OLD | NEW |
1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #ifndef STORAGE_BROWSER_FILEAPI_SANDBOX_FILE_SYSTEM_BACKEND_DELEGATE_H_ | 5 #ifndef STORAGE_BROWSER_FILEAPI_SANDBOX_FILE_SYSTEM_BACKEND_DELEGATE_H_ |
6 #define STORAGE_BROWSER_FILEAPI_SANDBOX_FILE_SYSTEM_BACKEND_DELEGATE_H_ | 6 #define STORAGE_BROWSER_FILEAPI_SANDBOX_FILE_SYSTEM_BACKEND_DELEGATE_H_ |
7 | 7 |
8 #include <map> | 8 #include <map> |
9 #include <set> | 9 #include <set> |
10 #include <string> | 10 #include <string> |
(...skipping 156 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
167 // Registers quota observer for file updates on filesystem of |type|. | 167 // Registers quota observer for file updates on filesystem of |type|. |
168 void RegisterQuotaUpdateObserver(FileSystemType type); | 168 void RegisterQuotaUpdateObserver(FileSystemType type); |
169 | 169 |
170 void InvalidateUsageCache(const GURL& origin_url, | 170 void InvalidateUsageCache(const GURL& origin_url, |
171 FileSystemType type); | 171 FileSystemType type); |
172 void StickyInvalidateUsageCache(const GURL& origin_url, | 172 void StickyInvalidateUsageCache(const GURL& origin_url, |
173 FileSystemType type); | 173 FileSystemType type); |
174 | 174 |
175 void CollectOpenFileSystemMetrics(base::File::Error error_code); | 175 void CollectOpenFileSystemMetrics(base::File::Error error_code); |
176 | 176 |
| 177 // Used for migrating from the general storage partition to an isolated |
| 178 // storage partition |
| 179 void CopyFileSystem(const GURL& origin_url, |
| 180 FileSystemType type, |
| 181 SandboxFileSystemBackendDelegate* destination); |
| 182 |
177 base::SequencedTaskRunner* file_task_runner() { | 183 base::SequencedTaskRunner* file_task_runner() { |
178 return file_task_runner_.get(); | 184 return file_task_runner_.get(); |
179 } | 185 } |
180 | 186 |
181 AsyncFileUtil* file_util() { return sandbox_file_util_.get(); } | 187 AsyncFileUtil* file_util() { return sandbox_file_util_.get(); } |
182 FileSystemUsageCache* usage_cache() { return file_system_usage_cache_.get(); } | 188 FileSystemUsageCache* usage_cache() { return file_system_usage_cache_.get(); } |
183 SandboxQuotaObserver* quota_observer() { return quota_observer_.get(); } | 189 SandboxQuotaObserver* quota_observer() { return quota_observer_.get(); } |
184 | 190 |
185 storage::SpecialStoragePolicy* special_storage_policy() { | 191 storage::SpecialStoragePolicy* special_storage_policy() { |
186 return special_storage_policy_.get(); | 192 return special_storage_policy_.get(); |
(...skipping 63 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
250 base::Time next_release_time_for_open_filesystem_stat_; | 256 base::Time next_release_time_for_open_filesystem_stat_; |
251 | 257 |
252 base::WeakPtrFactory<SandboxFileSystemBackendDelegate> weak_factory_; | 258 base::WeakPtrFactory<SandboxFileSystemBackendDelegate> weak_factory_; |
253 | 259 |
254 DISALLOW_COPY_AND_ASSIGN(SandboxFileSystemBackendDelegate); | 260 DISALLOW_COPY_AND_ASSIGN(SandboxFileSystemBackendDelegate); |
255 }; | 261 }; |
256 | 262 |
257 } // namespace storage | 263 } // namespace storage |
258 | 264 |
259 #endif // STORAGE_BROWSER_FILEAPI_SANDBOX_FILE_SYSTEM_BACKEND_DELEGATE_H_ | 265 #endif // STORAGE_BROWSER_FILEAPI_SANDBOX_FILE_SYSTEM_BACKEND_DELEGATE_H_ |
OLD | NEW |