blob: 74c8954e1eac33da8f2db2c679c5427dd8665b97 [file] [log] [blame]
// Copyright (c) 2012 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "chrome/browser/chromeos/gdata/gdata_util.h"
#include <string>
#include <vector>
#include <utility>
#include "base/basictypes.h"
#include "base/bind.h"
#include "base/bind_helpers.h"
#include "base/command_line.h"
#include "base/file_path.h"
#include "base/file_util.h"
#include "base/json/json_reader.h"
#include "base/logging.h"
#include "base/string_number_conversions.h"
#include "base/string_util.h"
#include "base/stringprintf.h"
#include "base/threading/sequenced_worker_pool.h"
#include "base/time.h"
#include "base/tracked_objects.h"
#include "chrome/browser/chromeos/gdata/drive.pb.h"
#include "chrome/browser/chromeos/gdata/file_write_helper.h"
#include "chrome/browser/chromeos/gdata/gdata_file_system_interface.h"
#include "chrome/browser/chromeos/gdata/gdata_system_service.h"
#include "chrome/browser/chromeos/login/user.h"
#include "chrome/browser/chromeos/login/user_manager.h"
#include "chrome/browser/prefs/pref_service.h"
#include "chrome/browser/profiles/profile.h"
#include "chrome/browser/ui/browser.h"
#include "chrome/browser/ui/browser_finder.h"
#include "chrome/common/chrome_switches.h"
#include "chrome/common/chrome_version_info.h"
#include "chrome/common/pref_names.h"
#include "chrome/common/url_constants.h"
#include "content/public/browser/browser_thread.h"
#include "content/public/browser/child_process_security_policy.h"
#include "net/base/escape.h"
#include "third_party/libxml/chromium/libxml_utils.h"
using content::BrowserThread;
namespace gdata {
namespace util {
namespace {
const char kGDataSpecialRootPath[] = "/special";
const char kGDataMountPointPath[] = "/special/drive";
const FilePath::CharType* kGDataMountPointPathComponents[] = {
"/", "special", "drive"
};
const int kReadOnlyFilePermissions = base::PLATFORM_FILE_OPEN |
base::PLATFORM_FILE_READ |
base::PLATFORM_FILE_EXCLUSIVE_READ |
base::PLATFORM_FILE_ASYNC;
GDataFileSystemInterface* GetGDataFileSystem(Profile* profile) {
GDataSystemService* system_service =
GDataSystemServiceFactory::GetForProfile(profile);
return system_service ? system_service->file_system() : NULL;
}
DriveCache* GetDriveCache(Profile* profile) {
GDataSystemService* system_service =
GDataSystemServiceFactory::GetForProfile(profile);
return system_service ? system_service->cache() : NULL;
}
FileWriteHelper* GetFileWriteHelper(Profile* profile) {
GDataSystemService* system_service =
GDataSystemServiceFactory::GetForProfile(profile);
return system_service ? system_service->file_write_helper() : NULL;
}
void GetHostedDocumentURLBlockingThread(const FilePath& drive_cache_path,
GURL* url) {
std::string json;
if (!file_util::ReadFileToString(drive_cache_path, &json)) {
NOTREACHED() << "Unable to read file " << drive_cache_path.value();
return;
}
DVLOG(1) << "Hosted doc content " << json;
scoped_ptr<base::Value> val(base::JSONReader::Read(json));
base::DictionaryValue* dict_val;
if (!val.get() || !val->GetAsDictionary(&dict_val)) {
NOTREACHED() << "Parse failure for " << json;
return;
}
std::string edit_url;
if (!dict_val->GetString("url", &edit_url)) {
NOTREACHED() << "url field doesn't exist in " << json;
return;
}
*url = GURL(edit_url);
DVLOG(1) << "edit url " << *url;
}
void OpenEditURLUIThread(Profile* profile, const GURL* edit_url) {
Browser* browser = browser::FindLastActiveWithProfile(profile);
if (browser) {
browser->OpenURL(content::OpenURLParams(*edit_url, content::Referrer(),
CURRENT_TAB, content::PAGE_TRANSITION_TYPED, false));
}
}
// Invoked upon completion of GetEntryInfoByResourceId initiated by
// ModifyGDataFileResourceUrl.
