Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(99)

Side by Side Diff: webkit/browser/fileapi/sandbox_file_system_backend.cc

Issue 539143002: Migrate webkit/browser/ to storage/browser/ (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: fix android build Created 6 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
(Empty)
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include "webkit/browser/fileapi/sandbox_file_system_backend.h"
6
7 #include "base/bind.h"
8 #include "base/files/file_util.h"
9 #include "base/logging.h"
10 #include "base/metrics/histogram.h"
11 #include "base/task_runner_util.h"
12 #include "url/gurl.h"
13 #include "webkit/browser/blob/file_stream_reader.h"
14 #include "webkit/browser/fileapi/async_file_util_adapter.h"
15 #include "webkit/browser/fileapi/copy_or_move_file_validator.h"
16 #include "webkit/browser/fileapi/file_stream_writer.h"
17 #include "webkit/browser/fileapi/file_system_context.h"
18 #include "webkit/browser/fileapi/file_system_operation.h"
19 #include "webkit/browser/fileapi/file_system_operation_context.h"
20 #include "webkit/browser/fileapi/file_system_options.h"
21 #include "webkit/browser/fileapi/file_system_usage_cache.h"
22 #include "webkit/browser/fileapi/obfuscated_file_util.h"
23 #include "webkit/browser/fileapi/sandbox_file_system_backend_delegate.h"
24 #include "webkit/browser/fileapi/sandbox_quota_observer.h"
25 #include "webkit/browser/quota/quota_manager.h"
26 #include "webkit/common/fileapi/file_system_types.h"
27 #include "webkit/common/fileapi/file_system_util.h"
28
29 using storage::QuotaManagerProxy;
30 using storage::SpecialStoragePolicy;
31
32 namespace storage {
33
34 SandboxFileSystemBackend::SandboxFileSystemBackend(
35 SandboxFileSystemBackendDelegate* delegate)
36 : delegate_(delegate),
37 enable_temporary_file_system_in_incognito_(false) {
38 }
39
40 SandboxFileSystemBackend::~SandboxFileSystemBackend() {
41 }
42
43 bool SandboxFileSystemBackend::CanHandleType(FileSystemType type) const {
44 return type == kFileSystemTypeTemporary ||
45 type == kFileSystemTypePersistent;
46 }
47
48 void SandboxFileSystemBackend::Initialize(FileSystemContext* context) {
49 DCHECK(delegate_);
50
51 // Set quota observers.
52 delegate_->RegisterQuotaUpdateObserver(storage::kFileSystemTypeTemporary);
53 delegate_->AddFileAccessObserver(
54 storage::kFileSystemTypeTemporary, delegate_->quota_observer(), NULL);
55
56 delegate_->RegisterQuotaUpdateObserver(storage::kFileSystemTypePersistent);
57 delegate_->AddFileAccessObserver(
58 storage::kFileSystemTypePersistent, delegate_->quota_observer(), NULL);
59 }
60
61 void SandboxFileSystemBackend::ResolveURL(
62 const FileSystemURL& url,
63 OpenFileSystemMode mode,
64 const OpenFileSystemCallback& callback) {
65 DCHECK(CanHandleType(url.type()));
66 DCHECK(delegate_);
67 if (delegate_->file_system_options().is_incognito() &&
68 !(url.type() == kFileSystemTypeTemporary &&
69 enable_temporary_file_system_in_incognito_)) {
70 // TODO(kinuko): return an isolated temporary directory.
71 callback.Run(GURL(), std::string(), base::File::FILE_ERROR_SECURITY);
72 return;
73 }
74
75 delegate_->OpenFileSystem(url.origin(),
76 url.type(),
77 mode,
78 callback,
79 GetFileSystemRootURI(url.origin(), url.type()));
80 }
81
82 AsyncFileUtil* SandboxFileSystemBackend::GetAsyncFileUtil(
83 FileSystemType type) {
84 DCHECK(delegate_);
85 return delegate_->file_util();
86 }
87
88 WatcherManager* SandboxFileSystemBackend::GetWatcherManager(
89 FileSystemType type) {
90 return NULL;
91 }
92
93 CopyOrMoveFileValidatorFactory*
94 SandboxFileSystemBackend::GetCopyOrMoveFileValidatorFactory(
95 FileSystemType type,
96 base::File::Error* error_code) {
97 DCHECK(error_code);
98 *error_code = base::File::FILE_OK;
99 return NULL;
100 }
101
102 FileSystemOperation* SandboxFileSystemBackend::CreateFileSystemOperation(
103 const FileSystemURL& url,
104 FileSystemContext* context,
105 base::File::Error* error_code) const {
106 DCHECK(CanHandleType(url.type()));
107 DCHECK(error_code);
108
109 DCHECK(delegate_);
110 scoped_ptr<FileSystemOperationContext> operation_context =
111 delegate_->CreateFileSystemOperationContext(url, context, error_code);
112 if (!operation_context)
113 return NULL;
114
115 SpecialStoragePolicy* policy = delegate_->special_storage_policy();
116 if (policy && policy->IsStorageUnlimited(url.origin()))
117 operation_context->set_quota_limit_type(storage::kQuotaLimitTypeUnlimited);
118 else
119 operation_context->set_quota_limit_type(storage::kQuotaLimitTypeLimited);
120
121 return FileSystemOperation::Create(url, context, operation_context.Pass());
122 }
123
124 bool SandboxFileSystemBackend::SupportsStreaming(
125 const storage::FileSystemURL& url) const {
126 return false;
127 }
128
129 bool SandboxFileSystemBackend::HasInplaceCopyImplementation(
130 storage::FileSystemType type) const {
131 return true;
132 }
133
134 scoped_ptr<storage::FileStreamReader>
135 SandboxFileSystemBackend::CreateFileStreamReader(
136 const FileSystemURL& url,
137 int64 offset,
138 const base::Time& expected_modification_time,
139 FileSystemContext* context) const {
140 DCHECK(CanHandleType(url.type()));
141 DCHECK(delegate_);
142 return delegate_->CreateFileStreamReader(
143 url, offset, expected_modification_time, context);
144 }
145
146 scoped_ptr<storage::FileStreamWriter>
147 SandboxFileSystemBackend::CreateFileStreamWriter(
148 const FileSystemURL& url,
149 int64 offset,
150 FileSystemContext* context) const {
151 DCHECK(CanHandleType(url.type()));
152 DCHECK(delegate_);
153 return delegate_->CreateFileStreamWriter(url, offset, context, url.type());
154 }
155
156 FileSystemQuotaUtil* SandboxFileSystemBackend::GetQuotaUtil() {
157 return delegate_;
158 }
159
160 SandboxFileSystemBackendDelegate::OriginEnumerator*
161 SandboxFileSystemBackend::CreateOriginEnumerator() {
162 DCHECK(delegate_);
163 return delegate_->CreateOriginEnumerator();
164 }
165
166 } // namespace storage
OLDNEW
« no previous file with comments | « webkit/browser/fileapi/sandbox_file_system_backend.h ('k') | webkit/browser/fileapi/sandbox_file_system_backend_delegate.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698