| OLD | NEW |
| 1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #ifndef STORAGE_BROWSER_FILEAPI_SANDBOX_FILE_SYSTEM_BACKEND_DELEGATE_H_ | 5 #ifndef STORAGE_BROWSER_FILEAPI_SANDBOX_FILE_SYSTEM_BACKEND_DELEGATE_H_ |
| 6 #define STORAGE_BROWSER_FILEAPI_SANDBOX_FILE_SYSTEM_BACKEND_DELEGATE_H_ | 6 #define STORAGE_BROWSER_FILEAPI_SANDBOX_FILE_SYSTEM_BACKEND_DELEGATE_H_ |
| 7 | 7 |
| 8 #include <map> | 8 #include <map> |
| 9 #include <set> | 9 #include <set> |
| 10 #include <string> | 10 #include <string> |
| (...skipping 156 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 167 // Registers quota observer for file updates on filesystem of |type|. | 167 // Registers quota observer for file updates on filesystem of |type|. |
| 168 void RegisterQuotaUpdateObserver(FileSystemType type); | 168 void RegisterQuotaUpdateObserver(FileSystemType type); |
| 169 | 169 |
| 170 void InvalidateUsageCache(const GURL& origin_url, | 170 void InvalidateUsageCache(const GURL& origin_url, |
| 171 FileSystemType type); | 171 FileSystemType type); |
| 172 void StickyInvalidateUsageCache(const GURL& origin_url, | 172 void StickyInvalidateUsageCache(const GURL& origin_url, |
| 173 FileSystemType type); | 173 FileSystemType type); |
| 174 | 174 |
| 175 void CollectOpenFileSystemMetrics(base::File::Error error_code); | 175 void CollectOpenFileSystemMetrics(base::File::Error error_code); |
| 176 | 176 |
| 177 // Used for migrating from the general storage partition to an isolated |
| 178 // storage partition |
| 179 void CopyFileSystem(const GURL& origin_url, |
| 180 FileSystemType type, |
| 181 SandboxFileSystemBackendDelegate* destination); |
| 182 |
| 177 base::SequencedTaskRunner* file_task_runner() { | 183 base::SequencedTaskRunner* file_task_runner() { |
| 178 return file_task_runner_.get(); | 184 return file_task_runner_.get(); |
| 179 } | 185 } |
| 180 | 186 |
| 181 AsyncFileUtil* file_util() { return sandbox_file_util_.get(); } | 187 AsyncFileUtil* file_util() { return sandbox_file_util_.get(); } |
| 182 FileSystemUsageCache* usage_cache() { return file_system_usage_cache_.get(); } | 188 FileSystemUsageCache* usage_cache() { return file_system_usage_cache_.get(); } |
| 183 SandboxQuotaObserver* quota_observer() { return quota_observer_.get(); } | 189 SandboxQuotaObserver* quota_observer() { return quota_observer_.get(); } |
| 184 | 190 |
| 185 storage::SpecialStoragePolicy* special_storage_policy() { | 191 storage::SpecialStoragePolicy* special_storage_policy() { |
| 186 return special_storage_policy_.get(); | 192 return special_storage_policy_.get(); |
| (...skipping 63 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 250 base::Time next_release_time_for_open_filesystem_stat_; | 256 base::Time next_release_time_for_open_filesystem_stat_; |
| 251 | 257 |
| 252 base::WeakPtrFactory<SandboxFileSystemBackendDelegate> weak_factory_; | 258 base::WeakPtrFactory<SandboxFileSystemBackendDelegate> weak_factory_; |
| 253 | 259 |
| 254 DISALLOW_COPY_AND_ASSIGN(SandboxFileSystemBackendDelegate); | 260 DISALLOW_COPY_AND_ASSIGN(SandboxFileSystemBackendDelegate); |
| 255 }; | 261 }; |
| 256 | 262 |
| 257 } // namespace storage | 263 } // namespace storage |
| 258 | 264 |
| 259 #endif // STORAGE_BROWSER_FILEAPI_SANDBOX_FILE_SYSTEM_BACKEND_DELEGATE_H_ | 265 #endif // STORAGE_BROWSER_FILEAPI_SANDBOX_FILE_SYSTEM_BACKEND_DELEGATE_H_ |
| OLD | NEW |