summaryrefslogtreecommitdiffstats
path: root/webkit/browser/fileapi
diff options
context:
space:
mode:
Diffstat (limited to 'webkit/browser/fileapi')
-rw-r--r--webkit/browser/fileapi/file_system_mount_point_provider.h177
-rw-r--r--webkit/browser/fileapi/file_system_mount_point_provider_unittest.cc308
-rw-r--r--webkit/browser/fileapi/webkit_browser_fileapi.gypi11
3 files changed, 496 insertions, 0 deletions
diff --git a/webkit/browser/fileapi/file_system_mount_point_provider.h b/webkit/browser/fileapi/file_system_mount_point_provider.h
new file mode 100644
index 0000000..d8aff2b
--- /dev/null
+++ b/webkit/browser/fileapi/file_system_mount_point_provider.h
@@ -0,0 +1,177 @@
+// Copyright (c) 2012 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#ifndef WEBKIT_BROWSER_FILEAPI_FILE_SYSTEM_MOUNT_POINT_PROVIDER_H_
+#define WEBKIT_BROWSER_FILEAPI_FILE_SYSTEM_MOUNT_POINT_PROVIDER_H_
+
+#include <string>
+#include <vector>
+
+#include "base/callback_forward.h"
+#include "base/files/file_path.h"
+#include "base/memory/scoped_ptr.h"
+#include "base/platform_file.h"
+#include "webkit/fileapi/file_permission_policy.h"
+#include "webkit/fileapi/file_system_types.h"
+#include "webkit/storage/webkit_storage_export.h"
+
+namespace webkit_blob {
+class FileStreamReader;
+}
+
+namespace fileapi {
+
+class AsyncFileUtil;
+class CopyOrMoveFileValidatorFactory;
+class FileSystemURL;
+class FileStreamWriter;
+class FileSystemContext;
+class FileSystemFileUtil;
+class FileSystemOperation;
+class FileSystemQuotaUtil;
+class RemoteFileSystemProxyInterface;
+
+// An interface to provide mount-point-specific path-related utilities
+// and specialized FileSystemFileUtil instance.
+//
+// NOTE: when you implement a new MountPointProvider for your own
+// FileSystem module, please contact to kinuko@chromium.org.
+//
+class WEBKIT_STORAGE_EXPORT FileSystemMountPointProvider {
+ public:
+ // Callback for ValidateFileSystemRoot.
+ typedef base::Callback<void(base::PlatformFileError error)>
+ ValidateFileSystemCallback;
+ typedef base::Callback<void(base::PlatformFileError error)>
+ DeleteFileSystemCallback;
+ virtual ~FileSystemMountPointProvider() {}
+
+ // Returns true if this mount point provider can handle |type|.
+ // One mount point provider may be able to handle multiple filesystem types.
+ virtual bool CanHandleType(FileSystemType type) const = 0;
+
+ // Validates the filesystem for the given |origin_url| and |type|.
+ // This verifies if it is allowed to request (or create) the filesystem
+ // and if it can access (or create) the root directory of the mount point.
+ // If |create| is true this may also create the root directory for
+ // the filesystem if it doesn't exist.
+ virtual void ValidateFileSystemRoot(
+ const GURL& origin_url,
+ FileSystemType type,
+ bool create,
+ const ValidateFileSystemCallback& callback) = 0;
+
+ // Retrieves the root path of the filesystem specified by the given
+ // file system url on the file thread.
+ // If |create| is true this may also create the root directory for
+ // the filesystem if it doesn't exist.
+ virtual base::FilePath GetFileSystemRootPathOnFileThread(
+ const FileSystemURL& url,
+ bool create) = 0;
+
+ // Returns the specialized FileSystemFileUtil for this mount point.
+ // It is ok to return NULL if the filesystem doesn't support synchronous
+ // version of FileUtil.
+ virtual FileSystemFileUtil* GetFileUtil(FileSystemType type) = 0;
+
+ // Returns the specialized AsyncFileUtil for this mount point.
