tzik@chromium.org | f586495 | 2012-03-10 09:18:31 +0900 | [diff] [blame] | 1 | // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
mmentovai@google.com | aa13be6 | 2008-09-03 03:20:34 +0900 | [diff] [blame] | 2 | // Use of this source code is governed by a BSD-style license that can be |
| 3 | // found in the LICENSE file. |
| 4 | |
brettw@chromium.org | 01f3da4 | 2014-08-14 05:22:14 +0900 | [diff] [blame] | 5 | #include "base/files/file_util.h" |
mmentovai@google.com | aa13be6 | 2008-09-03 03:20:34 +0900 | [diff] [blame] | 6 | |
evan@chromium.org | 3730132 | 2009-04-21 10:50:39 +0900 | [diff] [blame] | 7 | #include <dirent.h> |
evanm@google.com | 5c1d39b | 2008-09-19 04:15:54 +0900 | [diff] [blame] | 8 | #include <errno.h> |
mmentovai@google.com | aa13be6 | 2008-09-03 03:20:34 +0900 | [diff] [blame] | 9 | #include <fcntl.h> |
mmentovai@google.com | aa13be6 | 2008-09-03 03:20:34 +0900 | [diff] [blame] | 10 | #include <libgen.h> |
skerner@chromium.org | 5f3c456 | 2010-05-13 06:36:39 +0900 | [diff] [blame] | 11 | #include <limits.h> |
mark@chromium.org | d1bafc6 | 2008-10-02 02:40:13 +0900 | [diff] [blame] | 12 | #include <stdio.h> |
evan@chromium.org | 73aec0e | 2010-04-23 08:28:05 +0900 | [diff] [blame] | 13 | #include <stdlib.h> |
evanm@google.com | 5c1d39b | 2008-09-19 04:15:54 +0900 | [diff] [blame] | 14 | #include <string.h> |
mmentovai@google.com | aa13be6 | 2008-09-03 03:20:34 +0900 | [diff] [blame] | 15 | #include <sys/errno.h> |
estade@chromium.org | 2c23353 | 2008-12-13 08:43:03 +0900 | [diff] [blame] | 16 | #include <sys/mman.h> |
skerner@chromium.org | 559baa9 | 2010-05-13 00:13:57 +0900 | [diff] [blame] | 17 | #include <sys/param.h> |
mmentovai@google.com | aa13be6 | 2008-09-03 03:20:34 +0900 | [diff] [blame] | 18 | #include <sys/stat.h> |
jochen@chromium.org | a687977 | 2010-02-18 19:02:26 +0900 | [diff] [blame] | 19 | #include <sys/time.h> |
evan@chromium.org | 3730132 | 2009-04-21 10:50:39 +0900 | [diff] [blame] | 20 | #include <sys/types.h> |
mmentovai@google.com | aa13be6 | 2008-09-03 03:20:34 +0900 | [diff] [blame] | 21 | #include <time.h> |
evan@chromium.org | 3730132 | 2009-04-21 10:50:39 +0900 | [diff] [blame] | 22 | #include <unistd.h> |
mmentovai@google.com | aa13be6 | 2008-09-03 03:20:34 +0900 | [diff] [blame] | 23 | |
mark@chromium.org | 0e56c16 | 2009-09-17 02:31:25 +0900 | [diff] [blame] | 24 | #if defined(OS_MACOSX) |
| 25 | #include <AvailabilityMacros.h> |
mark@chromium.org | 13aa8aa | 2011-04-22 13:15:13 +0900 | [diff] [blame] | 26 | #include "base/mac/foundation_util.h" |
mark@chromium.org | 0e56c16 | 2009-09-17 02:31:25 +0900 | [diff] [blame] | 27 | #endif |
| 28 | |
mmentovai@google.com | aa13be6 | 2008-09-03 03:20:34 +0900 | [diff] [blame] | 29 | #include "base/basictypes.h" |
brettw@chromium.org | 5694672 | 2013-06-08 13:53:36 +0900 | [diff] [blame] | 30 | #include "base/files/file_enumerator.h" |
brettw@chromium.org | 59eef1f | 2013-02-24 14:40:52 +0900 | [diff] [blame] | 31 | #include "base/files/file_path.h" |
brettw@chromium.org | b52f29b | 2014-03-18 04:02:35 +0900 | [diff] [blame] | 32 | #include "base/files/scoped_file.h" |
mmentovai@google.com | aa13be6 | 2008-09-03 03:20:34 +0900 | [diff] [blame] | 33 | #include "base/logging.h" |
levin@chromium.org | 5c52868 | 2011-03-28 10:54:15 +0900 | [diff] [blame] | 34 | #include "base/memory/scoped_ptr.h" |
| 35 | #include "base/memory/singleton.h" |
nileshagrawal@chromium.org | 62001b9 | 2012-05-18 05:09:06 +0900 | [diff] [blame] | 36 | #include "base/path_service.h" |
brettw@chromium.org | b1788fb | 2012-11-15 05:54:35 +0900 | [diff] [blame] | 37 | #include "base/posix/eintr_wrapper.h" |
skerner@chromium.org | 8078414 | 2011-10-18 06:30:29 +0900 | [diff] [blame] | 38 | #include "base/stl_util.h" |
avi@chromium.org | 94bd573 | 2013-06-11 22:36:37 +0900 | [diff] [blame] | 39 | #include "base/strings/string_util.h" |
| 40 | #include "base/strings/stringprintf.h" |
brettw@chromium.org | 1f67a91 | 2013-02-08 04:18:03 +0900 | [diff] [blame] | 41 | #include "base/strings/sys_string_conversions.h" |
avi@chromium.org | 17f6062 | 2013-06-08 03:37:07 +0900 | [diff] [blame] | 42 | #include "base/strings/utf_string_conversions.h" |
stevenjb@chromium.org | 861313b | 2013-09-28 04:28:24 +0900 | [diff] [blame] | 43 | #include "base/sys_info.h" |
brettw@chromium.org | 5b5f5e0 | 2011-01-01 10:01:06 +0900 | [diff] [blame] | 44 | #include "base/threading/thread_restrictions.h" |
avi@chromium.org | b039e8b | 2013-06-28 09:49:07 +0900 | [diff] [blame] | 45 | #include "base/time/time.h" |
estade@chromium.org | 868ecbc | 2009-06-24 12:29:26 +0900 | [diff] [blame] | 46 | |
michaelbai@google.com | 2251c62 | 2011-06-22 07:34:50 +0900 | [diff] [blame] | 47 | #if defined(OS_ANDROID) |
qinmin@chromium.org | 8abcc0c | 2013-11-20 16:04:55 +0900 | [diff] [blame] | 48 | #include "base/android/content_uri_utils.h" |
michaelbai@google.com | 2251c62 | 2011-06-22 07:34:50 +0900 | [diff] [blame] | 49 | #include "base/os_compat_android.h" |
| 50 | #endif |
| 51 | |
qsr@chromium.org | 4ab5de9 | 2012-07-09 23:40:39 +0900 | [diff] [blame] | 52 | #if !defined(OS_IOS) |
| 53 | #include <grp.h> |
| 54 | #endif |
| 55 | |
brettw@chromium.org | 99b198e | 2013-04-12 14:17:15 +0900 | [diff] [blame] | 56 | namespace base { |
| 57 | |
skerner@chromium.org | 8bbe5be | 2010-06-10 07:56:48 +0900 | [diff] [blame] | 58 | namespace { |
| 59 | |
rvargas@chromium.org | 527ea31 | 2014-04-05 11:39:18 +0900 | [diff] [blame] | 60 | #if defined(OS_BSD) || defined(OS_MACOSX) || defined(OS_NACL) |
skerner@google.com | 93449ef | 2011-09-22 23:47:18 +0900 | [diff] [blame] | 61 | static int CallStat(const char *path, stat_wrapper_t *sb) { |
brettw@chromium.org | 0878fea | 2013-07-02 08:07:36 +0900 | [diff] [blame] | 62 | ThreadRestrictions::AssertIOAllowed(); |
skerner@google.com | 93449ef | 2011-09-22 23:47:18 +0900 | [diff] [blame] | 63 | return stat(path, sb); |
| 64 | } |
| 65 | static int CallLstat(const char *path, stat_wrapper_t *sb) { |
brettw@chromium.org | 0878fea | 2013-07-02 08:07:36 +0900 | [diff] [blame] | 66 | ThreadRestrictions::AssertIOAllowed(); |
skerner@google.com | 93449ef | 2011-09-22 23:47:18 +0900 | [diff] [blame] | 67 | return lstat(path, sb); |
| 68 | } |
rvargas@chromium.org | 527ea31 | 2014-04-05 11:39:18 +0900 | [diff] [blame] | 69 | #else // defined(OS_BSD) || defined(OS_MACOSX) || defined(OS_NACL) |
skerner@google.com | 93449ef | 2011-09-22 23:47:18 +0900 | [diff] [blame] | 70 | static int CallStat(const char *path, stat_wrapper_t *sb) { |
brettw@chromium.org | 0878fea | 2013-07-02 08:07:36 +0900 | [diff] [blame] | 71 | ThreadRestrictions::AssertIOAllowed(); |
skerner@google.com | 93449ef | 2011-09-22 23:47:18 +0900 | [diff] [blame] | 72 | return stat64(path, sb); |
| 73 | } |
| 74 | static int CallLstat(const char *path, stat_wrapper_t *sb) { |
brettw@chromium.org | 0878fea | 2013-07-02 08:07:36 +0900 | [diff] [blame] | 75 | ThreadRestrictions::AssertIOAllowed(); |
skerner@google.com | 93449ef | 2011-09-22 23:47:18 +0900 | [diff] [blame] | 76 | return lstat64(path, sb); |
| 77 | } |
thestig@chromium.org | 5b29c25 | 2014-04-29 20:21:50 +0900 | [diff] [blame] | 78 | #endif // !(defined(OS_BSD) || defined(OS_MACOSX) || defined(OS_NACL)) |
skerner@google.com | 93449ef | 2011-09-22 23:47:18 +0900 | [diff] [blame] | 79 | |
hidehiko | 4597201 | 2015-04-02 03:31:15 +0900 | [diff] [blame] | 80 | #if !defined(OS_NACL_NONSFI) |
skerner@chromium.org | 8bbe5be | 2010-06-10 07:56:48 +0900 | [diff] [blame] | 81 | // Helper for NormalizeFilePath(), defined below. |
