)); | |
| 743 | |
| 744 if (error == base::File::FILE_ERROR_NOT_FOUND) | |
| 745 return base::File::FILE_OK; | |
| 746 | |
| 747 error = NativeFileUtil::DeleteFile(local_path); | |
| 748 if (base::File::FILE_OK != error) | |
| 749 LOG(WARNING) << "Leaked a backing file."; | |
| 750 return base::File::FILE_OK; | |
| 751 } | |
| 752 | |
| 753 base::File::Error ObfuscatedFileUtil::DeleteDirectory( | |
| 754 FileSystemOperationContext* context, | |
| 755 const FileSystemURL& url) { | |
| 756 SandboxDirectoryDatabase* db = GetDirectoryDatabase(url, true); | |
| 757 if (!db) | |
| 758 return base::File::FILE_ERROR_FAILED; | |
| 759 | |
| 760 FileId file_id; | |
| 761 if (!db->GetFileWithPath(url.path(), &file_id)) | |
| 762 return base::File::FILE_ERROR_NOT_FOUND; | |
| 763 FileInfo file_info; | |
| 764 if (!db->GetFileInfo(file_id, &file_info)) { | |
| 765 NOTREACHED(); | |
| 766 return base::File::FILE_ERROR_FAILED; | |
| 767 } | |
| 768 if (!file_info.is_directory()) | |
| 769 return base::File::FILE_ERROR_NOT_A_DIRECTORY; | |
| 770 if (!db->RemoveFileInfo(file_id)) | |
| 771 return base::File::FILE_ERROR_NOT_EMPTY; | |
| 772 int64 growth = -UsageForPath(file_info.name.size()); | |
| 773 AllocateQuota(context, growth); | |
| 774 UpdateUsage(context, url, growth); | |
| 775 TouchDirectory(db, file_info.parent_id); | |
| 776 context->change_observers()->Notify( | |
| 777 &FileChangeObserver::OnRemoveDirectory, MakeTuple(url)); | |
| 778 return base::File::FILE_OK; | |
| 779 } | |
| 780 | |
| 781 storage::ScopedFile ObfuscatedFileUtil::CreateSnapshotFile( | |
| 782 FileSystemOperationContext* context, | |
| 783 const FileSystemURL& url, | |
| 784 base::File::Error* error, | |
| 785 base::File::Info* file_info, | |
| 786 base::FilePath* platform_path) { | |
| 787 // We're just returning the local file information. | |
| 788 *error = GetFileInfo(context, url, file_info, platform_path); | |
| 789 if (*error == base::File::FILE_OK && file_info->is_directory) { | |
| 790 *file_info = base::File::Info(); | |
| 791 *error = base::File::FILE_ERROR_NOT_A_FILE; | |
| 792 } | |
| 793 return storage::ScopedFile(); | |
| 794 } | |
| 795 | |
| 796 scoped_ptr<FileSystemFileUtil::AbstractFileEnumerator> | |
| 797 ObfuscatedFileUtil::CreateFileEnumerator( | |
| 798 FileSystemOperationContext* context, | |
| 799 const FileSystemURL& root_url, | |
| 800 bool recursive) { | |
| 801 SandboxDirectoryDatabase* db = GetDirectoryDatabase(root_url, false); | |
| 802 if (!db) { | |
| 803 return scoped_ptr<AbstractFileEnumerator>(new EmptyFileEnumerator()); | |
| 804 } | |
| 805 return scoped_ptr<AbstractFileEnumerator>( | |
| 806 new ObfuscatedFileEnumerator(db, context, this, root_url, recursive)); | |
| 807 } | |
| 808 | |
| 809 bool ObfuscatedFileUtil::IsDirectoryEmpty( | |
| 810 FileSystemOperationContext* context, | |
| 811 const FileSystemURL& url) { | |
| 812 SandboxDirectoryDatabase* db = GetDirectoryDatabase(url, false); | |
| 813 if (!db) | |
| 814 return true; // Not a great answer, but it's what others do. | |
| 815 FileId file_id; | |
| 816 if (!db->GetFileWithPath(url.path(), &file_id)) | |
| 817 return true; // Ditto. | |
| 818 FileInfo file_info; | |
| 819 if (!db->GetFileInfo(file_id, &file_info)) { | |
| 820 DCHECK(!file_id); | |
| 821 // It's the root directory and the database hasn't been initialized yet. | |
| 822 return true; | |
| 823 } | |
| 824 if (!file_info.is_directory()) | |
| 825 return true; | |
| 826 std::vector<FileId> children; | |
| 827 // TODO(ericu): This could easily be made faster with help from the database. | |
