Upstream version 10.38.222.0
[platform/framework/web/crosswalk.git] / src / webkit / browser / fileapi / obfuscated_file_util.cc
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include "webkit/browser/fileapi/obfuscated_file_util.h"
6
7 #include <queue>
8 #include <string>
9 #include <vector>
10
11 #include "base/file_util.h"
12 #include "base/format_macros.h"
13 #include "base/logging.h"
14 #include "base/message_loop/message_loop.h"
15 #include "base/metrics/histogram.h"
16 #include "base/stl_util.h"
17 #include "base/strings/string_number_conversions.h"
18 #include "base/strings/stringprintf.h"
19 #include "base/strings/sys_string_conversions.h"
20 #include "base/strings/utf_string_conversions.h"
21 #include "base/time/time.h"
22 #include "url/gurl.h"
23 #include "webkit/browser/fileapi/file_observers.h"
24 #include "webkit/browser/fileapi/file_system_context.h"
25 #include "webkit/browser/fileapi/file_system_operation_context.h"
26 #include "webkit/browser/fileapi/file_system_url.h"
27 #include "webkit/browser/fileapi/native_file_util.h"
28 #include "webkit/browser/fileapi/sandbox_file_system_backend.h"
29 #include "webkit/browser/fileapi/sandbox_isolated_origin_database.h"
30 #include "webkit/browser/fileapi/sandbox_origin_database.h"
31 #include "webkit/browser/fileapi/sandbox_prioritized_origin_database.h"
32 #include "webkit/browser/fileapi/timed_task_helper.h"
33 #include "webkit/browser/quota/quota_manager.h"
34 #include "webkit/common/database/database_identifier.h"
35 #include "webkit/common/fileapi/file_system_util.h"
36
37 // Example of various paths:
38 //   void ObfuscatedFileUtil::DoSomething(const FileSystemURL& url) {
39 //     base::FilePath virtual_path = url.path();
40 //     base::FilePath local_path = GetLocalFilePath(url);
41 //
42 //     NativeFileUtil::DoSomething(local_path);
43 //     file_util::DoAnother(local_path);
44 //  }
45
46 namespace fileapi {
47
48 namespace {
49
50 typedef SandboxDirectoryDatabase::FileId FileId;
51 typedef SandboxDirectoryDatabase::FileInfo FileInfo;
52
53 void InitFileInfo(
54     SandboxDirectoryDatabase::FileInfo* file_info,
55     SandboxDirectoryDatabase::FileId parent_id,
56     const base::FilePath::StringType& file_name) {
57   DCHECK(file_info);
58   file_info->parent_id = parent_id;
59   file_info->name = file_name;
60 }
61
62 // Costs computed as per crbug.com/86114, based on the LevelDB implementation of
63 // path storage under Linux.  It's not clear if that will differ on Windows, on
64 // which base::FilePath uses wide chars [since they're converted to UTF-8 for
65 // storage anyway], but as long as the cost is high enough that one can't cheat
66 // on quota by storing data in paths, it doesn't need to be all that accurate.
67 const int64 kPathCreationQuotaCost = 146;  // Bytes per inode, basically.
68 const int64 kPathByteQuotaCost = 2;  // Bytes per byte of path length in UTF-8.
69
70 int64 UsageForPath(size_t length) {
71   return kPathCreationQuotaCost +
72       static_cast<int64>(length) * kPathByteQuotaCost;
73 }
74
75 bool AllocateQuota(FileSystemOperationContext* context, int64 growth) {
76   if (context->allowed_bytes_growth() == quota::QuotaManager::kNoLimit)
77     return true;
78
79   int64 new_quota = context->allowed_bytes_growth() - growth;
80   if (growth > 0 && new_quota < 0)
81     return false;
82   context->set_allowed_bytes_growth(new_quota);
83   return true;
84 }
85
86 void UpdateUsage(
87     FileSystemOperationContext* context,
88     const FileSystemURL& url,
89     int64 growth) {
90   context->update_observers()->Notify(
91       &FileUpdateObserver::OnUpdate, MakeTuple(url, growth));
92 }
93
94 void TouchDirectory(SandboxDirectoryDatabase* db, FileId dir_id) {
95   DCHECK(db);
96   if (!db->UpdateModificationTime(dir_id, base::Time::Now()))
97     NOTREACHED();
98 }
99
100 enum IsolatedOriginStatus {
101   kIsolatedOriginMatch,
102   kIsolatedOriginDontMatch,
103   kIsolatedOriginStatusMax,
104 };
105
106 }  // namespace
107
108 class ObfuscatedFileEnumerator
109     : public FileSystemFileUtil::AbstractFileEnumerator {
110  public:
111   ObfuscatedFileEnumerator(
112       SandboxDirectoryDatabase* db,
113       FileSystemOperationContext* context,
114       ObfuscatedFileUtil* obfuscated_file_util,
115       const FileSystemURL& root_url,
116       bool recursive)
117       : db_(db),
118         context_(context),
119         obfuscated_file_util_(obfuscated_file_util),
120         root_url_(root_url),
121         recursive_(recursive),
122         current_file_id_(0) {
123     base::FilePath root_virtual_path = root_url.path();
124     FileId file_id;
125
126     if (!db_->GetFileWithPath(root_virtual_path, &file_id))
127       return;
128
129     FileRecord record = { file_id, root_virtual_path };
130     recurse_queue_.push(record);
131   }
132
133   virtual ~ObfuscatedFileEnumerator() {}
134
135   virtual base::FilePath Next() OVERRIDE {
136     ProcessRecurseQueue();
137     if (display_stack_.empty())
138       return base::FilePath();
139
140     current_file_id_ = display_stack_.back();
141     display_stack_.pop_back();
142
143     FileInfo file_info;
144     base::FilePath platform_file_path;
145     base::File::Error error =
146         obfuscated_file_util_->GetFileInfoInternal(
147             db_, context_, root_url_, current_file_id_,
148             &file_info, &current_platform_file_info_, &platform_file_path);
149     if (error != base::File::FILE_OK)
150       return Next();
151
152     base::FilePath virtual_path =
153         current_parent_virtual_path_.Append(file_info.name);
154     if (recursive_ && file_info.is_directory()) {
155       FileRecord record = { current_file_id_, virtual_path };
156       recurse_queue_.push(record);
157     }
158     return virtual_path;
159   }
160
161   virtual int64 Size() OVERRIDE {
162     return current_platform_file_info_.size;
163   }
164
165   virtual base::Time LastModifiedTime() OVERRIDE {
166     return current_platform_file_info_.last_modified;
167   }
168
169   virtual bool IsDirectory() OVERRIDE {
170     return current_platform_file_info_.is_directory;
171   }
172
173  private:
174   typedef SandboxDirectoryDatabase::FileId FileId;
175   typedef SandboxDirectoryDatabase::FileInfo FileInfo;
176
177   struct FileRecord {
178     FileId file_id;
179     base::FilePath virtual_path;
180   };
181
182   void ProcessRecurseQueue() {
183     while (display_stack_.empty() && !recurse_queue_.empty()) {
184       FileRecord entry = recurse_queue_.front();
185       recurse_queue_.pop();
186       if (!db_->ListChildren(entry.file_id, &display_stack_)) {
187         display_stack_.clear();
188         return;
189       }
190       current_parent_virtual_path_ = entry.virtual_path;
191     }
192   }
193
194   SandboxDirectoryDatabase* db_;
195   FileSystemOperationContext* context_;
196   ObfuscatedFileUtil* obfuscated_file_util_;
197   FileSystemURL root_url_;
198   bool recursive_;
199
200   std::queue<FileRecord> recurse_queue_;
201   std::vector<FileId> display_stack_;
202   base::FilePath current_parent_virtual_path_;
203
204   FileId current_file_id_;
205   base::File::Info current_platform_file_info_;
206 };
207
208 class ObfuscatedOriginEnumerator
209     : public ObfuscatedFileUtil::AbstractOriginEnumerator {
210  public:
211   typedef SandboxOriginDatabase::OriginRecord OriginRecord;
212   ObfuscatedOriginEnumerator(
213       SandboxOriginDatabaseInterface* origin_database,
214       const base::FilePath& base_file_path)
215       : base_file_path_(base_file_path) {
216     if (origin_database)
217       origin_database->ListAllOrigins(&origins_);
218   }
219
220   virtual ~ObfuscatedOriginEnumerator() {}
221
222   // Returns the next origin.  Returns empty if there are no more origins.