| 82 | bool RealPath(const FilePath& path, FilePath* real_path) { |
brettw@chromium.org | 0878fea | 2013-07-02 08:07:36 +0900 | [diff] [blame] | 83 | ThreadRestrictions::AssertIOAllowed(); // For realpath(). |
skerner@chromium.org | 8bbe5be | 2010-06-10 07:56:48 +0900 | [diff] [blame] | 84 | FilePath::CharType buf[PATH_MAX]; |
| 85 | if (!realpath(path.value().c_str(), buf)) |
| 86 | return false; |
| 87 | |
| 88 | *real_path = FilePath(buf); |
| 89 | return true; |
| 90 | } |
| 91 | |
skerner@google.com | 93449ef | 2011-09-22 23:47:18 +0900 | [diff] [blame] | 92 | // Helper for VerifyPathControlledByUser. |
| 93 | bool VerifySpecificPathControlledByUser(const FilePath& path, |
| 94 | uid_t owner_uid, |
skerner@chromium.org | 8078414 | 2011-10-18 06:30:29 +0900 | [diff] [blame] | 95 | const std::set<gid_t>& group_gids) { |
skerner@google.com | 93449ef | 2011-09-22 23:47:18 +0900 | [diff] [blame] | 96 | stat_wrapper_t stat_info; |
| 97 | if (CallLstat(path.value().c_str(), &stat_info) != 0) { |
brettw@chromium.org | 5faed3c | 2011-10-27 06:48:00 +0900 | [diff] [blame] | 98 | DPLOG(ERROR) << "Failed to get information on path " |
| 99 | << path.value(); |
skerner@google.com | 93449ef | 2011-09-22 23:47:18 +0900 | [diff] [blame] | 100 | return false; |
| 101 | } |
skerner@chromium.org | 8bbe5be | 2010-06-10 07:56:48 +0900 | [diff] [blame] | 102 | |
skerner@google.com | 93449ef | 2011-09-22 23:47:18 +0900 | [diff] [blame] | 103 | if (S_ISLNK(stat_info.st_mode)) { |
brettw@chromium.org | 5faed3c | 2011-10-27 06:48:00 +0900 | [diff] [blame] | 104 | DLOG(ERROR) << "Path " << path.value() |
skerner@google.com | 93449ef | 2011-09-22 23:47:18 +0900 | [diff] [blame] | 105 | << " is a symbolic link."; |
| 106 | return false; |
| 107 | } |
| 108 | |
| 109 | if (stat_info.st_uid != owner_uid) { |
brettw@chromium.org | 5faed3c | 2011-10-27 06:48:00 +0900 | [diff] [blame] | 110 | DLOG(ERROR) << "Path " << path.value() |
| 111 | << " is owned by the wrong user."; |
skerner@google.com | 93449ef | 2011-09-22 23:47:18 +0900 | [diff] [blame] | 112 | return false; |
| 113 | } |
| 114 | |
skerner@chromium.org | 8078414 | 2011-10-18 06:30:29 +0900 | [diff] [blame] | 115 | if ((stat_info.st_mode & S_IWGRP) && |
| 116 | !ContainsKey(group_gids, stat_info.st_gid)) { |
brettw@chromium.org | 5faed3c | 2011-10-27 06:48:00 +0900 | [diff] [blame] | 117 | DLOG(ERROR) << "Path " << path.value() |
| 118 | << " is writable by an unprivileged group."; |
skerner@google.com | 93449ef | 2011-09-22 23:47:18 +0900 | [diff] [blame] | 119 | return false; |
| 120 | } |
| 121 | |
| 122 | if (stat_info.st_mode & S_IWOTH) { |
brettw@chromium.org | 5faed3c | 2011-10-27 06:48:00 +0900 | [diff] [blame] | 123 | DLOG(ERROR) << "Path " << path.value() |
| 124 | << " is writable by any user."; |
skerner@google.com | 93449ef | 2011-09-22 23:47:18 +0900 | [diff] [blame] | 125 | return false; |
| 126 | } |
| 127 | |
| 128 | return true; |
benl@chromium.org | 6b6b216 | 2009-09-08 01:39:46 +0900 | [diff] [blame] | 129 | } |
skerner@google.com | 93449ef | 2011-09-22 23:47:18 +0900 | [diff] [blame] | 130 | |
brettw@chromium.org | 0878fea | 2013-07-02 08:07:36 +0900 | [diff] [blame] | 131 | std::string TempFileName() { |
| 132 | #if defined(OS_MACOSX) |
| 133 | return StringPrintf(".%s.XXXXXX", base::mac::BaseBundleID()); |
| 134 | #endif |
| 135 | |
| 136 | #if defined(GOOGLE_CHROME_BUILD) |
| 137 | return std::string(".com.google.Chrome.XXXXXX"); |
| 138 | #else |
| 139 | return std::string(".org.chromium.Chromium.XXXXXX"); |
| 140 | #endif |
| 141 | } |
| 142 | |
brettw@chromium.org | 83c44c8 | 2013-12-03 03:55:49 +0900 | [diff] [blame] | 143 | // Creates and opens a temporary file in |directory|, returning the |
| 144 | // file descriptor. |path| is set to the temporary file path. |
| 145 | // This function does NOT unlink() the file. |
| 146 | int CreateAndOpenFdForTemporaryFile(FilePath directory, FilePath* path) { |
| 147 | ThreadRestrictions::AssertIOAllowed(); // For call to mkstemp(). |
| 148 | *path = directory.Append(base::TempFileName()); |
| 149 | const std::string& tmpdir_string = path->value(); |
| 150 | // this should be OK since mkstemp just replaces characters in place |
| 151 | char* buffer = const_cast<char*>(tmpdir_string.c_str()); |
| 152 | |
| 153 | return HANDLE_EINTR(mkstemp(buffer)); |
| 154 | } |
| 155 | |
| 156 | #if defined(OS_LINUX) |
| 157 | // Determine if /dev/shm files can be mapped and then mprotect'd PROT_EXEC. |
| 158 | // This depends on the mount options used for /dev/shm, which vary among |
| 159 | // different Linux distributions and possibly local configuration. It also |
| 160 | // depends on details of kernel--ChromeOS uses the noexec option for /dev/shm |
| 161 | // but its kernel allows mprotect with PROT_EXEC anyway. |
| 162 | bool DetermineDevShmExecutable() { |
| 163 | bool result = false; |
| 164 | FilePath path; |
brettw@chromium.org | b52f29b | 2014-03-18 04:02:35 +0900 | [diff] [blame] | 165 | |
| 166 | ScopedFD fd(CreateAndOpenFdForTemporaryFile(FilePath("/dev/shm"), &path)); |
| 167 | if (fd.is_valid()) { |
brettw@chromium.org | 83c44c8 | 2013-12-03 03:55:49 +0900 | [diff] [blame] | 168 | DeleteFile(path, false); |
| 169 | long sysconf_result = sysconf(_SC_PAGESIZE); |
| 170 | CHECK_GE(sysconf_result, 0); |
| 171 | size_t pagesize = static_cast<size_t>(sysconf_result); |
| 172 | CHECK_GE(sizeof(pagesize), sizeof(sysconf_result)); |
thestig@chromium.org | 5b29c25 | 2014-04-29 20:21:50 +0900 | [diff] [blame] | 173 | void* mapping = mmap(NULL, pagesize, PROT_READ, MAP_SHARED, fd.get(), 0); |
brettw@chromium.org | 83c44c8 | 2013-12-03 03:55:49 +0900 | [diff] [blame] | 174 | if (mapping != MAP_FAILED) { |
| 175 | if (mprotect(mapping, pagesize, PROT_READ | PROT_EXEC) == 0) |
| 176 | result = true; |
| 177 | munmap(mapping, pagesize); |
| 178 | } |
| 179 | } |
| 180 | return result; |
| 181 | } |
| 182 | #endif // defined(OS_LINUX) |
hidehiko | 4597201 | 2015-04-02 03:31:15 +0900 | [diff] [blame] | 183 | #endif // !defined(OS_NACL_NONSFI) |
brettw@chromium.org | 83c44c8 | 2013-12-03 03:55:49 +0900 | [diff] [blame] | 184 | |
skerner@google.com | 93449ef | 2011-09-22 23:47:18 +0900 | [diff] [blame] | 185 | } // namespace |
benl@chromium.org | 6b6b216 | 2009-09-08 01:39:46 +0900 | [diff] [blame] | 186 | |
hidehiko | 4597201 | 2015-04-02 03:31:15 +0900 | [diff] [blame] | 187 | #if !defined(OS_NACL_NONSFI) |
brettw@chromium.org | e9f9948 | 2013-07-02 04:41:02 +0900 | [diff] [blame] | 188 | FilePath MakeAbsoluteFilePath(const FilePath& input) { |
| 189 | ThreadRestrictions::AssertIOAllowed(); |
| 190 | char full_path[PATH_MAX]; |
| 191 | if (realpath(input.value().c_str(), full_path) == NULL) |
| 192 | return FilePath(); |
| 193 | return FilePath(full_path); |
mark@chromium.org | 13aa8aa | 2011-04-22 13:15:13 +0900 | [diff] [blame] | 194 | } |
mark@chromium.org | 8ca0d27 | 2008-09-12 02:36:23 +0900 | [diff] [blame] | 195 | |
mmentovai@google.com | aa13be6 | 2008-09-03 03:20:34 +0900 | [diff] [blame] | 196 | // TODO(erikkay): The Windows version of this accepts paths like "foo/bar/*" |
| 197 | // which works both with and without the recursive flag. I'm not sure we need |
| 198 | // that functionality. If not, remove from file_util_win.cc, otherwise add it |
| 199 | // here. |
brettw@chromium.org | 220b8de | 2013-07-17 04:10:23 +0900 | [diff] [blame] | 200 | bool DeleteFile(const FilePath& path, bool recursive) { |
brettw@chromium.org | e9f9948 | 2013-07-02 04:41:02 +0900 | [diff] [blame] | 201 | ThreadRestrictions::AssertIOAllowed(); |
