| Index: webkit/browser/fileapi/obfuscated_file_util.cc
|
| diff --git a/webkit/browser/fileapi/obfuscated_file_util.cc b/webkit/browser/fileapi/obfuscated_file_util.cc
|
| deleted file mode 100644
|
| index da58125325158bfc7c11ea4cd0a47922e315beff..0000000000000000000000000000000000000000
|
| --- a/webkit/browser/fileapi/obfuscated_file_util.cc
|
| +++ /dev/null
|
| @@ -1,1424 +0,0 @@
|
| -// Copyright (c) 2012 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "webkit/browser/fileapi/obfuscated_file_util.h"
|
| -
|
| -#include <queue>
|
| -#include <string>
|
| -#include <vector>
|
| -
|
| -#include "base/file_util.h"
|
| -#include "base/format_macros.h"
|
| -#include "base/logging.h"
|
| -#include "base/message_loop/message_loop.h"
|
| -#include "base/metrics/histogram.h"
|
| -#include "base/stl_util.h"
|
| -#include "base/strings/string_number_conversions.h"
|
| -#include "base/strings/stringprintf.h"
|
| -#include "base/strings/sys_string_conversions.h"
|
| -#include "base/strings/utf_string_conversions.h"
|
| -#include "base/time/time.h"
|
| -#include "url/gurl.h"
|
| -#include "webkit/browser/fileapi/file_observers.h"
|
| -#include "webkit/browser/fileapi/file_system_context.h"
|
| -#include "webkit/browser/fileapi/file_system_operation_context.h"
|
| -#include "webkit/browser/fileapi/file_system_url.h"
|
| -#include "webkit/browser/fileapi/native_file_util.h"
|
| -#include "webkit/browser/fileapi/sandbox_file_system_backend.h"
|
| -#include "webkit/browser/fileapi/sandbox_isolated_origin_database.h"
|
| -#include "webkit/browser/fileapi/sandbox_origin_database.h"
|
| -#include "webkit/browser/fileapi/sandbox_prioritized_origin_database.h"
|
| -#include "webkit/browser/fileapi/timed_task_helper.h"
|
| -#include "webkit/browser/quota/quota_manager.h"
|
| -#include "webkit/common/database/database_identifier.h"
|
| -#include "webkit/common/fileapi/file_system_util.h"
|
| -
|
| -// Example of various paths:
|
| -// void ObfuscatedFileUtil::DoSomething(const FileSystemURL& url) {
|
| -// base::FilePath virtual_path = url.path();
|
| -// base::FilePath local_path = GetLocalFilePath(url);
|
| -//
|
| -// NativeFileUtil::DoSomething(local_path);
|
| -// file_util::DoAnother(local_path);
|
| -// }
|
| -
|
| -namespace storage {
|
| -
|
| -namespace {
|
| -
|
| -typedef SandboxDirectoryDatabase::FileId FileId;
|
| -typedef SandboxDirectoryDatabase::FileInfo FileInfo;
|
| -
|
| -void InitFileInfo(
|
| - SandboxDirectoryDatabase::FileInfo* file_info,
|
| - SandboxDirectoryDatabase::FileId parent_id,
|
| - const base::FilePath::StringType& file_name) {
|
| - DCHECK(file_info);
|
| - file_info->parent_id = parent_id;
|
| - file_info->name = file_name;
|
| -}
|
| -
|
| -// Costs computed as per crbug.com/86114, based on the LevelDB implementation of
|
| -// path storage under Linux. It's not clear if that will differ on Windows, on
|
| -// which base::FilePath uses wide chars [since they're converted to UTF-8 for
|
| -// storage anyway], but as long as the cost is high enough that one can't cheat
|
| -// on quota by storing data in paths, it doesn't need to be all that accurate.
|
| -const int64 kPathCreationQuotaCost = 146; // Bytes per inode, basically.
|
| -const int64 kPathByteQuotaCost = 2; // Bytes per byte of path length in UTF-8.
|
| -
|
| -int64 UsageForPath(size_t length) {
|
| - return kPathCreationQuotaCost +
|
| - static_cast<int64>(length) * kPathByteQuotaCost;
|
| -}
|
| -
|
| -bool AllocateQuota(FileSystemOperationContext* context, int64 growth) {
|
| - if (context->allowed_bytes_growth() == storage::QuotaManager::kNoLimit)
|
| - return true;
|
| -
|
| - int64 new_quota = context->allowed_bytes_growth() - growth;
|
| - if (growth > 0 && new_quota < 0)
|
| - return false;
|
| - context->set_allowed_bytes_growth(new_quota);
|
| - return true;
|
| -}
|
| -
|
| -void UpdateUsage(
|
| - FileSystemOperationContext* context,
|
| - const FileSystemURL& url,
|
| - int64 growth) {
|
| - context->update_observers()->Notify(
|
| - &FileUpdateObserver::OnUpdate, MakeTuple(url, growth));
|
| -}
|
| -
|
| -void TouchDirectory(SandboxDirectoryDatabase* db, FileId dir_id) {
|
| - DCHECK(db);
|
| - if (!db->UpdateModificationTime(dir_id, base::Time::Now()))
|
| - NOTREACHED();
|
| -}
|
| -
|
| -enum IsolatedOriginStatus {
|
| - kIsolatedOriginMatch,
|
| - kIsolatedOriginDontMatch,
|
| - kIsolatedOriginStatusMax,
|
| -};
|
| -
|
| -} // namespace
|
| -
|
| -class ObfuscatedFileEnumerator
|
| - : public FileSystemFileUtil::AbstractFileEnumerator {
|
| - public:
|
| - ObfuscatedFileEnumerator(
|
| - SandboxDirectoryDatabase* db,
|
| - FileSystemOperationContext* context,
|
| - ObfuscatedFileUtil* obfuscated_file_util,
|
| - const FileSystemURL& root_url,
|
| - bool recursive)
|
| - : db_(db),
|
| - context_(context),
|
| - obfuscated_file_util_(obfuscated_file_util),
|
| - root_url_(root_url),
|
| - recursive_(recursive),
|
| - current_file_id_(0) {
|
| - base::FilePath root_virtual_path = root_url.path();
|
| - FileId file_id;
|
| -
|
| - if (!db_->GetFileWithPath(root_virtual_path, &file_id))
|
| - return;
|
| -
|
| - FileRecord record = { file_id, root_virtual_path };
|
| - recurse_queue_.push(record);
|
| - }
|
| -
|
| - virtual ~ObfuscatedFileEnumerator() {}
|
| -
|
| - virtual base::FilePath Next() OVERRIDE {
|
| - ProcessRecurseQueue();
|
| - if (display_stack_.empty())
|
| - return base::FilePath();
|
| -
|
| - current_file_id_ = display_stack_.back();
|
| - display_stack_.pop_back();
|
| -
|
| - FileInfo file_info;
|
| - base::FilePath platform_file_path;
|
| - base::File::Error error =
|
| - obfuscated_file_util_->GetFileInfoInternal(
|
| - db_, context_, root_url_, current_file_id_,
|
| - &file_info, ¤t_platform_file_info_, &platform_file_path);
|
| - if (error != base::File::FILE_OK)
|
| - return Next();
|
| -
|
| - base::FilePath virtual_path =
|
| - current_parent_virtual_path_.Append(file_info.name);
|
| - if (recursive_ && file_info.is_directory()) {
|
| - FileRecord record = { current_file_id_, virtual_path };
|
| - recurse_queue_.push(record);
|
| - }
|
| - return virtual_path;
|
| - }
|
| -
|
| - virtual int64 Size() OVERRIDE {
|
| - return current_platform_file_info_.size;
|
| - }
|
| -
|
| - virtual base::Time LastModifiedTime() OVERRIDE {
|
| - return current_platform_file_info_.last_modified;
|
| - }
|
| -
|
| - virtual bool IsDirectory() OVERRIDE {
|
| - return current_platform_file_info_.is_directory;
|
| - }
|
| -
|
| - private:
|
| - typedef SandboxDirectoryDatabase::FileId FileId;
|
| - typedef SandboxDirectoryDatabase::FileInfo FileInfo;
|
| -
|
| - struct FileRecord {
|
| - FileId file_id;
|
| - base::FilePath virtual_path;
|
| - };
|
| -
|
| - void ProcessRecurseQueue() {
|
| - while (display_stack_.empty() && !recurse_queue_.empty()) {
|
| - FileRecord entry = recurse_queue_.front();
|
| - recurse_queue_.pop();
|
| - if (!db_->ListChildren(entry.file_id, &display_stack_)) {
|
| - display_stack_.clear();
|
| - return;
|
| - }
|
| - current_parent_virtual_path_ = entry.virtual_path;
|
| - }
|
| - }
|
| -
|
| - SandboxDirectoryDatabase* db_;
|
| - FileSystemOperationContext* context_;
|
| - ObfuscatedFileUtil* obfuscated_file_util_;
|
| - FileSystemURL root_url_;
|
| - bool recursive_;
|
| -
|
| - std::queue<FileRecord> recurse_queue_;
|
| - std::vector<FileId> display_stack_;
|
| - base::FilePath current_parent_virtual_path_;
|
| -
|
| - FileId current_file_id_;
|
| - base::File::Info current_platform_file_info_;
|
| -};
|
| -
|
| -class ObfuscatedOriginEnumerator
|
| - : public ObfuscatedFileUtil::AbstractOriginEnumerator {
|
| - public:
|
| - typedef SandboxOriginDatabase::OriginRecord OriginRecord;
|
| - ObfuscatedOriginEnumerator(
|
| - SandboxOriginDatabaseInterface* origin_database,
|
| - const base::FilePath& base_file_path)
|
| - : base_file_path_(base_file_path) {
|
| - if (origin_database)
|
| - origin_database->ListAllOrigins(&origins_);
|
| - }
|
| -
|
| - virtual ~ObfuscatedOriginEnumerator() {}
|
| -
|
| - // Returns the next origin. Returns empty if there are no more origins.