223   virtual GURL Next() OVERRIDE {
224     OriginRecord record;
225     if (!origins_.empty()) {
226       record = origins_.back();
227       origins_.pop_back();
228     }
229     current_ = record;
230     return webkit_database::GetOriginFromIdentifier(record.origin);
231   }
232
233   // Returns the current origin's information.
234   virtual bool HasTypeDirectory(const std::string& type_string) const OVERRIDE {
235     if (current_.path.empty())
236       return false;
237     if (type_string.empty()) {
238       NOTREACHED();
239       return false;
240     }
241     base::FilePath path =
242         base_file_path_.Append(current_.path).AppendASCII(type_string);
243     return base::DirectoryExists(path);
244   }
245
246  private:
247   std::vector<OriginRecord> origins_;
248   OriginRecord current_;
249   base::FilePath base_file_path_;
250 };
251
252 ObfuscatedFileUtil::ObfuscatedFileUtil(
253     quota::SpecialStoragePolicy* special_storage_policy,
254     const base::FilePath& file_system_directory,
255     leveldb::Env* env_override,
256     base::SequencedTaskRunner* file_task_runner,
257     const GetTypeStringForURLCallback& get_type_string_for_url,
258     const std::set<std::string>& known_type_strings,
259     SandboxFileSystemBackendDelegate* sandbox_delegate)
260     : special_storage_policy_(special_storage_policy),
261       file_system_directory_(file_system_directory),
262       env_override_(env_override),
263       db_flush_delay_seconds_(10 * 60),  // 10 mins.
264       file_task_runner_(file_task_runner),
265       get_type_string_for_url_(get_type_string_for_url),
266       known_type_strings_(known_type_strings),
267       sandbox_delegate_(sandbox_delegate) {
268 }
269
270 ObfuscatedFileUtil::~ObfuscatedFileUtil() {
271   DropDatabases();
272 }
273
274 base::File ObfuscatedFileUtil::CreateOrOpen(
275     FileSystemOperationContext* context,
276     const FileSystemURL& url, int file_flags) {
277   base::File file = CreateOrOpenInternal(context, url, file_flags);
278   if (file.IsValid() && file_flags & base::File::FLAG_WRITE &&
279       context->quota_limit_type() == quota::kQuotaLimitTypeUnlimited &&
280       sandbox_delegate_) {
281     sandbox_delegate_->StickyInvalidateUsageCache(url.origin(), url.type());
282   }
283   return file.Pass();
284 }
285
286 base::File::Error ObfuscatedFileUtil::EnsureFileExists(
287     FileSystemOperationContext* context,
288     const FileSystemURL& url,
289     bool* created) {
290   SandboxDirectoryDatabase* db = GetDirectoryDatabase(url, true);
291   if (!db)
292     return base::File::FILE_ERROR_FAILED;
293
294   FileId file_id;
295   if (db->GetFileWithPath(url.path(), &file_id)) {
296     FileInfo file_info;
297     if (!db->GetFileInfo(file_id, &file_info)) {
298       NOTREACHED();
299       return base::File::FILE_ERROR_FAILED;
300     }
301     if (file_info.is_directory())
302       return base::File::FILE_ERROR_NOT_A_FILE;
303     if (created)
304       *created = false;
305     return base::File::FILE_OK;
306   }
307   FileId parent_id;
308   if (!db->GetFileWithPath(VirtualPath::DirName(url.path()), &parent_id))
309     return base::File::FILE_ERROR_NOT_FOUND;
310
311   FileInfo file_info;
312   InitFileInfo(&file_info, parent_id,
313                VirtualPath::BaseName(url.path()).value());
314
315   int64 growth = UsageForPath(file_info.name.size());
316   if (!AllocateQuota(context, growth))
317     return base::File::FILE_ERROR_NO_SPACE;
318   base::File::Error error = CreateFile(context, base::FilePath(), url,
319                                        &file_info);
320   if (created && base::File::FILE_OK == error) {
321     *created = true;
322     UpdateUsage(context, url, growth);
323     context->change_observers()->Notify(
324         &FileChangeObserver::OnCreateFile, MakeTuple(url));
325   }
326   return error;
327 }
328
329 base::File::Error ObfuscatedFileUtil::CreateDirectory(
330     FileSystemOperationContext* context,
331     const FileSystemURL& url,
332     bool exclusive,
333     bool recursive) {
334   SandboxDirectoryDatabase* db = GetDirectoryDatabase(url, true);
335   if (!db)
336     return base::File::FILE_ERROR_FAILED;
337
338   FileId file_id;
339   if (db->GetFileWithPath(url.path(), &file_id)) {
340     FileInfo file_info;
341     if (exclusive)
342       return base::File::FILE_ERROR_EXISTS;
343     if (!db->GetFileInfo(file_id, &file_info)) {
344       NOTREACHED();
345       return base::File::FILE_ERROR_FAILED;
346     }
347     if (!file_info.is_directory())
348       return base::File::FILE_ERROR_NOT_A_DIRECTORY;
349     return base::File::FILE_OK;
350   }
351
352   std::vector<base::FilePath::StringType> components;
353   VirtualPath::GetComponents(url.path(), &components);
354   FileId parent_id = 0;
355   size_t index;
356   for (index = 0; index < components.size(); ++index) {
357     base::FilePath::StringType name = components[index];
358     if (name == FILE_PATH_LITERAL("/"))
359       continue;
360     if (!db->GetChildWithName(parent_id, name, &parent_id))
361       break;
362   }
363   if (!db->IsDirectory(parent_id))
364     return base::File::FILE_ERROR_NOT_A_DIRECTORY;
365   if (!recursive && components.size() - index > 1)
366     return base::File::FILE_ERROR_NOT_FOUND;
367   bool first = true;
368   for (; index < components.size(); ++index) {
369     FileInfo file_info;
370     file_info.name = components[index];
371     if (file_info.name == FILE_PATH_LITERAL("/"))
372       continue;
373     file_info.modification_time = base::Time::Now();
374     file_info.parent_id = parent_id;
375     int64 growth = UsageForPath(file_info.name.size());
376     if (!AllocateQuota(context, growth))
377       return base::File::FILE_ERROR_NO_SPACE;
378     base::File::Error error = db->AddFileInfo(file_info, &parent_id);
379     if (error != base::File::FILE_OK)
380       return error;
381     UpdateUsage(context, url, growth);
382     context->change_observers()->Notify(
383         &FileChangeObserver::OnCreateDirectory, MakeTuple(url));
384     if (first) {
385       first = false;
386       TouchDirectory(db, file_info.parent_id);
387     }
388   }
389   return base::File::FILE_OK;
390 }
391
392 base::File::Error ObfuscatedFileUtil::GetFileInfo(
393     FileSystemOperationContext* context,
394     const FileSystemURL& url,
395     base::File::Info* file_info,
