Refactor management of overview window copy lifetime into a separate class.
[chromium-blink-merge.git] / content / renderer / pepper / pepper_file_io_host.cc
blobf505313c4302a87e12120925f0258b8bb6004cfe
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "content/renderer/pepper/pepper_file_io_host.h"
7 #include "base/bind.h"
8 #include "base/callback.h"
9 #include "base/callback_helpers.h"
10 #include "base/command_line.h"
11 #include "base/files/file_util_proxy.h"
12 #include "content/child/child_thread.h"
13 #include "content/child/fileapi/file_system_dispatcher.h"
14 #include "content/child/quota_dispatcher.h"
15 #include "content/common/fileapi/file_system_messages.h"
16 #include "content/common/view_messages.h"
17 #include "content/public/common/content_client.h"
18 #include "content/public/renderer/content_renderer_client.h"
19 #include "content/renderer/pepper/pepper_file_ref_renderer_host.h"
20 #include "content/renderer/pepper/quota_file_io.h"
21 #include "content/renderer/pepper/renderer_ppapi_host_impl.h"
22 #include "content/renderer/render_thread_impl.h"
23 #include "ppapi/c/pp_errors.h"
24 #include "ppapi/c/ppb_file_io.h"
25 #include "ppapi/host/dispatch_host_message.h"
26 #include "ppapi/host/ppapi_host.h"
27 #include "ppapi/proxy/ppapi_messages.h"
28 #include "ppapi/shared_impl/file_type_conversion.h"
29 #include "ppapi/shared_impl/time_conversion.h"
30 #include "ppapi/thunk/enter.h"
31 #include "third_party/WebKit/public/web/WebPluginContainer.h"
33 namespace content {
35 using ppapi::FileIOStateManager;
36 using ppapi::PPTimeToTime;
37 using ppapi::host::ReplyMessageContext;
38 using ppapi::thunk::EnterResourceNoLock;
40 namespace {
42 typedef base::Callback<void (base::PlatformFileError)> PlatformGeneralCallback;
44 int32_t ErrorOrByteNumber(int32_t pp_error, int32_t byte_number) {
45 // On the plugin side, some callbacks expect a parameter that means different
46 // things depending on whether is negative or not. We translate for those
47 // callbacks here.
48 return pp_error == PP_OK ? byte_number : pp_error;
51 class QuotaCallbackTranslator : public QuotaDispatcher::Callback {
52 public:
53 typedef QuotaFileIO::Delegate::AvailableSpaceCallback PluginCallback;
54 explicit QuotaCallbackTranslator(const PluginCallback& cb) : callback_(cb) {}
55 virtual void DidQueryStorageUsageAndQuota(int64 usage, int64 quota) OVERRIDE {
56 callback_.Run(std::max(static_cast<int64>(0), quota - usage));
58 virtual void DidGrantStorageQuota(int64 granted_quota) OVERRIDE {
59 NOTREACHED();
61 virtual void DidFail(quota::QuotaStatusCode error) OVERRIDE {
62 callback_.Run(0);
64 private:
65 PluginCallback callback_;
68 class QuotaFileIODelegate : public QuotaFileIO::Delegate {
69 public:
70 QuotaFileIODelegate() {}
71 virtual ~QuotaFileIODelegate() {}
73 virtual void QueryAvailableSpace(
74 const GURL& origin,
75 quota::StorageType type,
76 const AvailableSpaceCallback& callback) OVERRIDE {
77 ChildThread::current()->quota_dispatcher()->QueryStorageUsageAndQuota(
78 origin, type, new QuotaCallbackTranslator(callback));
80 virtual void WillUpdateFile(const GURL& file_path) OVERRIDE {
81 ChildThread::current()->Send(new FileSystemHostMsg_WillUpdate(file_path));
