1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
content / browser / file_system_access / file_system_access_watch_scope.h [blame]
// Copyright 2023 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef CONTENT_BROWSER_FILE_SYSTEM_ACCESS_FILE_SYSTEM_ACCESS_WATCH_SCOPE_H_
#define CONTENT_BROWSER_FILE_SYSTEM_ACCESS_FILE_SYSTEM_ACCESS_WATCH_SCOPE_H_
#include "content/common/content_export.h"
#include "content/public/browser/file_system_access_permission_context.h"
#include "storage/browser/file_system/file_system_url.h"
namespace content {
// Describes the extent of the file system that is being observed, which can be
// a single file, a directory and its contents, or a directory and all its
// subdirectories.
class CONTENT_EXPORT FileSystemAccessWatchScope {
public:
enum class WatchType {
kAllBucketFileSystems,
kFile,
kDirectoryNonRecursive,
kDirectoryRecursive,
};
// TODO(crbug.com/341239594): Consider using something like a PassKey
// to restrict access to these initializers.
static FileSystemAccessWatchScope GetScopeForFileWatch(
const storage::FileSystemURL& file_url);
static FileSystemAccessWatchScope GetScopeForDirectoryWatch(
const storage::FileSystemURL& directory_url,
bool is_recursive);
static FileSystemAccessWatchScope GetScopeForAllBucketFileSystems();
~FileSystemAccessWatchScope();
// Copyable and movable.
FileSystemAccessWatchScope(const FileSystemAccessWatchScope&);
FileSystemAccessWatchScope(FileSystemAccessWatchScope&&) noexcept;
FileSystemAccessWatchScope& operator=(const FileSystemAccessWatchScope&);
FileSystemAccessWatchScope& operator=(FileSystemAccessWatchScope&&) noexcept;
// Returns true if `url` is contained within this `Scope`.
bool Contains(const storage::FileSystemURL& url) const;
// Returns true if `scope` is contained within this `Scope`.
bool Contains(const FileSystemAccessWatchScope& scope) const;
bool IsRecursive() const {
switch (watch_type_) {
case WatchType::kFile:
case WatchType::kDirectoryNonRecursive:
return false;
case WatchType::kAllBucketFileSystems:
case WatchType::kDirectoryRecursive:
return true;
}
}
// This method may only be called when `watch_type_` is not
// `WatchType::kAllBucketFileSystems`.
const storage::FileSystemURL& root_url() const {
CHECK(root_url_.is_valid());
return root_url_;
}
WatchType GetWatchType() const { return watch_type_; }
FileSystemAccessPermissionContext::HandleType handle_type() const {
switch (watch_type_) {
case WatchType::kFile:
return FileSystemAccessPermissionContext::HandleType::kFile;
case WatchType::kAllBucketFileSystems:
case WatchType::kDirectoryNonRecursive:
case WatchType::kDirectoryRecursive:
return FileSystemAccessPermissionContext::HandleType::kDirectory;
}
}
bool operator==(const FileSystemAccessWatchScope& other) const {
return root_url_ == other.root_url_ && watch_type_ == other.watch_type_;
}
private:
FileSystemAccessWatchScope(storage::FileSystemURL root_url,
WatchType watch_type);
// Invalid iff `watch_type_` is `WatchType::kAllBucketFileSystems`.
storage::FileSystemURL root_url_;
WatchType watch_type_;
};
} // namespace content
#endif // CONTENT_BROWSER_FILE_SYSTEM_ACCESS_FILE_SYSTEM_ACCESS_WATCH_SCOPE_H_