|
| - virtual GURL Next() OVERRIDE {
|
| - OriginRecord record;
|
| - if (!origins_.empty()) {
|
| - record = origins_.back();
|
| - origins_.pop_back();
|
| - }
|
| - current_ = record;
|
| - return storage::GetOriginFromIdentifier(record.origin);
|
| - }
|
| -
|
| - // Returns the current origin's information.
|
| - virtual bool HasTypeDirectory(const std::string& type_string) const OVERRIDE {
|
| - if (current_.path.empty())
|
| - return false;
|
| - if (type_string.empty()) {
|
| - NOTREACHED();
|
| - return false;
|
| - }
|
| - base::FilePath path =
|
| - base_file_path_.Append(current_.path).AppendASCII(type_string);
|
| - return base::DirectoryExists(path);
|
| - }
|
| -
|
| - private:
|
| - std::vector<OriginRecord> origins_;
|
| - OriginRecord current_;
|
| - base::FilePath base_file_path_;
|
| -};
|
| -
|
| -ObfuscatedFileUtil::ObfuscatedFileUtil(
|
| - storage::SpecialStoragePolicy* special_storage_policy,
|
| - const base::FilePath& file_system_directory,
|
| - leveldb::Env* env_override,
|
| - base::SequencedTaskRunner* file_task_runner,
|
| - const GetTypeStringForURLCallback& get_type_string_for_url,
|
| - const std::set<std::string>& known_type_strings,
|
| - SandboxFileSystemBackendDelegate* sandbox_delegate)
|
| - : special_storage_policy_(special_storage_policy),
|
| - file_system_directory_(file_system_directory),
|
| - env_override_(env_override),
|
| - db_flush_delay_seconds_(10 * 60), // 10 mins.
|
| - file_task_runner_(file_task_runner),
|
| - get_type_string_for_url_(get_type_string_for_url),
|
| - known_type_strings_(known_type_strings),
|
| - sandbox_delegate_(sandbox_delegate) {
|
| -}
|
| -
|
| -ObfuscatedFileUtil::~ObfuscatedFileUtil() {
|
| - DropDatabases();
|
| -}
|
| -
|
| -base::File ObfuscatedFileUtil::CreateOrOpen(
|
| - FileSystemOperationContext* context,
|
| - const FileSystemURL& url, int file_flags) {
|
| - base::File file = CreateOrOpenInternal(context, url, file_flags);
|
| - if (file.IsValid() && file_flags & base::File::FLAG_WRITE &&
|
| - context->quota_limit_type() == storage::kQuotaLimitTypeUnlimited &&
|
| - sandbox_delegate_) {
|
| - sandbox_delegate_->StickyInvalidateUsageCache(url.origin(), url.type());
|
| - }
|
| - return file.Pass();
|
| -}
|
| -
|
| -base::File::Error ObfuscatedFileUtil::EnsureFileExists(
|
| - FileSystemOperationContext* context,
|
| - const FileSystemURL& url,
|
| - bool* created) {
|
| - SandboxDirectoryDatabase* db = GetDirectoryDatabase(url, true);
|
| - if (!db)
|
| - return base::File::FILE_ERROR_FAILED;
|
| -
|
| - FileId file_id;
|
| - if (db->GetFileWithPath(url.path(), &file_id)) {
|
| - FileInfo file_info;
|
| - if (!db->GetFileInfo(file_id, &file_info)) {
|
| - NOTREACHED();
|
| - return base::File::FILE_ERROR_FAILED;
|
| - }
|
| - if (file_info.is_directory())
|
| - return base::File::FILE_ERROR_NOT_A_FILE;
|
| - if (created)
|
| - *created = false;
|
| - return base::File::FILE_OK;
|
| - }
|
| - FileId parent_id;
|
| - if (!db->GetFileWithPath(VirtualPath::DirName(url.path()), &parent_id))
|
| - return base::File::FILE_ERROR_NOT_FOUND;
|
| -
|
| - FileInfo file_info;
|
| - InitFileInfo(&file_info, parent_id,
|
| - VirtualPath::BaseName(url.path()).value());
|
| -
|
| - int64 growth = UsageForPath(file_info.name.size());
|
| - if (!AllocateQuota(context, growth))
|
| - return base::File::FILE_ERROR_NO_SPACE;
|
| - base::File::Error error = CreateFile(context, base::FilePath(), url,
|
| - &file_info);
|
| - if (created && base::File::FILE_OK == error) {
|
| - *created = true;
|
| - UpdateUsage(context, url, growth);
|
| - context->change_observers()->Notify(
|
| - &FileChangeObserver::OnCreateFile, MakeTuple(url));
|
| - }
|
| - return error;
|
| -}
|
| -
|
| -base::File::Error ObfuscatedFileUtil::CreateDirectory(
|
| - FileSystemOperationContext* context,
|
| - const FileSystemURL& url,
|
| - bool exclusive,
|
| - bool recursive) {
|
| - SandboxDirectoryDatabase* db = GetDirectoryDatabase(url, true);
|
| - if (!db)
|
| - return base::File::FILE_ERROR_FAILED;
|
| -
|
| - FileId file_id;
|
| - if (db->GetFileWithPath(url.path(), &file_id)) {
|
| - FileInfo file_info;
|
| - if (exclusive)
|
| - return base::File::FILE_ERROR_EXISTS;
|
| - if (!db->GetFileInfo(file_id, &file_info)) {
|
| - NOTREACHED();
|
| - return base::File::FILE_ERROR_FAILED;
|
| - }
|
| - if (!file_info.is_directory())
|
| - return base::File::FILE_ERROR_NOT_A_DIRECTORY;
|
| - return base::File::FILE_OK;
|
| - }
|
| -
|
| - std::vector<base::FilePath::StringType> components;
|
| - VirtualPath::GetComponents(url.path(), &components);
|
| - FileId parent_id = 0;
|
| - size_t index;
|
| - for (index = 0; index < components.size(); ++index) {
|
| - base::FilePath::StringType name = components[index];
|
| - if (name == FILE_PATH_LITERAL("/"))
|
| - continue;
|
| - if (!db->GetChildWithName(parent_id, name, &parent_id))
|
| - break;
|
| - }
|
| - if (!db->IsDirectory(parent_id))
|
| - return base::File::FILE_ERROR_NOT_A_DIRECTORY;
|
| - if (!recursive && components.size() - index > 1)
|
| - return base::File::FILE_ERROR_NOT_FOUND;
|
| - bool first = true;
|
| - for (; index < components.size(); ++index) {
|
| - FileInfo file_info;
|
| - file_info.name = components[index];
|
| - if (file_info.name == FILE_PATH_LITERAL("/"))
|
| - continue;
|
| - file_info.modification_time = base::Time::Now();
|
| - file_info.parent_id = parent_id;
|
| - int64 growth = UsageForPath(file_info.name.size());
|
| - if (!AllocateQuota(context, growth))
|
| - return base::File::FILE_ERROR_NO_SPACE;
|
| - base::File::Error error = db->AddFileInfo(file_info, &parent_id);
|
| - if (error != base::File::FILE_OK)
|
| - return error;
|
| - UpdateUsage(context, url, growth);
|
| - context->change_observers()->Notify(
|
| - &FileChangeObserver::OnCreateDirectory, MakeTuple(url));
|
| - if (first) {
|
| - first = false;
|
| - TouchDirectory(db, file_info.parent_id);
|
| - }
|
| - }
|
| - return base::File::FILE_OK;
|
| -}
|
| -
|
| -base::File::Error ObfuscatedFileUtil::GetFileInfo(
|
| - FileSystemOperationContext* context,
|
| - const FileSystemURL& url,
|
| - base::File::Info* file_info,
|
| - base::FilePath* platform_file_path) {