void OnGetEntryInfoByResourceId(Profile* profile,
const std::string& resource_id,
DriveFileError error,
const FilePath& /* gdata_file_path */,
scoped_ptr<DriveEntryProto> entry_proto) {
DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
if (error != DRIVE_FILE_OK)
return;
DCHECK(entry_proto.get());
const std::string& base_name = entry_proto->base_name();
const GURL edit_url = GetFileResourceUrl(resource_id, base_name);
OpenEditURLUIThread(profile, &edit_url);
DVLOG(1) << "OnFindEntryByResourceId " << edit_url;
}
// Invoked upon completion of GetEntryInfoByPath initiated by
// InsertDriveCachePathPermissions.
void OnGetEntryInfoForInsertDriveCachePathsPermissions(
Profile* profile,
std::vector<std::pair<FilePath, int> >* cache_paths,
const base::Closure& callback,
DriveFileError error,
scoped_ptr<DriveEntryProto> entry_proto) {
DCHECK(profile);
DCHECK(cache_paths);
DCHECK(!callback.is_null());
if (entry_proto.get() && !entry_proto->has_file_specific_info())
error = DRIVE_FILE_ERROR_NOT_FOUND;
DriveCache* cache = GetDriveCache(profile);
if (!cache || error != DRIVE_FILE_OK) {
callback.Run();
return;
}
DCHECK(entry_proto.get());
const std::string& resource_id = entry_proto->resource_id();
const std::string& file_md5 = entry_proto->file_specific_info().file_md5();
// We check permissions for raw cache file paths only for read-only
// operations (when fileEntry.file() is called), so read only permissions
// should be sufficient for all cache paths. For the rest of supported
// operations the file access check is done for drive/ paths.
cache_paths->push_back(std::make_pair(
cache->GetCacheFilePath(resource_id, file_md5,
DriveCache::CACHE_TYPE_PERSISTENT,
DriveCache::CACHED_FILE_FROM_SERVER),
kReadOnlyFilePermissions));
// TODO(tbarzic): When we start supporting openFile operation, we may have to
// change permission for localy modified files to match handler's permissions.
cache_paths->push_back(std::make_pair(
cache->GetCacheFilePath(resource_id, file_md5,
DriveCache::CACHE_TYPE_PERSISTENT,
DriveCache::CACHED_FILE_LOCALLY_MODIFIED),
kReadOnlyFilePermissions));
cache_paths->push_back(std::make_pair(
cache->GetCacheFilePath(resource_id, file_md5,
DriveCache::CACHE_TYPE_PERSISTENT,
DriveCache::CACHED_FILE_MOUNTED),
kReadOnlyFilePermissions));
cache_paths->push_back(std::make_pair(
cache->GetCacheFilePath(resource_id, file_md5,
DriveCache::CACHE_TYPE_TMP,
DriveCache::CACHED_FILE_FROM_SERVER),
kReadOnlyFilePermissions));
callback.Run();
}
bool ParseTimezone(const base::StringPiece& timezone,
bool ahead,
int* out_offset_to_utc_in_minutes) {
DCHECK(out_offset_to_utc_in_minutes);
std::vector<base::StringPiece> parts;
int num_of_token = Tokenize(timezone, ":", &parts);
int hour = 0;
if (!base::StringToInt(parts[0], &hour))
return false;
int minute = 0;
if (num_of_token > 1 && !base::StringToInt(parts[1], &minute))
return false;
*out_offset_to_utc_in_minutes = (hour * 60 + minute) * (ahead ? +1 : -1);
return true;
}
} // namespace
const FilePath& GetGDataMountPointPath() {
CR_DEFINE_STATIC_LOCAL(FilePath, gdata_mount_path,
