diff options
author | zelidrag@chromium.org <zelidrag@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2011-03-25 20:37:59 +0000 |
---|---|---|
committer | zelidrag@chromium.org <zelidrag@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2011-03-25 20:37:59 +0000 |
commit | 55d9bed8de248d583bd5770a42c8520e1225162b (patch) | |
tree | 6be27d9ee263e9a475385120a933bcb29fe75a74 /webkit/chromeos | |
parent | e69b903ec57dc0f511598b03d4aae148a56e33bc (diff) | |
download | chromium_src-55d9bed8de248d583bd5770a42c8520e1225162b.zip chromium_src-55d9bed8de248d583bd5770a42c8520e1225162b.tar.gz chromium_src-55d9bed8de248d583bd5770a42c8520e1225162b.tar.bz2 |
Wired local file system support for File API. The local file system provider currently exists for ChromeOS builds only.
This CL exposes new extension permission 'fileSystem' that controls access to individual local file system elements from 3rd party extensions. Another new permission 'fileBrowserPrivate' controls access to following API call that retrieves root DOMFileSystem instance for locally exposed folders:
chrome.fileBrowserPrivate.requestLocalFileSystem(callback)
BUG=chromium-os:11983
TEST=ExtensionApiTest.LocalFileSystem
Review URL: http://codereview.chromium.org/6519040
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@79451 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'webkit/chromeos')
-rw-r--r-- | webkit/chromeos/fileapi/cros_mount_point_provider.cc | 124 | ||||
-rw-r--r-- | webkit/chromeos/fileapi/cros_mount_point_provider.h | 59 |
2 files changed, 183 insertions, 0 deletions
diff --git a/webkit/chromeos/fileapi/cros_mount_point_provider.cc b/webkit/chromeos/fileapi/cros_mount_point_provider.cc new file mode 100644 index 0000000..1579c36 --- /dev/null +++ b/webkit/chromeos/fileapi/cros_mount_point_provider.cc @@ -0,0 +1,124 @@ + // Copyright (c) 2011 The Chromium Authors. All rights reserved. +// Use of this source code is governed by a BSD-style license that can be +// found in the LICENSE file. + +#include "webkit/chromeos/fileapi/cros_mount_point_provider.h" + +#include "base/logging.h" +#include "base/message_loop.h" +#include "base/message_loop_proxy.h" +#include "base/scoped_callback_factory.h" +#include "base/scoped_ptr.h" +#include "base/stringprintf.h" +#include "base/utf_string_conversions.h" +#include "third_party/WebKit/Source/WebKit/chromium/public/WebCString.h" +#include "third_party/WebKit/Source/WebKit/chromium/public/WebFileSystem.h" +#include "third_party/WebKit/Source/WebKit/chromium/public/WebSecurityOrigin.h" +#include "webkit/fileapi/file_system_path_manager.h" +#include "webkit/glue/webkit_glue.h" + +namespace chromeos { + +const char CrosMountPointProvider::kLocalName[] = "Local"; +const char CrosMountPointProvider::kLocalDirName[] = "/local/"; + +typedef struct { + const char* local_root_path; + const char* web_root_path; +} FixedExposedPaths; + +// Top level file system elements exposed in FileAPI in ChromeOS: +FixedExposedPaths fixed_exposed_paths[] = { + {"/home/chronos/user/", "Downloads"}, + {"/", "media"}, + {"/", "tmp"}, +}; + +CrosMountPointProvider::CrosMountPointProvider( + scoped_refptr<quota::SpecialStoragePolicy> special_storage_policy) + : local_dir_name_(kLocalName), + special_storage_policy_(special_storage_policy) { + + // TODO(zelidrag): There's got to be a better way to generate UUID. + srand(time(NULL)); + std::string virtual_root; + virtual_root.append(base::StringPrintf("%hx%hx-%hx-%hx-%hx-%hx%hx%hx", + static_cast<unsigned short>(rand()), static_cast<unsigned short>(rand()), + static_cast<unsigned short>(rand()), + static_cast<unsigned short>(rand()), + static_cast<unsigned short>(rand()), + static_cast<unsigned short>(rand()), static_cast<unsigned short>(rand()), + static_cast<unsigned short>(rand()))); + + // Create virtual root node. + virtual_root_path_ = FilePath(virtual_root); + base_path_ = virtual_root_path_.Append(local_dir_name_); + + for (size_t i = 0; i < arraysize(fixed_exposed_paths); i++) { + mount_point_map_.insert(std::pair<std::string, std::string>( + std::string(fixed_exposed_paths[i].web_root_path), + std::string(fixed_exposed_paths[i].local_root_path))); + } +} + +CrosMountPointProvider::~CrosMountPointProvider() { +} + +// TODO(zelidrag) share