83 virtual void DidUpdateFile(const GURL& file_path, int64_t delta) OVERRIDE {
84 ChildThread::current()->Send(new FileSystemHostMsg_DidUpdate(
85 file_path, delta));
87 virtual scoped_refptr<base::MessageLoopProxy>
88 GetFileThreadMessageLoopProxy() OVERRIDE {
89 return RenderThreadImpl::current()->GetFileThreadMessageLoopProxy();
93 typedef base::Callback<
94 void (base::PlatformFileError error,
95 base::PassPlatformFile file,
96 quota::QuotaLimitType quota_policy,
97 const PepperFileIOHost::NotifyCloseFileCallback& close_file_callback)>
98 AsyncOpenFileSystemURLCallback;
100 void DoNotifyCloseFile(int file_open_id, base::PlatformFileError error) {
101 ChildThread::current()->file_system_dispatcher()->NotifyCloseFile(
102 file_open_id);
105 void DidOpenFileSystemURL(const AsyncOpenFileSystemURLCallback& callback,
106 base::PlatformFile file,
107 int file_open_id,
108 quota::QuotaLimitType quota_policy) {
109 callback.Run(base::PLATFORM_FILE_OK,
110 base::PassPlatformFile(&file),
111 quota_policy,
112 base::Bind(&DoNotifyCloseFile, file_open_id));
113 // Make sure we won't leak file handle if the requester has died.
114 if (file != base::kInvalidPlatformFileValue) {
115 base::FileUtilProxy::Close(
116 RenderThreadImpl::current()->GetFileThreadMessageLoopProxy().get(),
117 file,
118 base::Bind(&DoNotifyCloseFile, file_open_id));
122 void DidFailOpenFileSystemURL(const AsyncOpenFileSystemURLCallback& callback,
123 base::PlatformFileError error_code) {
124 base::PlatformFile invalid_file = base::kInvalidPlatformFileValue;
125 callback.Run(error_code,
126 base::PassPlatformFile(&invalid_file),
127 quota::kQuotaLimitTypeUnknown,
128 PepperFileIOHost::NotifyCloseFileCallback());
131 } // namespace
133 PepperFileIOHost::PepperFileIOHost(RendererPpapiHost* host,
134 PP_Instance instance,
135 PP_Resource resource)
136 : ResourceHost(host->GetPpapiHost(), instance, resource),
137 renderer_ppapi_host_(host),
138 file_(base::kInvalidPlatformFileValue),
139 file_system_type_(PP_FILESYSTEMTYPE_INVALID),
140 quota_policy_(quota::kQuotaLimitTypeUnknown),
141 open_flags_(0),
142 routing_id_(RenderThreadImpl::current()->GenerateRoutingID()),
143 weak_factory_(this) {
144 ChildThread::current()->AddRoute(routing_id_, this);
147 PepperFileIOHost::~PepperFileIOHost() {
148 OnHostMsgClose(NULL);
149 ChildThread::current()->RemoveRoute(routing_id_);
152 int32_t PepperFileIOHost::OnResourceMessageReceived(
153 const IPC::Message& msg,
154 ppapi::host::HostMessageContext* context) {
155 IPC_BEGIN_MESSAGE_MAP(PepperFileIOHost, msg)
156 PPAPI_DISPATCH_HOST_RESOURCE_CALL(PpapiHostMsg_FileIO_Open,
157 OnHostMsgOpen)
158 PPAPI_DISPATCH_HOST_RESOURCE_CALL(PpapiHostMsg_FileIO_Touch,
159 OnHostMsgTouch)
160 PPAPI_DISPATCH_HOST_RESOURCE_CALL(PpapiHostMsg_FileIO_Write,
161 OnHostMsgWrite)
162 PPAPI_DISPATCH_HOST_RESOURCE_CALL(PpapiHostMsg_FileIO_SetLength,
163 OnHostMsgSetLength)
164 PPAPI_DISPATCH_HOST_RESOURCE_CALL_0(PpapiHostMsg_FileIO_Flush,
165 OnHostMsgFlush)
166 PPAPI_DISPATCH_HOST_RESOURCE_CALL_0(PpapiHostMsg_FileIO_Close,
167 OnHostMsgClose)
168 PPAPI_DISPATCH_HOST_RESOURCE_CALL_0(PpapiHostMsg_FileIO_RequestOSFileHandle,