(FilePath::FromUTF8Unsafe(kGDataMountPointPath)));
return gdata_mount_path;
}
const std::string& GetGDataMountPointPathAsString() {
CR_DEFINE_STATIC_LOCAL(std::string, gdata_mount_path_string,
(kGDataMountPointPath));
return gdata_mount_path_string;
}
const FilePath& GetSpecialRemoteRootPath() {
CR_DEFINE_STATIC_LOCAL(FilePath, gdata_mount_path,
(FilePath::FromUTF8Unsafe(kGDataSpecialRootPath)));
return gdata_mount_path;
}
GURL GetFileResourceUrl(const std::string& resource_id,
const std::string& file_name) {
std::string url(base::StringPrintf(
"%s:%s",
chrome::kDriveScheme,
net::EscapePath(resource_id).c_str()));
return GURL(url);
}
void ModifyGDataFileResourceUrl(Profile* profile,
const FilePath& drive_cache_path,
GURL* url) {
DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
GDataFileSystemInterface* file_system = GetGDataFileSystem(profile);
if (!file_system)
return;
DriveCache* cache = GetDriveCache(profile);
if (!cache)
return;
if (cache->GetCacheDirectoryPath(DriveCache::CACHE_TYPE_TMP_DOCUMENTS).
IsParent(drive_cache_path)) {
// Handle hosted documents. The edit url is in the temporary file, so we
// read it on a blocking thread.
GURL* edit_url = new GURL();
content::BrowserThread::GetBlockingPool()->PostTaskAndReply(FROM_HERE,
base::Bind(&GetHostedDocumentURLBlockingThread,
drive_cache_path, edit_url),
base::Bind(&OpenEditURLUIThread, profile, base::Owned(edit_url)));
*url = GURL();
} else if (cache->GetCacheDirectoryPath(DriveCache::CACHE_TYPE_TMP).
IsParent(drive_cache_path) ||
cache->GetCacheDirectoryPath(DriveCache::CACHE_TYPE_PERSISTENT).
IsParent(drive_cache_path)) {
// Handle all other gdata files.
const std::string resource_id =
drive_cache_path.BaseName().RemoveExtension().AsUTF8Unsafe();
file_system->GetEntryInfoByResourceId(
resource_id,
base::Bind(&OnGetEntryInfoByResourceId,
profile,
resource_id));
*url = GURL();
}
}
bool IsUnderGDataMountPoint(const FilePath& path) {
return GetGDataMountPointPath() == path ||
GetGDataMountPointPath().IsParent(path);
}
FilePath ExtractGDataPath(const FilePath& path) {
if (!IsUnderGDataMountPoint(path))
return FilePath();
std::vector<FilePath::StringType> components;
path.GetComponents(&components);
// -1 to include 'drive'.
FilePath extracted;
for (size_t i = arraysize(kGDataMountPointPathComponents) - 1;
i < components.size(); ++i) {
extracted = extracted.Append(components[i]);
}
return extracted;
}
void InsertDriveCachePathsPermissions(
Profile* profile,
scoped_ptr<std::vector<FilePath> > gdata_paths,
std::vector<std::pair<FilePath, int> >* cache_paths,
const base::Closure& callback) {
DCHECK(profile);
DCHECK(gdata_paths.get());
DCHECK(cache_paths);
DCHECK(!callback.is_null());
GDataFileSystemInterface* file_system = GetGDataFileSystem(profile);
if (!file_system || gdata_paths->empty()) {
callback.Run();
return;
}
// Remove one file path entry from the back of the input vector |gdata_paths|.
FilePath gdata_path = gdata_paths->back();
gdata_paths->pop_back();
// Call GetEntryInfoByPath() to get file info for |gdata_path| then insert
// all possible cache paths to the output vector |cache_paths|.
