thestig@chromium.org | b2f28d2 | 2012-03-03 01:54:35 | [diff] [blame] | 1 | // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
license.bot | bf09a50 | 2008-08-24 00:55:55 | [diff] [blame] | 2 | // Use of this source code is governed by a BSD-style license that can be |
| 3 | // found in the LICENSE file. |
initial.commit | d7cae12 | 2008-07-26 21:49:38 | [diff] [blame] | 4 | |
brettw@chromium.org | e3177dd5 | 2014-08-13 20:22:14 | [diff] [blame] | 5 | #include "base/files/file_util.h" |
initial.commit | d7cae12 | 2008-07-26 21:49:38 | [diff] [blame] | 6 | |
jeremy@chromium.org | c2c998c | 2009-01-27 19:08:39 | [diff] [blame] | 7 | #if defined(OS_WIN) |
| 8 | #include <io.h> |
| 9 | #endif |
mark@chromium.org | 836f134 | 2008-10-01 17:40:13 | [diff] [blame] | 10 | #include <stdio.h> |
| 11 | |
initial.commit | d7cae12 | 2008-07-26 21:49:38 | [diff] [blame] | 12 | #include <fstream> |
kaliamoorthi@chromium.org | 0710fdd | 2014-02-18 16:31:51 | [diff] [blame] | 13 | #include <limits> |
Victor Costan | b5a0a9700 | 2019-09-08 04:55:15 | [diff] [blame] | 14 | #include <memory> |
initial.commit | d7cae12 | 2008-07-26 21:49:38 | [diff] [blame] | 15 | |
Hans Wennborg | c3cffa6 | 2020-04-27 10:09:12 | [diff] [blame] | 16 | #include "base/check_op.h" |
brettw@chromium.org | 25a4c1c | 2013-06-08 04:53:36 | [diff] [blame] | 17 | #include "base/files/file_enumerator.h" |
brettw@chromium.org | 5799981 | 2013-02-24 05:40:52 | [diff] [blame] | 18 | #include "base/files/file_path.h" |
Greg Thompson | 3f7e20f4 | 2020-05-02 19:01:11 | [diff] [blame] | 19 | #include "base/posix/eintr_wrapper.h" |
tfarina@chromium.org | eb62f726 | 2013-03-30 14:29:00 | [diff] [blame] | 20 | #include "base/strings/string_piece.h" |
avi@chromium.org | 251cd6e5 | 2013-06-11 13:36:37 | [diff] [blame] | 21 | #include "base/strings/string_util.h" |
| 22 | #include "base/strings/stringprintf.h" |
avi@chromium.org | a4ea1f1 | 2013-06-07 18:37:07 | [diff] [blame] | 23 | #include "base/strings/utf_string_conversions.h" |
Etienne Pierre-Doray | 1da5859 | 2018-09-21 14:47:20 | [diff] [blame] | 24 | #include "base/threading/scoped_blocking_call.h" |
avi | 543540e | 2015-12-24 05:15:32 | [diff] [blame] | 25 | #include "build/build_config.h" |
estade@chromium.org | b9e04f0 | 2008-11-27 04:03:57 | [diff] [blame] | 26 | |
brettw@chromium.org | 0408c75 | 2013-06-22 22:15:46 | [diff] [blame] | 27 | namespace base { |
brettw@chromium.org | 04af979a | 2013-02-16 04:12:26 | [diff] [blame] | 28 | |
hidehiko | 8fc7c82 | 2015-06-09 02:50:57 | [diff] [blame] | 29 | #if !defined(OS_NACL_NONSFI) |
Lei Zhang | e3aa0b9a | 2020-06-11 08:59:23 | [diff] [blame] | 30 | OnceCallback<void(const FilePath&)> GetDeleteFileCallback() { |
Lei Zhang | 9382efe | 2020-07-25 20:52:14 | [diff] [blame] | 31 | return BindOnce(IgnoreResult(&DeleteFile)); |
Lei Zhang | e3aa0b9a | 2020-06-11 08:59:23 | [diff] [blame] | 32 | } |
| 33 | |
Lei Zhang | 3190449f | 2020-06-12 05:14:04 | [diff] [blame] | 34 | OnceCallback<void(const FilePath&)> GetDeletePathRecursivelyCallback() { |
Lei Zhang | 746ce47 | 2020-07-01 04:39:45 | [diff] [blame] | 35 | return BindOnce(IgnoreResult(&DeletePathRecursively)); |
Lei Zhang | 3190449f | 2020-06-12 05:14:04 | [diff] [blame] | 36 | } |