evanm@google.com | 874d167 | 2008-10-31 08:54:04 +0900 | [diff] [blame] | 202 | const char* path_str = path.value().c_str(); |
benl@chromium.org | 6b6b216 | 2009-09-08 01:39:46 +0900 | [diff] [blame] | 203 | stat_wrapper_t file_info; |
yoshiki@chromium.org | 45cbd63 | 2012-06-30 14:26:59 +0900 | [diff] [blame] | 204 | int test = CallLstat(path_str, &file_info); |
mmentovai@google.com | aa13be6 | 2008-09-03 03:20:34 +0900 | [diff] [blame] | 205 | if (test != 0) { |
| 206 | // The Windows version defines this condition as success. |
jrg@chromium.org | d505c3a | 2009-02-04 09:58:39 +0900 | [diff] [blame] | 207 | bool ret = (errno == ENOENT || errno == ENOTDIR); |
mmentovai@google.com | aa13be6 | 2008-09-03 03:20:34 +0900 | [diff] [blame] | 208 | return ret; |
| 209 | } |
| 210 | if (!S_ISDIR(file_info.st_mode)) |
evanm@google.com | 874d167 | 2008-10-31 08:54:04 +0900 | [diff] [blame] | 211 | return (unlink(path_str) == 0); |
mmentovai@google.com | aa13be6 | 2008-09-03 03:20:34 +0900 | [diff] [blame] | 212 | if (!recursive) |
evanm@google.com | 874d167 | 2008-10-31 08:54:04 +0900 | [diff] [blame] | 213 | return (rmdir(path_str) == 0); |
mmentovai@google.com | aa13be6 | 2008-09-03 03:20:34 +0900 | [diff] [blame] | 214 | |
| 215 | bool success = true; |
thestig@chromium.org | 3217c82 | 2009-08-07 06:23:07 +0900 | [diff] [blame] | 216 | std::stack<std::string> directories; |
| 217 | directories.push(path.value()); |
haruki@chromium.org | 0e1a70b | 2012-08-12 10:57:23 +0900 | [diff] [blame] | 218 | FileEnumerator traversal(path, true, |
| 219 | FileEnumerator::FILES | FileEnumerator::DIRECTORIES | |
| 220 | FileEnumerator::SHOW_SYM_LINKS); |
thestig@chromium.org | 3217c82 | 2009-08-07 06:23:07 +0900 | [diff] [blame] | 221 | for (FilePath current = traversal.Next(); success && !current.empty(); |
| 222 | current = traversal.Next()) { |
brettw@chromium.org | 5694672 | 2013-06-08 13:53:36 +0900 | [diff] [blame] | 223 | if (traversal.GetInfo().IsDirectory()) |
thestig@chromium.org | 3217c82 | 2009-08-07 06:23:07 +0900 | [diff] [blame] | 224 | directories.push(current.value()); |
| 225 | else |
| 226 | success = (unlink(current.value().c_str()) == 0); |
evanm@google.com | 5c1d39b | 2008-09-19 04:15:54 +0900 | [diff] [blame] | 227 | } |
thestig@chromium.org | 3217c82 | 2009-08-07 06:23:07 +0900 | [diff] [blame] | 228 | |
| 229 | while (success && !directories.empty()) { |
| 230 | FilePath dir = FilePath(directories.top()); |
| 231 | directories.pop(); |
| 232 | success = (rmdir(dir.value().c_str()) == 0); |
mmentovai@google.com | aa13be6 | 2008-09-03 03:20:34 +0900 | [diff] [blame] | 233 | } |
| 234 | return success; |
| 235 | } |
| 236 | |
brettw@chromium.org | 0878fea | 2013-07-02 08:07:36 +0900 | [diff] [blame] | 237 | bool ReplaceFile(const FilePath& from_path, |
| 238 | const FilePath& to_path, |
rvargas@chromium.org | b005b38 | 2014-01-07 19:06:58 +0900 | [diff] [blame] | 239 | File::Error* error) { |
brettw@chromium.org | 0878fea | 2013-07-02 08:07:36 +0900 | [diff] [blame] | 240 | ThreadRestrictions::AssertIOAllowed(); |
dgrogan@chromium.org | 38fc56d | 2013-05-09 07:02:36 +0900 | [diff] [blame] | 241 | if (rename(from_path.value().c_str(), to_path.value().c_str()) == 0) |
| 242 | return true; |
| 243 | if (error) |
rvargas@chromium.org | b005b38 | 2014-01-07 19:06:58 +0900 | [diff] [blame] | 244 | *error = File::OSErrorToFileError(errno); |
dgrogan@chromium.org | 38fc56d | 2013-05-09 07:02:36 +0900 | [diff] [blame] | 245 | return false; |
phajdan.jr@chromium.org | d86bea0 | 2009-05-20 02:21:07 +0900 | [diff] [blame] | 246 | } |
| 247 | |
dbeam@chromium.org | 85aa52a | 2013-05-08 14:46:20 +0900 | [diff] [blame] | 248 | bool CopyDirectory(const FilePath& from_path, |
| 249 | const FilePath& to_path, |
evanm@google.com | 5c1d39b | 2008-09-19 04:15:54 +0900 | [diff] [blame] | 250 | bool recursive) { |
brettw@chromium.org | aecf7a3 | 2013-07-10 02:42:26 +0900 | [diff] [blame] | 251 | ThreadRestrictions::AssertIOAllowed(); |
evanm@google.com | 5c1d39b | 2008-09-19 04:15:54 +0900 | [diff] [blame] | 252 | // Some old callers of CopyDirectory want it to support wildcards. |
| 253 | // After some discussion, we decided to fix those callers. |
| 254 | // Break loudly here if anyone tries to do this. |
evanm@google.com | 874d167 | 2008-10-31 08:54:04 +0900 | [diff] [blame] | 255 | DCHECK(to_path.value().find('*') == std::string::npos); |
| 256 | DCHECK(from_path.value().find('*') == std::string::npos); |
evanm@google.com | 5c1d39b | 2008-09-19 04:15:54 +0900 | [diff] [blame] | 257 | |
maruel@chromium.org | 0a177fa | 2014-02-06 04:55:52 +0900 | [diff] [blame] | 258 | if (from_path.value().size() >= PATH_MAX) { |
evanm@google.com | 5c1d39b | 2008-09-19 04:15:54 +0900 | [diff] [blame] | 259 | return false; |
| 260 | } |
| 261 | |
thestig@chromium.org | 3217c82 | 2009-08-07 06:23:07 +0900 | [diff] [blame] | 262 | // This function does not properly handle destinations within the source |
| 263 | FilePath real_to_path = to_path; |
brettw@chromium.org | 10b6412 | 2013-07-12 02:36:07 +0900 | [diff] [blame] | 264 | if (PathExists(real_to_path)) { |
brettw@chromium.org | 99b198e | 2013-04-12 14:17:15 +0900 | [diff] [blame] | 265 | real_to_path = MakeAbsoluteFilePath(real_to_path); |
| 266 | if (real_to_path.empty()) |
thestig@chromium.org | 3217c82 | 2009-08-07 06:23:07 +0900 | [diff] [blame] | 267 | return false; |
| 268 | } else { |
brettw@chromium.org | 99b198e | 2013-04-12 14:17:15 +0900 | [diff] [blame] | 269 | real_to_path = MakeAbsoluteFilePath(real_to_path.DirName()); |
| 270 | if (real_to_path.empty()) |
thestig@chromium.org | 3217c82 | 2009-08-07 06:23:07 +0900 | [diff] [blame] | 271 | return false; |
| 272 | } |
brettw@chromium.org | 99b198e | 2013-04-12 14:17:15 +0900 | [diff] [blame] | 273 | FilePath real_from_path = MakeAbsoluteFilePath(from_path); |
| 274 | if (real_from_path.empty()) |
evanm@google.com | 5c1d39b | 2008-09-19 04:15:54 +0900 | [diff] [blame] | 275 | return false; |
thestig@chromium.org | 3217c82 | 2009-08-07 06:23:07 +0900 | [diff] [blame] | 276 | if (real_to_path.value().size() >= real_from_path.value().size() && |
| 277 | real_to_path.value().compare(0, real_from_path.value().size(), |
maruel@chromium.org | 0a177fa | 2014-02-06 04:55:52 +0900 | [diff] [blame] | 278 | real_from_path.value()) == 0) { |
thestig@chromium.org | 3217c82 | 2009-08-07 06:23:07 +0900 | [diff] [blame] | 279 | return false; |
maruel@chromium.org | 0a177fa | 2014-02-06 04:55:52 +0900 | [diff] [blame] | 280 | } |
thestig@chromium.org | 3217c82 | 2009-08-07 06:23:07 +0900 | [diff] [blame] | 281 | |
haruki@chromium.org | 0e1a70b | 2012-08-12 10:57:23 +0900 | [diff] [blame] | 282 | int traverse_type = FileEnumerator::FILES | FileEnumerator::SHOW_SYM_LINKS; |
thestig@chromium.org | 3217c82 | 2009-08-07 06:23:07 +0900 | [diff] [blame] | 283 | if (recursive) |
haruki@chromium.org | 0e1a70b | 2012-08-12 10:57:23 +0900 | [diff] [blame] | 284 | traverse_type |= FileEnumerator::DIRECTORIES; |
thestig@chromium.org | 3217c82 | 2009-08-07 06:23:07 +0900 | [diff] [blame] | 285 | FileEnumerator traversal(from_path, recursive, traverse_type); |
| 286 | |
vandebo@chromium.org | 70cf3f1 | 2009-10-14 02:57:27 +0900 | [diff] [blame] | 287 | // We have to mimic windows behavior here. |to_path| may not exist yet, |
vandebo@chromium.org | c0cf77e | 2009-10-15 10:11:44 +0900 | [diff] [blame] | 288 | // start the loop with |to_path|. |
brettw@chromium.org | 5694672 | 2013-06-08 13:53:36 +0900 | [diff] [blame] | 289 | struct stat from_stat; |