+ virtual AsyncFileUtil* GetAsyncFileUtil(FileSystemType type) = 0;
+
+ // Returns the specialized CopyOrMoveFileValidatorFactory for this mount
+ // point and |type|. If |error_code| is PLATFORM_FILE_OK and the result
+ // is NULL, then no validator is required.
+ virtual CopyOrMoveFileValidatorFactory* GetCopyOrMoveFileValidatorFactory(
+ FileSystemType type, base::PlatformFileError* error_code) = 0;
+
+ // Initialize the CopyOrMoveFileValidatorFactory. Invalid to call more than
+ // once.
+ virtual void InitializeCopyOrMoveFileValidatorFactory(
+ FileSystemType type,
+ scoped_ptr<CopyOrMoveFileValidatorFactory> factory) = 0;
+
+ // Returns file permission policy we should apply for the given |url|.
+ virtual FilePermissionPolicy GetPermissionPolicy(
+ const FileSystemURL& url,
+ int permissions) const = 0;
+
+ // Returns a new instance of the specialized FileSystemOperation for this
+ // mount point based on the given triplet of |origin_url|, |file_system_type|
+ // and |virtual_path|. On failure to create a file system operation, set
+ // |error_code| correspondingly.
+ // This method is usually dispatched by
+ // FileSystemContext::CreateFileSystemOperation.
+ virtual FileSystemOperation* CreateFileSystemOperation(
+ const FileSystemURL& url,
+ FileSystemContext* context,
+ base::PlatformFileError* error_code) const = 0;
+
+ // Creates a new file stream reader for a given filesystem URL |url| with an
+ // offset |offset|. |expected_modification_time| specifies the expected last
+ // modification if the value is non-null, the reader will check the underlying
+ // file's actual modification time to see if the file has been modified, and
+ // if it does any succeeding read operations should fail with
+ // ERR_UPLOAD_FILE_CHANGED error.
+ // This method itself does *not* check if the given path exists and is a
+ // regular file.
+ virtual scoped_ptr<webkit_blob::FileStreamReader> CreateFileStreamReader(
+ const FileSystemURL& url,
+ int64 offset,
+ const base::Time& expected_modification_time,
+ FileSystemContext* context) const = 0;
+
+ // Creates a new file stream writer for a given filesystem URL |url| with an
+ // offset |offset|.
+ // This method itself does *not* check if the given path exists and is a
+ // regular file.
+ virtual scoped_ptr<FileStreamWriter> CreateFileStreamWriter(
+ const FileSystemURL& url,
+ int64 offset,
+ FileSystemContext* context) const = 0;
+
+ // Returns the specialized FileSystemQuotaUtil for this mount point.
+ // This could return NULL if this mount point does not support quota.
+ virtual FileSystemQuotaUtil* GetQuotaUtil() = 0;
+
+ // Deletes the filesystem for the given |origin_url| and |type|.
+ virtual void DeleteFileSystem(
+ const GURL& origin_url,
+ FileSystemType type,
+ FileSystemContext* context,
+ const DeleteFileSystemCallback& callback) = 0;
+};
+
+// An interface to control external file system access permissions.
+class ExternalFileSystemMountPointProvider
+ : public FileSystemMountPointProvider {
+ public:
+ // Returns true if |url| is allowed to be accessed.
+ // This is supposed to perform ExternalFileSystem-specific security
+ // checks. This method is also likely to be called by
+ // FileSystemMountPointProvider::GetPermissionPolicy as
+ // GetPermissionPolicy is supposed to perform fileapi-generic security
+ // checks (which likely need to include ExternalFileSystem-specific checks).
+ virtual bool IsAccessAllowed(const fileapi::FileSystemURL& url) const = 0;
+ // Returns the list of top level directories that are exposed by this
+ // provider. This list is used to set appropriate child process file access
+ // permissions.
