1
    2
    3
    4
    5
    6
    7
    8
    9
   10
   11
   12
   13
   14
   15
   16
   17
   18
   19
   20
   21
   22
   23
   24
   25
   26
   27
   28
   29
   30
   31
   32
   33
   34
   35
   36
   37
   38
   39
   40
   41
   42
   43
   44
   45
   46
   47
   48
   49
   50
   51
   52
   53
   54
   55
   56
   57
   58
   59
   60
   61
   62
   63
   64
   65
   66
   67
   68
   69
   70
   71
   72
   73
   74
   75
   76
   77
   78
   79
   80
   81
   82
   83
   84
   85
   86
   87
   88
   89
   90
   91
   92
   93
   94
   95
   96
   97
   98
   99
  100
  101
  102
  103
  104
  105
  106
  107
  108
  109
  110
  111
  112
  113
  114
  115
  116
  117
  118
  119
  120
  121
  122
  123
  124
  125

content / public / test / fake_file_system_access_permission_context.cc [blame]

// Copyright 2021 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.

#include "content/public/test/fake_file_system_access_permission_context.h"

#include "base/containers/contains.h"
#include "base/files/file_path.h"
#include "content/browser/file_system_access/fixed_file_system_access_permission_grant.h"

namespace content {

FakeFileSystemAccessPermissionContext::FakeFileSystemAccessPermissionContext() =
    default;

FakeFileSystemAccessPermissionContext::
    ~FakeFileSystemAccessPermissionContext() = default;

scoped_refptr<FileSystemAccessPermissionGrant>
FakeFileSystemAccessPermissionContext::GetReadPermissionGrant(
    const url::Origin& origin,
    const PathInfo& path_info,
    HandleType handle_type,
    UserAction user_action) {
  return base::MakeRefCounted<FixedFileSystemAccessPermissionGrant>(
      FileSystemAccessPermissionGrant::PermissionStatus::GRANTED, path_info);
}

scoped_refptr<FileSystemAccessPermissionGrant>
FakeFileSystemAccessPermissionContext::GetWritePermissionGrant(
    const url::Origin& origin,
    const PathInfo& path_info,
    HandleType handle_type,
    UserAction user_action) {
  return base::MakeRefCounted<FixedFileSystemAccessPermissionGrant>(
      FileSystemAccessPermissionGrant::PermissionStatus::GRANTED, path_info);
}

void FakeFileSystemAccessPermissionContext::ConfirmSensitiveEntryAccess(
    const url::Origin& origin,
    const PathInfo& path_info,
    HandleType handle_type,
    UserAction user_action,
    GlobalRenderFrameHostId frame_id,
    base::OnceCallback<void(SensitiveEntryResult)> callback) {
  std::move(callback).Run(SensitiveEntryResult::kAllowed);
}

void FakeFileSystemAccessPermissionContext::PerformAfterWriteChecks(
    std::unique_ptr<FileSystemAccessWriteItem> item,
    GlobalRenderFrameHostId frame_id,
    base::OnceCallback<void(AfterWriteCheckResult)> callback) {
  std::move(callback).Run(AfterWriteCheckResult::kAllow);
}

bool FakeFileSystemAccessPermissionContext::IsFileTypeDangerous(
    const base::FilePath& path,
    const url::Origin& origin) {
  return false;
}

base::expected<void, std::string>
FakeFileSystemAccessPermissionContext::CanShowFilePicker(RenderFrameHost* rfh) {
  return base::ok();
}

bool FakeFileSystemAccessPermissionContext::CanObtainReadPermission(
    const url::Origin& origin) {
  return true;
}
bool FakeFileSystemAccessPermissionContext::CanObtainWritePermission(
    const url::Origin& origin) {
  return true;
}

void FakeFileSystemAccessPermissionContext::SetLastPickedDirectory(
    const url::Origin& origin,
    const std::string& id,
    const PathInfo& path_info) {
  id_pathinfo_map_.insert({id, path_info});
}

PathInfo FakeFileSystemAccessPermissionContext::GetLastPickedDirectory(
    const url::Origin& origin,
    const std::string& id) {
  return base::Contains(id_pathinfo_map_, id) ? id_pathinfo_map_[id]
                                              : PathInfo();
}

void FakeFileSystemAccessPermissionContext::SetWellKnownDirectoryPath(
    blink::mojom::WellKnownDirectory directory,
    base::FilePath path) {
  well_known_directory_map_.insert({directory, path});
}

base::FilePath FakeFileSystemAccessPermissionContext::GetWellKnownDirectoryPath(
    blink::mojom::WellKnownDirectory directory,
    const url::Origin& origin) {
  return base::Contains(well_known_directory_map_, directory)
             ? well_known_directory_map_[directory]
             : base::FilePath();
}

std::u16string FakeFileSystemAccessPermissionContext::GetPickerTitle(
    const blink::mojom::FilePickerOptionsPtr& options) {
  return kPickerTitle;
}

void FakeFileSystemAccessPermissionContext::NotifyEntryMoved(
    const url::Origin& origin,
    const PathInfo& old_path,
    const PathInfo& new_path) {}

void FakeFileSystemAccessPermissionContext::OnFileCreatedFromShowSaveFilePicker(
    const GURL& file_picker_binding_context,
    const storage::FileSystemURL& url) {}

void FakeFileSystemAccessPermissionContext::CheckPathsAgainstEnterprisePolicy(
    std::vector<PathInfo> entries,
    GlobalRenderFrameHostId frame_id,
    EntriesAllowedByEnterprisePolicyCallback callback) {
  std::move(callback).Run(std::move(entries));
}

}  // namespace content