summaryrefslogtreecommitdiffstats
path: root/webkit/chromeos/fileapi/cros_mount_point_provider.cc
blob: 159dc3b7fafdf82f8ad9557b67ad44541727cf30 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
  // Copyright (c) 2011 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.

#include "webkit/chromeos/fileapi/cros_mount_point_provider.h"

#include "base/logging.h"
#include "base/memory/scoped_callback_factory.h"
#include "base/memory/scoped_ptr.h"
#include "base/message_loop.h"
#include "base/message_loop_proxy.h"
#include "base/stringprintf.h"
#include "base/utf_string_conversions.h"
#include "third_party/WebKit/Source/WebKit/chromium/public/WebCString.h"
#include "third_party/WebKit/Source/WebKit/chromium/public/WebFileSystem.h"
#include "third_party/WebKit/Source/WebKit/chromium/public/WebSecurityOrigin.h"
#include "webkit/fileapi/file_system_path_manager.h"
#include "webkit/glue/webkit_glue.h"

namespace chromeos {

const char CrosMountPointProvider::kLocalName[] = "Local";
const char CrosMountPointProvider::kLocalDirName[] = "/local/";

typedef struct {
  const char* local_root_path;
  const char* web_root_path;
} FixedExposedPaths;

// Top level file system elements exposed in FileAPI in ChromeOS:
FixedExposedPaths fixed_exposed_paths[] = {
    {"/home/chronos/user/", "Downloads"},
    {"/",                   "media"},
    {"/",                   "tmp"},
};

CrosMountPointProvider::CrosMountPointProvider(
    scoped_refptr<quota::SpecialStoragePolicy> special_storage_policy)
    : local_dir_name_(kLocalName),
      special_storage_policy_(special_storage_policy) {

  // TODO(zelidrag): There's got to be a better way to generate UUID.
  srand(time(NULL));
  std::string virtual_root;
  virtual_root.append(base::StringPrintf("%hx%hx-%hx-%hx-%hx-%hx%hx%hx",
      static_cast<unsigned short>(rand()), static_cast<unsigned short>(rand()),
      static_cast<unsigned short>(rand()),
      static_cast<unsigned short>(rand()),
      static_cast<unsigned short>(rand()),
      static_cast<unsigned short>(rand()), static_cast<unsigned short>(rand()),
          static_cast<unsigned short>(rand())));

  // Create virtual root node.
  virtual_root_path_ = FilePath(virtual_root);
  base_path_ = virtual_root_path_.Append(local_dir_name_);

  for (size_t i = 0; i < arraysize(fixed_exposed_paths); i++) {
    mount_point_map_.insert(std::pair<std::string, std::string>(
        std::string(fixed_exposed_paths[i].web_root_path),
        std::string(fixed_exposed_paths[i].local_root_path)));
  }
}

CrosMountPointProvider::~CrosMountPointProvider() {
}

// TODO(zelidrag) share with SandboxMountPointProvider impl.
std::string GetOriginIdentifierFromURL(
    const GURL& url) {
  WebKit::WebSecurityOrigin web_security_origin =
      WebKit::WebSecurityOrigin::createFromString(UTF8ToUTF16(url.spec()));
  return web_security_origin.databaseIdentifier().utf8();
}

void CrosMountPointProvider::GetFileSystemRootPath(
    const GURL& origin_url,
    fileapi::FileSystemType type,
    bool create,
    fileapi::FileSystemPathManager::GetRootPathCallback* callback_ptr) {
  DCHECK(type == fileapi::kFileSystemTypeLocal);

  std::string name(GetOriginIdentifierFromURL(origin_url));
  name += ':';
  name += CrosMountPointProvider::kLocalName;

  FilePath root_path = FilePath(CrosMountPointProvider::kLocalDirName);
  callback_ptr->Run(!root_path.empty(), root_path, name);
}

// Like GetFileSystemRootPath, but synchronous, and can be called only while
// running on the file thread.
FilePath CrosMountPointProvider::GetFileSystemRootPathOnFileThread(
    const GURL& origin_url,
    fileapi::FileSystemType type,
    const FilePath& virtual_path,
    bool create) {
  DCHECK(type == fileapi::kFileSystemTypeLocal);

  std::vector<FilePath::StringType> components;
  virtual_path.GetComponents(&components);
  if (components.size() < 1) {
    return FilePath();
  }

  // Check if this root directory is exposed by this provider.
  MountPointMap::iterator iter = mount_point_map_.find(components[0]);
  if (iter == mount_point_map_.end()) {
    return FilePath();
  }

  return FilePath(iter->second);
}

// TODO(zelidrag): Share this code with SandboxMountPointProvider impl.
bool CrosMountPointProvider::IsRestrictedFileName(const FilePath& path) const {
  return false;
}

bool CrosMountPointProvider::IsAccessAllowed(const GURL& origin_url) {
  return special_storage_policy_->IsLocalFileSystemAccessAllowed(origin_url);
}

}  // namespace chromeos