| 37 | |
avi | 543540e | 2015-12-24 05:15:32 | [diff] [blame] | 38 | int64_t ComputeDirectorySize(const FilePath& root_path) { |
| 39 | int64_t running_size = 0; |
brettw@chromium.org | 0408c75 | 2013-06-22 22:15:46 | [diff] [blame] | 40 | FileEnumerator file_iter(root_path, true, FileEnumerator::FILES); |
| 41 | while (!file_iter.Next().empty()) |
| 42 | running_size += file_iter.GetInfo().GetSize(); |
| 43 | return running_size; |
| 44 | } |
| 45 | |
brettw@chromium.org | 5553d5b | 2013-07-01 23:07:36 | [diff] [blame] | 46 | bool Move(const FilePath& from_path, const FilePath& to_path) { |
| 47 | if (from_path.ReferencesParent() || to_path.ReferencesParent()) |
| 48 | return false; |
brettw@chromium.org | f0ff2ad | 2013-07-09 17:42:26 | [diff] [blame] | 49 | return internal::MoveUnsafe(from_path, to_path); |
| 50 | } |
| 51 | |
Alexander Bolodurin | 53bfc89c2 | 2020-11-25 22:43:29 | [diff] [blame^] | 52 | bool CopyFileContents(File& infile, File& outfile) { |
| 53 | static constexpr size_t kBufferSize = 32768; |
| 54 | std::vector<char> buffer(kBufferSize); |
| 55 | |
| 56 | for (;;) { |
| 57 | int bytes_read = infile.ReadAtCurrentPos(buffer.data(), buffer.size()); |
| 58 | if (bytes_read < 0) { |
| 59 | return false; |
| 60 | } |
| 61 | if (bytes_read == 0) { |
| 62 | return true; |
| 63 | } |
| 64 | // Allow for partial writes |
| 65 | int bytes_written_per_read = 0; |
| 66 | do { |
| 67 | int bytes_written_partial = outfile.WriteAtCurrentPos( |
| 68 | &buffer[bytes_written_per_read], bytes_read - bytes_written_per_read); |
| 69 | if (bytes_written_partial < 0) { |
| 70 | return false; |
| 71 | } |
| 72 | |
| 73 | bytes_written_per_read += bytes_written_partial; |
| 74 | } while (bytes_written_per_read < bytes_read); |
| 75 | } |
| 76 | |
| 77 | NOTREACHED(); |
| 78 | return false; |
| 79 | } |
| 80 | |
evanm@google.com | 640517f | 2008-10-30 23:54:04 | [diff] [blame] | 81 | bool ContentsEqual(const FilePath& filename1, const FilePath& filename2) { |
initial.commit | d7cae12 | 2008-07-26 21:49:38 | [diff] [blame] | 82 | // We open the file in binary format even if they are text files because |
| 83 | // we are just comparing that bytes are exactly same in both files and not |
| 84 | // doing anything smart with text formatting. |
jdoerrie | 983968a | 2019-01-29 12:54:41 | [diff] [blame] | 85 | #if defined(OS_WIN) |
Jan Wilken Dörrie | 9bb441d | 2019-11-01 17:48:40 | [diff] [blame] | 86 | std::ifstream file1(filename1.value().c_str(), |
erikkay@google.com | 5af2edb9 | 2008-08-08 20:16:08 | [diff] [blame] | 87 | std::ios::in | std::ios::binary); |
Jan Wilken Dörrie | 9bb441d | 2019-11-01 17:48:40 | [diff] [blame] | 88 | std::ifstream file2(filename2.value().c_str(), |
erikkay@google.com | 5af2edb9 | 2008-08-08 20:16:08 | [diff] [blame] | 89 | std::ios::in | std::ios::binary); |
jdoerrie | 983968a | 2019-01-29 12:54:41 | [diff] [blame] | 90 | #elif defined(OS_POSIX) || defined(OS_FUCHSIA) |
| 91 | std::ifstream file1(filename1.value(), std::ios::in | std::ios::binary); |
| 92 | std::ifstream file2(filename2.value(), std::ios::in | std::ios::binary); |
| 93 | #endif // OS_WIN |
estade@chromium.org | b9e04f0 | 2008-11-27 04:03:57 | [diff] [blame] | 94 | |