396     base::FilePath* platform_file_path) {
397   SandboxDirectoryDatabase* db = GetDirectoryDatabase(url, false);
398   if (!db)
399     return base::File::FILE_ERROR_NOT_FOUND;
400   FileId file_id;
401   if (!db->GetFileWithPath(url.path(), &file_id))
402     return base::File::FILE_ERROR_NOT_FOUND;
403   FileInfo local_info;
404   return GetFileInfoInternal(db, context, url,
405                              file_id, &local_info,
406                              file_info, platform_file_path);
407 }
408
409 scoped_ptr<FileSystemFileUtil::AbstractFileEnumerator>
410     ObfuscatedFileUtil::CreateFileEnumerator(
411     FileSystemOperationContext* context,
412     const FileSystemURL& root_url) {
413   return CreateFileEnumerator(context, root_url, false /* recursive */);
414 }
415
416 base::File::Error ObfuscatedFileUtil::GetLocalFilePath(
417     FileSystemOperationContext* context,
418     const FileSystemURL& url,
419     base::FilePath* local_path) {
420   SandboxDirectoryDatabase* db = GetDirectoryDatabase(url, false);
421   if (!db)
422     return base::File::FILE_ERROR_NOT_FOUND;
423   FileId file_id;
424   if (!db->GetFileWithPath(url.path(), &file_id))
425     return base::File::FILE_ERROR_NOT_FOUND;
426   FileInfo file_info;
427   if (!db->GetFileInfo(file_id, &file_info) || file_info.is_directory()) {
428     NOTREACHED();
429     // Directories have no local file path.
430     return base::File::FILE_ERROR_NOT_FOUND;
431   }
432   *local_path = DataPathToLocalPath(url, file_info.data_path);
433
434   if (local_path->empty())
435     return base::File::FILE_ERROR_NOT_FOUND;
436   return base::File::FILE_OK;
437 }
438
439 base::File::Error ObfuscatedFileUtil::Touch(
440     FileSystemOperationContext* context,
441     const FileSystemURL& url,
442     const base::Time& last_access_time,
443     const base::Time& last_modified_time) {
444   SandboxDirectoryDatabase* db = GetDirectoryDatabase(url, false);
445   if (!db)
446     return base::File::FILE_ERROR_NOT_FOUND;
447   FileId file_id;
448   if (!db->GetFileWithPath(url.path(), &file_id))
449     return base::File::FILE_ERROR_NOT_FOUND;
450
451   FileInfo file_info;
452   if (!db->GetFileInfo(file_id, &file_info)) {
453     NOTREACHED();
454     return base::File::FILE_ERROR_FAILED;
455   }
456   if (file_info.is_directory()) {
457     if (!db->UpdateModificationTime(file_id, last_modified_time))
458       return base::File::FILE_ERROR_FAILED;
459     return base::File::FILE_OK;
460   }
461   return NativeFileUtil::Touch(
462       DataPathToLocalPath(url, file_info.data_path),
463       last_access_time, last_modified_time);
464 }
465
466 base::File::Error ObfuscatedFileUtil::Truncate(
467     FileSystemOperationContext* context,
468     const FileSystemURL& url,
469     int64 length) {
470   base::File::Info file_info;
471   base::FilePath local_path;
472   base::File::Error error =
473       GetFileInfo(context, url, &file_info, &local_path);
474   if (error != base::File::FILE_OK)
475     return error;
476
477   int64 growth = length - file_info.size;
478   if (!AllocateQuota(context, growth))
479     return base::File::FILE_ERROR_NO_SPACE;
480   error = NativeFileUtil::Truncate(local_path, length);
481   if (error == base::File::FILE_OK) {
482     UpdateUsage(context, url, growth);
483     context->change_observers()->Notify(
484         &FileChangeObserver::OnModifyFile, MakeTuple(url));
485   }
486   return error;
487 }
488
489 base::File::Error ObfuscatedFileUtil::CopyOrMoveFile(
490     FileSystemOperationContext* context,
491     const FileSystemURL& src_url,
492     const FileSystemURL& dest_url,
493     CopyOrMoveOption option,
494     bool copy) {
495   // Cross-filesystem copies and moves should be handled via CopyInForeignFile.
496   DCHECK(src_url.origin() == dest_url.origin());
497   DCHECK(src_url.type() == dest_url.type());
498
499   SandboxDirectoryDatabase* db = GetDirectoryDatabase(src_url, true);
500   if (!db)
501     return base::File::FILE_ERROR_FAILED;
502
503   FileId src_file_id;
504   if (!db->GetFileWithPath(src_url.path(), &src_file_id))
505     return base::File::FILE_ERROR_NOT_FOUND;
506
507   FileId dest_file_id;
508   bool overwrite = db->GetFileWithPath(dest_url.path(),
509                                        &dest_file_id);
510
511   FileInfo src_file_info;
512   base::File::Info src_platform_file_info;
513   base::FilePath src_local_path;
514   base::File::Error error = GetFileInfoInternal(
515       db, context, src_url, src_file_id,
516       &src_file_info, &src_platform_file_info, &src_local_path);
517   if (error != base::File::FILE_OK)
518     return error;
519   if (src_file_info.is_directory())
520     return base::File::FILE_ERROR_NOT_A_FILE;
521
522   FileInfo dest_file_info;
523   base::File::Info dest_platform_file_info;  // overwrite case only
524   base::FilePath dest_local_path;  // overwrite case only
525   if (overwrite) {
526     base::File::Error error = GetFileInfoInternal(
527         db, context, dest_url, dest_file_id,
528         &dest_file_info, &dest_platform_file_info, &dest_local_path);
529     if (error == base::File::FILE_ERROR_NOT_FOUND)
530       overwrite = false;  // fallback to non-overwrite case
531     else if (error != base::File::FILE_OK)
532       return error;
533     else if (dest_file_info.is_directory())
534       return base::File::FILE_ERROR_INVALID_OPERATION;
535   }
536   if (!overwrite) {
537     FileId dest_parent_id;
538     if (!db->GetFileWithPath(VirtualPath::DirName(dest_url.path()),
539                              &dest_parent_id)) {
540       return base::File::FILE_ERROR_NOT_FOUND;
541     }
542
543     dest_file_info = src_file_info;
544     dest_file_info.parent_id = dest_parent_id;
545     dest_file_info.name =
546         VirtualPath::BaseName(dest_url.path()).value();
547   }
548
549   int64 growth = 0;
550   if (copy)
551     growth += src_platform_file_info.size;
552   else
553     growth -= UsageForPath(src_file_info.name.size());
554   if (overwrite)
555     growth -= dest_platform_file_info.size;
556   else
557     growth += UsageForPath(dest_file_info.name.size());
558   if (!AllocateQuota(context, growth))
559     return base::File::FILE_ERROR_NO_SPACE;
560
561   /*
562    * Copy-with-overwrite
563    *  Just overwrite data file
564    * Copy-without-overwrite
565    *  Copy backing file
566    *  Create new metadata pointing to new backing file.