169 OnHostMsgRequestOSFileHandle)
170 IPC_END_MESSAGE_MAP()
171 return PP_ERROR_FAILED;
174 bool PepperFileIOHost::OnMessageReceived(const IPC::Message& msg) {
175 bool handled = true;
176 IPC_BEGIN_MESSAGE_MAP(PepperFileIOHost, msg)
177 IPC_MESSAGE_HANDLER(ViewMsg_AsyncOpenPepperFile_ACK, OnAsyncFileOpened)
178 IPC_MESSAGE_UNHANDLED(handled = false)
179 IPC_END_MESSAGE_MAP()
180 return handled;
183 void PepperFileIOHost::OnAsyncFileOpened(
184 base::PlatformFileError error_code,
185 IPC::PlatformFileForTransit file_for_transit) {
186 DCHECK(!pending_open_callback_.is_null());
187 base::PlatformFile file =
188 IPC::PlatformFileForTransitToPlatformFile(file_for_transit);
189 if (!pending_open_callback_.is_null())
190 pending_open_callback_.Run(error_code, base::PassPlatformFile(&file));
192 // Make sure we won't leak file handle if the requester has died.
193 if (file != base::kInvalidPlatformFileValue) {
194 base::FileUtilProxy::Close(
195 RenderThreadImpl::current()->GetFileThreadMessageLoopProxy().get(),
196 file,
197 base::FileUtilProxy::StatusCallback());
199 pending_open_callback_.Reset();
202 int32_t PepperFileIOHost::OnHostMsgOpen(
203 ppapi::host::HostMessageContext* context,
204 PP_Resource file_ref_resource,
205 int32_t open_flags) {
206 int32_t rv = state_manager_.CheckOperationState(
207 FileIOStateManager::OPERATION_EXCLUSIVE, false);
208 if (rv != PP_OK)
209 return rv;
211 if (!ppapi::PepperFileOpenFlagsToPlatformFileFlags(open_flags, NULL))
212 return PP_ERROR_BADARGUMENT;
214 ppapi::host::ResourceHost* resource_host =
215 renderer_ppapi_host_->GetPpapiHost()->GetResourceHost(file_ref_resource);
216 if (!resource_host || !resource_host->IsFileRefHost())
217 return PP_ERROR_BADRESOURCE;
219 PepperFileRefRendererHost* file_ref_host =
220 static_cast<PepperFileRefRendererHost*>(resource_host);
221 if (file_ref_host->GetFileSystemType() == PP_FILESYSTEMTYPE_INVALID)
222 return PP_ERROR_FAILED;
224 open_flags_ = open_flags;
225 file_system_type_ = file_ref_host->GetFileSystemType();
227 if (file_system_type_ != PP_FILESYSTEMTYPE_EXTERNAL) {
228 file_system_url_ = file_ref_host->GetFileSystemURL();
229 FileSystemDispatcher* file_system_dispatcher =
230 ChildThread::current()->file_system_dispatcher();
232 AsyncOpenFileSystemURLCallback callback = base::Bind(
233 &PepperFileIOHost::ExecutePlatformOpenFileSystemURLCallback,
234 weak_factory_.GetWeakPtr(),
235 context->MakeReplyMessageContext());
236 file_system_dispatcher->OpenPepperFile(
237 file_system_url_, open_flags,
238 base::Bind(&DidOpenFileSystemURL, callback),
239 base::Bind(&DidFailOpenFileSystemURL, callback));
240 } else {
241 pending_open_callback_ =
242 base::Bind(&PepperFileIOHost::ExecutePlatformOpenFileCallback,
243 weak_factory_.GetWeakPtr(),
244 context->MakeReplyMessageContext());
245 RenderThreadImpl::current()->Send(new ViewHostMsg_AsyncOpenPepperFile(
246 routing_id_,
247 file_ref_host->GetExternalFilePath(),
248 open_flags_));
250 state_manager_.SetPendingOperation(FileIOStateManager::OPERATION_EXCLUSIVE);
251 return PP_OK_COMPLETIONPENDING;
254 int32_t PepperFileIOHost::OnHostMsgTouch(
255 ppapi::host::HostMessageContext* context,
256 PP_Time last_access_time,