| 828 if (!db->ListChildren(file_id, &children)) | |
| 829 return true; | |
| 830 return children.empty(); | |
| 831 } | |
| 832 | |
| 833 base::FilePath ObfuscatedFileUtil::GetDirectoryForOriginAndType( | |
| 834 const GURL& origin, | |
| 835 const std::string& type_string, | |
| 836 bool create, | |
| 837 base::File::Error* error_code) { | |
| 838 base::FilePath origin_dir = GetDirectoryForOrigin(origin, create, error_code); | |
| 839 if (origin_dir.empty()) | |
| 840 return base::FilePath(); | |
| 841 if (type_string.empty()) | |
| 842 return origin_dir; | |
| 843 base::FilePath path = origin_dir.AppendASCII(type_string); | |
| 844 base::File::Error error = base::File::FILE_OK; | |
| 845 if (!base::DirectoryExists(path) && | |
| 846 (!create || !base::CreateDirectory(path))) { | |
| 847 error = create ? | |
| 848 base::File::FILE_ERROR_FAILED : | |
| 849 base::File::FILE_ERROR_NOT_FOUND; | |
| 850 } | |
| 851 | |
| 852 if (error_code) | |
| 853 *error_code = error; | |
| 854 return path; | |
| 855 } | |
| 856 | |
| 857 bool ObfuscatedFileUtil::DeleteDirectoryForOriginAndType( | |
| 858 const GURL& origin, | |
| 859 const std::string& type_string) { | |
| 860 base::File::Error error = base::File::FILE_OK; | |
| 861 base::FilePath origin_type_path = GetDirectoryForOriginAndType( | |
| 862 origin, type_string, false, &error); | |
| 863 if (origin_type_path.empty()) | |
| 864 return true; | |
| 865 if (error != base::File::FILE_ERROR_NOT_FOUND) { | |
| 866 // TODO(dmikurube): Consider the return value of DestroyDirectoryDatabase. | |
| 867 // We ignore its error now since 1) it doesn't matter the final result, and | |
| 868 // 2) it always returns false in Windows because of LevelDB's | |
| 869 // implementation. | |
| 870 // Information about failure would be useful for debugging. | |
| 871 if (!type_string.empty()) | |
| 872 DestroyDirectoryDatabase(origin, type_string); | |
| 873 if (!base::DeleteFile(origin_type_path, true /* recursive */)) | |
| 874 return false; | |
| 875 } | |
| 876 | |
| 877 base::FilePath origin_path = VirtualPath::DirName(origin_type_path); | |
| 878 DCHECK_EQ(origin_path.value(), | |
| 879 GetDirectoryForOrigin(origin, false, NULL).value()); | |
| 880 | |
| 881 if (!type_string.empty()) { | |
| 882 // At this point we are sure we had successfully deleted the origin/type | |
| 883 // directory (i.e. we're ready to just return true). | |
| 884 // See if we have other directories in this origin directory. | |
| 885 for (std::set<std::string>::iterator iter = known_type_strings_.begin(); | |
| 886 iter != known_type_strings_.end(); | |
| 887 ++iter) { | |
| 888 if (*iter == type_string) | |
| 889 continue; | |
| 890 if (base::DirectoryExists(origin_path.AppendASCII(*iter))) { | |
| 891 // Other type's directory exists; just return true here. | |
| 892 return true; | |
| 893 } | |
| 894 } | |
| 895 } | |
| 896 | |
| 897 // No other directories seem exist. Try deleting the entire origin directory. | |
| 898 InitOriginDatabase(origin, false); | |
| 899 if (origin_database_) { | |
| 900 origin_database_->RemovePathForOrigin( | |
| 901 storage::GetIdentifierFromOrigin(origin)); | |
| 902 } | |
| 903 if (!base::DeleteFile(origin_path, true /* recursive */)) | |
| 904 return false; | |
| 905 | |
| 906 return true; | |
| 907 } | |
| 908 | |
| 909 ObfuscatedFileUtil::AbstractOriginEnumerator* | |
| 910 ObfuscatedFileUtil::CreateOriginEnumerator() { | |
| 911 std::vector<SandboxOriginDatabase::OriginRecord> origins; | |
| 912 | |
