1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
|
// Copyright (c) 2011 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "webkit/fileapi/file_system_context.h"
#include "base/file_util.h"
#include "base/message_loop_proxy.h"
#include "googleurl/src/gurl.h"
#include "webkit/fileapi/file_system_path_manager.h"
#include "webkit/fileapi/file_system_util.h"
#include "webkit/fileapi/sandbox_mount_point_provider.h"
#include "webkit/fileapi/file_system_quota_client.h"
#include "webkit/quota/quota_manager.h"
using quota::QuotaClient;
namespace fileapi {
namespace {
QuotaClient* CreateQuotaClient(
scoped_refptr<base::MessageLoopProxy> file_message_loop,
FileSystemContext* context,
bool is_incognito) {
return new FileSystemQuotaClient(file_message_loop, context, is_incognito);
}
} // anonymous namespace
FileSystemContext::FileSystemContext(
scoped_refptr<base::MessageLoopProxy> file_message_loop,
scoped_refptr<base::MessageLoopProxy> io_message_loop,
scoped_refptr<quota::SpecialStoragePolicy> special_storage_policy,
quota::QuotaManagerProxy* quota_manager_proxy,
const FilePath& profile_path,
bool is_incognito,
bool allow_file_access,
bool unlimited_quota,
FileSystemPathManager* path_manager)
: file_message_loop_(file_message_loop),
io_message_loop_(io_message_loop),
special_storage_policy_(special_storage_policy),
quota_manager_proxy_(quota_manager_proxy),
allow_file_access_from_files_(allow_file_access),
unlimited_quota_(unlimited_quota),
path_manager_(path_manager) {
if (!path_manager) {
path_manager_.reset(new FileSystemPathManager(
file_message_loop, profile_path, special_storage_policy,
is_incognito, allow_file_access));
}
if (quota_manager_proxy) {
quota_manager_proxy->RegisterClient(CreateQuotaClient(
file_message_loop, this, is_incognito));
}
}
FileSystemContext::~FileSystemContext() {
}
bool FileSystemContext::IsStorageUnlimited(const GURL& origin) {
// If allow-file-access-from-files flag is explicitly given and the scheme
// is file, or if unlimited quota for this process was explicitly requested,
// return true.
return unlimited_quota_ ||
(allow_file_access_from_files_ && origin.SchemeIsFile()) ||
(special_storage_policy_.get() &&
special_storage_policy_->IsStorageUnlimited(origin));
}
bool FileSystemContext::DeleteDataForOriginOnFileThread(
const GURL& origin_url) {
DCHECK(file_message_loop_->BelongsToCurrentThread());
DCHECK(sandbox_provider());
// Delete temporary and persistent data.
sandbox_provider()->DeleteOriginDataOnFileThread(
quota_manager_proxy(), origin_url, kFileSystemTypeTemporary);
sandbox_provider()->DeleteOriginDataOnFileThread(
quota_manager_proxy(), origin_url, kFileSystemTypePersistent);
// Delete the upper level directory.
FilePath path_for_origin =
sandbox_provider()->GetBaseDirectoryForOrigin(origin_url);
if (!file_util::PathExists(path_for_origin))
return true;
return file_util::Delete(path_for_origin, true /* recursive */);
}
bool FileSystemContext::DeleteDataForOriginAndTypeOnFileThread(
const GURL& origin_url, FileSystemType type) {
DCHECK(file_message_loop_->BelongsToCurrentThread());
if (type == fileapi::kFileSystemTypeTemporary ||
type == fileapi::kFileSystemTypePersistent) {
DCHECK(sandbox_provider());
return sandbox_provider()->DeleteOriginDataOnFileThread(
quota_manager_proxy(), origin_url, type);
}
return false;
}
FileSystemQuotaUtil*
FileSystemContext::GetQuotaUtil(FileSystemType type) const {
if (type == fileapi::kFileSystemTypeTemporary ||
type == fileapi::kFileSystemTypePersistent) {
DCHECK(sandbox_provider());
return sandbox_provider()->quota_util();
}
return NULL;
}
void FileSystemContext::DeleteOnCorrectThread() const {
if (!io_message_loop_->BelongsToCurrentThread()) {
io_message_loop_->DeleteSoon(FROM_HERE, this);
return;
}
delete this;
}
SandboxMountPointProvider* FileSystemContext::sandbox_provider() const {
return path_manager_->sandbox_provider();
}
} // namespace fileapi
|