|
| - SandboxDirectoryDatabase* db = GetDirectoryDatabase(url, false);
|
| - if (!db)
|
| - return base::File::FILE_ERROR_NOT_FOUND;
|
| - FileId file_id;
|
| - if (!db->GetFileWithPath(url.path(), &file_id))
|
| - return base::File::FILE_ERROR_NOT_FOUND;
|
| - FileInfo local_info;
|
| - return GetFileInfoInternal(db, context, url,
|
| - file_id, &local_info,
|
| - file_info, platform_file_path);
|
| -}
|
| -
|
| -scoped_ptr<FileSystemFileUtil::AbstractFileEnumerator>
|
| - ObfuscatedFileUtil::CreateFileEnumerator(
|
| - FileSystemOperationContext* context,
|
| - const FileSystemURL& root_url) {
|
| - return CreateFileEnumerator(context, root_url, false /* recursive */);
|
| -}
|
| -
|
| -base::File::Error ObfuscatedFileUtil::GetLocalFilePath(
|
| - FileSystemOperationContext* context,
|
| - const FileSystemURL& url,
|
| - base::FilePath* local_path) {
|
| - SandboxDirectoryDatabase* db = GetDirectoryDatabase(url, false);
|
| - if (!db)
|
| - return base::File::FILE_ERROR_NOT_FOUND;
|
| - FileId file_id;
|
| - if (!db->GetFileWithPath(url.path(), &file_id))
|
| - return base::File::FILE_ERROR_NOT_FOUND;
|
| - FileInfo file_info;
|
| - if (!db->GetFileInfo(file_id, &file_info) || file_info.is_directory()) {
|
| - NOTREACHED();
|
| - // Directories have no local file path.
|
| - return base::File::FILE_ERROR_NOT_FOUND;
|
| - }
|
| - *local_path = DataPathToLocalPath(url, file_info.data_path);
|
| -
|
| - if (local_path->empty())
|
| - return base::File::FILE_ERROR_NOT_FOUND;
|
| - return base::File::FILE_OK;
|
| -}
|
| -
|
| -base::File::Error ObfuscatedFileUtil::Touch(
|
| - FileSystemOperationContext* context,
|
| - const FileSystemURL& url,
|
| - const base::Time& last_access_time,
|
| - const base::Time& last_modified_time) {
|
| - SandboxDirectoryDatabase* db = GetDirectoryDatabase(url, false);
|
| - if (!db)
|
| - return base::File::FILE_ERROR_NOT_FOUND;
|
| - FileId file_id;
|
| - if (!db->GetFileWithPath(url.path(), &file_id))
|
| - return base::File::FILE_ERROR_NOT_FOUND;
|
| -
|
| - FileInfo file_info;
|
| - if (!db->GetFileInfo(file_id, &file_info)) {
|
| - NOTREACHED();
|
| - return base::File::FILE_ERROR_FAILED;
|
| - }
|
| - if (file_info.is_directory()) {
|
| - if (!db->UpdateModificationTime(file_id, last_modified_time))
|
| - return base::File::FILE_ERROR_FAILED;
|
| - return base::File::FILE_OK;
|
| - }
|
| - return NativeFileUtil::Touch(
|
| - DataPathToLocalPath(url, file_info.data_path),
|
| - last_access_time, last_modified_time);
|
| -}
|
| -
|
| -base::File::Error ObfuscatedFileUtil::Truncate(
|
| - FileSystemOperationContext* context,
|
| - const FileSystemURL& url,
|
| - int64 length) {
|
| - base::File::Info file_info;
|
| - base::FilePath local_path;
|
| - base::File::Error error =
|
| - GetFileInfo(context, url, &file_info, &local_path);
|
| - if (error != base::File::FILE_OK)
|
| - return error;
|
| -
|
| - int64 growth = length - file_info.size;
|
| - if (!AllocateQuota(context, growth))
|
| - return base::File::FILE_ERROR_NO_SPACE;
|
| - error = NativeFileUtil::Truncate(local_path, length);
|
| - if (error == base::File::FILE_OK) {
|
| - UpdateUsage(context, url, growth);
|
| - context->change_observers()->Notify(
|
| - &FileChangeObserver::OnModifyFile, MakeTuple(url));
|
| - }
|
| - return error;
|
| -}
|
| -
|
| -base::File::Error ObfuscatedFileUtil::CopyOrMoveFile(
|
| - FileSystemOperationContext* context,
|
| - const FileSystemURL& src_url,
|
| - const FileSystemURL& dest_url,
|
| - CopyOrMoveOption option,
|
| - bool copy) {
|
| - // Cross-filesystem copies and moves should be handled via CopyInForeignFile.
|
| - DCHECK(src_url.origin() == dest_url.origin());
|
| - DCHECK(src_url.type() == dest_url.type());
|
| -
|
| - SandboxDirectoryDatabase* db = GetDirectoryDatabase(src_url, true);
|
| - if (!db)
|
| - return base::File::FILE_ERROR_FAILED;
|
| -
|
| - FileId src_file_id;
|
| - if (!db->GetFileWithPath(src_url.path(), &src_file_id))
|
| - return base::File::FILE_ERROR_NOT_FOUND;
|
| -
|
| - FileId dest_file_id;
|
| - bool overwrite = db->GetFileWithPath(dest_url.path(),
|
| - &dest_file_id);
|
| -
|
| - FileInfo src_file_info;
|
| - base::File::Info src_platform_file_info;
|
| - base::FilePath src_local_path;
|
| - base::File::Error error = GetFileInfoInternal(
|
| - db, context, src_url, src_file_id,
|
| - &src_file_info, &src_platform_file_info, &src_local_path);
|
| - if (error != base::File::FILE_OK)
|
| - return error;
|
| - if (src_file_info.is_directory())
|
| - return base::File::FILE_ERROR_NOT_A_FILE;
|
| -
|
| - FileInfo dest_file_info;
|
| - base::File::Info dest_platform_file_info; // overwrite case only
|
| - base::FilePath dest_local_path; // overwrite case only
|
| - if (overwrite) {
|
| - base::File::Error error = GetFileInfoInternal(
|
| - db, context, dest_url, dest_file_id,
|
| - &dest_file_info, &dest_platform_file_info, &dest_local_path);
|
| - if (error == base::File::FILE_ERROR_NOT_FOUND)
|
| - overwrite = false; // fallback to non-overwrite case
|
| - else if (error != base::File::FILE_OK)
|
| - return error;
|
| - else if (dest_file_info.is_directory())
|
| - return base::File::FILE_ERROR_INVALID_OPERATION;
|
| - }
|
| - if (!overwrite) {
|
| - FileId dest_parent_id;
|
| - if (!db->GetFileWithPath(VirtualPath::DirName(dest_url.path()),
|
| - &dest_parent_id)) {
|
| - return base::File::FILE_ERROR_NOT_FOUND;
|
| - }
|
| -
|
| - dest_file_info = src_file_info;
|
| - dest_file_info.parent_id = dest_parent_id;
|
| - dest_file_info.name =
|
| - VirtualPath::BaseName(dest_url.path()).value();
|
| - }
|
| -
|
| - int64 growth = 0;
|
| - if (copy)
|
| - growth += src_platform_file_info.size;
|
| - else
|
| - growth -= UsageForPath(src_file_info.name.size());
|
| - if (overwrite)
|
| - growth -= dest_platform_file_info.size;
|
| - else
|
| - growth += UsageForPath(dest_file_info.name.size());
|
| - if (!AllocateQuota(context, growth))
|
| - return base::File::FILE_ERROR_NO_SPACE;
|
| -
|
| - /*
|
| - * Copy-with-overwrite
|
| - * Just overwrite data file
|
| - * Copy-without-overwrite
|
| - * Copy backing file
|
| - * Create new metadata pointing to new backing file.