| 913 InitOriginDatabase(GURL(), false); | |
| 914 return new ObfuscatedOriginEnumerator( | |
| 915 origin_database_.get(), file_system_directory_); | |
| 916 } | |
| 917 | |
| 918 bool ObfuscatedFileUtil::DestroyDirectoryDatabase( | |
| 919 const GURL& origin, | |
| 920 const std::string& type_string) { | |
| 921 std::string key = GetDirectoryDatabaseKey(origin, type_string); | |
| 922 if (key.empty()) | |
| 923 return true; | |
| 924 DirectoryMap::iterator iter = directories_.find(key); | |
| 925 if (iter != directories_.end()) { | |
| 926 SandboxDirectoryDatabase* database = iter->second; | |
| 927 directories_.erase(iter); | |
| 928 delete database; | |
| 929 } | |
| 930 | |
| 931 base::File::Error error = base::File::FILE_OK; | |
| 932 base::FilePath path = GetDirectoryForOriginAndType( | |
| 933 origin, type_string, false, &error); | |
| 934 if (path.empty() || error == base::File::FILE_ERROR_NOT_FOUND) | |
| 935 return true; | |
| 936 return SandboxDirectoryDatabase::DestroyDatabase(path, env_override_); | |
| 937 } | |
| 938 | |
| 939 // static | |
| 940 int64 ObfuscatedFileUtil::ComputeFilePathCost(const base::FilePath& path) { | |
| 941 return UsageForPath(VirtualPath::BaseName(path).value().size()); | |
| 942 } | |
| 943 | |
| 944 void ObfuscatedFileUtil::MaybePrepopulateDatabase( | |
| 945 const std::vector<std::string>& type_strings_to_prepopulate) { | |
| 946 SandboxPrioritizedOriginDatabase database(file_system_directory_, | |
| 947 env_override_); | |
| 948 std::string origin_string = database.GetPrimaryOrigin(); | |
| 949 if (origin_string.empty() || !database.HasOriginPath(origin_string)) | |
| 950 return; | |
| 951 const GURL origin = storage::GetOriginFromIdentifier(origin_string); | |
| 952 | |
| 953 // Prepopulate the directory database(s) if and only if this instance | |
| 954 // has primary origin and the directory database is already there. | |
| 955 for (size_t i = 0; i < type_strings_to_prepopulate.size(); ++i) { | |
| 956 const std::string type_string = type_strings_to_prepopulate[i]; | |
| 957 // Only handles known types. | |
| 958 if (!ContainsKey(known_type_strings_, type_string)) | |
| 959 continue; | |
| 960 base::File::Error error = base::File::FILE_ERROR_FAILED; | |
| 961 base::FilePath path = GetDirectoryForOriginAndType( | |
| 962 origin, type_string, false, &error); | |
| 963 if (error != base::File::FILE_OK) | |
| 964 continue; | |
| 965 scoped_ptr<SandboxDirectoryDatabase> db( | |
| 966 new SandboxDirectoryDatabase(path, env_override_)); | |
| 967 if (db->Init(SandboxDirectoryDatabase::FAIL_ON_CORRUPTION)) { | |
| 968 directories_[GetDirectoryDatabaseKey(origin, type_string)] = db.release(); | |
| 969 MarkUsed(); | |
| 970 // Don't populate more than one database, as it may rather hurt | |
| 971 // performance. | |
| 972 break; | |
| 973 } | |
| 974 } | |
| 975 } | |
| 976 | |
| 977 base::FilePath ObfuscatedFileUtil::GetDirectoryForURL( | |
| 978 const FileSystemURL& url, | |
| 979 bool create, | |
| 980 base::File::Error* error_code) { | |
| 981 return GetDirectoryForOriginAndType( | |
| 982 url.origin(), CallGetTypeStringForURL(url), create, error_code); | |
| 983 } | |
| 984 | |
| 985 std::string ObfuscatedFileUtil::CallGetTypeStringForURL( | |
| 986 const FileSystemURL& url) { | |
| 987 DCHECK(!get_type_string_for_url_.is_null()); | |
| 988 return get_type_string_for_url_.Run(url); | |
| 989 } | |
| 990 | |
| 991 base::File::Error ObfuscatedFileUtil::GetFileInfoInternal( | |
| 992 SandboxDirectoryDatabase* db, | |
| 993 FileSystemOperationContext* context, | |