567    * Move-with-overwrite
568    *  transaction:
569    *    Remove source entry.
570    *    Point target entry to source entry's backing file.
571    *  Delete target entry's old backing file
572    * Move-without-overwrite
573    *  Just update metadata
574    */
575   error = base::File::FILE_ERROR_FAILED;
576   if (copy) {
577     if (overwrite) {
578       error = NativeFileUtil::CopyOrMoveFile(
579           src_local_path,
580           dest_local_path,
581           option,
582           fileapi::NativeFileUtil::CopyOrMoveModeForDestination(
583               dest_url, true /* copy */));
584     } else {  // non-overwrite
585       error = CreateFile(context, src_local_path, dest_url, &dest_file_info);
586     }
587   } else {
588     if (overwrite) {
589       if (db->OverwritingMoveFile(src_file_id, dest_file_id)) {
590         if (base::File::FILE_OK !=
591             NativeFileUtil::DeleteFile(dest_local_path))
592           LOG(WARNING) << "Leaked a backing file.";
593         error = base::File::FILE_OK;
594       } else {
595         error = base::File::FILE_ERROR_FAILED;
596       }
597     } else {  // non-overwrite
598       if (db->UpdateFileInfo(src_file_id, dest_file_info))
599         error = base::File::FILE_OK;
600       else
601         error = base::File::FILE_ERROR_FAILED;
602     }
603   }
604
605   if (error != base::File::FILE_OK)
606     return error;
607
608   if (overwrite) {
609     context->change_observers()->Notify(
610         &FileChangeObserver::OnModifyFile,
611         MakeTuple(dest_url));
612   } else {
613     context->change_observers()->Notify(
614         &FileChangeObserver::OnCreateFileFrom,
615         MakeTuple(dest_url, src_url));
616   }
617
618   if (!copy) {
619     context->change_observers()->Notify(
620         &FileChangeObserver::OnRemoveFile, MakeTuple(src_url));
621     TouchDirectory(db, src_file_info.parent_id);
622   }
623
624   TouchDirectory(db, dest_file_info.parent_id);
625
626   UpdateUsage(context, dest_url, growth);
627   return error;
628 }
629
630 base::File::Error ObfuscatedFileUtil::CopyInForeignFile(
631     FileSystemOperationContext* context,
632     const base::FilePath& src_file_path,
633     const FileSystemURL& dest_url) {
634   SandboxDirectoryDatabase* db = GetDirectoryDatabase(dest_url, true);
635   if (!db)
636     return base::File::FILE_ERROR_FAILED;
637
638   base::File::Info src_platform_file_info;
639   if (!base::GetFileInfo(src_file_path, &src_platform_file_info))
640     return base::File::FILE_ERROR_NOT_FOUND;
641
642   FileId dest_file_id;
643   bool overwrite = db->GetFileWithPath(dest_url.path(),
644                                        &dest_file_id);
645
646   FileInfo dest_file_info;
647   base::File::Info dest_platform_file_info;  // overwrite case only
648   if (overwrite) {
649     base::FilePath dest_local_path;
650     base::File::Error error = GetFileInfoInternal(
651         db, context, dest_url, dest_file_id,
652         &dest_file_info, &dest_platform_file_info, &dest_local_path);
653     if (error == base::File::FILE_ERROR_NOT_FOUND)
654       overwrite = false;  // fallback to non-overwrite case
655     else if (error != base::File::FILE_OK)
656       return error;
657     else if (dest_file_info.is_directory())
658       return base::File::FILE_ERROR_INVALID_OPERATION;
659   }
660   if (!overwrite) {
661     FileId dest_parent_id;
662     if (!db->GetFileWithPath(VirtualPath::DirName(dest_url.path()),
663                              &dest_parent_id)) {
664       return base::File::FILE_ERROR_NOT_FOUND;
665     }
666     if (!dest_file_info.is_directory())
667       return base::File::FILE_ERROR_FAILED;
668     InitFileInfo(&dest_file_info, dest_parent_id,
669                  VirtualPath::BaseName(dest_url.path()).value());
670   }
671
672   int64 growth = src_platform_file_info.size;
673   if (overwrite)
674     growth -= dest_platform_file_info.size;
675   else
676     growth += UsageForPath(dest_file_info.name.size());
677   if (!AllocateQuota(context, growth))
678     return base::File::FILE_ERROR_NO_SPACE;
679
680   base::File::Error error;
681   if (overwrite) {
682     base::FilePath dest_local_path =
683         DataPathToLocalPath(dest_url, dest_file_info.data_path);
684     error = NativeFileUtil::CopyOrMoveFile(
685         src_file_path, dest_local_path,
686         FileSystemOperation::OPTION_NONE,
687         fileapi::NativeFileUtil::CopyOrMoveModeForDestination(dest_url,
688                                                               true /* copy */));
689   } else {
690     error = CreateFile(context, src_file_path, dest_url, &dest_file_info);
691   }
692
693   if (error != base::File::FILE_OK)
694     return error;
695
696   if (overwrite) {
697     context->change_observers()->Notify(
698         &FileChangeObserver::OnModifyFile, MakeTuple(dest_url));
699   } else {
700     context->change_observers()->Notify(
701         &FileChangeObserver::OnCreateFile, MakeTuple(dest_url));
702   }
703
704   UpdateUsage(context, dest_url, growth);
705   TouchDirectory(db, dest_file_info.parent_id);
706   return base::File::FILE_OK;
707 }
708
709 base::File::Error ObfuscatedFileUtil::DeleteFile(
710     FileSystemOperationContext* context,
711     const FileSystemURL& url) {
712   SandboxDirectoryDatabase* db = GetDirectoryDatabase(url, true);
713   if (!db)
714     return base::File::FILE_ERROR_FAILED;
715   FileId file_id;
716   if (!db->GetFileWithPath(url.path(), &file_id))
717     return base::File::FILE_ERROR_NOT_FOUND;
718
719   FileInfo file_info;
720   base::File::Info platform_file_info;
721   base::FilePath local_path;
722   base::File::Error error = GetFileInfoInternal(
723       db, context, url, file_id, &file_info, &platform_file_info, &local_path);
724   if (error != base::File::FILE_ERROR_NOT_FOUND &&
725       error != base::File::FILE_OK)
726     return error;
727
728   if (file_info.is_directory())
729     return base::File::FILE_ERROR_NOT_A_FILE;
730
731   int64 growth = -UsageForPath(file_info.name.size()) - platform_file_info.size;
732   AllocateQuota(context, growth);
733   if (!db->RemoveFileInfo(file_id)) {
734     NOTREACHED();
735     return base::File::FILE_ERROR_FAILED;
736   }
737   UpdateUsage(context, url, growth);
738   TouchDirectory(db, file_info.parent_id);
739
740   context->change_observers()->Notify(
741       &FileChangeObserver::OnRemoveFile, MakeTuple(url));
742
743   if (error == base::File::FILE_ERROR_NOT_FOUND)
744     return base::File::FILE_OK;
745
746   error = NativeFileUtil::DeleteFile(local_path);
747   if (base::File::FILE_OK != error)
748     LOG(WARNING) << "Leaked a backing file.";
749   return base::File::FILE_OK;
750 }
751
752 base::File::Error ObfuscatedFileUtil::DeleteDirectory(
753     FileSystemOperationContext* context,
754     const FileSystemURL& url) {
755   SandboxDirectoryDatabase* db = GetDirectoryDatabase(url, true);
756   if (!db)
757     return base::File::FILE_ERROR_FAILED;
758
759   FileId file_id;
760   if (!db->GetFileWithPath(url.path(), &file_id))
761     return base::File::FILE_ERROR_NOT_FOUND;
762   FileInfo file_info;
763   if (!db->GetFileInfo(file_id, &file_info)) {
764     NOTREACHED();
765     return base::File::FILE_ERROR_FAILED;
766   }
767   if (!file_info.is_directory())
768     return base::File::FILE_ERROR_NOT_A_DIRECTORY;
769   if (!db->RemoveFileInfo(file_id))
770     return base::File::FILE_ERROR_NOT_EMPTY;
771   int64 growth = -UsageForPath(file_info.name.size());
772   AllocateQuota(context, growth);
773   UpdateUsage(context, url, growth);
774   TouchDirectory(db, file_info.parent_id);
775   context->change_observers()->Notify(
776       &FileChangeObserver::OnRemoveDirectory, MakeTuple(url));
777   return base::File::FILE_OK;
778 }
779
780 webkit_blob::ScopedFile ObfuscatedFileUtil::CreateSnapshotFile(
781     FileSystemOperationContext* context,
782     const FileSystemURL& url,
783     base::File::Error* error,
784     base::File::Info* file_info,
785     base::FilePath* platform_path) {
786   // We're just returning the local file information.