|
| - * Move-with-overwrite
|
| - * transaction:
|
| - * Remove source entry.
|
| - * Point target entry to source entry's backing file.
|
| - * Delete target entry's old backing file
|
| - * Move-without-overwrite
|
| - * Just update metadata
|
| - */
|
| - error = base::File::FILE_ERROR_FAILED;
|
| - if (copy) {
|
| - if (overwrite) {
|
| - error = NativeFileUtil::CopyOrMoveFile(
|
| - src_local_path,
|
| - dest_local_path,
|
| - option,
|
| - storage::NativeFileUtil::CopyOrMoveModeForDestination(
|
| - dest_url, true /* copy */));
|
| - } else { // non-overwrite
|
| - error = CreateFile(context, src_local_path, dest_url, &dest_file_info);
|
| - }
|
| - } else {
|
| - if (overwrite) {
|
| - if (db->OverwritingMoveFile(src_file_id, dest_file_id)) {
|
| - if (base::File::FILE_OK !=
|
| - NativeFileUtil::DeleteFile(dest_local_path))
|
| - LOG(WARNING) << "Leaked a backing file.";
|
| - error = base::File::FILE_OK;
|
| - } else {
|
| - error = base::File::FILE_ERROR_FAILED;
|
| - }
|
| - } else { // non-overwrite
|
| - if (db->UpdateFileInfo(src_file_id, dest_file_info))
|
| - error = base::File::FILE_OK;
|
| - else
|
| - error = base::File::FILE_ERROR_FAILED;
|
| - }
|
| - }
|
| -
|
| - if (error != base::File::FILE_OK)
|
| - return error;
|
| -
|
| - if (overwrite) {
|
| - context->change_observers()->Notify(
|
| - &FileChangeObserver::OnModifyFile,
|
| - MakeTuple(dest_url));
|
| - } else {
|
| - context->change_observers()->Notify(
|
| - &FileChangeObserver::OnCreateFileFrom,
|
| - MakeTuple(dest_url, src_url));
|
| - }
|
| -
|
| - if (!copy) {
|
| - context->change_observers()->Notify(
|
| - &FileChangeObserver::OnRemoveFile, MakeTuple(src_url));
|
| - TouchDirectory(db, src_file_info.parent_id);
|
| - }
|
| -
|
| - TouchDirectory(db, dest_file_info.parent_id);
|
| -
|
| - UpdateUsage(context, dest_url, growth);
|
| - return error;
|
| -}
|
| -
|
| -base::File::Error ObfuscatedFileUtil::CopyInForeignFile(
|
| - FileSystemOperationContext* context,
|
| - const base::FilePath& src_file_path,
|
| - const FileSystemURL& dest_url) {
|
| - SandboxDirectoryDatabase* db = GetDirectoryDatabase(dest_url, true);
|
| - if (!db)
|
| - return base::File::FILE_ERROR_FAILED;
|
| -
|
| - base::File::Info src_platform_file_info;
|
| - if (!base::GetFileInfo(src_file_path, &src_platform_file_info))
|
| - return base::File::FILE_ERROR_NOT_FOUND;
|
| -
|
| - FileId dest_file_id;
|
| - bool overwrite = db->GetFileWithPath(dest_url.path(),
|
| - &dest_file_id);
|
| -
|
| - FileInfo dest_file_info;
|
| - base::File::Info dest_platform_file_info; // overwrite case only
|
| - if (overwrite) {
|
| - base::FilePath dest_local_path;
|
| - base::File::Error error = GetFileInfoInternal(
|
| - db, context, dest_url, dest_file_id,
|
| - &dest_file_info, &dest_platform_file_info, &dest_local_path);
|
| - if (error == base::File::FILE_ERROR_NOT_FOUND)
|
| - overwrite = false; // fallback to non-overwrite case
|
| - else if (error != base::File::FILE_OK)
|
| - return error;
|
| - else if (dest_file_info.is_directory())
|
| - return base::File::FILE_ERROR_INVALID_OPERATION;
|
| - }
|
| - if (!overwrite) {
|
| - FileId dest_parent_id;
|
| - if (!db->GetFileWithPath(VirtualPath::DirName(dest_url.path()),
|
| - &dest_parent_id)) {
|
| - return base::File::FILE_ERROR_NOT_FOUND;
|
| - }
|
| - if (!dest_file_info.is_directory())
|
| - return base::File::FILE_ERROR_FAILED;
|
| - InitFileInfo(&dest_file_info, dest_parent_id,
|
| - VirtualPath::BaseName(dest_url.path()).value());
|
| - }
|
| -
|
| - int64 growth = src_platform_file_info.size;
|
| - if (overwrite)
|
| - growth -= dest_platform_file_info.size;
|
| - else
|
| - growth += UsageForPath(dest_file_info.name.size());
|
| - if (!AllocateQuota(context, growth))
|
| - return base::File::FILE_ERROR_NO_SPACE;
|
| -
|
| - base::File::Error error;
|
| - if (overwrite) {
|
| - base::FilePath dest_local_path =
|
| - DataPathToLocalPath(dest_url, dest_file_info.data_path);
|
| - error = NativeFileUtil::CopyOrMoveFile(
|
| - src_file_path,
|
| - dest_local_path,
|
| - FileSystemOperation::OPTION_NONE,
|
| - storage::NativeFileUtil::CopyOrMoveModeForDestination(dest_url,
|
| - true /* copy */));
|
| - } else {
|
| - error = CreateFile(context, src_file_path, dest_url, &dest_file_info);
|
| - }
|
| -
|
| - if (error != base::File::FILE_OK)
|
| - return error;
|
| -
|
| - if (overwrite) {
|
| - context->change_observers()->Notify(
|
| - &FileChangeObserver::OnModifyFile, MakeTuple(dest_url));
|
| - } else {
|
| - context->change_observers()->Notify(
|
| - &FileChangeObserver::OnCreateFile, MakeTuple(dest_url));
|
| - }
|
| -
|
| - UpdateUsage(context, dest_url, growth);
|
| - TouchDirectory(db, dest_file_info.parent_id);
|
| - return base::File::FILE_OK;
|
| -}
|
| -
|
| -base::File::Error ObfuscatedFileUtil::DeleteFile(
|
| - FileSystemOperationContext* context,
|
| - const FileSystemURL& url) {
|
| - SandboxDirectoryDatabase* db = GetDirectoryDatabase(url, true);
|
| - if (!db)
|
| - return base::File::FILE_ERROR_FAILED;
|
| - FileId file_id;
|
| - if (!db->GetFileWithPath(url.path(), &file_id))
|
| - return base::File::FILE_ERROR_NOT_FOUND;
|
| -
|
| - FileInfo file_info;
|
| - base::File::Info platform_file_info;
|
| - base::FilePath local_path;
|
| - base::File::Error error = GetFileInfoInternal(
|
| - db, context, url, file_id, &file_info, &platform_file_info, &local_path);
|
| - if (error != base::File::FILE_ERROR_NOT_FOUND &&
|
| - error != base::File::FILE_OK)
|
| - return error;
|
| -
|
| - if (file_info.is_directory())
|
| - return base::File::FILE_ERROR_NOT_A_FILE;
|
| -
|
| - int64 growth = -UsageForPath(file_info.name.size()) - platform_file_info.size;
|
| - AllocateQuota(context, growth);
|
| - if (!db->RemoveFileInfo(file_id)) {
|
| - NOTREACHED();
|
| - return base::File::FILE_ERROR_FAILED;
|
| - }
|
| - UpdateUsage(context, url, growth);
|
| - TouchDirectory(db, file_info.parent_id);