| 994 const FileSystemURL& url, | |
| 995 FileId file_id, | |
| 996 FileInfo* local_info, | |
| 997 base::File::Info* file_info, | |
| 998 base::FilePath* platform_file_path) { | |
| 999 DCHECK(db); | |
| 1000 DCHECK(context); | |
| 1001 DCHECK(file_info); | |
| 1002 DCHECK(platform_file_path); | |
| 1003 | |
| 1004 if (!db->GetFileInfo(file_id, local_info)) { | |
| 1005 NOTREACHED(); | |
| 1006 return base::File::FILE_ERROR_FAILED; | |
| 1007 } | |
| 1008 | |
| 1009 if (local_info->is_directory()) { | |
| 1010 file_info->size = 0; | |
| 1011 file_info->is_directory = true; | |
| 1012 file_info->is_symbolic_link = false; | |
| 1013 file_info->last_modified = local_info->modification_time; | |
| 1014 *platform_file_path = base::FilePath(); | |
| 1015 // We don't fill in ctime or atime. | |
| 1016 return base::File::FILE_OK; | |
| 1017 } | |
| 1018 if (local_info->data_path.empty()) | |
| 1019 return base::File::FILE_ERROR_INVALID_OPERATION; | |
| 1020 base::FilePath local_path = DataPathToLocalPath(url, local_info->data_path); | |
| 1021 base::File::Error error = NativeFileUtil::GetFileInfo( | |
| 1022 local_path, file_info); | |
| 1023 // We should not follow symbolic links in sandboxed file system. | |
| 1024 if (base::IsLink(local_path)) { | |
| 1025 LOG(WARNING) << "Found a symbolic file."; | |
| 1026 error = base::File::FILE_ERROR_NOT_FOUND; | |
| 1027 } | |
| 1028 if (error == base::File::FILE_OK) { | |
| 1029 *platform_file_path = local_path; | |
| 1030 } else if (error == base::File::FILE_ERROR_NOT_FOUND) { | |
| 1031 LOG(WARNING) << "Lost a backing file."; | |
| 1032 InvalidateUsageCache(context, url.origin(), url.type()); | |
| 1033 if (!db->RemoveFileInfo(file_id)) | |
| 1034 return base::File::FILE_ERROR_FAILED; | |
| 1035 } | |
| 1036 return error; | |
| 1037 } | |
| 1038 | |
| 1039 base::File ObfuscatedFileUtil::CreateAndOpenFile( | |
| 1040 FileSystemOperationContext* context, | |
| 1041 const FileSystemURL& dest_url, | |
| 1042 FileInfo* dest_file_info, int file_flags) { | |
| 1043 SandboxDirectoryDatabase* db = GetDirectoryDatabase(dest_url, true); | |
| 1044 | |
| 1045 base::FilePath root, dest_local_path; | |
| 1046 base::File::Error error = GenerateNewLocalPath(db, context, dest_url, &root, | |
| 1047 &dest_local_path); | |
| 1048 if (error != base::File::FILE_OK) | |
| 1049 return base::File(error); | |
| 1050 | |
| 1051 if (base::PathExists(dest_local_path)) { | |
| 1052 if (!base::DeleteFile(dest_local_path, true /* recursive */)) | |
| 1053 return base::File(base::File::FILE_ERROR_FAILED); | |
| 1054 LOG(WARNING) << "A stray file detected"; | |
| 1055 InvalidateUsageCache(context, dest_url.origin(), dest_url.type()); | |
| 1056 } | |
| 1057 | |
| 1058 base::File file = NativeFileUtil::CreateOrOpen(dest_local_path, file_flags); | |
| 1059 if (!file.IsValid()) | |
| 1060 return file.Pass(); | |
| 1061 | |
| 1062 if (!file.created()) { | |
| 1063 file.Close(); | |
| 1064 base::DeleteFile(dest_local_path, false /* recursive */); | |
| 1065 return base::File(base::File::FILE_ERROR_FAILED); | |
| 1066 } | |
| 1067 | |
| 1068 error = CommitCreateFile(root, dest_local_path, db, dest_file_info); | |
| 1069 if (error != base::File::FILE_OK) { | |
| 1070 file.Close(); | |
| 1071 base::DeleteFile(dest_local_path, false /* recursive */); | |
| 1072 return base::File(error); | |
| 1073 } | |
| 1074 | |
| 1075 return file.Pass(); | |
| 1076 } | |
| 1077 | |
| 1078 base::File::Error ObfuscatedFileUtil::CreateFile( | |
| 1079 FileSystemOperationContext* context, | |