initial.commit | d7cae12 | 2008-07-26 21:49:38 | [diff] [blame] | 95 | // Even if both files aren't openable (and thus, in some sense, "equal"), |
| 96 | // any unusable file yields a result of "false". |
| 97 | if (!file1.is_open() || !file2.is_open()) |
| 98 | return false; |
| 99 | |
| 100 | const int BUFFER_SIZE = 2056; |
| 101 | char buffer1[BUFFER_SIZE], buffer2[BUFFER_SIZE]; |
| 102 | do { |
| 103 | file1.read(buffer1, BUFFER_SIZE); |
| 104 | file2.read(buffer2, BUFFER_SIZE); |
| 105 | |
mark@chromium.org | b81637c3 | 2009-06-26 21:17:24 | [diff] [blame] | 106 | if ((file1.eof() != file2.eof()) || |
initial.commit | d7cae12 | 2008-07-26 21:49:38 | [diff] [blame] | 107 | (file1.gcount() != file2.gcount()) || |
pkasting | 9cf9b94 | 2014-10-01 22:18:43 | [diff] [blame] | 108 | (memcmp(buffer1, buffer2, static_cast<size_t>(file1.gcount())))) { |
initial.commit | d7cae12 | 2008-07-26 21:49:38 | [diff] [blame] | 109 | file1.close(); |
| 110 | file2.close(); |
| 111 | return false; |
| 112 | } |
mark@chromium.org | b81637c3 | 2009-06-26 21:17:24 | [diff] [blame] | 113 | } while (!file1.eof() || !file2.eof()); |
initial.commit | d7cae12 | 2008-07-26 21:49:38 | [diff] [blame] | 114 | |
| 115 | file1.close(); |
| 116 | file2.close(); |
| 117 | return true; |
| 118 | } |
| 119 | |
mark@chromium.org | b81637c3 | 2009-06-26 21:17:24 | [diff] [blame] | 120 | bool TextContentsEqual(const FilePath& filename1, const FilePath& filename2) { |
jdoerrie | 983968a | 2019-01-29 12:54:41 | [diff] [blame] | 121 | #if defined(OS_WIN) |
Jan Wilken Dörrie | 9bb441d | 2019-11-01 17:48:40 | [diff] [blame] | 122 | std::ifstream file1(filename1.value().c_str(), std::ios::in); |
| 123 | std::ifstream file2(filename2.value().c_str(), std::ios::in); |
jdoerrie | 983968a | 2019-01-29 12:54:41 | [diff] [blame] | 124 | #elif defined(OS_POSIX) || defined(OS_FUCHSIA) |
| 125 | std::ifstream file1(filename1.value(), std::ios::in); |
| 126 | std::ifstream file2(filename2.value(), std::ios::in); |
| 127 | #endif // OS_WIN |
mark@chromium.org | b81637c3 | 2009-06-26 21:17:24 | [diff] [blame] | 128 | |
| 129 | // Even if both files aren't openable (and thus, in some sense, "equal"), |
| 130 | // any unusable file yields a result of "false". |
| 131 | if (!file1.is_open() || !file2.is_open()) |
| 132 | return false; |
| 133 | |
| 134 | do { |
| 135 | std::string line1, line2; |
| 136 | getline(file1, line1); |
| 137 | getline(file2, line2); |
| 138 | |
| 139 | // Check for mismatched EOF states, or any error state. |
| 140 | if ((file1.eof() != file2.eof()) || |
| 141 | file1.bad() || file2.bad()) { |
| 142 | return false; |
| 143 | } |
| 144 | |
| 145 | // Trim all '\r' and '\n' characters from the end of the line. |
| 146 | std::string::size_type end1 = line1.find_last_not_of("\r\n"); |
| 147 | if (end1 == std::string::npos) |
| 148 | line1.clear(); |
| 149 | else if (end1 + 1 < line1.length()) |
| 150 | line1.erase(end1 + 1); |
| 151 | |
| 152 | std::string::size_type end2 = line2.find_last_not_of("\r\n"); |
| 153 | if (end2 == std::string::npos) |
| 154 | line2.clear(); |
| 155 | else if (end2 + 1 < line2.length()) |
| 156 | line2.erase(end2 + 1); |
| 157 | |
| 158 | if (line1 != line2) |
| 159 | return false; |