thestig@chromium.org | 3217c82 | 2009-08-07 06:23:07 +0900 | [diff] [blame] | 290 | FilePath current = from_path; |
brettw@chromium.org | 5694672 | 2013-06-08 13:53:36 +0900 | [diff] [blame] | 291 | if (stat(from_path.value().c_str(), &from_stat) < 0) { |
brettw@chromium.org | 5faed3c | 2011-10-27 06:48:00 +0900 | [diff] [blame] | 292 | DLOG(ERROR) << "CopyDirectory() couldn't stat source directory: " |
| 293 | << from_path.value() << " errno = " << errno; |
maruel@chromium.org | 0a177fa | 2014-02-06 04:55:52 +0900 | [diff] [blame] | 294 | return false; |
evanm@google.com | 5c1d39b | 2008-09-19 04:15:54 +0900 | [diff] [blame] | 295 | } |
vandebo@chromium.org | c0cf77e | 2009-10-15 10:11:44 +0900 | [diff] [blame] | 296 | struct stat to_path_stat; |
| 297 | FilePath from_path_base = from_path; |
| 298 | if (recursive && stat(to_path.value().c_str(), &to_path_stat) == 0 && |
| 299 | S_ISDIR(to_path_stat.st_mode)) { |
| 300 | // If the destination already exists and is a directory, then the |
| 301 | // top level of source needs to be copied. |
| 302 | from_path_base = from_path.DirName(); |
| 303 | } |
| 304 | |
| 305 | // The Windows version of this function assumes that non-recursive calls |
| 306 | // will always have a directory for from_path. |
maruel@chromium.org | 0a177fa | 2014-02-06 04:55:52 +0900 | [diff] [blame] | 307 | // TODO(maruel): This is not necessary anymore. |
brettw@chromium.org | 5694672 | 2013-06-08 13:53:36 +0900 | [diff] [blame] | 308 | DCHECK(recursive || S_ISDIR(from_stat.st_mode)); |
evanm@google.com | 5c1d39b | 2008-09-19 04:15:54 +0900 | [diff] [blame] | 309 | |
maruel@chromium.org | 0a177fa | 2014-02-06 04:55:52 +0900 | [diff] [blame] | 310 | bool success = true; |
thestig@chromium.org | 3217c82 | 2009-08-07 06:23:07 +0900 | [diff] [blame] | 311 | while (success && !current.empty()) { |
aedla@chromium.org | fef1a20 | 2013-01-30 20:38:02 +0900 | [diff] [blame] | 312 | // current is the source path, including from_path, so append |
| 313 | // the suffix after from_path to to_path to create the target_path. |
| 314 | FilePath target_path(to_path); |
| 315 | if (from_path_base != current) { |
| 316 | if (!from_path_base.AppendRelativePath(current, &target_path)) { |
| 317 | success = false; |
| 318 | break; |
| 319 | } |
phajdan.jr@chromium.org | ecf5075 | 2009-01-14 03:57:46 +0900 | [diff] [blame] | 320 | } |
evanm@google.com | 5c1d39b | 2008-09-19 04:15:54 +0900 | [diff] [blame] | 321 | |
brettw@chromium.org | 5694672 | 2013-06-08 13:53:36 +0900 | [diff] [blame] | 322 | if (S_ISDIR(from_stat.st_mode)) { |
ripp | f845918 | 2014-10-27 18:59:53 +0900 | [diff] [blame] | 323 | if (mkdir(target_path.value().c_str(), |
| 324 | (from_stat.st_mode & 01777) | S_IRUSR | S_IXUSR | S_IWUSR) != |
| 325 | 0 && |
thestig@chromium.org | 3217c82 | 2009-08-07 06:23:07 +0900 | [diff] [blame] | 326 | errno != EEXIST) { |
brettw@chromium.org | 5faed3c | 2011-10-27 06:48:00 +0900 | [diff] [blame] | 327 | DLOG(ERROR) << "CopyDirectory() couldn't create directory: " |
| 328 | << target_path.value() << " errno = " << errno; |
thestig@chromium.org | 3217c82 | 2009-08-07 06:23:07 +0900 | [diff] [blame] | 329 | success = false; |
| 330 | } |
brettw@chromium.org | 5694672 | 2013-06-08 13:53:36 +0900 | [diff] [blame] | 331 | } else if (S_ISREG(from_stat.st_mode)) { |
thestig@chromium.org | 3217c82 | 2009-08-07 06:23:07 +0900 | [diff] [blame] | 332 | if (!CopyFile(current, target_path)) { |
brettw@chromium.org | 5faed3c | 2011-10-27 06:48:00 +0900 | [diff] [blame] | 333 | DLOG(ERROR) << "CopyDirectory() couldn't create file: " |
| 334 | << target_path.value(); |
thestig@chromium.org | 3217c82 | 2009-08-07 06:23:07 +0900 | [diff] [blame] | 335 | success = false; |
| 336 | } |
| 337 | } else { |
brettw@chromium.org | 5faed3c | 2011-10-27 06:48:00 +0900 | [diff] [blame] | 338 | DLOG(WARNING) << "CopyDirectory() skipping non-regular file: " |
| 339 | << current.value(); |
evanm@google.com | 5c1d39b | 2008-09-19 04:15:54 +0900 | [diff] [blame] | 340 | } |
evanm@google.com | 5c1d39b | 2008-09-19 04:15:54 +0900 | [diff] [blame] | 341 | |
thestig@chromium.org | 3217c82 | 2009-08-07 06:23:07 +0900 | [diff] [blame] | 342 | current = traversal.Next(); |
brettw@chromium.org | 5694672 | 2013-06-08 13:53:36 +0900 | [diff] [blame] | 343 | if (!current.empty()) |
| 344 | from_stat = traversal.GetInfo().stat(); |
evanm@google.com | 5c1d39b | 2008-09-19 04:15:54 +0900 | [diff] [blame] | 345 | } |
| 346 | |
thestig@chromium.org | 3217c82 | 2009-08-07 06:23:07 +0900 | [diff] [blame] | 347 | return success; |
mmentovai@google.com | aa13be6 | 2008-09-03 03:20:34 +0900 | [diff] [blame] | 348 | } |
hidehiko | 58e1907 | 2014-11-06 08:51:52 +0900 | [diff] [blame] | 349 | #endif // !defined(OS_NACL_NONSFI) |
mmentovai@google.com | aa13be6 | 2008-09-03 03:20:34 +0900 | [diff] [blame] | 350 | |
brettw@chromium.org | 10b6412 | 2013-07-12 02:36:07 +0900 | [diff] [blame] | 351 | bool PathExists(const FilePath& path) { |
| 352 | ThreadRestrictions::AssertIOAllowed(); |
qinmin@chromium.org | 8abcc0c | 2013-11-20 16:04:55 +0900 | [diff] [blame] | 353 | #if defined(OS_ANDROID) |
| 354 | if (path.IsContentUri()) { |
| 355 | return ContentUriExists(path); |
| 356 | } |
| 357 | #endif |
brettw@chromium.org | 10b6412 | 2013-07-12 02:36:07 +0900 | [diff] [blame] | 358 | return access(path.value().c_str(), F_OK) == 0; |
| 359 | } |
| 360 | |
hidehiko | 58e1907 | 2014-11-06 08:51:52 +0900 | [diff] [blame] | 361 | #if !defined(OS_NACL_NONSFI) |
brettw@chromium.org | 5a112e7 | 2013-07-16 05:18:09 +0900 | [diff] [blame] | 362 | bool PathIsWritable(const FilePath& path) { |
| 363 | ThreadRestrictions::AssertIOAllowed(); |
| 364 | return access(path.value().c_str(), W_OK) == 0; |
| 365 | } |
hidehiko | 4597201 | 2015-04-02 03:31:15 +0900 | [diff] [blame] | 366 | #endif // !defined(OS_NACL_NONSFI) |
brettw@chromium.org | 5a112e7 | 2013-07-16 05:18:09 +0900 | [diff] [blame] | 367 | |
| 368 | bool DirectoryExists(const FilePath& path) { |
| 369 | ThreadRestrictions::AssertIOAllowed(); |
| 370 | stat_wrapper_t file_info; |
| 371 | if (CallStat(path.value().c_str(), &file_info) == 0) |
| 372 | return S_ISDIR(file_info.st_mode); |
| 373 | return false; |
| 374 | } |
| 375 | |
phajdan.jr@chromium.org | 2372593 | 2009-04-23 21:38:08 +0900 | [diff] [blame] | 376 | bool ReadFromFD(int fd, char* buffer, size_t bytes) { |
| 377 | size_t total_read = 0; |
| 378 | while (total_read < bytes) { |
agl@chromium.org | d263ad7 | 2009-05-02 06:37:31 +0900 | [diff] [blame] | 379 | ssize_t bytes_read = |
| 380 | HANDLE_EINTR(read(fd, buffer + total_read, bytes - total_read)); |
| 381 | if (bytes_read <= 0) |
phajdan.jr@chromium.org | 2372593 | 2009-04-23 21:38:08 +0900 | [diff] [blame] | 382 | break; |
agl@chromium.org | d263ad7 | 2009-05-02 06:37:31 +0900 | [diff] [blame] | 383 | total_read += bytes_read; |
phajdan.jr@chromium.org | 2372593 | 2009-04-23 21:38:08 +0900 | [diff] [blame] | 384 | } |
| 385 | return total_read == bytes; |
| 386 | } |
| 387 | |
hidehiko | 58e1907 | 2014-11-06 08:51:52 +0900 | [diff] [blame] | 388 | #if !defined(OS_NACL_NONSFI) |
gspencer@chromium.org | 4dcc02c | 2010-11-30 09:43:37 +0900 | [diff] [blame] | 389 | bool CreateSymbolicLink(const FilePath& target_path, |
| 390 | const FilePath& symlink_path) { |
| 391 | DCHECK(!symlink_path.empty()); |
| 392 | DCHECK(!target_path.empty()); |
| 393 | return ::symlink(target_path.value().c_str(), |
| 394 | symlink_path.value().c_str()) != -1; |
| 395 | } |
| 396 | |
brettw@chromium.org | 2873d9b | 2013-11-28 08:22:08 +0900 | [diff] [blame] | 397 | bool ReadSymbolicLink(const FilePath& symlink_path, FilePath* target_path) { |