| 1080 const base::FilePath& src_file_path, | |
| 1081 const FileSystemURL& dest_url, | |
| 1082 FileInfo* dest_file_info) { | |
| 1083 SandboxDirectoryDatabase* db = GetDirectoryDatabase(dest_url, true); | |
| 1084 | |
| 1085 base::FilePath root, dest_local_path; | |
| 1086 base::File::Error error = GenerateNewLocalPath(db, context, dest_url, &root, | |
| 1087 &dest_local_path); | |
| 1088 if (error != base::File::FILE_OK) | |
| 1089 return error; | |
| 1090 | |
| 1091 bool created = false; | |
| 1092 if (src_file_path.empty()) { | |
| 1093 if (base::PathExists(dest_local_path)) { | |
| 1094 if (!base::DeleteFile(dest_local_path, true /* recursive */)) | |
| 1095 return base::File::FILE_ERROR_FAILED; | |
| 1096 LOG(WARNING) << "A stray file detected"; | |
| 1097 InvalidateUsageCache(context, dest_url.origin(), dest_url.type()); | |
| 1098 } | |
| 1099 | |
| 1100 error = NativeFileUtil::EnsureFileExists(dest_local_path, &created); | |
| 1101 } else { | |
| 1102 error = NativeFileUtil::CopyOrMoveFile( | |
| 1103 src_file_path, | |
| 1104 dest_local_path, | |
| 1105 FileSystemOperation::OPTION_NONE, | |
| 1106 storage::NativeFileUtil::CopyOrMoveModeForDestination(dest_url, | |
| 1107 true /* copy */)); | |
| 1108 created = true; | |
| 1109 } | |
| 1110 if (error != base::File::FILE_OK) | |
| 1111 return error; | |
| 1112 if (!created) | |
| 1113 return base::File::FILE_ERROR_FAILED; | |
| 1114 | |
| 1115 return CommitCreateFile(root, dest_local_path, db, dest_file_info); | |
| 1116 } | |
| 1117 | |
| 1118 base::File::Error ObfuscatedFileUtil::CommitCreateFile( | |
| 1119 const base::FilePath& root, | |
| 1120 const base::FilePath& local_path, | |
| 1121 SandboxDirectoryDatabase* db, | |
| 1122 FileInfo* dest_file_info) { | |
| 1123 // This removes the root, including the trailing slash, leaving a relative | |
| 1124 // path. | |
| 1125 dest_file_info->data_path = base::FilePath( | |
| 1126 local_path.value().substr(root.value().length() + 1)); | |
| 1127 | |
| 1128 FileId file_id; | |
| 1129 base::File::Error error = db->AddFileInfo(*dest_file_info, &file_id); | |
| 1130 if (error != base::File::FILE_OK) | |
| 1131 return error; | |
| 1132 | |
| 1133 TouchDirectory(db, dest_file_info->parent_id); | |
| 1134 return base::File::FILE_OK; | |
| 1135 } | |
| 1136 | |
| 1137 base::FilePath ObfuscatedFileUtil::DataPathToLocalPath( | |
| 1138 const FileSystemURL& url, const base::FilePath& data_path) { | |
| 1139 base::File::Error error = base::File::FILE_OK; | |
| 1140 base::FilePath root = GetDirectoryForURL(url, false, &error); | |
| 1141 if (error != base::File::FILE_OK) | |
| 1142 return base::FilePath(); | |
| 1143 return root.Append(data_path); | |
| 1144 } | |
| 1145 | |
| 1146 std::string ObfuscatedFileUtil::GetDirectoryDatabaseKey( | |
| 1147 const GURL& origin, const std::string& type_string) { | |
| 1148 if (type_string.empty()) { | |
| 1149 LOG(WARNING) << "Unknown filesystem type requested:" << type_string; | |
| 1150 return std::string(); | |
| 1151 } | |
| 1152 // For isolated origin we just use a type string as a key. | |
| 1153 return storage::GetIdentifierFromOrigin(origin) + type_string; | |
| 1154 } | |
| 1155 | |
| 1156 // TODO(ericu): How to do the whole validation-without-creation thing? | |
| 1157 // We may not have quota even to create the database. | |
| 1158 // Ah, in that case don't even get here? | |
| 1159 // Still doesn't answer the quota issue, though. | |
| 1160 SandboxDirectoryDatabase* ObfuscatedFileUtil::GetDirectoryDatabase( | |
| 1161 const FileSystemURL& url, bool create) { | |