787   *error = GetFileInfo(context, url, file_info, platform_path);
788   if (*error == base::File::FILE_OK && file_info->is_directory) {
789     *file_info = base::File::Info();
790     *error = base::File::FILE_ERROR_NOT_A_FILE;
791   }
792   return webkit_blob::ScopedFile();
793 }
794
795 scoped_ptr<FileSystemFileUtil::AbstractFileEnumerator>
796     ObfuscatedFileUtil::CreateFileEnumerator(
797     FileSystemOperationContext* context,
798     const FileSystemURL& root_url,
799     bool recursive) {
800   SandboxDirectoryDatabase* db = GetDirectoryDatabase(root_url, false);
801   if (!db) {
802     return scoped_ptr<AbstractFileEnumerator>(new EmptyFileEnumerator());
803   }
804   return scoped_ptr<AbstractFileEnumerator>(
805       new ObfuscatedFileEnumerator(db, context, this, root_url, recursive));
806 }
807
808 bool ObfuscatedFileUtil::IsDirectoryEmpty(
809     FileSystemOperationContext* context,
810     const FileSystemURL& url) {
811   SandboxDirectoryDatabase* db = GetDirectoryDatabase(url, false);
812   if (!db)
813     return true;  // Not a great answer, but it's what others do.
814   FileId file_id;
815   if (!db->GetFileWithPath(url.path(), &file_id))
816     return true;  // Ditto.
817   FileInfo file_info;
818   if (!db->GetFileInfo(file_id, &file_info)) {
819     DCHECK(!file_id);
820     // It's the root directory and the database hasn't been initialized yet.
821     return true;
822   }
823   if (!file_info.is_directory())
824     return true;
825   std::vector<FileId> children;
826   // TODO(ericu): This could easily be made faster with help from the database.
827   if (!db->ListChildren(file_id, &children))
828     return true;
829   return children.empty();
830 }
831
832 base::FilePath ObfuscatedFileUtil::GetDirectoryForOriginAndType(
833     const GURL& origin,
834     const std::string& type_string,
835     bool create,
836     base::File::Error* error_code) {
837   base::FilePath origin_dir = GetDirectoryForOrigin(origin, create, error_code);
838   if (origin_dir.empty())
839     return base::FilePath();
840   if (type_string.empty())
841     return origin_dir;
842   base::FilePath path = origin_dir.AppendASCII(type_string);
843   base::File::Error error = base::File::FILE_OK;
844   if (!base::DirectoryExists(path) &&
845       (!create || !base::CreateDirectory(path))) {
846     error = create ?
847           base::File::FILE_ERROR_FAILED :
848           base::File::FILE_ERROR_NOT_FOUND;
849   }
850
851   if (error_code)
852     *error_code = error;
853   return path;
854 }
855
856 bool ObfuscatedFileUtil::DeleteDirectoryForOriginAndType(
857     const GURL& origin,
858     const std::string& type_string) {
859   base::File::Error error = base::File::FILE_OK;
860   base::FilePath origin_type_path = GetDirectoryForOriginAndType(
861       origin, type_string, false, &error);
862   if (origin_type_path.empty())
863     return true;
864   if (error != base::File::FILE_ERROR_NOT_FOUND) {
865     // TODO(dmikurube): Consider the return value of DestroyDirectoryDatabase.
866     // We ignore its error now since 1) it doesn't matter the final result, and
867     // 2) it always returns false in Windows because of LevelDB's
868     // implementation.
869     // Information about failure would be useful for debugging.
870     if (!type_string.empty())
871       DestroyDirectoryDatabase(origin, type_string);
872     if (!base::DeleteFile(origin_type_path, true /* recursive */))
873       return false;
874   }
875
876   base::FilePath origin_path = VirtualPath::DirName(origin_type_path);
877   DCHECK_EQ(origin_path.value(),
878             GetDirectoryForOrigin(origin, false, NULL).value());
879
880   if (!type_string.empty()) {
881     // At this point we are sure we had successfully deleted the origin/type
882     // directory (i.e. we're ready to just return true).
883     // See if we have other directories in this origin directory.
884     for (std::set<std::string>::iterator iter = known_type_strings_.begin();
885          iter != known_type_strings_.end();
886          ++iter) {
887       if (*iter == type_string)
888         continue;
889       if (base::DirectoryExists(origin_path.AppendASCII(*iter))) {
890         // Other type's directory exists; just return true here.
891         return true;
892       }
893     }
894   }
895
896   // No other directories seem exist. Try deleting the entire origin directory.