gspencer@chromium.org | 4dcc02c | 2010-11-30 09:43:37 +0900 | [diff] [blame] | 398 | DCHECK(!symlink_path.empty()); |
| 399 | DCHECK(target_path); |
| 400 | char buf[PATH_MAX]; |
| 401 | ssize_t count = ::readlink(symlink_path.value().c_str(), buf, arraysize(buf)); |
| 402 | |
gspencer@chromium.org | 3c6690c | 2010-12-04 02:37:54 +0900 | [diff] [blame] | 403 | if (count <= 0) { |
| 404 | target_path->clear(); |
gspencer@chromium.org | 4dcc02c | 2010-11-30 09:43:37 +0900 | [diff] [blame] | 405 | return false; |
gspencer@chromium.org | 3c6690c | 2010-12-04 02:37:54 +0900 | [diff] [blame] | 406 | } |
gspencer@chromium.org | 4dcc02c | 2010-11-30 09:43:37 +0900 | [diff] [blame] | 407 | |
| 408 | *target_path = FilePath(FilePath::StringType(buf, count)); |
gspencer@chromium.org | 4dcc02c | 2010-11-30 09:43:37 +0900 | [diff] [blame] | 409 | return true; |
| 410 | } |
| 411 | |
yoshiki@chromium.org | 670a38f | 2012-07-11 10:24:02 +0900 | [diff] [blame] | 412 | bool GetPosixFilePermissions(const FilePath& path, int* mode) { |
brettw@chromium.org | 2873d9b | 2013-11-28 08:22:08 +0900 | [diff] [blame] | 413 | ThreadRestrictions::AssertIOAllowed(); |
yoshiki@chromium.org | 670a38f | 2012-07-11 10:24:02 +0900 | [diff] [blame] | 414 | DCHECK(mode); |
| 415 | |
| 416 | stat_wrapper_t file_info; |
| 417 | // Uses stat(), because on symbolic link, lstat() does not return valid |
| 418 | // permission bits in st_mode |
| 419 | if (CallStat(path.value().c_str(), &file_info) != 0) |
| 420 | return false; |
| 421 | |
| 422 | *mode = file_info.st_mode & FILE_PERMISSION_MASK; |
| 423 | return true; |
| 424 | } |
| 425 | |
| 426 | bool SetPosixFilePermissions(const FilePath& path, |
| 427 | int mode) { |
brettw@chromium.org | 2873d9b | 2013-11-28 08:22:08 +0900 | [diff] [blame] | 428 | ThreadRestrictions::AssertIOAllowed(); |
cmumford | 83c1a7a | 2014-11-12 06:28:29 +0900 | [diff] [blame] | 429 | DCHECK_EQ(mode & ~FILE_PERMISSION_MASK, 0); |
yoshiki@chromium.org | 670a38f | 2012-07-11 10:24:02 +0900 | [diff] [blame] | 430 | |
| 431 | // Calls stat() so that we can preserve the higher bits like S_ISGID. |
| 432 | stat_wrapper_t stat_buf; |
| 433 | if (CallStat(path.value().c_str(), &stat_buf) != 0) |
| 434 | return false; |
| 435 | |
| 436 | // Clears the existing permission bits, and adds the new ones. |
| 437 | mode_t updated_mode_bits = stat_buf.st_mode & ~FILE_PERMISSION_MASK; |
| 438 | updated_mode_bits |= mode & FILE_PERMISSION_MASK; |
| 439 | |
| 440 | if (HANDLE_EINTR(chmod(path.value().c_str(), updated_mode_bits)) != 0) |
| 441 | return false; |
| 442 | |
| 443 | return true; |
| 444 | } |
| 445 | |
brettw@chromium.org | 83c44c8 | 2013-12-03 03:55:49 +0900 | [diff] [blame] | 446 | #if !defined(OS_MACOSX) |
| 447 | // This is implemented in file_util_mac.mm for Mac. |
| 448 | bool GetTempDir(FilePath* path) { |
| 449 | const char* tmp = getenv("TMPDIR"); |
| 450 | if (tmp) { |
| 451 | *path = FilePath(tmp); |
| 452 | } else { |
| 453 | #if defined(OS_ANDROID) |
| 454 | return PathService::Get(base::DIR_CACHE, path); |
| 455 | #else |
| 456 | *path = FilePath("/tmp"); |
| 457 | #endif |
| 458 | } |
| 459 | return true; |
| 460 | } |
| 461 | #endif // !defined(OS_MACOSX) |
| 462 | |
brettw@chromium.org | 49de1af | 2014-02-20 05:34:23 +0900 | [diff] [blame] | 463 | #if !defined(OS_MACOSX) // Mac implementation is in file_util_mac.mm. |
brettw@chromium.org | 83c44c8 | 2013-12-03 03:55:49 +0900 | [diff] [blame] | 464 | FilePath GetHomeDir() { |
| 465 | #if defined(OS_CHROMEOS) |
nkostylev@chromium.org | 45c656f | 2014-05-27 09:12:33 +0900 | [diff] [blame] | 466 | if (SysInfo::IsRunningOnChromeOS()) { |
nkostylev@chromium.org | cbf2756 | 2014-06-04 06:01:57 +0900 | [diff] [blame] | 467 | // On Chrome OS chrome::DIR_USER_DATA is overridden with a primary user |
| 468 | // homedir once it becomes available. Return / as the safe option. |
nkostylev@chromium.org | 45c656f | 2014-05-27 09:12:33 +0900 | [diff] [blame] | 469 | return FilePath("/"); |
| 470 | } |
brettw@chromium.org | 83c44c8 | 2013-12-03 03:55:49 +0900 | [diff] [blame] | 471 | #endif |
| 472 | |
| 473 | const char* home_dir = getenv("HOME"); |
| 474 | if (home_dir && home_dir[0]) |
| 475 | return FilePath(home_dir); |
| 476 | |
| 477 | #if defined(OS_ANDROID) |
| 478 | DLOG(WARNING) << "OS_ANDROID: Home directory lookup not yet implemented."; |
brettw@chromium.org | 83c44c8 | 2013-12-03 03:55:49 +0900 | [diff] [blame] | 479 | #endif |
| 480 | |
| 481 | FilePath rv; |
| 482 | if (GetTempDir(&rv)) |
| 483 | return rv; |
| 484 | |
| 485 | // Last resort. |
| 486 | return FilePath("/tmp"); |
| 487 | } |
| 488 | #endif // !defined(OS_MACOSX) |
| 489 | |
erikkay@chromium.org | 18f0dde | 2009-08-19 01:07:55 +0900 | [diff] [blame] | 490 | bool CreateTemporaryFile(FilePath* path) { |
brettw@chromium.org | 735d11d | 2013-12-04 02:55:52 +0900 | [diff] [blame] | 491 | ThreadRestrictions::AssertIOAllowed(); // For call to close(). |
jrg@chromium.org | d505c3a | 2009-02-04 09:58:39 +0900 | [diff] [blame] | 492 | FilePath directory; |
| 493 | if (!GetTempDir(&directory)) |
| 494 | return false; |
| 495 | int fd = CreateAndOpenFdForTemporaryFile(directory, path); |
mmentovai@google.com | aa13be6 | 2008-09-03 03:20:34 +0900 | [diff] [blame] | 496 | if (fd < 0) |
| 497 | return false; |
mark@chromium.org | fa5a0f9 | 2013-12-03 23:10:59 +0900 | [diff] [blame] | 498 | close(fd); |
mmentovai@google.com | aa13be6 | 2008-09-03 03:20:34 +0900 | [diff] [blame] | 499 | return true; |
| 500 | } |
| 501 | |
phajdan.jr@chromium.org | 8139fe1 | 2009-04-28 15:50:36 +0900 | [diff] [blame] | 502 | FILE* CreateAndOpenTemporaryFileInDir(const FilePath& dir, FilePath* path) { |
| 503 | int fd = CreateAndOpenFdForTemporaryFile(dir, path); |
jrg@chromium.org | d505c3a | 2009-02-04 09:58:39 +0900 | [diff] [blame] | 504 | if (fd < 0) |
| 505 | return NULL; |
| 506 | |
phajdan.jr@chromium.org | ae25ba2 | 2011-04-19 04:05:53 +0900 | [diff] [blame] | 507 | FILE* file = fdopen(fd, "a+"); |
| 508 | if (!file) |
mark@chromium.org | fa5a0f9 | 2013-12-03 23:10:59 +0900 | [diff] [blame] | 509 | close(fd); |
phajdan.jr@chromium.org | ae25ba2 | 2011-04-19 04:05:53 +0900 | [diff] [blame] | 510 | return file; |
jrg@chromium.org | d505c3a | 2009-02-04 09:58:39 +0900 | [diff] [blame] | 511 | } |
dumi@chromium.org | 13e715d | 2009-09-12 05:06:27 +0900 | [diff] [blame] | 512 | |
| 513 | bool CreateTemporaryFileInDir(const FilePath& dir, FilePath* temp_file) { |
brettw@chromium.org | 735d11d | 2013-12-04 02:55:52 +0900 | [diff] [blame] | 514 | ThreadRestrictions::AssertIOAllowed(); // For call to close(). |
dumi@chromium.org | 13e715d | 2009-09-12 05:06:27 +0900 | [diff] [blame] | 515 | int fd = CreateAndOpenFdForTemporaryFile(dir, temp_file); |
mark@chromium.org | fa5a0f9 | 2013-12-03 23:10:59 +0900 | [diff] [blame] | 516 | return ((fd >= 0) && !IGNORE_EINTR(close(fd))); |
jcampan@chromium.org | bf29e60 | 2008-10-11 03:50:32 +0900 | [diff] [blame] | 517 | } |
| 518 | |
skerner@chromium.org | e443239 | 2010-05-01 02:00:09 +0900 | [diff] [blame] | 519 | static bool CreateTemporaryDirInDirImpl(const FilePath& base_dir, |
| 520 | const FilePath::StringType& name_tmpl, |
| 521 | FilePath* new_dir) { |
brettw@chromium.org | 735d11d | 2013-12-04 02:55:52 +0900 | [diff] [blame] | 522 | ThreadRestrictions::AssertIOAllowed(); // For call to mkdtemp(). |
brettw@chromium.org | 5faed3c | 2011-10-27 06:48:00 +0900 | [diff] [blame] | 523 | DCHECK(name_tmpl.find("XXXXXX") != FilePath::StringType::npos) |