257 PP_Time last_modified_time) {
258 int32_t rv = state_manager_.CheckOperationState(
259 FileIOStateManager::OPERATION_EXCLUSIVE, true);
260 if (rv != PP_OK)
261 return rv;
263 if (file_system_type_ != PP_FILESYSTEMTYPE_EXTERNAL) {
264 FileSystemDispatcher* file_system_dispatcher =
265 ChildThread::current()->file_system_dispatcher();
266 file_system_dispatcher->TouchFile(
267 file_system_url_,
268 PPTimeToTime(last_access_time),
269 PPTimeToTime(last_modified_time),
270 base::Bind(&PepperFileIOHost::ExecutePlatformGeneralCallback,
271 weak_factory_.GetWeakPtr(),
272 context->MakeReplyMessageContext()));
273 state_manager_.SetPendingOperation(FileIOStateManager::OPERATION_EXCLUSIVE);
274 return PP_OK_COMPLETIONPENDING;
277 // TODO(nhiroki): fix a failure of FileIO.Touch for an external filesystem on
278 // Mac and Linux due to sandbox restrictions (http://crbug.com/101128).
279 if (!base::FileUtilProxy::Touch(
280 RenderThreadImpl::current()->GetFileThreadMessageLoopProxy().get(),
281 file_,
282 PPTimeToTime(last_access_time),
283 PPTimeToTime(last_modified_time),
284 base::Bind(&PepperFileIOHost::ExecutePlatformGeneralCallback,
285 weak_factory_.GetWeakPtr(),
286 context->MakeReplyMessageContext())))
287 return PP_ERROR_FAILED;
289 state_manager_.SetPendingOperation(FileIOStateManager::OPERATION_EXCLUSIVE);
290 return PP_OK_COMPLETIONPENDING;
293 int32_t PepperFileIOHost::OnHostMsgWrite(
294 ppapi::host::HostMessageContext* context,
295 int64_t offset,
296 const std::string& buffer) {
297 int32_t rv = state_manager_.CheckOperationState(
298 FileIOStateManager::OPERATION_WRITE, true);
299 if (rv != PP_OK)
300 return rv;
302 if (quota_file_io_) {
303 if (!quota_file_io_->Write(
304 offset, buffer.c_str(), buffer.size(),
305 base::Bind(&PepperFileIOHost::ExecutePlatformWriteCallback,
306 weak_factory_.GetWeakPtr(),
307 context->MakeReplyMessageContext())))
308 return PP_ERROR_FAILED;
309 } else {
310 if (!base::FileUtilProxy::Write(
311 RenderThreadImpl::current()->GetFileThreadMessageLoopProxy().get(),
312 file_,
313 offset,
314 buffer.c_str(),
315 buffer.size(),
316 base::Bind(&PepperFileIOHost::ExecutePlatformWriteCallback,
317 weak_factory_.GetWeakPtr(),
318 context->MakeReplyMessageContext())))
319 return PP_ERROR_FAILED;
322 state_manager_.SetPendingOperation(FileIOStateManager::OPERATION_WRITE);
323 return PP_OK_COMPLETIONPENDING;
326 int32_t PepperFileIOHost::OnHostMsgSetLength(
327 ppapi::host::HostMessageContext* context,
328 int64_t length) {
329 int32_t rv = state_manager_.CheckOperationState(
330 FileIOStateManager::OPERATION_EXCLUSIVE, true);
331 if (rv != PP_OK)
332 return rv;
334 if (file_system_type_ != PP_FILESYSTEMTYPE_EXTERNAL) {
335 FileSystemDispatcher* file_system_dispatcher =
336 ChildThread::current()->file_system_dispatcher();
337 file_system_dispatcher->Truncate(
338 file_system_url_, length, NULL,
339 base::Bind(&PepperFileIOHost::ExecutePlatformGeneralCallback,
340 weak_factory_.GetWeakPtr(),
341 context->MakeReplyMessageContext()));
342 } else {
343 // TODO(nhiroki): fix a failure of FileIO.SetLength for an external
344 // filesystem on Mac due to sandbox restrictions (http://crbug.com/156077).