897   InitOriginDatabase(origin, false);
898   if (origin_database_) {
899     origin_database_->RemovePathForOrigin(
900         webkit_database::GetIdentifierFromOrigin(origin));
901   }
902   if (!base::DeleteFile(origin_path, true /* recursive */))
903     return false;
904
905   return true;
906 }
907
908 ObfuscatedFileUtil::AbstractOriginEnumerator*
909 ObfuscatedFileUtil::CreateOriginEnumerator() {
910   std::vector<SandboxOriginDatabase::OriginRecord> origins;
911
912   InitOriginDatabase(GURL(), false);
913   return new ObfuscatedOriginEnumerator(
914       origin_database_.get(), file_system_directory_);
915 }
916
917 bool ObfuscatedFileUtil::DestroyDirectoryDatabase(
918     const GURL& origin,
919     const std::string& type_string) {
920   std::string key = GetDirectoryDatabaseKey(origin, type_string);
921   if (key.empty())
922     return true;
923   DirectoryMap::iterator iter = directories_.find(key);
924   if (iter != directories_.end()) {
925     SandboxDirectoryDatabase* database = iter->second;
926     directories_.erase(iter);
927     delete database;
928   }
929
930   base::File::Error error = base::File::FILE_OK;
931   base::FilePath path = GetDirectoryForOriginAndType(
932       origin, type_string, false, &error);
933   if (path.empty() || error == base::File::FILE_ERROR_NOT_FOUND)
934     return true;
935   return SandboxDirectoryDatabase::DestroyDatabase(path, env_override_);
936 }
937
938 // static
939 int64 ObfuscatedFileUtil::ComputeFilePathCost(const base::FilePath& path) {
940   return UsageForPath(VirtualPath::BaseName(path).value().size());
941 }
942
943 void ObfuscatedFileUtil::MaybePrepopulateDatabase(
944     const std::vector<std::string>& type_strings_to_prepopulate) {
945   SandboxPrioritizedOriginDatabase database(file_system_directory_,
946                                             env_override_);
947   std::string origin_string = database.GetPrimaryOrigin();
948   if (origin_string.empty() || !database.HasOriginPath(origin_string))
949     return;
950   const GURL origin = webkit_database::GetOriginFromIdentifier(origin_string);
951
952   // Prepopulate the directory database(s) if and only if this instance
953   // has primary origin and the directory database is already there.
954   for (size_t i = 0; i < type_strings_to_prepopulate.size(); ++i) {
955     const std::string type_string = type_strings_to_prepopulate[i];
956     // Only handles known types.
957     if (!ContainsKey(known_type_strings_, type_string))
958       continue;
959     base::File::Error error = base::File::FILE_ERROR_FAILED;
960     base::FilePath path = GetDirectoryForOriginAndType(
961         origin, type_string, false, &error);
962     if (error != base::File::FILE_OK)
963       continue;
964     scoped_ptr<SandboxDirectoryDatabase> db(
965         new SandboxDirectoryDatabase(path, env_override_));
966     if (db->Init(SandboxDirectoryDatabase::FAIL_ON_CORRUPTION)) {
967       directories_[GetDirectoryDatabaseKey(origin, type_string)] = db.release();
968       MarkUsed();
969       // Don't populate more than one database, as it may rather hurt
970       // performance.
971       break;
972     }
973   }
974 }
975
976 base::FilePath ObfuscatedFileUtil::GetDirectoryForURL(
977     const FileSystemURL& url,
978     bool create,
979     base::File::Error* error_code) {
980   return GetDirectoryForOriginAndType(
981       url.origin(), CallGetTypeStringForURL(url), create, error_code);
982 }
983
984 std::string ObfuscatedFileUtil::CallGetTypeStringForURL(
985     const FileSystemURL& url) {
986   DCHECK(!get_type_string_for_url_.is_null());
987   return get_type_string_for_url_.Run(url);
988 }
989
990 base::File::Error ObfuscatedFileUtil::GetFileInfoInternal(
991     SandboxDirectoryDatabase* db,
992     FileSystemOperationContext* context,
993     const FileSystemURL& url,
994     FileId file_id,
995     FileInfo* local_info,
996     base::File::Info* file_info,
997     base::FilePath* platform_file_path) {
998   DCHECK(db);
999   DCHECK(context);
1000   DCHECK(file_info);
1001   DCHECK(platform_file_path);
1002
1003   if (!db->GetFileInfo(file_id, local_info)) {
1004     NOTREACHED();
1005     return base::File::FILE_ERROR_FAILED;
1006   }
1007
1008   if (local_info->is_directory()) {
1009     file_info->size = 0;
1010     file_info->is_directory = true;
1011     file_info->is_symbolic_link = false;
1012     file_info->last_modified = local_info->modification_time;
1013     *platform_file_path = base::FilePath();
1014     // We don't fill in ctime or atime.
1015     return base::File::FILE_OK;
1016   }
1017   if (local_info->data_path.empty())
1018     return base::File::FILE_ERROR_INVALID_OPERATION;
1019   base::FilePath local_path = DataPathToLocalPath(url, local_info->data_path);
1020   base::File::Error error = NativeFileUtil::GetFileInfo(
1021       local_path, file_info);
1022   // We should not follow symbolic links in sandboxed file system.
1023   if (base::IsLink(local_path)) {
1024     LOG(WARNING) << "Found a symbolic file.";
1025     error = base::File::FILE_ERROR_NOT_FOUND;
1026   }
1027   if (error == base::File::FILE_OK) {
1028     *platform_file_path = local_path;
1029   } else if (error == base::File::FILE_ERROR_NOT_FOUND) {
1030     LOG(WARNING) << "Lost a backing file.";
1031     InvalidateUsageCache(context, url.origin(), url.type());
1032     if (!db->RemoveFileInfo(file_id))
1033       return base::File::FILE_ERROR_FAILED;
1034   }
1035   return error;
1036 }
1037
1038 base::File ObfuscatedFileUtil::CreateAndOpenFile(
1039     FileSystemOperationContext* context,
1040     const FileSystemURL& dest_url,
1041     FileInfo* dest_file_info, int file_flags) {
1042   SandboxDirectoryDatabase* db = GetDirectoryDatabase(dest_url, true);
1043
1044   base::FilePath root, dest_local_path;
1045   base::File::Error error = GenerateNewLocalPath(db, context, dest_url, &root,
1046                                                  &dest_local_path);
1047   if (error != base::File::FILE_OK)
1048     return base::File(error);
1049
1050   if (base::PathExists(dest_local_path)) {
1051     if (!base::DeleteFile(dest_local_path, true /* recursive */))
1052       return base::File(base::File::FILE_ERROR_FAILED);
1053     LOG(WARNING) << "A stray file detected";
1054     InvalidateUsageCache(context, dest_url.origin(), dest_url.type());
1055   }
1056
1057   base::File file = NativeFileUtil::CreateOrOpen(dest_local_path, file_flags);
1058   if (!file.IsValid())
1059     return file.Pass();
1060
1061   if (!file.created()) {
1062     file.Close();
1063     base::DeleteFile(dest_local_path, false /* recursive */);
1064     return base::File(base::File::FILE_ERROR_FAILED);
1065   }
1066
1067   error = CommitCreateFile(root, dest_local_path, db, dest_file_info);
1068   if (error != base::File::FILE_OK) {
1069     file.Close();
1070     base::DeleteFile(dest_local_path, false /* recursive */);
1071     return base::File(error);
1072   }
1073
1074   return file.Pass();
1075 }
1076
1077 base::File::Error ObfuscatedFileUtil::CreateFile(
1078     FileSystemOperationContext* context,
1079     const base::FilePath& src_file_path,
1080     const FileSystemURL& dest_url,
1081     FileInfo* dest_file_info) {
1082   SandboxDirectoryDatabase* db = GetDirectoryDatabase(dest_url, true);
1083
1084   base::FilePath root, dest_local_path;
1085   base::File::Error error = GenerateNewLocalPath(db, context, dest_url, &root,
1086                                                  &dest_local_path);
1087   if (error != base::File::FILE_OK)
1088     return error;
1089
1090   bool created = false;
1091   if (src_file_path.empty()) {
1092     if (base::PathExists(dest_local_path)) {
1093       if (!base::DeleteFile(dest_local_path, true /* recursive */))
1094         return base::File::FILE_ERROR_FAILED;
1095       LOG(WARNING) << "A stray file detected";
1096       InvalidateUsageCache(context, dest_url.origin(), dest_url.type());
1097     }
1098
1099     error = NativeFileUtil::EnsureFileExists(dest_local_path, &created);
1100   } else {
1101     error = NativeFileUtil::CopyOrMoveFile(
1102         src_file_path, dest_local_path,
1103         FileSystemOperation::OPTION_NONE,
1104         fileapi::NativeFileUtil::CopyOrMoveModeForDestination(dest_url,
1105                                                               true /* copy */));
1106     created = true;
1107   }
1108   if (error != base::File::FILE_OK)
1109     return error;
1110   if (!created)
1111     return base::File::FILE_ERROR_FAILED;
1112
1113   return CommitCreateFile(root, dest_local_path, db, dest_file_info);
1114 }
1115
1116 base::File::Error ObfuscatedFileUtil::CommitCreateFile(
1117     const base::FilePath& root,
1118     const base::FilePath& local_path,
1119     SandboxDirectoryDatabase* db,
1120     FileInfo* dest_file_info) {
1121   // This removes the root, including the trailing slash, leaving a relative
1122   // path.