// Note that we can only process one file path at a time. Upon completion
// of OnGetEntryInfoForInsertDriveCachePathsPermissions(), we recursively call
// InsertDriveCachePathsPermissions() to process the next file path from the
// back of the input vector |gdata_paths| until it is empty.
file_system->GetEntryInfoByPath(
gdata_path,
base::Bind(&OnGetEntryInfoForInsertDriveCachePathsPermissions,
profile,
cache_paths,
base::Bind(&InsertDriveCachePathsPermissions,
profile,
base::Passed(&gdata_paths),
cache_paths,
callback)));
}
bool IsGDataAvailable(Profile* profile) {
if (!chromeos::UserManager::Get()->IsUserLoggedIn() ||
chromeos::UserManager::Get()->IsLoggedInAsGuest() ||
chromeos::UserManager::Get()->IsLoggedInAsDemoUser())
return false;
// Do not allow GData for incognito windows / guest mode.
if (profile->IsOffTheRecord())
return false;
// Disable gdata if preference is set. This can happen with commandline flag
// --disable-gdata or enterprise policy, or probably with user settings too
// in the future.
if (profile->GetPrefs()->GetBoolean(prefs::kDisableGData))
return false;
return true;
}
std::string EscapeCacheFileName(const std::string& filename) {
// This is based on net/base/escape.cc: net::(anonymous namespace)::Escape
std::string escaped;
for (size_t i = 0; i < filename.size(); ++i) {
char c = filename[i];
if (c == '%' || c == '.' || c == '/') {
base::StringAppendF(&escaped, "%%%02X", c);
} else {
escaped.push_back(c);
}
}
return escaped;
}
std::string UnescapeCacheFileName(const std::string& filename) {
std::string unescaped;
for (size_t i = 0; i < filename.size(); ++i) {
char c = filename[i];
if (c == '%' && i + 2 < filename.length()) {
c = (HexDigitToInt(filename[i + 1]) << 4) +
HexDigitToInt(filename[i + 2]);
i += 2;
}
unescaped.push_back(c);
}
return unescaped;
}
void ParseCacheFilePath(const FilePath& path,
std::string* resource_id,
std::string* md5,
std::string* extra_extension) {
DCHECK(resource_id);
DCHECK(md5);
DCHECK(extra_extension);
// Extract up to two extensions from the right.
FilePath base_name = path.BaseName();
const int kNumExtensionsToExtract = 2;
std::vector<FilePath::StringType> extensions;
for (int i = 0; i < kNumExtensionsToExtract; ++i) {
FilePath::StringType extension = base_name.Extension();
if (!extension.empty()) {
// FilePath::Extension returns ".", so strip it.
extension = UnescapeCacheFileName(extension.substr(1));
base_name = base_name.RemoveExtension();
extensions.push_back(extension);
} else {
break;
}
}
// The base_name here is already stripped of extensions in the loop above.
*resource_id = UnescapeCacheFileName(base_name.value());
// Assign the extracted extensions to md5 and extra_extension.