345 if (!base::FileUtilProxy::Truncate(
346 RenderThreadImpl::current()->GetFileThreadMessageLoopProxy().get(),
347 file_,
348 length,
349 base::Bind(&PepperFileIOHost::ExecutePlatformGeneralCallback,
350 weak_factory_.GetWeakPtr(),
351 context->MakeReplyMessageContext())))
352 return PP_ERROR_FAILED;
355 state_manager_.SetPendingOperation(FileIOStateManager::OPERATION_EXCLUSIVE);
356 return PP_OK_COMPLETIONPENDING;
359 int32_t PepperFileIOHost::OnHostMsgFlush(
360 ppapi::host::HostMessageContext* context) {
361 int32_t rv = state_manager_.CheckOperationState(
362 FileIOStateManager::OPERATION_EXCLUSIVE, true);
363 if (rv != PP_OK)
364 return rv;
366 if (!base::FileUtilProxy::Flush(
367 RenderThreadImpl::current()->GetFileThreadMessageLoopProxy().get(),
368 file_,
369 base::Bind(&PepperFileIOHost::ExecutePlatformGeneralCallback,
370 weak_factory_.GetWeakPtr(),
371 context->MakeReplyMessageContext())))
372 return PP_ERROR_FAILED;
374 state_manager_.SetPendingOperation(FileIOStateManager::OPERATION_EXCLUSIVE);
375 return PP_OK_COMPLETIONPENDING;
378 int32_t PepperFileIOHost::OnHostMsgClose(
379 ppapi::host::HostMessageContext* context) {
380 if (file_ != base::kInvalidPlatformFileValue) {
381 base::FileUtilProxy::Close(
382 RenderThreadImpl::current()->GetFileThreadMessageLoopProxy().get(),
383 file_,
384 base::ResetAndReturn(&notify_close_file_callback_));
385 file_ = base::kInvalidPlatformFileValue;
386 quota_file_io_.reset();
388 return PP_OK;
391 int32_t PepperFileIOHost::OnHostMsgRequestOSFileHandle(
392 ppapi::host::HostMessageContext* context) {
393 if (open_flags_ != PP_FILEOPENFLAG_READ &&
394 quota_policy_ != quota::kQuotaLimitTypeUnlimited)
395 return PP_ERROR_FAILED;
397 // Whitelist to make it privately accessible.