| 524 | << "Directory name template must contain \"XXXXXX\"."; |
skerner@chromium.org | e443239 | 2010-05-01 02:00:09 +0900 | [diff] [blame] | 525 | |
| 526 | FilePath sub_dir = base_dir.Append(name_tmpl); |
| 527 | std::string sub_dir_string = sub_dir.value(); |
| 528 | |
| 529 | // this should be OK since mkdtemp just replaces characters in place |
| 530 | char* buffer = const_cast<char*>(sub_dir_string.c_str()); |
| 531 | char* dtemp = mkdtemp(buffer); |
evan@chromium.org | 01ec22c | 2010-07-29 06:00:51 +0900 | [diff] [blame] | 532 | if (!dtemp) { |
| 533 | DPLOG(ERROR) << "mkdtemp"; |
skerner@chromium.org | e443239 | 2010-05-01 02:00:09 +0900 | [diff] [blame] | 534 | return false; |
evan@chromium.org | 01ec22c | 2010-07-29 06:00:51 +0900 | [diff] [blame] | 535 | } |
skerner@chromium.org | e443239 | 2010-05-01 02:00:09 +0900 | [diff] [blame] | 536 | *new_dir = FilePath(dtemp); |
| 537 | return true; |
| 538 | } |
| 539 | |
| 540 | bool CreateTemporaryDirInDir(const FilePath& base_dir, |
| 541 | const FilePath::StringType& prefix, |
skerner@chromium.org | bd112ab | 2010-06-30 16:19:11 +0900 | [diff] [blame] | 542 | FilePath* new_dir) { |
skerner@chromium.org | e443239 | 2010-05-01 02:00:09 +0900 | [diff] [blame] | 543 | FilePath::StringType mkdtemp_template = prefix; |
| 544 | mkdtemp_template.append(FILE_PATH_LITERAL("XXXXXX")); |
| 545 | return CreateTemporaryDirInDirImpl(base_dir, mkdtemp_template, new_dir); |
| 546 | } |
| 547 | |
erikkay@google.com | cce8382 | 2008-12-24 05:20:10 +0900 | [diff] [blame] | 548 | bool CreateNewTempDirectory(const FilePath::StringType& prefix, |
| 549 | FilePath* new_temp_path) { |
estade@chromium.org | f474a1b | 2008-11-11 09:01:38 +0900 | [diff] [blame] | 550 | FilePath tmpdir; |
mmentovai@google.com | aa13be6 | 2008-09-03 03:20:34 +0900 | [diff] [blame] | 551 | if (!GetTempDir(&tmpdir)) |
| 552 | return false; |
skerner@chromium.org | e443239 | 2010-05-01 02:00:09 +0900 | [diff] [blame] | 553 | |
brettw@chromium.org | 735d11d | 2013-12-04 02:55:52 +0900 | [diff] [blame] | 554 | return CreateTemporaryDirInDirImpl(tmpdir, TempFileName(), new_temp_path); |
mmentovai@google.com | aa13be6 | 2008-09-03 03:20:34 +0900 | [diff] [blame] | 555 | } |
| 556 | |
dgrogan@chromium.org | f772813 | 2013-06-11 12:50:25 +0900 | [diff] [blame] | 557 | bool CreateDirectoryAndGetError(const FilePath& full_path, |
rvargas@chromium.org | b005b38 | 2014-01-07 19:06:58 +0900 | [diff] [blame] | 558 | File::Error* error) { |
brettw@chromium.org | 738669a | 2013-12-04 05:08:54 +0900 | [diff] [blame] | 559 | ThreadRestrictions::AssertIOAllowed(); // For call to mkdir(). |
evanm@google.com | 874d167 | 2008-10-31 08:54:04 +0900 | [diff] [blame] | 560 | std::vector<FilePath> subpaths; |
| 561 | |
| 562 | // Collect a list of all parent directories. |
| 563 | FilePath last_path = full_path; |
| 564 | subpaths.push_back(full_path); |
| 565 | for (FilePath path = full_path.DirName(); |
| 566 | path.value() != last_path.value(); path = path.DirName()) { |
| 567 | subpaths.push_back(path); |
| 568 | last_path = path; |
| 569 | } |
| 570 | |
| 571 | // Iterate through the parents and create the missing ones. |
| 572 | for (std::vector<FilePath>::reverse_iterator i = subpaths.rbegin(); |
| 573 | i != subpaths.rend(); ++i) { |
thestig@chromium.org | 2e7eebc | 2010-03-18 06:39:42 +0900 | [diff] [blame] | 574 | if (DirectoryExists(*i)) |
| 575 | continue; |
| 576 | if (mkdir(i->value().c_str(), 0700) == 0) |
| 577 | continue; |
| 578 | // Mkdir failed, but it might have failed with EEXIST, or some other error |
| 579 | // due to the the directory appearing out of thin air. This can occur if |
| 580 | // two processes are trying to create the same file system tree at the same |
| 581 | // time. Check to see if it exists and make sure it is a directory. |
dgrogan@chromium.org | f772813 | 2013-06-11 12:50:25 +0900 | [diff] [blame] | 582 | int saved_errno = errno; |
| 583 | if (!DirectoryExists(*i)) { |
| 584 | if (error) |
rvargas@chromium.org | b005b38 | 2014-01-07 19:06:58 +0900 | [diff] [blame] | 585 | *error = File::OSErrorToFileError(saved_errno); |
thestig@chromium.org | 2e7eebc | 2010-03-18 06:39:42 +0900 | [diff] [blame] | 586 | return false; |
dgrogan@chromium.org | f772813 | 2013-06-11 12:50:25 +0900 | [diff] [blame] | 587 | } |
mmentovai@google.com | aa13be6 | 2008-09-03 03:20:34 +0900 | [diff] [blame] | 588 | } |
| 589 | return true; |
| 590 | } |
| 591 | |
brettw@chromium.org | 7068424 | 2013-12-05 03:22:49 +0900 | [diff] [blame] | 592 | bool NormalizeFilePath(const FilePath& path, FilePath* normalized_path) { |
| 593 | FilePath real_path_result; |
| 594 | if (!RealPath(path, &real_path_result)) |
| 595 | return false; |
| 596 | |
| 597 | // To be consistant with windows, fail if |real_path_result| is a |
| 598 | // directory. |
| 599 | stat_wrapper_t file_info; |
| 600 | if (CallStat(real_path_result.value().c_str(), &file_info) != 0 || |
| 601 | S_ISDIR(file_info.st_mode)) |
| 602 | return false; |
| 603 | |
| 604 | *normalized_path = real_path_result; |
| 605 | return true; |
| 606 | } |
| 607 | |
brettw@chromium.org | a915403 | 2013-12-05 05:56:49 +0900 | [diff] [blame] | 608 | // TODO(rkc): Refactor GetFileInfo and FileEnumerator to handle symlinks |
| 609 | // correctly. http://code.google.com/p/chromium-os/issues/detail?id=15948 |
| 610 | bool IsLink(const FilePath& file_path) { |
| 611 | stat_wrapper_t st; |
| 612 | // If we can't lstat the file, it's safe to assume that the file won't at |
| 613 | // least be a 'followable' link. |
| 614 | if (CallLstat(file_path.value().c_str(), &st) != 0) |
| 615 | return false; |
| 616 | |
| 617 | if (S_ISLNK(st.st_mode)) |
| 618 | return true; |
| 619 | else |
| 620 | return false; |
| 621 | } |
| 622 | |
rvargas@chromium.org | b005b38 | 2014-01-07 19:06:58 +0900 | [diff] [blame] | 623 | bool GetFileInfo(const FilePath& file_path, File::Info* results) { |
brettw@chromium.org | a915403 | 2013-12-05 05:56:49 +0900 | [diff] [blame] | 624 | stat_wrapper_t file_info; |
| 625 | #if defined(OS_ANDROID) |
| 626 | if (file_path.IsContentUri()) { |
rvargas@chromium.org | 799ba6c | 2014-03-21 09:41:15 +0900 | [diff] [blame] | 627 | File file = OpenContentUriForRead(file_path); |
| 628 | if (!file.IsValid()) |
brettw@chromium.org | a915403 | 2013-12-05 05:56:49 +0900 | [diff] [blame] | 629 | return false; |
rvargas@chromium.org | 799ba6c | 2014-03-21 09:41:15 +0900 | [diff] [blame] | 630 | return file.GetInfo(results); |
brettw@chromium.org | a915403 | 2013-12-05 05:56:49 +0900 | [diff] [blame] | 631 | } else { |
| 632 | #endif // defined(OS_ANDROID) |
| 633 | if (CallStat(file_path.value().c_str(), &file_info) != 0) |
| 634 | return false; |
| 635 | #if defined(OS_ANDROID) |
| 636 | } |
| 637 | #endif // defined(OS_ANDROID) |
rvargas@chromium.org | 527ea31 | 2014-04-05 11:39:18 +0900 | [diff] [blame] | 638 | |
| 639 | results->FromStat(file_info); |
brettw@chromium.org | a915403 | 2013-12-05 05:56:49 +0900 | [diff] [blame] | 640 | return true; |
| 641 | } |
hidehiko | 4f3f44c | 2015-06-09 11:50:57 +0900 | [diff] [blame] | 642 | #endif // !defined(OS_NACL_NONSFI) |
brettw@chromium.org | a915403 | 2013-12-05 05:56:49 +0900 | [diff] [blame] | 643 | |
thakis@chromium.org | f01de7e | 2013-12-09 06:43:30 +0900 | [diff] [blame] | 644 | FILE* OpenFile(const FilePath& filename, const char* mode) { |
| 645 | ThreadRestrictions::AssertIOAllowed(); |
| 646 | FILE* result = NULL; |
| 647 | do { |
| 648 | result = fopen(filename.value().c_str(), mode); |
| 649 | } while (!result && errno == EINTR); |