int extension_count = extensions.size();
*md5 = (extension_count > 0) ? extensions[extension_count - 1] :
std::string();
*extra_extension = (extension_count > 1) ? extensions[extension_count - 2] :
std::string();
}
bool IsDriveV2ApiEnabled() {
static bool enabled = CommandLine::ForCurrentProcess()->HasSwitch(
switches::kEnableDriveV2Api);
return enabled;
}
base::PlatformFileError DriveFileErrorToPlatformError(
gdata::DriveFileError error) {
switch (error) {
case gdata::DRIVE_FILE_OK:
return base::PLATFORM_FILE_OK;
case gdata::DRIVE_FILE_ERROR_FAILED:
return base::PLATFORM_FILE_ERROR_FAILED;
case gdata::DRIVE_FILE_ERROR_IN_USE:
return base::PLATFORM_FILE_ERROR_IN_USE;
case gdata::DRIVE_FILE_ERROR_EXISTS:
return base::PLATFORM_FILE_ERROR_EXISTS;
case gdata::DRIVE_FILE_ERROR_NOT_FOUND:
return base::PLATFORM_FILE_ERROR_NOT_FOUND;
case gdata::DRIVE_FILE_ERROR_ACCESS_DENIED:
return base::PLATFORM_FILE_ERROR_ACCESS_DENIED;
case gdata::DRIVE_FILE_ERROR_TOO_MANY_OPENED:
return base::PLATFORM_FILE_ERROR_TOO_MANY_OPENED;
case gdata::DRIVE_FILE_ERROR_NO_MEMORY:
return base::PLATFORM_FILE_ERROR_NO_MEMORY;
case gdata::DRIVE_FILE_ERROR_NO_SPACE:
return base::PLATFORM_FILE_ERROR_NO_SPACE;
case gdata::DRIVE_FILE_ERROR_NOT_A_DIRECTORY:
return base::PLATFORM_FILE_ERROR_NOT_A_DIRECTORY;
case gdata::DRIVE_FILE_ERROR_INVALID_OPERATION:
return base::PLATFORM_FILE_ERROR_INVALID_OPERATION;
case gdata::DRIVE_FILE_ERROR_SECURITY:
return base::PLATFORM_FILE_ERROR_SECURITY;
case gdata::DRIVE_FILE_ERROR_ABORT:
return base::PLATFORM_FILE_ERROR_ABORT;
case gdata::DRIVE_FILE_ERROR_NOT_A_FILE:
return base::PLATFORM_FILE_ERROR_NOT_A_FILE;
case gdata::DRIVE_FILE_ERROR_NOT_EMPTY:
return base::PLATFORM_FILE_ERROR_NOT_EMPTY;
case gdata::DRIVE_FILE_ERROR_INVALID_URL:
return base::PLATFORM_FILE_ERROR_INVALID_URL;
case gdata::DRIVE_FILE_ERROR_NO_CONNECTION:
return base::PLATFORM_FILE_ERROR_FAILED;
}
NOTREACHED();
return base::PLATFORM_FILE_ERROR_FAILED;
}
bool GetTimeFromString(const base::StringPiece& raw_value,
base::Time* parsed_time) {
base::StringPiece date;
base::StringPiece time_and_tz;
base::StringPiece time;
base::Time::Exploded exploded = {0};
bool has_timezone = false;
int offset_to_utc_in_minutes = 0;
// Splits the string into "date" part and "time" part.
{
std::vector<base::StringPiece> parts;
if (Tokenize(raw_value, "T", &parts) != 2)
return false;
date = parts[0];
time_and_tz = parts[1];
}
// Parses timezone suffix on the time part if available.
{
std::vector<base::StringPiece> parts;
if (time_and_tz[time_and_tz.size() - 1] == 'Z') {
// Timezone is 'Z' (UTC)
has_timezone = true;
offset_to_utc_in_minutes = 0;
time = time_and_tz;
time.remove_suffix(1);
} else if (Tokenize(time_and_tz, "+", &parts) == 2) {
// Timezone is "+hh:mm" format
if (!ParseTimezone(parts[1], true, &offset_to_utc_in_minutes))
return false;
has_timezone = true;
time = parts[0];
} else if (Tokenize(time_and_tz, "-", &parts) == 2) {
// Timezone is "-hh:mm" format
if (!ParseTimezone(parts[1], false, &offset_to_utc_in_minutes))
return false;
has_timezone = true;
time = parts[0];
} else {
// No timezone (uses local timezone)
time = time_and_tz;
}
}
// Parses the date part.
{
std::vector<base::StringPiece> parts;
if (Tokenize(date, "-", &parts) != 3)
return false;
if (!base::StringToInt(parts[0], &exploded.year) ||
!base::StringToInt(parts[1], &exploded.month) ||
!base::StringToInt(parts[2], &exploded.day_of_month)) {
return false;
}
}
// Parses the time part.