1123   dest_file_info->data_path = base::FilePath(
1124       local_path.value().substr(root.value().length() + 1));
1125
1126   FileId file_id;
1127   base::File::Error error = db->AddFileInfo(*dest_file_info, &file_id);
1128   if (error != base::File::FILE_OK)
1129     return error;
1130
1131   TouchDirectory(db, dest_file_info->parent_id);
1132   return base::File::FILE_OK;
1133 }
1134
1135 base::FilePath ObfuscatedFileUtil::DataPathToLocalPath(
1136     const FileSystemURL& url, const base::FilePath& data_path) {
1137   base::File::Error error = base::File::FILE_OK;
1138   base::FilePath root = GetDirectoryForURL(url, false, &error);
1139   if (error != base::File::FILE_OK)
1140     return base::FilePath();
1141   return root.Append(data_path);
1142 }
1143
1144 std::string ObfuscatedFileUtil::GetDirectoryDatabaseKey(
1145     const GURL& origin, const std::string& type_string) {
1146   if (type_string.empty()) {
1147     LOG(WARNING) << "Unknown filesystem type requested:" << type_string;
1148     return std::string();
1149   }
1150   // For isolated origin we just use a type string as a key.
1151   return webkit_database::GetIdentifierFromOrigin(origin) +
1152       type_string;
1153 }
1154
1155 // TODO(ericu): How to do the whole validation-without-creation thing?
1156 // We may not have quota even to create the database.
1157 // Ah, in that case don't even get here?
1158 // Still doesn't answer the quota issue, though.
1159 SandboxDirectoryDatabase* ObfuscatedFileUtil::GetDirectoryDatabase(
1160     const FileSystemURL& url, bool create) {
1161   std::string key = GetDirectoryDatabaseKey(
1162       url.origin(), CallGetTypeStringForURL(url));
1163   if (key.empty())
1164     return NULL;
1165
1166   DirectoryMap::iterator iter = directories_.find(key);
1167   if (iter != directories_.end()) {
1168     MarkUsed();
1169     return iter->second;
1170   }
1171
1172   base::File::Error error = base::File::FILE_OK;
1173   base::FilePath path = GetDirectoryForURL(url, create, &error);
1174   if (error != base::File::FILE_OK) {
1175     LOG(WARNING) << "Failed to get origin+type directory: "
1176                  << url.DebugString() << " error:" << error;
1177     return NULL;
1178   }
1179   MarkUsed();
1180   SandboxDirectoryDatabase* database =
1181       new SandboxDirectoryDatabase(path, env_override_);
1182   directories_[key] = database;
1183   return database;
1184 }
1185
1186 base::FilePath ObfuscatedFileUtil::GetDirectoryForOrigin(
1187     const GURL& origin, bool create, base::File::Error* error_code) {
1188   if (!InitOriginDatabase(origin, create)) {
1189     if (error_code) {
1190       *error_code = create ?
1191           base::File::FILE_ERROR_FAILED :
1192           base::File::FILE_ERROR_NOT_FOUND;
1193     }
1194     return base::FilePath();
1195   }
1196   base::FilePath directory_name;
1197   std::string id = webkit_database::GetIdentifierFromOrigin(origin);
1198
1199   bool exists_in_db = origin_database_->HasOriginPath(id);
1200   if (!exists_in_db && !create) {
1201     if (error_code)
1202       *error_code = base::File::FILE_ERROR_NOT_FOUND;
1203     return base::FilePath();
1204   }
1205   if (!origin_database_->GetPathForOrigin(id, &directory_name)) {
1206     if (error_code)
1207       *error_code = base::File::FILE_ERROR_FAILED;
1208     return base::FilePath();
1209   }
1210
1211   base::FilePath path = file_system_directory_.Append(directory_name);
1212   bool exists_in_fs = base::DirectoryExists(path);
1213   if (!exists_in_db && exists_in_fs) {
1214     if (!base::DeleteFile(path, true)) {
1215       if (error_code)
1216         *error_code = base::File::FILE_ERROR_FAILED;
1217       return base::FilePath();
1218     }
1219     exists_in_fs = false;
1220   }
1221
1222   if (!exists_in_fs) {
1223     if (!create || !base::CreateDirectory(path)) {
1224       if (error_code)
1225         *error_code = create ?
1226             base::File::FILE_ERROR_FAILED :
1227             base::File::FILE_ERROR_NOT_FOUND;
1228       return base::FilePath();
1229     }
1230   }
1231
1232   if (error_code)
1233     *error_code = base::File::FILE_OK;
1234
1235   return path;
1236 }
1237
1238 void ObfuscatedFileUtil::InvalidateUsageCache(
1239     FileSystemOperationContext* context,
1240     const GURL& origin,
1241     FileSystemType type) {
1242   if (sandbox_delegate_)
1243     sandbox_delegate_->InvalidateUsageCache(origin, type);
1244 }
1245
1246 void ObfuscatedFileUtil::MarkUsed() {
1247   if (!timer_)
1248     timer_.reset(new TimedTaskHelper(file_task_runner_.get()));
1249
1250   if (timer_->IsRunning()) {
1251     timer_->Reset();
1252   } else {
1253     timer_->Start(FROM_HERE,
1254                   base::TimeDelta::FromSeconds(db_flush_delay_seconds_),
1255                   base::Bind(&ObfuscatedFileUtil::DropDatabases,
1256                              base::Unretained(this)));
1257   }
1258 }
1259
1260 void ObfuscatedFileUtil::DropDatabases() {
1261   origin_database_.reset();
1262   STLDeleteContainerPairSecondPointers(
1263       directories_.begin(), directories_.end());
1264   directories_.clear();
1265   timer_.reset();
1266 }
1267
1268 bool ObfuscatedFileUtil::InitOriginDatabase(const GURL& origin_hint,
1269                                             bool create) {
1270   if (origin_database_)
1271     return true;
1272
1273   if (!create && !base::DirectoryExists(file_system_directory_))
1274     return false;
1275   if (!base::CreateDirectory(file_system_directory_)) {
1276     LOG(WARNING) << "Failed to create FileSystem directory: " <<
1277         file_system_directory_.value();
1278     return false;
1279   }
1280
1281   SandboxPrioritizedOriginDatabase* prioritized_origin_database =
1282       new SandboxPrioritizedOriginDatabase(file_system_directory_,
1283                                            env_override_);
1284   origin_database_.reset(prioritized_origin_database);
1285
1286   if (origin_hint.is_empty() || !HasIsolatedStorage(origin_hint))
1287     return true;
1288
1289   const std::string isolated_origin_string =
1290       webkit_database::GetIdentifierFromOrigin(origin_hint);
1291
1292   // TODO(kinuko): Deprecate this after a few release cycles, e.g. around M33.
