blob: a9c2e05b02ff37ddff6b950858584d4bd7748e02 [file] [log] [blame]
// Copyright (c) 2012 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "storage/browser/fileapi/sandbox_file_system_backend.h"
#include <stdint.h>
#include <memory>
#include <utility>
#include "base/bind.h"
#include "base/files/file_util.h"
#include "base/logging.h"
#include "base/metrics/histogram.h"
#include "base/task_runner_util.h"
#include "storage/browser/fileapi/async_file_util_adapter.h"
#include "storage/browser/fileapi/copy_or_move_file_validator.h"
#include "storage/browser/fileapi/file_stream_reader.h"
#include "storage/browser/fileapi/file_stream_writer.h"
#include "storage/browser/fileapi/file_system_context.h"
#include "storage/browser/fileapi/file_system_operation.h"
#include "storage/browser/fileapi/file_system_operation_context.h"
#include "storage/browser/fileapi/file_system_options.h"
#include "storage/browser/fileapi/file_system_usage_cache.h"
#include "storage/browser/fileapi/obfuscated_file_util.h"
#include "storage/browser/fileapi/sandbox_quota_observer.h"
#include "storage/browser/quota/quota_manager.h"
#include "storage/common/fileapi/file_system_types.h"
#include "storage/common/fileapi/file_system_util.h"
#include "url/gurl.h"
using storage::QuotaManagerProxy;
using storage::SpecialStoragePolicy;
namespace storage {
SandboxFileSystemBackend::SandboxFileSystemBackend(
SandboxFileSystemBackendDelegate* delegate)
: delegate_(delegate),
enable_temporary_file_system_in_incognito_(false) {
}
SandboxFileSystemBackend::~SandboxFileSystemBackend() {
}
bool SandboxFileSystemBackend::CanHandleType(FileSystemType type) const {
return type == kFileSystemTypeTemporary ||
type == kFileSystemTypePersistent;
}
void SandboxFileSystemBackend::Initialize(FileSystemContext* context) {
DCHECK(delegate_);
// Set quota observers.
delegate_->RegisterQuotaUpdateObserver(storage::kFileSystemTypeTemporary);
delegate_->AddFileAccessObserver(
storage::kFileSystemTypeTemporary, delegate_->quota_observer(), NULL);
delegate_->RegisterQuotaUpdateObserver(storage::kFileSystemTypePersistent);
delegate_->AddFileAccessObserver(
storage::kFileSystemTypePersistent, delegate_->quota_observer(), NULL);
}
void SandboxFileSystemBackend::ResolveURL(
const FileSystemURL& url,
OpenFileSystemMode mode,
const OpenFileSystemCallback& callback) {
DCHECK(CanHandleType(url.type()));
DCHECK(delegate_);
if (delegate_->file_system_options().is_incognito() &&
!(url.type() == kFileSystemTypeTemporary &&
enable_temporary_file_system_in_incognito_)) {
// TODO(kinuko): return an isolated temporary directory.
callback.Run(GURL(), std::string(), base::File::FILE_ERROR_SECURITY);
return;
}
delegate_->OpenFileSystem(url.origin(),
url.type(),
mode,
callback,
GetFileSystemRootURI(url.origin(), url.type()));
}
AsyncFileUtil* SandboxFileSystemBackend::GetAsyncFileUtil(
FileSystemType type) {
DCHECK(delegate_);
return delegate_->file_util();
}
WatcherManager* SandboxFileSystemBackend::GetWatcherManager(
FileSystemType type) {
return NULL;
}
CopyOrMoveFileValidatorFactory*
SandboxFileSystemBackend::GetCopyOrMoveFileValidatorFactory(
FileSystemType type,
base::File::Error* error_code) {
DCHECK(error_code);
*error_code = base::File::FILE_OK;
return NULL;
}
FileSystemOperation* SandboxFileSystemBackend::CreateFileSystemOperation(
const FileSystemURL& url,
FileSystemContext* context,
base::File::Error* error_code) const {
DCHECK(CanHandleType(url.type()));
DCHECK(error_code);
DCHECK(delegate_);
std::unique_ptr<FileSystemOperationContext> operation_context =
delegate_->CreateFileSystemOperationContext(url, context, error_code);
if (!operation_context)
return NULL;
SpecialStoragePolicy* policy = delegate_->special_storage_policy();
if (policy && policy->IsStorageUnlimited(url.origin()))
operation_context->set_quota_limit_type(storage::kQuotaLimitTypeUnlimited);
else
operation_context->set_quota_limit_type(storage::kQuotaLimitTypeLimited);
return FileSystemOperation::Create(url, context,
std::move(operation_context));
}
bool SandboxFileSystemBackend::SupportsStreaming(
const storage::FileSystemURL& url) const {
return false;
}
bool SandboxFileSystemBackend::HasInplaceCopyImplementation(
storage::FileSystemType type) const {
return false;
}
std::unique_ptr<storage::FileStreamReader>
SandboxFileSystemBackend::CreateFileStreamReader(
const FileSystemURL& url,
int64_t offset,
int64_t max_bytes_to_read,
const base::Time& expected_modification_time,
FileSystemContext* context) const {
DCHECK(CanHandleType(url.type()));
DCHECK(delegate_);
return delegate_->CreateFileStreamReader(
url, offset, expected_modification_time, context);
}
std::unique_ptr<storage::FileStreamWriter>
SandboxFileSystemBackend::CreateFileStreamWriter(
const FileSystemURL& url,
int64_t offset,
FileSystemContext* context) const {
DCHECK(CanHandleType(url.type()));
DCHECK(delegate_);
return delegate_->CreateFileStreamWriter(url, offset, context, url.type());
}
FileSystemQuotaUtil* SandboxFileSystemBackend::GetQuotaUtil() {
return delegate_;
}
const UpdateObserverList* SandboxFileSystemBackend::GetUpdateObservers(
FileSystemType type) const {
return delegate_->GetUpdateObservers(type);
}
const ChangeObserverList* SandboxFileSystemBackend::GetChangeObservers(
FileSystemType type) const {
return delegate_->GetChangeObservers(type);
}
const AccessObserverList* SandboxFileSystemBackend::GetAccessObservers(
FileSystemType type) const {
return delegate_->GetAccessObservers(type);
}
SandboxFileSystemBackendDelegate::OriginEnumerator*
SandboxFileSystemBackend::CreateOriginEnumerator() {
DCHECK(delegate_);
return delegate_->CreateOriginEnumerator();
}
} // namespace storage