| 160 | } while (!file1.eof() || !file2.eof()); |
| 161 | |
| 162 | return true; |
| 163 | } |
hidehiko | 8fc7c82 | 2015-06-09 02:50:57 | [diff] [blame] | 164 | #endif // !defined(OS_NACL_NONSFI) |
mark@chromium.org | b81637c3 | 2009-06-26 21:17:24 | [diff] [blame] | 165 | |
Greg Thompson | 3f7e20f4 | 2020-05-02 19:01:11 | [diff] [blame] | 166 | bool ReadStreamToString(FILE* stream, std::string* contents) { |
| 167 | return ReadStreamToStringWithMaxSize( |
| 168 | stream, std::numeric_limits<size_t>::max(), contents); |
| 169 | } |
| 170 | |
| 171 | bool ReadStreamToStringWithMaxSize(FILE* stream, |
| 172 | size_t max_size, |
| 173 | std::string* contents) { |
kaliamoorthi@chromium.org | 0710fdd | 2014-02-18 16:31:51 | [diff] [blame] | 174 | if (contents) |
| 175 | contents->clear(); |
initial.commit | d7cae12 | 2008-07-26 21:49:38 | [diff] [blame] | 176 | |
Greg Thompson | 3f7e20f4 | 2020-05-02 19:01:11 | [diff] [blame] | 177 | // Seeking to the beginning is best-effort -- it is expected to fail for |
| 178 | // certain non-file stream (e.g., pipes). |
| 179 | HANDLE_EINTR(fseek(stream, 0, SEEK_SET)); |
| 180 | |
| 181 | // Many files have incorrect size (proc files etc). Hence, the file is read |
| 182 | // sequentially as opposed to a one-shot read, using file size as a hint for |
| 183 | // chunk size if available. |
Mikhail Istomin | 1ede155 | 2018-05-16 17:40:24 | [diff] [blame] | 184 | constexpr int64_t kDefaultChunkSize = 1 << 16; |
Greg Thompson | 3f7e20f4 | 2020-05-02 19:01:11 | [diff] [blame] | 185 | int64_t chunk_size = kDefaultChunkSize - 1; |
Mikhail Istomin | 1ede155 | 2018-05-16 17:40:24 | [diff] [blame] | 186 | #if !defined(OS_NACL_NONSFI) |
Greg Thompson | 3f7e20f4 | 2020-05-02 19:01:11 | [diff] [blame] | 187 | ScopedBlockingCall scoped_blocking_call(FROM_HERE, BlockingType::MAY_BLOCK); |
| 188 | #if defined(OS_WIN) |
| 189 | BY_HANDLE_FILE_INFORMATION file_info = {}; |
| 190 | if (::GetFileInformationByHandle( |
| 191 | reinterpret_cast<HANDLE>(_get_osfhandle(_fileno(stream))), |
| 192 | &file_info)) { |
| 193 | LARGE_INTEGER size; |
| 194 | size.HighPart = file_info.nFileSizeHigh; |
| 195 | size.LowPart = file_info.nFileSizeLow; |
| 196 | if (size.QuadPart > 0) |
| 197 | chunk_size = size.QuadPart; |
| 198 | } |
| 199 | #else // defined(OS_WIN) |
| 200 | stat_wrapper_t file_info = {}; |
| 201 | if (!File::Fstat(fileno(stream), &file_info) && file_info.st_size > 0) |
| 202 | chunk_size = file_info.st_size; |
| 203 | #endif // defined(OS_WIN) |
Mikhail Istomin | 1ede155 | 2018-05-16 17:40:24 | [diff] [blame] | 204 | // We need to attempt to read at EOF for feof flag to be set so here we |
| 205 | // use |chunk_size| + 1. |
| 206 | chunk_size = std::min<uint64_t>(chunk_size, max_size) + 1; |
Greg Thompson | 3f7e20f4 | 2020-05-02 19:01:11 | [diff] [blame] | 207 | #else // !defined(OS_NACL_NONSFI) |
Mikhail Istomin | 1ede155 | 2018-05-16 17:40:24 | [diff] [blame] | 208 | chunk_size = kDefaultChunkSize; |
| 209 | #endif // !defined(OS_NACL_NONSFI) |
| 210 | size_t bytes_read_this_pass; |
| 211 | size_t bytes_read_so_far = 0; |
| 212 | bool read_status = true; |
| 213 | std::string local_contents; |
| 214 | local_contents.resize(chunk_size); |