398 if (!host()->permissions().HasPermission(ppapi::PERMISSION_PRIVATE) &&
399 !GetContentClient()->renderer()->IsPluginAllowedToCallRequestOSFileHandle(
400 renderer_ppapi_host_->GetContainerForInstance(pp_instance())))
401 return PP_ERROR_NOACCESS;
403 IPC::PlatformFileForTransit file =
404 renderer_ppapi_host_->ShareHandleWithRemote(file_, false);
405 if (file == IPC::InvalidPlatformFileForTransit())
406 return PP_ERROR_FAILED;
407 ppapi::host::ReplyMessageContext reply_context =
408 context->MakeReplyMessageContext();
409 ppapi::proxy::SerializedHandle file_handle;
410 file_handle.set_file_handle(file, open_flags_);
411 reply_context.params.AppendHandle(file_handle);
412 host()->SendReply(reply_context,
413 PpapiPluginMsg_FileIO_RequestOSFileHandleReply());
414 return PP_OK_COMPLETIONPENDING;
417 void PepperFileIOHost::ExecutePlatformGeneralCallback(
418 ppapi::host::ReplyMessageContext reply_context,
419 base::PlatformFileError error_code) {
420 reply_context.params.set_result(
421 ppapi::PlatformFileErrorToPepperError(error_code));
422 host()->SendReply(reply_context, PpapiPluginMsg_FileIO_GeneralReply());
423 state_manager_.SetOperationFinished();
426 void PepperFileIOHost::ExecutePlatformOpenFileCallback(
427 ppapi::host::ReplyMessageContext reply_context,
428 base::PlatformFileError error_code,
429 base::PassPlatformFile file) {
430 int32_t pp_error = ppapi::PlatformFileErrorToPepperError(error_code);
431 if (pp_error == PP_OK)
432 state_manager_.SetOpenSucceed();
434 DCHECK(file_ == base::kInvalidPlatformFileValue);
435 file_ = file.ReleaseValue();
437 DCHECK(!quota_file_io_.get());
438 if (file_ != base::kInvalidPlatformFileValue) {
439 if (file_system_type_ == PP_FILESYSTEMTYPE_LOCALTEMPORARY ||
440 file_system_type_ == PP_FILESYSTEMTYPE_LOCALPERSISTENT) {
441 quota_file_io_.reset(new QuotaFileIO(
442 new QuotaFileIODelegate, file_, file_system_url_, file_system_type_));
445 IPC::PlatformFileForTransit file_for_transit =
446 renderer_ppapi_host_->ShareHandleWithRemote(file_, false);
447 if (!(file_for_transit == IPC::InvalidPlatformFileForTransit())) {
448 // Send the file descriptor to the plugin process. This is used in the
449 // plugin for any file operations that can be done there.
450 int32_t flags_to_send = open_flags_;
451 if (!host()->permissions().HasPermission(ppapi::PERMISSION_DEV)) {
452 // IMPORTANT: Clear PP_FILEOPENFLAG_WRITE and PP_FILEOPENFLAG_APPEND so
453 // the plugin can't write and so bypass our quota checks.
454 flags_to_send =
455 open_flags_ & ~(PP_FILEOPENFLAG_WRITE | PP_FILEOPENFLAG_APPEND);
457 ppapi::proxy::SerializedHandle file_handle;
458 file_handle.set_file_handle(file_for_transit, flags_to_send);
459 reply_context.params.AppendHandle(file_handle);
463 reply_context.params.set_result(pp_error);
464 host()->SendReply(reply_context, PpapiPluginMsg_FileIO_OpenReply());
465 state_manager_.SetOperationFinished();
468 void PepperFileIOHost::ExecutePlatformOpenFileSystemURLCallback(
469 ppapi::host::ReplyMessageContext reply_context,
470 base::PlatformFileError error_code,
471 base::PassPlatformFile file,
472 quota::QuotaLimitType quota_policy,
473 const PepperFileIOHost::NotifyCloseFileCallback& callback) {
474 if (error_code == base::PLATFORM_FILE_OK)
475 notify_close_file_callback_ = callback;
476 quota_policy_ = quota_policy;
477 ExecutePlatformOpenFileCallback(reply_context, error_code, file);
480 void PepperFileIOHost::ExecutePlatformWriteCallback(
481 ppapi::host::ReplyMessageContext reply_context,
482 base::PlatformFileError error_code,
483 int bytes_written) {
484 // On the plugin side, the callback expects a parameter with different meaning
485 // depends on whether is negative or not. It is the result here. We translate
486 // for the callback.
487 int32_t pp_error = ppapi::PlatformFileErrorToPepperError(error_code);
488 reply_context.params.set_result(ErrorOrByteNumber(pp_error, bytes_written));
489 host()->SendReply(reply_context, PpapiPluginMsg_FileIO_GeneralReply());
490 state_manager_.SetOperationFinished();
493 } // namespace content