| 1162 std::string key = GetDirectoryDatabaseKey( | |
| 1163 url.origin(), CallGetTypeStringForURL(url)); | |
| 1164 if (key.empty()) | |
| 1165 return NULL; | |
| 1166 | |
| 1167 DirectoryMap::iterator iter = directories_.find(key); | |
| 1168 if (iter != directories_.end()) { | |
| 1169 MarkUsed(); | |
| 1170 return iter->second; | |
| 1171 } | |
| 1172 | |
| 1173 base::File::Error error = base::File::FILE_OK; | |
| 1174 base::FilePath path = GetDirectoryForURL(url, create, &error); | |
| 1175 if (error != base::File::FILE_OK) { | |
| 1176 LOG(WARNING) << "Failed to get origin+type directory: " | |
| 1177 << url.DebugString() << " error:" << error; | |
| 1178 return NULL; | |
| 1179 } | |
| 1180 MarkUsed(); | |
| 1181 SandboxDirectoryDatabase* database = | |
| 1182 new SandboxDirectoryDatabase(path, env_override_); | |
| 1183 directories_[key] = database; | |
| 1184 return database; | |
| 1185 } | |
| 1186 | |
| 1187 base::FilePath ObfuscatedFileUtil::GetDirectoryForOrigin( | |
| 1188 const GURL& origin, bool create, base::File::Error* error_code) { | |
| 1189 if (!InitOriginDatabase(origin, create)) { | |
| 1190 if (error_code) { | |
| 1191 *error_code = create ? | |
| 1192 base::File::FILE_ERROR_FAILED : | |
| 1193 base::File::FILE_ERROR_NOT_FOUND; | |
| 1194 } | |
| 1195 return base::FilePath(); | |
| 1196 } | |
| 1197 base::FilePath directory_name; | |
| 1198 std::string id = storage::GetIdentifierFromOrigin(origin); | |
| 1199 | |
| 1200 bool exists_in_db = origin_database_->HasOriginPath(id); | |
| 1201 if (!exists_in_db && !create) { | |
| 1202 if (error_code) | |
| 1203 *error_code = base::File::FILE_ERROR_NOT_FOUND; | |
| 1204 return base::FilePath(); | |
| 1205 } | |
| 1206 if (!origin_database_->GetPathForOrigin(id, &directory_name)) { | |
| 1207 if (error_code) | |
| 1208 *error_code = base::File::FILE_ERROR_FAILED; | |
| 1209 return base::FilePath(); | |
| 1210 } | |
| 1211 | |
| 1212 base::FilePath path = file_system_directory_.Append(directory_name); | |
| 1213 bool exists_in_fs = base::DirectoryExists(path); | |
| 1214 if (!exists_in_db && exists_in_fs) { | |
| 1215 if (!base::DeleteFile(path, true)) { | |
| 1216 if (error_code) | |
| 1217 *error_code = base::File::FILE_ERROR_FAILED; | |
| 1218 return base::FilePath(); | |
| 1219 } | |
| 1220 exists_in_fs = false; | |
| 1221 } | |
| 1222 | |
| 1223 if (!exists_in_fs) { | |
| 1224 if (!create || !base::CreateDirectory(path)) { | |
| 1225 if (error_code) | |
| 1226 *error_code = create ? | |
| 1227 base::File::FILE_ERROR_FAILED : | |
| 1228 base::File::FILE_ERROR_NOT_FOUND; | |
| 1229 return base::FilePath(); | |
| 1230 } | |
| 1231 } | |
| 1232 | |
| 1233 if (error_code) | |
| 1234 *error_code = base::File::FILE_OK; | |
| 1235 | |
| 1236 return path; | |
| 1237 } | |
| 1238 | |
| 1239 void ObfuscatedFileUtil::InvalidateUsageCache( | |
| 1240 FileSystemOperationContext* context, | |
| 1241 const GURL& origin, | |
| 1242 FileSystemType type) { | |
| 1243 if (sandbox_delegate_) | |
| 1244 sandbox_delegate_->InvalidateUsageCache(origin, type); | |
| 1245 } | |
| 1246 | |
| 1247 void ObfuscatedFileUtil::MarkUsed() { | |
| 1248 if (!timer_) | |
| 1249 timer_.reset(new TimedTaskHelper(file_task_runner_.get())); | |
| 1250 | |
| 1251 if (timer_->IsRunning()) { | |
| 1252 timer_->Reset(); | |
| 1253 } else { | |
| 1254 timer_->Start(FROM_HERE, | |
| 1255 base::TimeDelta::FromSeconds(db_flush_delay_seconds_), | |
| 1256 base::Bind(&ObfuscatedFileUtil::DropDatabases, | |
| 1257 base::Unretained(this))); | |
| 1258 } | |