1293   base::FilePath isolated_origin_dir = file_system_directory_.Append(
1294       SandboxIsolatedOriginDatabase::kObsoleteOriginDirectory);
1295   if (base::DirectoryExists(isolated_origin_dir) &&
1296       prioritized_origin_database->GetSandboxOriginDatabase()) {
1297     SandboxIsolatedOriginDatabase::MigrateBackFromObsoleteOriginDatabase(
1298         isolated_origin_string,
1299         file_system_directory_,
1300         prioritized_origin_database->GetSandboxOriginDatabase());
1301   }
1302
1303   prioritized_origin_database->InitializePrimaryOrigin(
1304       isolated_origin_string);
1305
1306   return true;
1307 }
1308
1309 base::File::Error ObfuscatedFileUtil::GenerateNewLocalPath(
1310     SandboxDirectoryDatabase* db,
1311     FileSystemOperationContext* context,
1312     const FileSystemURL& url,
1313     base::FilePath* root,
1314     base::FilePath* local_path) {
1315   DCHECK(local_path);
1316   int64 number;
1317   if (!db || !db->GetNextInteger(&number))
1318     return base::File::FILE_ERROR_FAILED;
1319
1320   base::File::Error error = base::File::FILE_OK;
1321   *root = GetDirectoryForURL(url, false, &error);
1322   if (error != base::File::FILE_OK)
1323     return error;
1324
1325   // We use the third- and fourth-to-last digits as the directory.
1326   int64 directory_number = number % 10000 / 100;
1327   base::FilePath new_local_path = root->AppendASCII(
1328       base::StringPrintf("%02" PRId64, directory_number));
1329
1330   error = NativeFileUtil::CreateDirectory(
1331       new_local_path, false /* exclusive */, false /* recursive */);
1332   if (error != base::File::FILE_OK)
1333     return error;
1334
1335   *local_path =
1336       new_local_path.AppendASCII(base::StringPrintf("%08" PRId64, number));
1337   return base::File::FILE_OK;
1338 }
1339
1340 base::File ObfuscatedFileUtil::CreateOrOpenInternal(
1341     FileSystemOperationContext* context,
1342     const FileSystemURL& url, int file_flags) {
1343   DCHECK(!(file_flags & (base::File::FLAG_DELETE_ON_CLOSE |
1344         base::File::FLAG_HIDDEN | base::File::FLAG_EXCLUSIVE_READ |
1345         base::File::FLAG_EXCLUSIVE_WRITE)));
1346   SandboxDirectoryDatabase* db = GetDirectoryDatabase(url, true);
1347   if (!db)
1348     return base::File(base::File::FILE_ERROR_FAILED);
1349   FileId file_id;
1350   if (!db->GetFileWithPath(url.path(), &file_id)) {
1351     // The file doesn't exist.
1352     if (!(file_flags & (base::File::FLAG_CREATE |
1353         base::File::FLAG_CREATE_ALWAYS | base::File::FLAG_OPEN_ALWAYS))) {
1354       return base::File(base::File::FILE_ERROR_NOT_FOUND);
1355     }
1356     FileId parent_id;
1357     if (!db->GetFileWithPath(VirtualPath::DirName(url.path()), &parent_id))
1358       return base::File(base::File::FILE_ERROR_NOT_FOUND);
1359     FileInfo file_info;
1360     InitFileInfo(&file_info, parent_id,
1361                  VirtualPath::BaseName(url.path()).value());
1362
1363     int64 growth = UsageForPath(file_info.name.size());
1364     if (!AllocateQuota(context, growth))
1365       return base::File(base::File::FILE_ERROR_NO_SPACE);
1366     base::File file = CreateAndOpenFile(context, url, &file_info, file_flags);
1367     if (file.IsValid()) {
1368       UpdateUsage(context, url, growth);
1369       context->change_observers()->Notify(
1370           &FileChangeObserver::OnCreateFile, MakeTuple(url));
1371     }
1372     return file.Pass();
1373   }
1374
1375   if (file_flags & base::File::FLAG_CREATE)
1376     return base::File(base::File::FILE_ERROR_EXISTS);
1377
1378   base::File::Info platform_file_info;
1379   base::FilePath local_path;
1380   FileInfo file_info;
1381   base::File::Error error = GetFileInfoInternal(
1382       db, context, url, file_id, &file_info, &platform_file_info, &local_path);
1383   if (error != base::File::FILE_OK)
1384     return base::File(error);
1385   if (file_info.is_directory())
1386     return base::File(base::File::FILE_ERROR_NOT_A_FILE);
1387
1388   int64 delta = 0;
1389   if (file_flags & (base::File::FLAG_CREATE_ALWAYS |
1390                     base::File::FLAG_OPEN_TRUNCATED)) {
1391     // The file exists and we're truncating.
1392     delta = -platform_file_info.size;
1393     AllocateQuota(context, delta);
1394   }
1395
1396   base::File file = NativeFileUtil::CreateOrOpen(local_path, file_flags);
1397   if (!file.IsValid()) {
1398     error = file.error_details();
1399     if (error == base::File::FILE_ERROR_NOT_FOUND) {
1400       // TODO(tzik): Also invalidate on-memory usage cache in UsageTracker.
1401       // TODO(tzik): Delete database entry after ensuring the file lost.
1402       InvalidateUsageCache(context, url.origin(), url.type());
1403       LOG(WARNING) << "Lost a backing file.";
1404       return base::File(base::File::FILE_ERROR_FAILED);
1405     }
1406     return file.Pass();
1407   }
1408
1409   // If truncating we need to update the usage.
1410   if (delta) {
1411     UpdateUsage(context, url, delta);
1412     context->change_observers()->Notify(
1413         &FileChangeObserver::OnModifyFile, MakeTuple(url));
1414   }
1415   return file.Pass();
1416 }
1417
1418 bool ObfuscatedFileUtil::HasIsolatedStorage(const GURL& origin) {
1419   return special_storage_policy_.get() &&
1420       special_storage_policy_->HasIsolatedStorage(origin);
1421 }
1422
1423 }  // namespace fileapi