|
| -
|
| - context->change_observers()->Notify(
|
| - &FileChangeObserver::OnRemoveFile, MakeTuple(url));
|
| -
|
| - if (error == base::File::FILE_ERROR_NOT_FOUND)
|
| - return base::File::FILE_OK;
|
| -
|
| - error = NativeFileUtil::DeleteFile(local_path);
|
| - if (base::File::FILE_OK != error)
|
| - LOG(WARNING) << "Leaked a backing file.";
|
| - return base::File::FILE_OK;
|
| -}
|
| -
|
| -base::File::Error ObfuscatedFileUtil::DeleteDirectory(
|
| - FileSystemOperationContext* context,
|
| - const FileSystemURL& url) {
|
| - SandboxDirectoryDatabase* db = GetDirectoryDatabase(url, true);
|
| - if (!db)
|
| - return base::File::FILE_ERROR_FAILED;
|
| -
|
| - FileId file_id;
|
| - if (!db->GetFileWithPath(url.path(), &file_id))
|
| - return base::File::FILE_ERROR_NOT_FOUND;
|
| - FileInfo file_info;
|
| - if (!db->GetFileInfo(file_id, &file_info)) {
|
| - NOTREACHED();
|
| - return base::File::FILE_ERROR_FAILED;
|
| - }
|
| - if (!file_info.is_directory())
|
| - return base::File::FILE_ERROR_NOT_A_DIRECTORY;
|
| - if (!db->RemoveFileInfo(file_id))
|
| - return base::File::FILE_ERROR_NOT_EMPTY;
|
| - int64 growth = -UsageForPath(file_info.name.size());
|
| - AllocateQuota(context, growth);
|
| - UpdateUsage(context, url, growth);
|
| - TouchDirectory(db, file_info.parent_id);
|
| - context->change_observers()->Notify(
|
| - &FileChangeObserver::OnRemoveDirectory, MakeTuple(url));
|
| - return base::File::FILE_OK;
|
| -}
|
| -
|
| -storage::ScopedFile ObfuscatedFileUtil::CreateSnapshotFile(
|
| - FileSystemOperationContext* context,
|
| - const FileSystemURL& url,
|
| - base::File::Error* error,
|
| - base::File::Info* file_info,
|
| - base::FilePath* platform_path) {
|
| - // We're just returning the local file information.
|
| - *error = GetFileInfo(context, url, file_info, platform_path);
|
| - if (*error == base::File::FILE_OK && file_info->is_directory) {
|
| - *file_info = base::File::Info();
|
| - *error = base::File::FILE_ERROR_NOT_A_FILE;
|
| - }
|
| - return storage::ScopedFile();
|
| -}
|
| -
|
| -scoped_ptr<FileSystemFileUtil::AbstractFileEnumerator>
|
| - ObfuscatedFileUtil::CreateFileEnumerator(
|
| - FileSystemOperationContext* context,
|
| - const FileSystemURL& root_url,
|
| - bool recursive) {
|
| - SandboxDirectoryDatabase* db = GetDirectoryDatabase(root_url, false);
|
| - if (!db) {
|
| - return scoped_ptr<AbstractFileEnumerator>(new EmptyFileEnumerator());
|
| - }
|
| - return scoped_ptr<AbstractFileEnumerator>(
|
| - new ObfuscatedFileEnumerator(db, context, this, root_url, recursive));
|
| -}
|
| -
|
| -bool ObfuscatedFileUtil::IsDirectoryEmpty(
|
| - FileSystemOperationContext* context,
|
| - const FileSystemURL& url) {
|
| - SandboxDirectoryDatabase* db = GetDirectoryDatabase(url, false);
|
| - if (!db)
|
| - return true; // Not a great answer, but it's what others do.
|
| - FileId file_id;
|
| - if (!db->GetFileWithPath(url.path(), &file_id))
|
| - return true; // Ditto.
|
| - FileInfo file_info;
|
| - if (!db->GetFileInfo(file_id, &file_info)) {
|
| - DCHECK(!file_id);
|
| - // It's the root directory and the database hasn't been initialized yet.
|
| - return true;
|
| - }
|
| - if (!file_info.is_directory())
|
| - return true;
|
| - std::vector<FileId> children;
|
| - // TODO(ericu): This could easily be made faster with help from the database.
|
| - if (!db->ListChildren(file_id, &children))
|
| - return true;
|
| - return children.empty();
|
| -}
|
| -
|
| -base::FilePath ObfuscatedFileUtil::GetDirectoryForOriginAndType(
|
| - const GURL& origin,
|
| - const std::string& type_string,
|
| - bool create,
|
| - base::File::Error* error_code) {
|
| - base::FilePath origin_dir = GetDirectoryForOrigin(origin, create, error_code);
|
| - if (origin_dir.empty())
|
| - return base::FilePath();
|
| - if (type_string.empty())
|
| - return origin_dir;
|
| - base::FilePath path = origin_dir.AppendASCII(type_string);
|
| - base::File::Error error = base::File::FILE_OK;
|
| - if (!base::DirectoryExists(path) &&
|
| - (!create || !base::CreateDirectory(path))) {
|
| - error = create ?
|
| - base::File::FILE_ERROR_FAILED :
|
| - base::File::FILE_ERROR_NOT_FOUND;
|
| - }
|
| -
|
| - if (error_code)
|
| - *error_code = error;
|
| - return path;
|
| -}
|
| -
|
| -bool ObfuscatedFileUtil::DeleteDirectoryForOriginAndType(
|
| - const GURL& origin,
|
| - const std::string& type_string) {
|
| - base::File::Error error = base::File::FILE_OK;
|
| - base::FilePath origin_type_path = GetDirectoryForOriginAndType(
|
| - origin, type_string, false, &error);
|
| - if (origin_type_path.empty())
|
| - return true;
|
| - if (error != base::File::FILE_ERROR_NOT_FOUND) {
|
| - // TODO(dmikurube): Consider the return value of DestroyDirectoryDatabase.
|
| - // We ignore its error now since 1) it doesn't matter the final result, and
|
| - // 2) it always returns false in Windows because of LevelDB's
|
| - // implementation.
|
| - // Information about failure would be useful for debugging.
|
| - if (!type_string.empty())
|
| - DestroyDirectoryDatabase(origin, type_string);
|
| - if (!base::DeleteFile(origin_type_path, true /* recursive */))
|
| - return false;
|
| - }
|
| -
|
| - base::FilePath origin_path = VirtualPath::DirName(origin_type_path);
|
| - DCHECK_EQ(origin_path.value(),
|
| - GetDirectoryForOrigin(origin, false, NULL).value());
|
| -
|
| - if (!type_string.empty()) {
|
| - // At this point we are sure we had successfully deleted the origin/type
|
| - // directory (i.e. we're ready to just return true).
|
| - // See if we have other directories in this origin directory.
|
| - for (std::set<std::string>::iterator iter = known_type_strings_.begin();
|
| - iter != known_type_strings_.end();
|
| - ++iter) {
|
| - if (*iter == type_string)
|
| - continue;
|
| - if (base::DirectoryExists(origin_path.AppendASCII(*iter))) {
|
| - // Other type's directory exists; just return true here.