+ virtual std::vector<base::FilePath> GetRootDirectories() const = 0;
+ // Grants access to all external file system from extension identified with
+ // |extension_id|.
+ virtual void GrantFullAccessToExtension(const std::string& extension_id) = 0;
+ // Grants access to |virtual_path| from |origin_url|.
+ virtual void GrantFileAccessToExtension(
+ const std::string& extension_id,
+ const base::FilePath& virtual_path) = 0;
+ // Revokes file access from extension identified with |extension_id|.
+ virtual void RevokeAccessForExtension(
+ const std::string& extension_id) = 0;
+ // Gets virtual path by known filesystem path. Returns false when filesystem
+ // path is not exposed by this provider.
+ virtual bool GetVirtualPath(const base::FilePath& file_system_path,
+ base::FilePath* virtual_path) = 0;
+};
+
+} // namespace fileapi
+
+#endif // WEBKIT_BROWSER_FILEAPI_FILE_SYSTEM_MOUNT_POINT_PROVIDER_H_
diff --git a/webkit/browser/fileapi/file_system_mount_point_provider_unittest.cc b/webkit/browser/fileapi/file_system_mount_point_provider_unittest.cc
new file mode 100644
index 0000000..3995545
--- /dev/null
+++ b/webkit/browser/fileapi/file_system_mount_point_provider_unittest.cc
@@ -0,0 +1,308 @@
+// Copyright (c) 2012 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include <set>
+#include <string>
+
+#include "base/basictypes.h"
+#include "base/bind.h"
+#include "base/file_util.h"
+#include "base/files/scoped_temp_dir.h"
+#include "base/memory/ref_counted.h"
+#include "base/memory/scoped_ptr.h"
+#include "base/memory/weak_ptr.h"
+#include "base/message_loop.h"
+#include "base/message_loop_proxy.h"
+#include "base/strings/sys_string_conversions.h"
+#include "base/utf_string_conversions.h"
+#include "googleurl/src/gurl.h"
+#include "testing/gtest/include/gtest/gtest.h"
+#include "webkit/fileapi/external_mount_points.h"
+#include "webkit/fileapi/file_system_context.h"
+#include "webkit/fileapi/file_system_task_runners.h"
+#include "webkit/fileapi/file_system_url.h"
+#include "webkit/fileapi/file_system_util.h"
+#include "webkit/fileapi/mock_file_system_options.h"
+#include "webkit/fileapi/sandbox_mount_point_provider.h"
+#include "webkit/quota/mock_special_storage_policy.h"
+
+#if defined(OS_CHROMEOS)
+#include "webkit/chromeos/fileapi/cros_mount_point_provider.h"
+#endif
+
+namespace fileapi {
+
+namespace {
+
+// PS stands for path separator.
+#if defined(FILE_PATH_USES_WIN_SEPARATORS)
+#define PS "\\"
+#else
+#define PS "/"
+#endif
+
+struct RootPathTestCase {
+ fileapi::FileSystemType type;
+ const char* origin_url;
+ const char* expected_path;
+};
+
+const struct RootPathTest {
+ fileapi::FileSystemType type;
+ const char* origin_url;
+ const char* expected_path;
+} kRootPathTestCases[] = {
+ { fileapi::kFileSystemTypeTemporary, "http://foo:1/",
+ "000" PS "t" },
+ { fileapi::kFileSystemTypePersistent, "http://foo:1/",
+ "000" PS "p" },
+ { fileapi::kFileSystemTypeTemporary, "http://bar.com/",
+ "001" PS "t" },
+ { fileapi::kFileSystemTypePersistent, "http://bar.com/",
+ "001" PS "p" },
+ { fileapi::kFileSystemTypeTemporary, "https://foo:2/",
+ "002" PS "t" },
+ { fileapi::kFileSystemTypePersistent, "https://foo:2/",
+ "002" PS "p" },
+ { fileapi::kFileSystemTypeTemporary, "https://bar.com/",
+ "003" PS "t" },
+ { fileapi::kFileSystemTypePersistent, "https://bar.com/",
+ "003" PS "p" },
+#if defined(OS_CHROMEOS)
+ { fileapi::kFileSystemTypeExternal, "chrome-extension://foo/",
+ "chrome-extension__0" /* unused, only for logging */ },
+#endif
+};
+
+const struct RootPathFileURITest {
+ fileapi::FileSystemType type;
+ const char* origin_url;