kaliamoorthi@chromium.org | 0710fdd | 2014-02-18 16:31:51 | [diff] [blame] | 215 | |
Mikhail Istomin | 1ede155 | 2018-05-16 17:40:24 | [diff] [blame] | 216 | while ((bytes_read_this_pass = fread(&local_contents[bytes_read_so_far], 1, |
Greg Thompson | 3f7e20f4 | 2020-05-02 19:01:11 | [diff] [blame] | 217 | chunk_size, stream)) > 0) { |
Mikhail Istomin | 1ede155 | 2018-05-16 17:40:24 | [diff] [blame] | 218 | if ((max_size - bytes_read_so_far) < bytes_read_this_pass) { |
| 219 | // Read more than max_size bytes, bail out. |
| 220 | bytes_read_so_far = max_size; |
kaliamoorthi@chromium.org | 0710fdd | 2014-02-18 16:31:51 | [diff] [blame] | 221 | read_status = false; |
| 222 | break; |
| 223 | } |
Mikhail Istomin | 1ede155 | 2018-05-16 17:40:24 | [diff] [blame] | 224 | // In case EOF was not reached, iterate again but revert to the default |
| 225 | // chunk size. |
| 226 | if (bytes_read_so_far == 0) |
| 227 | chunk_size = kDefaultChunkSize; |
kaliamoorthi@chromium.org | 0710fdd | 2014-02-18 16:31:51 | [diff] [blame] | 228 | |
Mikhail Istomin | 1ede155 | 2018-05-16 17:40:24 | [diff] [blame] | 229 | bytes_read_so_far += bytes_read_this_pass; |
| 230 | // Last fread syscall (after EOF) can be avoided via feof, which is just a |
| 231 | // flag check. |
Greg Thompson | 3f7e20f4 | 2020-05-02 19:01:11 | [diff] [blame] | 232 | if (feof(stream)) |
Mikhail Istomin | 1ede155 | 2018-05-16 17:40:24 | [diff] [blame] | 233 | break; |
| 234 | local_contents.resize(bytes_read_so_far + chunk_size); |
initial.commit | d7cae12 | 2008-07-26 21:49:38 | [diff] [blame] | 235 | } |
Greg Thompson | 3f7e20f4 | 2020-05-02 19:01:11 | [diff] [blame] | 236 | read_status = read_status && !ferror(stream); |
Mikhail Istomin | 1ede155 | 2018-05-16 17:40:24 | [diff] [blame] | 237 | if (contents) { |
| 238 | contents->swap(local_contents); |
| 239 | contents->resize(bytes_read_so_far); |
| 240 | } |
initial.commit | d7cae12 | 2008-07-26 21:49:38 | [diff] [blame] | 241 | |
kaliamoorthi@chromium.org | 0710fdd | 2014-02-18 16:31:51 | [diff] [blame] | 242 | return read_status; |
| 243 | } |
| 244 | |
| 245 | bool ReadFileToString(const FilePath& path, std::string* contents) { |
hashimoto | 6da2fef | 2016-02-24 03:39:58 | [diff] [blame] | 246 | return ReadFileToStringWithMaxSize(path, contents, |
| 247 | std::numeric_limits<size_t>::max()); |
initial.commit | d7cae12 | 2008-07-26 21:49:38 | [diff] [blame] | 248 | } |
| 249 | |
Greg Thompson | 3f7e20f4 | 2020-05-02 19:01:11 | [diff] [blame] | 250 | bool ReadFileToStringWithMaxSize(const FilePath& path, |
| 251 | std::string* contents, |
| 252 | size_t max_size) { |
| 253 | if (contents) |
| 254 | contents->clear(); |
| 255 | if (path.ReferencesParent()) |
| 256 | return false; |
| 257 | ScopedFILE file_stream(OpenFile(path, "rb")); |
| 258 | if (!file_stream) |
| 259 | return false; |
| 260 | return ReadStreamToStringWithMaxSize(file_stream.get(), max_size, contents); |
| 261 | } |
| 262 | |
hidehiko | 8fc7c82 | 2015-06-09 02:50:57 | [diff] [blame] | 263 | #if !defined(OS_NACL_NONSFI) |
brettw@chromium.org | fb4bcfa3 | 2013-12-02 18:55:49 | [diff] [blame] | 264 | bool IsDirectoryEmpty(const FilePath& dir_path) { |
| 265 | FileEnumerator files(dir_path, false, |