| 1259 } | |
| 1260 | |
| 1261 void ObfuscatedFileUtil::DropDatabases() { | |
| 1262 origin_database_.reset(); | |
| 1263 STLDeleteContainerPairSecondPointers( | |
| 1264 directories_.begin(), directories_.end()); | |
| 1265 directories_.clear(); | |
| 1266 timer_.reset(); | |
| 1267 } | |
| 1268 | |
| 1269 bool ObfuscatedFileUtil::InitOriginDatabase(const GURL& origin_hint, | |
| 1270 bool create) { | |
| 1271 if (origin_database_) | |
| 1272 return true; | |
| 1273 | |
| 1274 if (!create && !base::DirectoryExists(file_system_directory_)) | |
| 1275 return false; | |
| 1276 if (!base::CreateDirectory(file_system_directory_)) { | |
| 1277 LOG(WARNING) << "Failed to create FileSystem directory: " << | |
| 1278 file_system_directory_.value(); | |
| 1279 return false; | |
| 1280 } | |
| 1281 | |
| 1282 SandboxPrioritizedOriginDatabase* prioritized_origin_database = | |
| 1283 new SandboxPrioritizedOriginDatabase(file_system_directory_, | |
| 1284 env_override_); | |
| 1285 origin_database_.reset(prioritized_origin_database); | |
| 1286 | |
| 1287 if (origin_hint.is_empty() || !HasIsolatedStorage(origin_hint)) | |
| 1288 return true; | |
| 1289 | |
| 1290 const std::string isolated_origin_string = | |
| 1291 storage::GetIdentifierFromOrigin(origin_hint); | |
| 1292 | |
| 1293 // TODO(kinuko): Deprecate this after a few release cycles, e.g. around M33. | |
| 1294 base::FilePath isolated_origin_dir = file_system_directory_.Append( | |
| 1295 SandboxIsolatedOriginDatabase::kObsoleteOriginDirectory); | |
| 1296 if (base::DirectoryExists(isolated_origin_dir) && | |
| 1297 prioritized_origin_database->GetSandboxOriginDatabase()) { | |
| 1298 SandboxIsolatedOriginDatabase::MigrateBackFromObsoleteOriginDatabase( | |
| 1299 isolated_origin_string, | |
| 1300 file_system_directory_, | |
| 1301 prioritized_origin_database->GetSandboxOriginDatabase()); | |
| 1302 } | |
| 1303 | |
| 1304 prioritized_origin_database->InitializePrimaryOrigin( | |
| 1305 isolated_origin_string); | |
| 1306 | |
| 1307 return true; | |
| 1308 } | |
| 1309 | |
| 1310 base::File::Error ObfuscatedFileUtil::GenerateNewLocalPath( | |
| 1311 SandboxDirectoryDatabase* db, | |
| 1312 FileSystemOperationContext* context, | |
| 1313 const FileSystemURL& url, | |
| 1314 base::FilePath* root, | |
| 1315 base::FilePath* local_path) { | |
| 1316 DCHECK(local_path); | |
| 1317 int64 number; | |
| 1318 if (!db || !db->GetNextInteger(&number)) | |
| 1319 return base::File::FILE_ERROR_FAILED; | |
| 1320 | |
| 1321 base::File::Error error = base::File::FILE_OK; | |
| 1322 *root = GetDirectoryForURL(url, false, &error); | |
| 1323 if (error != base::File::FILE_OK) | |
| 1324 return error; | |
| 1325 | |
| 1326 // We use the third- and fourth-to-last digits as the directory. | |
| 1327 int64 directory_number = number % 10000 / 100; | |
| 1328 base::FilePath new_local_path = root->AppendASCII( | |
| 1329 base::StringPrintf("%02" PRId64, directory_number)); | |
| 1330 | |
| 1331 error = NativeFileUtil::CreateDirectory( | |
| 1332 new_local_path, false /* exclusive */, false /* recursive */); | |
| 1333 if (error != base::File::FILE_OK) | |
| 1334 return error; | |
| 1335 | |
| 1336 *local_path = | |
| 1337 new_local_path.AppendASCII(base::StringPrintf("%08" PRId64, number)); | |
| 1338 return base::File::FILE_OK; | |
| 1339 } | |
| 1340 | |
| 1341 base::File ObfuscatedFileUtil::CreateOrOpenInternal( | |
| 1342 FileSystemOperationContext* context, | |
| 1343 const FileSystemURL& url, int file_flags) { | |
| 1344 DCHECK(!(file_flags & (base::File::FLAG_DELETE_ON_CLOSE | | |