+ const char* expected_path;
+ const char* virtual_path;
+} kRootPathFileURITestCases[] = {
+ { fileapi::kFileSystemTypeTemporary, "file:///",
+ "000" PS "t", NULL },
+ { fileapi::kFileSystemTypePersistent, "file:///",
+ "000" PS "p", NULL },
+};
+
+const struct CheckValidPathTest {
+ base::FilePath::StringType path;
+ bool expected_valid;
+} kCheckValidPathTestCases[] = {
+ { FILE_PATH_LITERAL("//tmp/foo.txt"), false, },
+ { FILE_PATH_LITERAL("//etc/hosts"), false, },
+ { FILE_PATH_LITERAL("foo.txt"), true, },
+ { FILE_PATH_LITERAL("a/b/c"), true, },
+ // Any paths that includes parent references are considered invalid.
+ { FILE_PATH_LITERAL(".."), false, },
+ { FILE_PATH_LITERAL("tmp/.."), false, },
+ { FILE_PATH_LITERAL("a/b/../c/.."), false, },
+};
+
+// For External filesystem.
+const base::FilePath::CharType kMountPoint[] =
+ FILE_PATH_LITERAL("/tmp/testing");
+const base::FilePath::CharType kRootPath[] = FILE_PATH_LITERAL("/tmp");
+const base::FilePath::CharType kVirtualPath[] = FILE_PATH_LITERAL("testing");
+
+} // namespace
+
+class FileSystemMountPointProviderTest : public testing::Test {
+ public:
+ FileSystemMountPointProviderTest()
+ : weak_factory_(this) {
+ }
+
+ virtual void SetUp() {
+ ASSERT_TRUE(data_dir_.CreateUniqueTempDir());
+ special_storage_policy_ = new quota::MockSpecialStoragePolicy;
+ }
+
+ protected:
+ void SetupNewContext(const FileSystemOptions& options) {
+ scoped_refptr<ExternalMountPoints> external_mount_points(
+ ExternalMountPoints::CreateRefCounted());
+ file_system_context_ = new FileSystemContext(
+ FileSystemTaskRunners::CreateMockTaskRunners(),
+ external_mount_points.get(),
+ special_storage_policy_,
+ NULL,
+ ScopedVector<FileSystemMountPointProvider>(),
+ data_dir_.path(),
+ options);
+#if defined(OS_CHROMEOS)
+ base::FilePath mount_point_path = base::FilePath(kMountPoint);
+ external_mount_points->RegisterFileSystem(
+ mount_point_path.BaseName().AsUTF8Unsafe(),
+ kFileSystemTypeNativeLocal,
+ mount_point_path);
+#endif
+ }
+
+ FileSystemMountPointProvider* provider(FileSystemType type) {
+ DCHECK(file_system_context_);
+ return file_system_context_->GetMountPointProvider(type);
+ }
+
+ bool GetRootPath(const GURL& origin_url,
+ fileapi::FileSystemType type,
+ bool create,
+ base::FilePath* root_path) {
+ base::FilePath virtual_path = base::FilePath();
+ if (type == kFileSystemTypeExternal)
+ virtual_path = base::FilePath(kVirtualPath);
+ FileSystemURL url = file_system_context_->CreateCrackedFileSystemURL(
+ origin_url, type, virtual_path);
+ base::FilePath returned_root_path =
+ provider(type)->GetFileSystemRootPathOnFileThread(url, create);
+ if (root_path)
+ *root_path = returned_root_path;
+ return !returned_root_path.empty();
+ }
+
+ base::FilePath data_path() const { return data_dir_.path(); }
+ base::FilePath file_system_path() const {
+ return data_dir_.path().Append(
+ SandboxMountPointProvider::kFileSystemDirectory);
+ }
+ FileSystemContext* file_system_context() const {
+ return file_system_context_.get();
+ }
+
+ private:
+ base::ScopedTempDir data_dir_;
+ base::MessageLoop message_loop_;
+ base::WeakPtrFactory<FileSystemMountPointProviderTest> weak_factory_;
+
+ scoped_refptr<quota::SpecialStoragePolicy> special_storage_policy_;
+ scoped_refptr<FileSystemContext> file_system_context_;
+
+ DISALLOW_COPY_AND_ASSIGN(FileSystemMountPointProviderTest);
+};
+
+TEST_F(FileSystemMountPointProviderTest, GetRootPathCreateAndExamine) {
+ std::vector<base::FilePath> returned_root_path(
+ ARRAYSIZE_UNSAFE(kRootPathTestCases));
+ SetupNewContext(CreateAllowFileAccessOptions());
+
+ // Create a new root directory.