with SandboxMountPointProvider impl. +std::string GetOriginIdentifierFromURL( + const GURL& url) { + WebKit::WebSecurityOrigin web_security_origin = + WebKit::WebSecurityOrigin::createFromString(UTF8ToUTF16(url.spec())); + return web_security_origin.databaseIdentifier().utf8(); +} + +void CrosMountPointProvider::GetFileSystemRootPath( + const GURL& origin_url, + fileapi::FileSystemType type, + bool create, + fileapi::FileSystemPathManager::GetRootPathCallback* callback_ptr) { + DCHECK(type == fileapi::kFileSystemTypeLocal); + + std::string name(GetOriginIdentifierFromURL(origin_url)); + name += ':'; + name += CrosMountPointProvider::kLocalName; + + FilePath root_path = FilePath(CrosMountPointProvider::kLocalDirName); + callback_ptr->Run(!root_path.empty(), root_path, name); +} + +// Like GetFileSystemRootPath, but synchronous, and can be called only while +// running on the file thread. +FilePath CrosMountPointProvider::GetFileSystemRootPathOnFileThread( + const GURL& origin_url, + fileapi::FileSystemType type, + const FilePath& virtual_path, + bool create) { + DCHECK(type == fileapi::kFileSystemTypeLocal); + + std::vector<FilePath::StringType> components; + virtual_path.GetComponents(&components); + if (components.size() < 1) { + return FilePath(); + } + + // Check if this root directory is exposed by this provider. + MountPointMap::iterator iter = mount_point_map_.find(components[0]); + if (iter == mount_point_map_.end()) { + return FilePath(); + } + + return FilePath(iter->second); +} + +// TODO(zelidrag): Share this code with SandboxMountPointProvider impl. +bool CrosMountPointProvider::IsRestrictedFileName(const FilePath& path) const { + return false; +} + +bool CrosMountPointProvider::IsAccessAllowed(const GURL& origin_url) { + return special_storage_policy_->IsLocalFileSystemAccessAllowed(origin_url); +} + +} // namespace chromeos + diff --git a/webkit/chromeos/fileapi/cros_mount_point_provider.h b/webkit/chromeos/fileapi/cros_mount_point_provider.h new file mode 100644 index 0000000..5ac8f37 --- /dev/null +++ b/webkit/chromeos/fileapi/cros_mount_point_provider.h @@ -0,0 +1,59 @@ + // Copyright (c) 2011 The Chromium Authors. All rights reserved. +// Use of this source code is governed by a BSD-style license that can be +// found in the LICENSE file. + +#ifndef WEBKIT_CHROMEOS_FILEAPI_CROS_MOUNT_POINT_PROVIDER_H_ +#define WEBKIT_CHROMEOS_FILEAPI_CROS_MOUNT_POINT_PROVIDER_H_ + +#include <map> +#include <set> +#include <string> + +#include "webkit/fileapi/file_system_mount_point_provider.h" +#include "webkit/quota/special_storage_policy.h" + +namespace chromeos { + +// An interface to provide local filesystem paths. +class CrosMountPointProvider + : public fileapi::FileSystemMountPointProvider { + public: + CrosMountPointProvider( + scoped_refptr<quota::SpecialStoragePolicy> special_storage_policy); + virtual ~CrosMountPointProvider(); + + // fileapi::FileSystemMountPointProvider overrides. + virtual bool IsAccessAllowed(const GURL& origin_url) OVERRIDE; + + virtual void GetFileSystemRootPath( + const GURL& origin_url, + fileapi::FileSystemType type, + bool create, + fileapi::FileSystemPathManager::GetRootPathCallback* callback) OVERRIDE; + + virtual FilePath GetFileSystemRootPathOnFileThread( + const GURL& origin_url, + fileapi::FileSystemType type, + const FilePath& virtual_path, + bool create); + + virtual bool IsRestrictedFileName(const FilePath& filename) const OVERRIDE; + + private: + class GetFileSystemRootPathTask; + typedef std::map<std::string, std::string> MountPointMap; + + static const char kLocalDirName[]; + static const char kLocalName[]; + FilePath virtual_root_path_; + FilePath base_path_; + std::string local_dir_name_; + MountPointMap mount_point_map_; + scoped_refptr<quota::SpecialStoragePolicy> special_storage_policy_; + + DISALLOW_COPY_AND_ASSIGN(CrosMountPointProvider); +}; + +} // namespace chromeos + +#endif // WEBKIT_CHROMEOS_FILEAPI_CROS_MOUNT_POINT_PROVIDER_H_ |