| 650 | return result; |
| 651 | } |
| 652 | |
rvargas@chromium.org | 43d4a8e | 2014-06-10 20:19:50 +0900 | [diff] [blame] | 653 | // NaCl doesn't implement system calls to open files directly. |
| 654 | #if !defined(OS_NACL) |
| 655 | FILE* FileToFILE(File file, const char* mode) { |
| 656 | FILE* stream = fdopen(file.GetPlatformFile(), mode); |
| 657 | if (stream) |
| 658 | file.TakePlatformFile(); |
| 659 | return stream; |
| 660 | } |
| 661 | #endif // !defined(OS_NACL) |
| 662 | |
fukino@chromium.org | af9cba0 | 2014-04-18 19:34:15 +0900 | [diff] [blame] | 663 | int ReadFile(const FilePath& filename, char* data, int max_size) { |
thakis@chromium.org | f01de7e | 2013-12-09 06:43:30 +0900 | [diff] [blame] | 664 | ThreadRestrictions::AssertIOAllowed(); |
| 665 | int fd = HANDLE_EINTR(open(filename.value().c_str(), O_RDONLY)); |
| 666 | if (fd < 0) |
| 667 | return -1; |
| 668 | |
fukino@chromium.org | af9cba0 | 2014-04-18 19:34:15 +0900 | [diff] [blame] | 669 | ssize_t bytes_read = HANDLE_EINTR(read(fd, data, max_size)); |
| 670 | if (IGNORE_EINTR(close(fd)) < 0) |
| 671 | return -1; |
thakis@chromium.org | f01de7e | 2013-12-09 06:43:30 +0900 | [diff] [blame] | 672 | return bytes_read; |
| 673 | } |
| 674 | |
brettw@chromium.org | 8c7b6b8 | 2014-03-07 05:42:30 +0900 | [diff] [blame] | 675 | int WriteFile(const FilePath& filename, const char* data, int size) { |
| 676 | ThreadRestrictions::AssertIOAllowed(); |
hashimoto | c9ac139 | 2015-10-14 14:18:54 +0900 | [diff] [blame] | 677 | int fd = HANDLE_EINTR(creat(filename.value().c_str(), 0666)); |
brettw@chromium.org | 8c7b6b8 | 2014-03-07 05:42:30 +0900 | [diff] [blame] | 678 | if (fd < 0) |
| 679 | return -1; |
| 680 | |
chirantan | 05106cc | 2014-10-08 08:15:30 +0900 | [diff] [blame] | 681 | int bytes_written = WriteFileDescriptor(fd, data, size) ? size : -1; |
fukino@chromium.org | af9cba0 | 2014-04-18 19:34:15 +0900 | [diff] [blame] | 682 | if (IGNORE_EINTR(close(fd)) < 0) |
| 683 | return -1; |
brettw@chromium.org | 8c7b6b8 | 2014-03-07 05:42:30 +0900 | [diff] [blame] | 684 | return bytes_written; |
| 685 | } |
| 686 | |
chirantan | 05106cc | 2014-10-08 08:15:30 +0900 | [diff] [blame] | 687 | bool WriteFileDescriptor(const int fd, const char* data, int size) { |
brettw@chromium.org | 8c7b6b8 | 2014-03-07 05:42:30 +0900 | [diff] [blame] | 688 | // Allow for partial writes. |
| 689 | ssize_t bytes_written_total = 0; |
| 690 | for (ssize_t bytes_written_partial = 0; bytes_written_total < size; |
| 691 | bytes_written_total += bytes_written_partial) { |
| 692 | bytes_written_partial = |
| 693 | HANDLE_EINTR(write(fd, data + bytes_written_total, |
| 694 | size - bytes_written_total)); |
| 695 | if (bytes_written_partial < 0) |
chirantan | 05106cc | 2014-10-08 08:15:30 +0900 | [diff] [blame] | 696 | return false; |
brettw@chromium.org | 8c7b6b8 | 2014-03-07 05:42:30 +0900 | [diff] [blame] | 697 | } |
| 698 | |
chirantan | 05106cc | 2014-10-08 08:15:30 +0900 | [diff] [blame] | 699 | return true; |
brettw@chromium.org | 8c7b6b8 | 2014-03-07 05:42:30 +0900 | [diff] [blame] | 700 | } |
| 701 | |
hidehiko | 4f3f44c | 2015-06-09 11:50:57 +0900 | [diff] [blame] | 702 | #if !defined(OS_NACL_NONSFI) |
| 703 | |
chirantan | 05106cc | 2014-10-08 08:15:30 +0900 | [diff] [blame] | 704 | bool AppendToFile(const FilePath& filename, const char* data, int size) { |
brettw@chromium.org | 14b3aa2 | 2014-03-12 05:59:02 +0900 | [diff] [blame] | 705 | ThreadRestrictions::AssertIOAllowed(); |
chirantan | 05106cc | 2014-10-08 08:15:30 +0900 | [diff] [blame] | 706 | bool ret = true; |
brettw@chromium.org | 14b3aa2 | 2014-03-12 05:59:02 +0900 | [diff] [blame] | 707 | int fd = HANDLE_EINTR(open(filename.value().c_str(), O_WRONLY | O_APPEND)); |
chirantan | 05106cc | 2014-10-08 08:15:30 +0900 | [diff] [blame] | 708 | if (fd < 0) { |
| 709 | VPLOG(1) << "Unable to create file " << filename.value(); |
| 710 | return false; |
| 711 | } |
brettw@chromium.org | 14b3aa2 | 2014-03-12 05:59:02 +0900 | [diff] [blame] | 712 | |
chirantan | 05106cc | 2014-10-08 08:15:30 +0900 | [diff] [blame] | 713 | // This call will either write all of the data or return false. |
| 714 | if (!WriteFileDescriptor(fd, data, size)) { |
| 715 | VPLOG(1) << "Error while writing to file " << filename.value(); |
| 716 | ret = false; |
| 717 | } |
| 718 | |
| 719 | if (IGNORE_EINTR(close(fd)) < 0) { |
| 720 | VPLOG(1) << "Error while closing file " << filename.value(); |
| 721 | return false; |
| 722 | } |
| 723 | |
| 724 | return ret; |
brettw@chromium.org | 14b3aa2 | 2014-03-12 05:59:02 +0900 | [diff] [blame] | 725 | } |
| 726 | |
| 727 | // Gets the current working directory for the process. |
| 728 | bool GetCurrentDirectory(FilePath* dir) { |
| 729 | // getcwd can return ENOENT, which implies it checks against the disk. |
| 730 | ThreadRestrictions::AssertIOAllowed(); |
| 731 | |
| 732 | char system_buffer[PATH_MAX] = ""; |
| 733 | if (!getcwd(system_buffer, sizeof(system_buffer))) { |
| 734 | NOTREACHED(); |
| 735 | return false; |
| 736 | } |
| 737 | *dir = FilePath(system_buffer); |
| 738 | return true; |
| 739 | } |
| 740 | |
| 741 | // Sets the current working directory for the process. |
| 742 | bool SetCurrentDirectory(const FilePath& path) { |
| 743 | ThreadRestrictions::AssertIOAllowed(); |
| 744 | int ret = chdir(path.value().c_str()); |
| 745 | return !ret; |
| 746 | } |
| 747 | |
skerner@google.com | 93449ef | 2011-09-22 23:47:18 +0900 | [diff] [blame] | 748 | bool VerifyPathControlledByUser(const FilePath& base, |
| 749 | const FilePath& path, |
| 750 | uid_t owner_uid, |
skerner@chromium.org | 8078414 | 2011-10-18 06:30:29 +0900 | [diff] [blame] | 751 | const std::set<gid_t>& group_gids) { |
skerner@google.com | 93449ef | 2011-09-22 23:47:18 +0900 | [diff] [blame] | 752 | if (base != path && !base.IsParent(path)) { |
brettw@chromium.org | 5faed3c | 2011-10-27 06:48:00 +0900 | [diff] [blame] | 753 | DLOG(ERROR) << "|base| must be a subdirectory of |path|. base = \"" |
| 754 | << base.value() << "\", path = \"" << path.value() << "\""; |
skerner@google.com | 93449ef | 2011-09-22 23:47:18 +0900 | [diff] [blame] | 755 | return false; |
| 756 | } |
| 757 | |
| 758 | std::vector<FilePath::StringType> base_components; |
| 759 | std::vector<FilePath::StringType> path_components; |
| 760 | |
| 761 | base.GetComponents(&base_components); |
| 762 | path.GetComponents(&path_components); |
| 763 | |
| 764 | std::vector<FilePath::StringType>::const_iterator ib, ip; |
| 765 | for (ib = base_components.begin(), ip = path_components.begin(); |
| 766 | ib != base_components.end(); ++ib, ++ip) { |
| 767 | // |base| must be a subpath of |path|, so all components should match. |
| 768 | // If these CHECKs fail, look at the test that base is a parent of |
| 769 | // path at the top of this function. |
brettw@chromium.org | 5faed3c | 2011-10-27 06:48:00 +0900 | [diff] [blame] | 770 | DCHECK(ip != path_components.end()); |
| 771 | DCHECK(*ip == *ib); |
skerner@google.com | 93449ef | 2011-09-22 23:47:18 +0900 | [diff] [blame] | 772 | } |
| 773 | |
| 774 | FilePath current_path = base; |
skerner@chromium.org | 8078414 | 2011-10-18 06:30:29 +0900 | [diff] [blame] | 775 | if (!VerifySpecificPathControlledByUser(current_path, owner_uid, group_gids)) |
skerner@google.com | 93449ef | 2011-09-22 23:47:18 +0900 | [diff] [blame] | 776 | return false; |
| 777 | |
| 778 | for (; ip != path_components.end(); ++ip) { |
| 779 | current_path = current_path.Append(*ip); |
skerner@chromium.org | 8078414 | 2011-10-18 06:30:29 +0900 | [diff] [blame] | 780 | if (!VerifySpecificPathControlledByUser( |