+ for (size_t i = 0; i < ARRAYSIZE_UNSAFE(kRootPathTestCases); ++i) {
+ SCOPED_TRACE(testing::Message() << "RootPath (create) #" << i << " "
+ << kRootPathTestCases[i].expected_path);
+
+ base::FilePath root_path;
+ EXPECT_TRUE(GetRootPath(GURL(kRootPathTestCases[i].origin_url),
+ kRootPathTestCases[i].type,
+ true /* create */, &root_path));
+
+ if (kRootPathTestCases[i].type != kFileSystemTypeExternal) {
+ base::FilePath expected = file_system_path().AppendASCII(
+ kRootPathTestCases[i].expected_path);
+ EXPECT_EQ(expected.value(), root_path.value());
+ EXPECT_TRUE(file_util::DirectoryExists(root_path));
+ } else {
+ // External file system root path is virtual one and does not match
+ // anything from the actual file system.
+ EXPECT_EQ(kRootPath, root_path.value());
+ }
+ ASSERT_TRUE(returned_root_path.size() > i);
+ returned_root_path[i] = root_path;
+ }
+
+ // Get the root directory with create=false and see if we get the
+ // same directory.
+ for (size_t i = 0; i < ARRAYSIZE_UNSAFE(kRootPathTestCases); ++i) {
+ SCOPED_TRACE(testing::Message() << "RootPath (get) #" << i << " "
+ << kRootPathTestCases[i].expected_path);
+
+ base::FilePath root_path;
+ EXPECT_TRUE(GetRootPath(GURL(kRootPathTestCases[i].origin_url),
+ kRootPathTestCases[i].type,
+ false /* create */, &root_path));
+ ASSERT_TRUE(returned_root_path.size() > i);
+ EXPECT_EQ(returned_root_path[i].value(), root_path.value());
+ }
+}
+
+TEST_F(FileSystemMountPointProviderTest,
+ GetRootPathCreateAndExamineWithNewProvider) {
+ std::vector<base::FilePath> returned_root_path(
+ ARRAYSIZE_UNSAFE(kRootPathTestCases));
+ SetupNewContext(CreateAllowFileAccessOptions());
+
+ GURL origin_url("http://foo.com:1/");
+
+ base::FilePath root_path1;
+ EXPECT_TRUE(GetRootPath(origin_url,
+ kFileSystemTypeTemporary, true, &root_path1));
+
+ SetupNewContext(CreateDisallowFileAccessOptions());
+ base::FilePath root_path2;
+ EXPECT_TRUE(GetRootPath(origin_url,
+ kFileSystemTypeTemporary, false, &root_path2));
+
+ EXPECT_EQ(root_path1.value(), root_path2.value());
+}
+
+TEST_F(FileSystemMountPointProviderTest, GetRootPathGetWithoutCreate) {
+ SetupNewContext(CreateDisallowFileAccessOptions());
+
+ // Try to get a root directory without creating.