|
| - return true;
|
| - }
|
| - }
|
| - }
|
| -
|
| - // No other directories seem exist. Try deleting the entire origin directory.
|
| - InitOriginDatabase(origin, false);
|
| - if (origin_database_) {
|
| - origin_database_->RemovePathForOrigin(
|
| - storage::GetIdentifierFromOrigin(origin));
|
| - }
|
| - if (!base::DeleteFile(origin_path, true /* recursive */))
|
| - return false;
|
| -
|
| - return true;
|
| -}
|
| -
|
| -ObfuscatedFileUtil::AbstractOriginEnumerator*
|
| -ObfuscatedFileUtil::CreateOriginEnumerator() {
|
| - std::vector<SandboxOriginDatabase::OriginRecord> origins;
|
| -
|
| - InitOriginDatabase(GURL(), false);
|
| - return new ObfuscatedOriginEnumerator(
|
| - origin_database_.get(), file_system_directory_);
|
| -}
|
| -
|
| -bool ObfuscatedFileUtil::DestroyDirectoryDatabase(
|
| - const GURL& origin,
|
| - const std::string& type_string) {
|
| - std::string key = GetDirectoryDatabaseKey(origin, type_string);
|
| - if (key.empty())
|
| - return true;
|
| - DirectoryMap::iterator iter = directories_.find(key);
|
| - if (iter != directories_.end()) {
|
| - SandboxDirectoryDatabase* database = iter->second;
|
| - directories_.erase(iter);
|
| - delete database;
|
| - }
|
| -
|
| - base::File::Error error = base::File::FILE_OK;
|
| - base::FilePath path = GetDirectoryForOriginAndType(
|
| - origin, type_string, false, &error);
|
| - if (path.empty() || error == base::File::FILE_ERROR_NOT_FOUND)
|
| - return true;
|
| - return SandboxDirectoryDatabase::DestroyDatabase(path, env_override_);
|
| -}
|
| -
|
| -// static
|
| -int64 ObfuscatedFileUtil::ComputeFilePathCost(const base::FilePath& path) {
|
| - return UsageForPath(VirtualPath::BaseName(path).value().size());
|
| -}
|
| -
|
| -void ObfuscatedFileUtil::MaybePrepopulateDatabase(
|
| - const std::vector<std::string>& type_strings_to_prepopulate) {
|
| - SandboxPrioritizedOriginDatabase database(file_system_directory_,
|
| - env_override_);
|
| - std::string origin_string = database.GetPrimaryOrigin();
|
| - if (origin_string.empty() || !database.HasOriginPath(origin_string))
|
| - return;
|
| - const GURL origin = storage::GetOriginFromIdentifier(origin_string);
|
| -
|
| - // Prepopulate the directory database(s) if and only if this instance
|
| - // has primary origin and the directory database is already there.
|
| - for (size_t i = 0; i < type_strings_to_prepopulate.size(); ++i) {
|
| - const std::string type_string = type_strings_to_prepopulate[i];
|
| - // Only handles known types.
|
| - if (!ContainsKey(known_type_strings_, type_string))
|
| - continue;
|
| - base::File::Error error = base::File::FILE_ERROR_FAILED;
|
| - base::FilePath path = GetDirectoryForOriginAndType(
|
| - origin, type_string, false, &error);
|
| - if (error != base::File::FILE_OK)
|
| - continue;
|
| - scoped_ptr<SandboxDirectoryDatabase> db(
|
| - new SandboxDirectoryDatabase(path, env_override_));
|
| - if (db->Init(SandboxDirectoryDatabase::FAIL_ON_CORRUPTION)) {
|
| - directories_[GetDirectoryDatabaseKey(origin, type_string)] = db.release();
|
| - MarkUsed();
|
| - // Don't populate more than one database, as it may rather hurt
|
| - // performance.
|
| - break;
|
| - }
|
| - }
|
| -}
|
| -
|
| -base::FilePath ObfuscatedFileUtil::GetDirectoryForURL(
|
| - const FileSystemURL& url,
|
| - bool create,
|
| - base::File::Error* error_code) {
|
| - return GetDirectoryForOriginAndType(
|
| - url.origin(), CallGetTypeStringForURL(url), create, error_code);
|
| -}
|
| -
|
| -std::string ObfuscatedFileUtil::CallGetTypeStringForURL(
|
| - const FileSystemURL& url) {
|
| - DCHECK(!get_type_string_for_url_.is_null());
|
| - return get_type_string_for_url_.Run(url);
|
| -}
|
| -
|
| -base::File::Error ObfuscatedFileUtil::GetFileInfoInternal(
|
| - SandboxDirectoryDatabase* db,
|
| - FileSystemOperationContext* context,
|
| - const FileSystemURL& url,
|
| - FileId file_id,
|
| - FileInfo* local_info,
|
| - base::File::Info* file_info,
|
| - base::FilePath* platform_file_path) {
|
| - DCHECK(db);
|
| - DCHECK(context);
|
| - DCHECK(file_info);
|
| - DCHECK(platform_file_path);
|
| -
|
| - if (!db->GetFileInfo(file_id, local_info)) {
|
| - NOTREACHED();
|
| - return base::File::FILE_ERROR_FAILED;
|
| - }
|
| -
|
| - if (local_info->is_directory()) {
|
| - file_info->size = 0;
|
| - file_info->is_directory = true;
|
| - file_info->is_symbolic_link = false;
|
| - file_info->last_modified = local_info->modification_time;
|
| - *platform_file_path = base::FilePath();
|
| - // We don't fill in ctime or atime.
|
| - return base::File::FILE_OK;
|
| - }
|
| - if (local_info->data_path.empty())
|
| - return base::File::FILE_ERROR_INVALID_OPERATION;
|
| - base::FilePath local_path = DataPathToLocalPath(url, local_info->data_path);
|
| - base::File::Error error = NativeFileUtil::GetFileInfo(
|
| - local_path, file_info);
|
| - // We should not follow symbolic links in sandboxed file system.