{
std::vector<base::StringPiece> parts;
int num_of_token = Tokenize(time, ":", &parts);
if (num_of_token != 3)
return false;
if (!base::StringToInt(parts[0], &exploded.hour) ||
!base::StringToInt(parts[1], &exploded.minute)) {
return false;
}
std::vector<base::StringPiece> seconds_parts;
int num_of_seconds_token = Tokenize(parts[2], ".", &seconds_parts);
if (num_of_seconds_token >= 3)
return false;
if (!base::StringToInt(seconds_parts[0], &exploded.second))
return false;
// Only accept milli-seconds (3-digits).
if (num_of_seconds_token > 1 &&
seconds_parts[1].length() == 3 &&
!base::StringToInt(seconds_parts[1], &exploded.millisecond)) {
return false;
}
}
exploded.day_of_week = 0;
if (!exploded.HasValidValues())
return false;
if (has_timezone) {
*parsed_time = base::Time::FromUTCExploded(exploded);
if (offset_to_utc_in_minutes != 0)
*parsed_time -= base::TimeDelta::FromMinutes(offset_to_utc_in_minutes);
} else {
*parsed_time = base::Time::FromLocalExploded(exploded);
}
return true;
}
std::string FormatTimeAsString(const base::Time& time) {
base::Time::Exploded exploded;
time.UTCExplode(&exploded);
return base::StringPrintf(
"%04d-%02d-%02dT%02d:%02d:%02d.%03dZ",
exploded.year, exploded.month, exploded.day_of_month,
exploded.hour, exploded.minute, exploded.second, exploded.millisecond);
}
std::string FormatTimeAsStringLocaltime(const base::Time& time) {
base::Time::Exploded exploded;
time.LocalExplode(&exploded);
return base::StringPrintf(
"%04d-%02d-%02dT%02d:%02d:%02d.%03d",
exploded.year, exploded.month, exploded.day_of_month,
exploded.hour, exploded.minute, exploded.second, exploded.millisecond);
}
void PrepareWritableFileAndRun(Profile* profile,
const FilePath& path,
const OpenFileCallback& callback) {
DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
if (IsUnderGDataMountPoint(path)) {
FileWriteHelper* file_write_helper = GetFileWriteHelper(profile);
if (!file_write_helper)
return;
FilePath remote_path(ExtractGDataPath(path));
file_write_helper->PrepareWritableFileAndRun(remote_path, callback);
} else {
if (!callback.is_null()) {
content::BrowserThread::GetBlockingPool()->PostTask(
FROM_HERE, base::Bind(callback, DRIVE_FILE_OK, path));
}
}
}
DriveFileError GDataToDriveFileError(GDataErrorCode status) {
switch (status) {
case HTTP_SUCCESS:
case HTTP_CREATED:
return DRIVE_FILE_OK;
case HTTP_UNAUTHORIZED:
case HTTP_FORBIDDEN:
return DRIVE_FILE_ERROR_ACCESS_DENIED;
case HTTP_NOT_FOUND:
return DRIVE_FILE_ERROR_NOT_FOUND;
case GDATA_PARSE_ERROR:
case GDATA_FILE_ERROR:
return DRIVE_FILE_ERROR_ABORT;
case GDATA_NO_CONNECTION:
return DRIVE_FILE_ERROR_NO_CONNECTION;
default:
return DRIVE_FILE_ERROR_FAILED;
}
}
void PostBlockingPoolSequencedTask(
const tracked_objects::Location& from_here,
base::SequencedTaskRunner* blocking_task_runner,
const base::Closure& task) {
DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
const bool posted = blocking_task_runner->PostTask(from_here, task);
DCHECK(posted);
}
void PostBlockingPoolSequencedTaskAndReply(
const tracked_objects::Location& from_here,
base::SequencedTaskRunner* blocking_task_runner,
const base::Closure& request_task,
const base::Closure& reply_task) {
DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
const bool posted = blocking_task_runner->PostTaskAndReply(
from_here, request_task, reply_task);
DCHECK(posted);
}
} // namespace util
} // namespace gdata