| 1345 base::File::FLAG_HIDDEN | base::File::FLAG_EXCLUSIVE_READ | | |
| 1346 base::File::FLAG_EXCLUSIVE_WRITE))); | |
| 1347 SandboxDirectoryDatabase* db = GetDirectoryDatabase(url, true); | |
| 1348 if (!db) | |
| 1349 return base::File(base::File::FILE_ERROR_FAILED); | |
| 1350 FileId file_id; | |
| 1351 if (!db->GetFileWithPath(url.path(), &file_id)) { | |
| 1352 // The file doesn't exist. | |
| 1353 if (!(file_flags & (base::File::FLAG_CREATE | | |
| 1354 base::File::FLAG_CREATE_ALWAYS | base::File::FLAG_OPEN_ALWAYS))) { | |
| 1355 return base::File(base::File::FILE_ERROR_NOT_FOUND); | |
| 1356 } | |
| 1357 FileId parent_id; | |
| 1358 if (!db->GetFileWithPath(VirtualPath::DirName(url.path()), &parent_id)) | |
| 1359 return base::File(base::File::FILE_ERROR_NOT_FOUND); | |
| 1360 FileInfo file_info; | |
| 1361 InitFileInfo(&file_info, parent_id, | |
| 1362 VirtualPath::BaseName(url.path()).value()); | |
| 1363 | |
| 1364 int64 growth = UsageForPath(file_info.name.size()); | |
| 1365 if (!AllocateQuota(context, growth)) | |
| 1366 return base::File(base::File::FILE_ERROR_NO_SPACE); | |
| 1367 base::File file = CreateAndOpenFile(context, url, &file_info, file_flags); | |
| 1368 if (file.IsValid()) { | |
| 1369 UpdateUsage(context, url, growth); | |
| 1370 context->change_observers()->Notify( | |
| 1371 &FileChangeObserver::OnCreateFile, MakeTuple(url)); | |
| 1372 } | |
| 1373 return file.Pass(); | |
| 1374 } | |
| 1375 | |
| 1376 if (file_flags & base::File::FLAG_CREATE) | |
| 1377 return base::File(base::File::FILE_ERROR_EXISTS); | |
| 1378 | |
| 1379 base::File::Info platform_file_info; | |
| 1380 base::FilePath local_path; | |
| 1381 FileInfo file_info; | |
| 1382 base::File::Error error = GetFileInfoInternal( | |
| 1383 db, context, url, file_id, &file_info, &platform_file_info, &local_path); | |
| 1384 if (error != base::File::FILE_OK) | |
| 1385 return base::File(error); | |
| 1386 if (file_info.is_directory()) | |
| 1387 return base::File(base::File::FILE_ERROR_NOT_A_FILE); | |
| 1388 | |
| 1389 int64 delta = 0; | |
| 1390 if (file_flags & (base::File::FLAG_CREATE_ALWAYS | | |
| 1391 base::File::FLAG_OPEN_TRUNCATED)) { | |
| 1392 // The file exists and we're truncating. | |
| 1393 delta = -platform_file_info.size; | |
| 1394 AllocateQuota(context, delta); | |
| 1395 } | |
| 1396 | |
| 1397 base::File file = NativeFileUtil::CreateOrOpen(local_path, file_flags); | |
| 1398 if (!file.IsValid()) { | |
| 1399 error = file.error_details(); | |
| 1400 if (error == base::File::FILE_ERROR_NOT_FOUND) { | |
| 1401 // TODO(tzik): Also invalidate on-memory usage cache in UsageTracker. | |
| 1402 // TODO(tzik): Delete database entry after ensuring the file lost. | |
| 1403 InvalidateUsageCache(context, url.origin(), url.type()); | |
| 1404 LOG(WARNING) << "Lost a backing file."; | |
| 1405 return base::File(base::File::FILE_ERROR_FAILED); | |
| 1406 } | |
| 1407 return file.Pass(); | |
| 1408 } | |
| 1409 | |
| 1410 // If truncating we need to update the usage. | |
| 1411 if (delta) { | |
| 1412 UpdateUsage(context, url, delta); | |
| 1413 context->change_observers()->Notify( | |
| 1414 &FileChangeObserver::OnModifyFile, MakeTuple(url)); | |
| 1415 } | |
| 1416 return file.Pass(); | |
| 1417 } | |
| 1418 | |
| 1419 bool ObfuscatedFileUtil::HasIsolatedStorage(const GURL& origin) { | |
| 1420 return special_storage_policy_.get() && | |
| 1421 special_storage_policy_->HasIsolatedStorage(origin); | |
| 1422 } | |
| 1423 | |
| 1424 } // namespace storage | |
| OLD | NEW |