|
| - if (base::IsLink(local_path)) {
|
| - LOG(WARNING) << "Found a symbolic file.";
|
| - error = base::File::FILE_ERROR_NOT_FOUND;
|
| - }
|
| - if (error == base::File::FILE_OK) {
|
| - *platform_file_path = local_path;
|
| - } else if (error == base::File::FILE_ERROR_NOT_FOUND) {
|
| - LOG(WARNING) << "Lost a backing file.";
|
| - InvalidateUsageCache(context, url.origin(), url.type());
|
| - if (!db->RemoveFileInfo(file_id))
|
| - return base::File::FILE_ERROR_FAILED;
|
| - }
|
| - return error;
|
| -}
|
| -
|
| -base::File ObfuscatedFileUtil::CreateAndOpenFile(
|
| - FileSystemOperationContext* context,
|
| - const FileSystemURL& dest_url,
|
| - FileInfo* dest_file_info, int file_flags) {
|
| - SandboxDirectoryDatabase* db = GetDirectoryDatabase(dest_url, true);
|
| -
|
| - base::FilePath root, dest_local_path;
|
| - base::File::Error error = GenerateNewLocalPath(db, context, dest_url, &root,
|
| - &dest_local_path);
|
| - if (error != base::File::FILE_OK)
|
| - return base::File(error);
|
| -
|
| - if (base::PathExists(dest_local_path)) {
|
| - if (!base::DeleteFile(dest_local_path, true /* recursive */))
|
| - return base::File(base::File::FILE_ERROR_FAILED);
|
| - LOG(WARNING) << "A stray file detected";
|
| - InvalidateUsageCache(context, dest_url.origin(), dest_url.type());
|
| - }
|
| -
|
| - base::File file = NativeFileUtil::CreateOrOpen(dest_local_path, file_flags);
|
| - if (!file.IsValid())
|
| - return file.Pass();
|
| -
|
| - if (!file.created()) {
|
| - file.Close();
|
| - base::DeleteFile(dest_local_path, false /* recursive */);
|
| - return base::File(base::File::FILE_ERROR_FAILED);
|
| - }
|
| -
|
| - error = CommitCreateFile(root, dest_local_path, db, dest_file_info);
|
| - if (error != base::File::FILE_OK) {
|
| - file.Close();
|
| - base::DeleteFile(dest_local_path, false /* recursive */);
|
| - return base::File(error);
|
| - }
|
| -
|
| - return file.Pass();
|
| -}
|
| -
|
| -base::File::Error ObfuscatedFileUtil::CreateFile(
|
| - FileSystemOperationContext* context,
|
| - const base::FilePath& src_file_path,
|
| - const FileSystemURL& dest_url,
|
| - FileInfo* dest_file_info) {
|
| - SandboxDirectoryDatabase* db = GetDirectoryDatabase(dest_url, true);
|
| -
|
| - base::FilePath root, dest_local_path;
|
| - base::File::Error error = GenerateNewLocalPath(db, context, dest_url, &root,
|
| - &dest_local_path);
|
| - if (error != base::File::FILE_OK)
|
| - return error;
|
| -
|
| - bool created = false;
|
| - if (src_file_path.empty()) {
|
| - if (base::PathExists(dest_local_path)) {
|
| - if (!base::DeleteFile(dest_local_path, true /* recursive */))
|
| - return base::File::FILE_ERROR_FAILED;
|
| - LOG(WARNING) << "A stray file detected";
|
| - InvalidateUsageCache(context, dest_url.origin(), dest_url.type());
|
| - }
|
| -
|
| - error = NativeFileUtil::EnsureFileExists(dest_local_path, &created);
|
| - } else {
|
| - error = NativeFileUtil::CopyOrMoveFile(
|
| - src_file_path,
|
| - dest_local_path,
|
| - FileSystemOperation::OPTION_NONE,
|
| - storage::NativeFileUtil::CopyOrMoveModeForDestination(dest_url,
|
| - true /* copy */));
|
| - created = true;
|
| - }
|
| - if (error != base::File::FILE_OK)
|
| - return error;
|
| - if (!created)
|
| - return base::File::FILE_ERROR_FAILED;
|
| -
|
| - return CommitCreateFile(root, dest_local_path, db, dest_file_info);
|
| -}
|
| -
|
| -base::File::Error ObfuscatedFileUtil::CommitCreateFile(
|
| - const base::FilePath& root,
|
| - const base::FilePath& local_path,
|
| - SandboxDirectoryDatabase* db,
|
| - FileInfo* dest_file_info) {
|
| - // This removes the root, including the trailing slash, leaving a relative
|
| - // path.
|
| - dest_file_info->data_path = base::FilePath(
|
| - local_path.value().substr(root.value().length() + 1));
|
| -
|
| - FileId file_id;
|
| - base::File::Error error = db->AddFileInfo(*dest_file_info, &file_id);
|
| - if (error != base::File::FILE_OK)
|
| - return error;
|
| -
|
| - TouchDirectory(db, dest_file_info->parent_id);
|
| - return base::File::FILE_OK;
|
| -}
|
| -
|
| -base::FilePath ObfuscatedFileUtil::DataPathToLocalPath(
|
| - const FileSystemURL& url, const base::FilePath& data_path) {
|
| - base::File::Error error = base::File::FILE_OK;
|
| - base::FilePath root = GetDirectoryForURL(url, false, &error);
|
| - if (error != base::File::FILE_OK)
|
| - return base::FilePath();
|
| - return root.Append(data_path);
|
| -}
|
| -
|
| -std::string ObfuscatedFileUtil::GetDirectoryDatabaseKey(
|
| - const GURL& origin, const std::string& type_string) {
|
| - if (type_string.empty()) {
|
| - LOG(WARNING) << "Unknown filesystem type requested:" << type_string;
|
| - return std::string();
|
| - }
|
| - // For isolated origin we just use a type string as a key.
|
| - return storage::GetIdentifierFromOrigin(origin) + type_string;
|
| -}
|
| -
|
| -// TODO(ericu): How to do the whole validation-without-creation thing?
|
| -// We may not have quota even to create the database.
|
| -// Ah, in that case don't even get here?
|
| -// Still doesn't answer the quota issue, though.
|
| -SandboxDirectoryDatabase* ObfuscatedFileUtil::GetDirectoryDatabase(
|
| - const FileSystemURL& url, bool create) {
|
| - std::string key = GetDirectoryDatabaseKey(
|
| - url.origin(), CallGetTypeStringForURL(url));
|
| - if (key.empty())
|
| - return NULL;
|
| -
|
| - DirectoryMap::iterator iter = directories_.find(key);
|
| - if (iter != directories_.end()) {
|
| - MarkUsed();
|
| - return iter->second;
|
| - }
|
| -
|
| - base::File::Error error = base::File::FILE_OK;
|
| - base::FilePath path = GetDirectoryForURL(url, create, &error);
|
| - if (error != base::File::FILE_OK) {
|
| - LOG(WARNING) << "Failed to get origin+type directory: "
|
| - << url.DebugString() << " error:" << error;
|
| - return NULL;
|
| - }
|
| - MarkUsed();
|
| - SandboxDirectoryDatabase* database =
|
| - new SandboxDirectoryDatabase(path, env_override_);
|
| - directories_[key] = database;
|
| - return database;
|
| -}
|
| -
|
| -base::FilePath ObfuscatedFileUtil::GetDirectoryForOrigin(
|
| - const GURL& origin, bool create, base::File::Error* error_code) {
|
| - if (!InitOriginDatabase(origin, create)) {
|
| - if (error_code) {
|
| - *error_code = create ?
|
| - base::File::FILE_ERROR_FAILED :
|
| - base::File::FILE_ERROR_NOT_FOUND;
|
| - }
|
| - return base::FilePath();
|
| - }
|
| - base::FilePath directory_name;
|
| - std::string id = storage::GetIdentifierFromOrigin(origin);
|
| -
|
| - bool exists_in_db = origin_database_->HasOriginPath(id);
|
| - if (!exists_in_db && !create) {
|
| - if (error_code)
|
| - *error_code = base::File::FILE_ERROR_NOT_FOUND;
|
| - return base::FilePath();
|
| - }
|
| - if (!origin_database_->GetPathForOrigin(id, &directory_name)) {
|
| - if (error_code)
|
| - *error_code = base::File::FILE_ERROR_FAILED;
|
| - return base::FilePath();
|
| - }
|
| -
|
| - base::FilePath path = file_system_directory_.Append(directory_name);
|
| - bool exists_in_fs = base::DirectoryExists(path);
|
| - if (!exists_in_db && exists_in_fs) {
|
| - if (!base::DeleteFile(path, true)) {
|
| - if (error_code)
|
| - *error_code = base::File::FILE_ERROR_FAILED;
|
| - return base::FilePath();
|
| - }
|
| - exists_in_fs = false;
|
| - }
|
| -
|
| - if (!exists_in_fs) {
|
| - if (!create || !base::CreateDirectory(path)) {
|
| - if (error_code)
|
| - *error_code = create ?