| 781 | current_path, owner_uid, group_gids)) |
skerner@google.com | 93449ef | 2011-09-22 23:47:18 +0900 | [diff] [blame] | 782 | return false; |
| 783 | } |
| 784 | return true; |
| 785 | } |
| 786 | |
qsr@chromium.org | 4ab5de9 | 2012-07-09 23:40:39 +0900 | [diff] [blame] | 787 | #if defined(OS_MACOSX) && !defined(OS_IOS) |
skerner@google.com | 93449ef | 2011-09-22 23:47:18 +0900 | [diff] [blame] | 788 | bool VerifyPathControlledByAdmin(const FilePath& path) { |
| 789 | const unsigned kRootUid = 0; |
| 790 | const FilePath kFileSystemRoot("/"); |
| 791 | |
| 792 | // The name of the administrator group on mac os. |
skerner@chromium.org | 8078414 | 2011-10-18 06:30:29 +0900 | [diff] [blame] | 793 | const char* const kAdminGroupNames[] = { |
| 794 | "admin", |
| 795 | "wheel" |
| 796 | }; |
skerner@google.com | 93449ef | 2011-09-22 23:47:18 +0900 | [diff] [blame] | 797 | |
| 798 | // Reading the groups database may touch the file system. |
brettw@chromium.org | aa82a77 | 2014-03-14 02:26:21 +0900 | [diff] [blame] | 799 | ThreadRestrictions::AssertIOAllowed(); |
skerner@google.com | 93449ef | 2011-09-22 23:47:18 +0900 | [diff] [blame] | 800 | |
skerner@chromium.org | 8078414 | 2011-10-18 06:30:29 +0900 | [diff] [blame] | 801 | std::set<gid_t> allowed_group_ids; |
| 802 | for (int i = 0, ie = arraysize(kAdminGroupNames); i < ie; ++i) { |
| 803 | struct group *group_record = getgrnam(kAdminGroupNames[i]); |
| 804 | if (!group_record) { |
brettw@chromium.org | 5faed3c | 2011-10-27 06:48:00 +0900 | [diff] [blame] | 805 | DPLOG(ERROR) << "Could not get the group ID of group \"" |
| 806 | << kAdminGroupNames[i] << "\"."; |
skerner@chromium.org | 8078414 | 2011-10-18 06:30:29 +0900 | [diff] [blame] | 807 | continue; |
| 808 | } |
| 809 | |
| 810 | allowed_group_ids.insert(group_record->gr_gid); |
skerner@google.com | 93449ef | 2011-09-22 23:47:18 +0900 | [diff] [blame] | 811 | } |
| 812 | |
| 813 | return VerifyPathControlledByUser( |
skerner@chromium.org | 8078414 | 2011-10-18 06:30:29 +0900 | [diff] [blame] | 814 | kFileSystemRoot, path, kRootUid, allowed_group_ids); |
skerner@google.com | 93449ef | 2011-09-22 23:47:18 +0900 | [diff] [blame] | 815 | } |
stuartmorgan@chromium.org | 925e0b7 | 2012-07-24 20:23:32 +0900 | [diff] [blame] | 816 | #endif // defined(OS_MACOSX) && !defined(OS_IOS) |
skerner@google.com | 93449ef | 2011-09-22 23:47:18 +0900 | [diff] [blame] | 817 | |
kinaba@chromium.org | bbe80ba | 2013-02-21 12:24:08 +0900 | [diff] [blame] | 818 | int GetMaximumPathComponentLength(const FilePath& path) { |
brettw@chromium.org | aa82a77 | 2014-03-14 02:26:21 +0900 | [diff] [blame] | 819 | ThreadRestrictions::AssertIOAllowed(); |
kinaba@chromium.org | bbe80ba | 2013-02-21 12:24:08 +0900 | [diff] [blame] | 820 | return pathconf(path.value().c_str(), _PC_NAME_MAX); |
| 821 | } |
| 822 | |
viettrungluu@chromium.org | 5c328d5 | 2014-03-21 06:33:39 +0900 | [diff] [blame] | 823 | #if !defined(OS_ANDROID) |
| 824 | // This is implemented in file_util_android.cc for that platform. |
viettrungluu@chromium.org | c9a4b21 | 2014-03-20 16:06:40 +0900 | [diff] [blame] | 825 | bool GetShmemTempDir(bool executable, FilePath* path) { |
| 826 | #if defined(OS_LINUX) |
| 827 | bool use_dev_shm = true; |
| 828 | if (executable) { |
| 829 | static const bool s_dev_shm_executable = DetermineDevShmExecutable(); |
| 830 | use_dev_shm = s_dev_shm_executable; |
| 831 | } |
| 832 | if (use_dev_shm) { |
| 833 | *path = FilePath("/dev/shm"); |
| 834 | return true; |
| 835 | } |
| 836 | #endif |
| 837 | return GetTempDir(path); |
| 838 | } |
viettrungluu@chromium.org | 5c328d5 | 2014-03-21 06:33:39 +0900 | [diff] [blame] | 839 | #endif // !defined(OS_ANDROID) |
viettrungluu@chromium.org | c9a4b21 | 2014-03-20 16:06:40 +0900 | [diff] [blame] | 840 | |
cmumford | 1daaa6b | 2014-11-18 03:58:20 +0900 | [diff] [blame] | 841 | #if !defined(OS_MACOSX) |
| 842 | // Mac has its own implementation, this is for all other Posix systems. |
| 843 | bool CopyFile(const FilePath& from_path, const FilePath& to_path) { |
| 844 | ThreadRestrictions::AssertIOAllowed(); |
| 845 | File infile; |
| 846 | #if defined(OS_ANDROID) |
| 847 | if (from_path.IsContentUri()) { |
| 848 | infile = OpenContentUriForRead(from_path); |
| 849 | } else { |
| 850 | infile = File(from_path, File::FLAG_OPEN | File::FLAG_READ); |
| 851 | } |
| 852 | #else |
| 853 | infile = File(from_path, File::FLAG_OPEN | File::FLAG_READ); |
| 854 | #endif |
| 855 | if (!infile.IsValid()) |
| 856 | return false; |
| 857 | |
| 858 | File outfile(to_path, File::FLAG_WRITE | File::FLAG_CREATE_ALWAYS); |
| 859 | if (!outfile.IsValid()) |
| 860 | return false; |
| 861 | |
| 862 | const size_t kBufferSize = 32768; |
| 863 | std::vector<char> buffer(kBufferSize); |
| 864 | bool result = true; |
| 865 | |
| 866 | while (result) { |
| 867 | ssize_t bytes_read = infile.ReadAtCurrentPos(&buffer[0], buffer.size()); |
| 868 | if (bytes_read < 0) { |
| 869 | result = false; |
| 870 | break; |
| 871 | } |
| 872 | if (bytes_read == 0) |
| 873 | break; |
| 874 | // Allow for partial writes |
| 875 | ssize_t bytes_written_per_read = 0; |
| 876 | do { |
| 877 | ssize_t bytes_written_partial = outfile.WriteAtCurrentPos( |
| 878 | &buffer[bytes_written_per_read], bytes_read - bytes_written_per_read); |
| 879 | if (bytes_written_partial < 0) { |
| 880 | result = false; |
| 881 | break; |
| 882 | } |
| 883 | bytes_written_per_read += bytes_written_partial; |
| 884 | } while (bytes_written_per_read < bytes_read); |
| 885 | } |
| 886 | |
| 887 | return result; |
| 888 | } |
| 889 | #endif // !defined(OS_MACOSX) |
| 890 | |
brettw@chromium.org | aa82a77 | 2014-03-14 02:26:21 +0900 | [diff] [blame] | 891 | // ----------------------------------------------------------------------------- |
brettw@chromium.org | aecf7a3 | 2013-07-10 02:42:26 +0900 | [diff] [blame] | 892 | |
brettw@chromium.org | aecf7a3 | 2013-07-10 02:42:26 +0900 | [diff] [blame] | 893 | namespace internal { |
| 894 | |
| 895 | bool MoveUnsafe(const FilePath& from_path, const FilePath& to_path) { |
| 896 | ThreadRestrictions::AssertIOAllowed(); |
| 897 | // Windows compatibility: if to_path exists, from_path and to_path |
| 898 | // must be the same type, either both files, or both directories. |
| 899 | stat_wrapper_t to_file_info; |
| 900 | if (CallStat(to_path.value().c_str(), &to_file_info) == 0) { |
| 901 | stat_wrapper_t from_file_info; |
| 902 | if (CallStat(from_path.value().c_str(), &from_file_info) == 0) { |
| 903 | if (S_ISDIR(to_file_info.st_mode) != S_ISDIR(from_file_info.st_mode)) |
| 904 | return false; |
| 905 | } else { |
| 906 | return false; |
| 907 | } |
| 908 | } |
| 909 | |
| 910 | if (rename(from_path.value().c_str(), to_path.value().c_str()) == 0) |
| 911 | return true; |
| 912 | |
| 913 | if (!CopyDirectory(from_path, to_path, true)) |
| 914 | return false; |
| 915 | |
brettw@chromium.org | 220b8de | 2013-07-17 04:10:23 +0900 | [diff] [blame] | 916 | DeleteFile(from_path, true); |
brettw@chromium.org | aecf7a3 | 2013-07-10 02:42:26 +0900 | [diff] [blame] | 917 | return true; |
| 918 | } |
| 919 | |
brettw@chromium.org | aecf7a3 | 2013-07-10 02:42:26 +0900 | [diff] [blame] | 920 | } // namespace internal |
hidehiko | ce6251b | 2014-10-17 15:40:30 +0900 | [diff] [blame] | 921 | |
hidehiko | 58e1907 | 2014-11-06 08:51:52 +0900 | [diff] [blame] | 922 | #endif // !defined(OS_NACL_NONSFI) |
brettw@chromium.org | aecf7a3 | 2013-07-10 02:42:26 +0900 | [diff] [blame] | 923 | } // namespace base |