+ for (size_t i = 0; i < ARRAYSIZE_UNSAFE(kRootPathTestCases); ++i) {
+ SCOPED_TRACE(testing::Message() << "RootPath (create=false) #" << i << " "
+ << kRootPathTestCases[i].expected_path);
+ // External type does not check the directory existence.
+ if (kRootPathTestCases[i].type != kFileSystemTypeExternal) {
+ EXPECT_FALSE(GetRootPath(GURL(kRootPathTestCases[i].origin_url),
+ kRootPathTestCases[i].type,
+ false /* create */, NULL));
+ }
+ }
+}
+
+TEST_F(FileSystemMountPointProviderTest, GetRootPathInIncognito) {
+ SetupNewContext(CreateIncognitoFileSystemOptions());
+
+ // Try to get a root directory.
+ for (size_t i = 0; i < ARRAYSIZE_UNSAFE(kRootPathTestCases); ++i) {
+ SCOPED_TRACE(testing::Message() << "RootPath (incognito) #" << i << " "
+ << kRootPathTestCases[i].expected_path);
+ // External type does not change the behavior in incognito mode.
+ if (kRootPathTestCases[i].type != kFileSystemTypeExternal) {
+ EXPECT_FALSE(GetRootPath(GURL(kRootPathTestCases[i].origin_url),
+ kRootPathTestCases[i].type,
+ true /* create */, NULL));
+ }
+ }
+}
+
+TEST_F(FileSystemMountPointProviderTest, GetRootPathFileURI) {
+ SetupNewContext(CreateDisallowFileAccessOptions());
+ for (size_t i = 0; i < ARRAYSIZE_UNSAFE(kRootPathFileURITestCases); ++i) {
+ SCOPED_TRACE(testing::Message() << "RootPathFileURI (disallow) #"
+ << i << " " << kRootPathFileURITestCases[i].expected_path);
+ EXPECT_FALSE(GetRootPath(GURL(kRootPathFileURITestCases[i].origin_url),
+ kRootPathFileURITestCases[i].type,
+ true /* create */, NULL));
+ }
+}
+
+TEST_F(FileSystemMountPointProviderTest, GetRootPathFileURIWithAllowFlag) {
+ SetupNewContext(CreateAllowFileAccessOptions());
+ for (size_t i = 0; i < ARRAYSIZE_UNSAFE(kRootPathFileURITestCases); ++i) {
+ SCOPED_TRACE(testing::Message() << "RootPathFileURI (allow) #"
+ << i << " " << kRootPathFileURITestCases[i].expected_path);
+ base::FilePath root_path;
+ EXPECT_TRUE(GetRootPath(GURL(kRootPathFileURITestCases[i].origin_url),
+ kRootPathFileURITestCases[i].type,
+ true /* create */, &root_path));
+ base::FilePath expected = file_system_path().AppendASCII(
+ kRootPathFileURITestCases[i].expected_path);
+ EXPECT_EQ(expected.value(), root_path.value());
+ EXPECT_TRUE(file_util::DirectoryExists(root_path));
+ }
+}
+
+} // namespace fileapi
diff --git a/webkit/browser/fileapi/webkit_browser_fileapi.gypi b/webkit/browser/fileapi/webkit_browser_fileapi.gypi
new file mode 100644
index 0000000..714257f
--- /dev/null
+++ b/webkit/browser/fileapi/webkit_browser_fileapi.gypi
@@ -0,0 +1,11 @@
+# Copyright 2013 The Chromium Authors. All rights reserved.
+# Use of this source code is governed by a BSD-style license that can be
+# found in the LICENSE file.
+
+{
+ 'variables': {
+ 'webkit_browser_fileapi_sources': [
+ '../browser/fileapi/file_system_mount_point_provider.h',
+ ],
+ },
+}