|
| - base::File::FILE_ERROR_FAILED :
|
| - base::File::FILE_ERROR_NOT_FOUND;
|
| - return base::FilePath();
|
| - }
|
| - }
|
| -
|
| - if (error_code)
|
| - *error_code = base::File::FILE_OK;
|
| -
|
| - return path;
|
| -}
|
| -
|
| -void ObfuscatedFileUtil::InvalidateUsageCache(
|
| - FileSystemOperationContext* context,
|
| - const GURL& origin,
|
| - FileSystemType type) {
|
| - if (sandbox_delegate_)
|
| - sandbox_delegate_->InvalidateUsageCache(origin, type);
|
| -}
|
| -
|
| -void ObfuscatedFileUtil::MarkUsed() {
|
| - if (!timer_)
|
| - timer_.reset(new TimedTaskHelper(file_task_runner_.get()));
|
| -
|
| - if (timer_->IsRunning()) {
|
| - timer_->Reset();
|
| - } else {
|
| - timer_->Start(FROM_HERE,
|
| - base::TimeDelta::FromSeconds(db_flush_delay_seconds_),
|
| - base::Bind(&ObfuscatedFileUtil::DropDatabases,
|
| - base::Unretained(this)));
|
| - }
|
| -}
|
| -
|
| -void ObfuscatedFileUtil::DropDatabases() {
|
| - origin_database_.reset();
|
| - STLDeleteContainerPairSecondPointers(
|
| - directories_.begin(), directories_.end());
|
| - directories_.clear();
|
| - timer_.reset();
|
| -}
|
| -
|
| -bool ObfuscatedFileUtil::InitOriginDatabase(const GURL& origin_hint,
|
| - bool create) {
|
| - if (origin_database_)
|
| - return true;
|
| -
|
| - if (!create && !base::DirectoryExists(file_system_directory_))
|
| - return false;
|
| - if (!base::CreateDirectory(file_system_directory_)) {
|
| - LOG(WARNING) << "Failed to create FileSystem directory: " <<
|
| - file_system_directory_.value();
|
| - return false;
|
| - }
|
| -
|
| - SandboxPrioritizedOriginDatabase* prioritized_origin_database =
|
| - new SandboxPrioritizedOriginDatabase(file_system_directory_,
|
| - env_override_);
|
| - origin_database_.reset(prioritized_origin_database);
|
| -
|
| - if (origin_hint.is_empty() || !HasIsolatedStorage(origin_hint))
|
| - return true;
|
| -
|
| - const std::string isolated_origin_string =
|
| - storage::GetIdentifierFromOrigin(origin_hint);
|
| -
|
| - // TODO(kinuko): Deprecate this after a few release cycles, e.g. around M33.
|
| - base::FilePath isolated_origin_dir = file_system_directory_.Append(
|
| - SandboxIsolatedOriginDatabase::kObsoleteOriginDirectory);
|
| - if (base::DirectoryExists(isolated_origin_dir) &&
|
| - prioritized_origin_database->GetSandboxOriginDatabase()) {
|
| - SandboxIsolatedOriginDatabase::MigrateBackFromObsoleteOriginDatabase(
|
| - isolated_origin_string,
|
| - file_system_directory_,
|
| - prioritized_origin_database->GetSandboxOriginDatabase());
|
| - }
|
| -
|
| - prioritized_origin_database->InitializePrimaryOrigin(
|
| - isolated_origin_string);
|
| -
|
| - return true;
|
| -}
|
| -
|
| -base::File::Error ObfuscatedFileUtil::GenerateNewLocalPath(
|
| - SandboxDirectoryDatabase* db,
|
| - FileSystemOperationContext* context,
|
| - const FileSystemURL& url,
|
| - base::FilePath* root,
|
| - base::FilePath* local_path) {
|
| - DCHECK(local_path);
|
| - int64 number;
|
| - if (!db || !db->GetNextInteger(&number))
|
| - return base::File::FILE_ERROR_FAILED;
|
| -
|
| - base::File::Error error = base::File::FILE_OK;
|
| - *root = GetDirectoryForURL(url, false, &error);
|
| - if (error != base::File::FILE_OK)
|
| - return error;
|
| -
|
| - // We use the third- and fourth-to-last digits as the directory.
|
| - int64 directory_number = number % 10000 / 100;
|
| - base::FilePath new_local_path = root->AppendASCII(
|
| - base::StringPrintf("%02" PRId64, directory_number));
|
| -
|
| - error = NativeFileUtil::CreateDirectory(
|
| - new_local_path, false /* exclusive */, false /* recursive */);
|
| - if (error != base::File::FILE_OK)
|
| - return error;
|
| -
|
| - *local_path =
|
| - new_local_path.AppendASCII(base::StringPrintf("%08" PRId64, number));
|
| - return base::File::FILE_OK;
|
| -}
|
| -
|
| -base::File ObfuscatedFileUtil::CreateOrOpenInternal(
|
| - FileSystemOperationContext* context,
|
| - const FileSystemURL& url, int file_flags) {
|
| - DCHECK(!(file_flags & (base::File::FLAG_DELETE_ON_CLOSE |
|
| - base::File::FLAG_HIDDEN | base::File::FLAG_EXCLUSIVE_READ |
|
| - base::File::FLAG_EXCLUSIVE_WRITE)));
|
| - SandboxDirectoryDatabase* db = GetDirectoryDatabase(url, true);
|
| - if (!db)
|
| - return base::File(base::File::FILE_ERROR_FAILED);
|
| - FileId file_id;
|
| - if (!db->GetFileWithPath(url.path(), &file_id)) {
|
| - // The file doesn't exist.
|
| - if (!(file_flags & (base::File::FLAG_CREATE |
|
| - base::File::FLAG_CREATE_ALWAYS | base::File::FLAG_OPEN_ALWAYS))) {
|
| - return base::File(base::File::FILE_ERROR_NOT_FOUND);
|
| - }
|
| - FileId parent_id;
|
| - if (!db->GetFileWithPath(VirtualPath::DirName(url.path()), &parent_id))
|
| - return base::File(base::File::FILE_ERROR_NOT_FOUND);
|
| - FileInfo file_info;
|
| - InitFileInfo(&file_info, parent_id,
|
| - VirtualPath::BaseName(url.path()).value());
|
| -
|
| - int64 growth = UsageForPath(file_info.name.size());
|
| - if (!AllocateQuota(context, growth))
|
| - return base::File(base::File::FILE_ERROR_NO_SPACE);
|
| - base::File file = CreateAndOpenFile(context, url, &file_info, file_flags);
|
| - if (file.IsValid()) {
|
| - UpdateUsage(context, url, growth);
|
| - context->change_observers()->Notify(
|
| - &FileChangeObserver::OnCreateFile, MakeTuple(url));
|
| - }
|
| - return file.Pass();
|
| - }
|
| -
|
| - if (file_flags & base::File::FLAG_CREATE)
|
| - return base::File(base::File::FILE_ERROR_EXISTS);
|
| -
|
| - base::File::Info platform_file_info;
|
| - base::FilePath local_path;
|
| - FileInfo file_info;
|
| - base::File::Error error = GetFileInfoInternal(
|
| - db, context, url, file_id, &file_info, &platform_file_info, &local_path);
|
| - if (error != base::File::FILE_OK)
|
| - return base::File(error);
|
| - if (file_info.is_directory())
|
| - return base::File(base::File::FILE_ERROR_NOT_A_FILE);
|
| -
|
| - int64 delta = 0;
|
| - if (file_flags & (base::File::FLAG_CREATE_ALWAYS |
|
| - base::File::FLAG_OPEN_TRUNCATED)) {
|
| - // The file exists and we're truncating.
|
| - delta = -platform_file_info.size;
|
| - AllocateQuota(context, delta);
|
| - }
|
| -
|
| - base::File file = NativeFileUtil::CreateOrOpen(local_path, file_flags);
|
| - if (!file.IsValid()) {
|
| - error = file.error_details();
|
| - if (error == base::File::FILE_ERROR_NOT_FOUND) {
|
| - // TODO(tzik): Also invalidate on-memory usage cache in UsageTracker.
|
| - // TODO(tzik): Delete database entry after ensuring the file lost.
|
| - InvalidateUsageCache(context, url.origin(), url.type());
|
| - LOG(WARNING) << "Lost a backing file.";
|
| - return base::File(base::File::FILE_ERROR_FAILED);
|
| - }
|
| - return file.Pass();
|
| - }
|
| -
|
| - // If truncating we need to update the usage.
|
| - if (delta) {
|
| - UpdateUsage(context, url, delta);
|
| - context->change_observers()->Notify(
|
| - &FileChangeObserver::OnModifyFile, MakeTuple(url));
|
| - }
|
| - return file.Pass();
|
| -}
|
| -
|
| -bool ObfuscatedFileUtil::HasIsolatedStorage(const GURL& origin) {
|
| - return special_storage_policy_.get() &&
|
| - special_storage_policy_->HasIsolatedStorage(origin);
|
| -}
|
| -
|
| -} // namespace storage
|
|
|