| 266 | FileEnumerator::FILES | FileEnumerator::DIRECTORIES); |
| 267 | if (files.Next().empty()) |
| 268 | return true; |
| 269 | return false; |
| 270 | } |
| 271 | |
Greg Thompson | 3f7e20f4 | 2020-05-02 19:01:11 | [diff] [blame] | 272 | bool CreateTemporaryFile(FilePath* path) { |
| 273 | FilePath temp_dir; |
| 274 | return GetTempDir(&temp_dir) && CreateTemporaryFileInDir(temp_dir, path); |
| 275 | } |
| 276 | |
Greg Thompson | f75f5fb | 2020-04-30 08:13:25 | [diff] [blame] | 277 | ScopedFILE CreateAndOpenTemporaryStream(FilePath* path) { |
brettw@chromium.org | 03d9afc0 | 2013-12-03 17:55:52 | [diff] [blame] | 278 | FilePath directory; |
| 279 | if (!GetTempDir(&directory)) |
Ivan Kotenkov | a16212a5 | 2017-11-08 12:37:33 | [diff] [blame] | 280 | return nullptr; |
brettw@chromium.org | 03d9afc0 | 2013-12-03 17:55:52 | [diff] [blame] | 281 | |
Greg Thompson | f75f5fb | 2020-04-30 08:13:25 | [diff] [blame] | 282 | return CreateAndOpenTemporaryStreamInDir(directory, path); |
brettw@chromium.org | 03d9afc0 | 2013-12-03 17:55:52 | [diff] [blame] | 283 | } |
| 284 | |
brettw@chromium.org | 426d1c9 | 2013-12-03 20:08:54 | [diff] [blame] | 285 | bool CreateDirectory(const FilePath& full_path) { |
Ivan Kotenkov | a16212a5 | 2017-11-08 12:37:33 | [diff] [blame] | 286 | return CreateDirectoryAndGetError(full_path, nullptr); |
brettw@chromium.org | 426d1c9 | 2013-12-03 20:08:54 | [diff] [blame] | 287 | } |
| 288 | |
avi | 543540e | 2015-12-24 05:15:32 | [diff] [blame] | 289 | bool GetFileSize(const FilePath& file_path, int64_t* file_size) { |
rvargas@chromium.org | 54124ed0 | 2014-01-07 10:06:58 | [diff] [blame] | 290 | File::Info info; |
brettw@chromium.org | 9eae4e6 | 2013-12-04 20:56:49 | [diff] [blame] | 291 | if (!GetFileInfo(file_path, &info)) |
brettw@chromium.org | 5628570 | 2013-12-04 18:22:49 | [diff] [blame] | 292 | return false; |
| 293 | *file_size = info.size; |
| 294 | return true; |
| 295 | } |
| 296 | |
brettw@chromium.org | c0d50816 | 2013-12-04 22:49:00 | [diff] [blame] | 297 | bool TouchFile(const FilePath& path, |
| 298 | const Time& last_accessed, |
| 299 | const Time& last_modified) { |
rvargas@chromium.org | 54124ed0 | 2014-01-07 10:06:58 | [diff] [blame] | 300 | int flags = File::FLAG_OPEN | File::FLAG_WRITE_ATTRIBUTES; |
brettw@chromium.org | c0d50816 | 2013-12-04 22:49:00 | [diff] [blame] | 301 | |
| 302 | #if defined(OS_WIN) |
| 303 | // On Windows, FILE_FLAG_BACKUP_SEMANTICS is needed to open a directory. |
| 304 | if (DirectoryExists(path)) |
rvargas@chromium.org | 54124ed0 | 2014-01-07 10:06:58 | [diff] [blame] | 305 | flags |= File::FLAG_BACKUP_SEMANTICS; |
Wez | 432ea8d89 | 2019-03-31 01:17:08 | [diff] [blame] | 306 | #elif defined(OS_FUCHSIA) |
| 307 | // On Fuchsia, we need O_RDONLY for directories, or O_WRONLY for files. |
| 308 | // TODO(https://crbug.com/947802): Find a cleaner workaround for this. |
| 309 | flags |= (DirectoryExists(path) ? File::FLAG_READ : File::FLAG_WRITE); |
| 310 | #endif |
brettw@chromium.org | c0d50816 | 2013-12-04 22:49:00 | [diff] [blame] | 311 | |
rvargas@chromium.org | 54124ed0 | 2014-01-07 10:06:58 | [diff] [blame] | 312 | File file(path, flags); |
| 313 | if (!file.IsValid()) |
| 314 | return false; |
brettw@chromium.org | c0d50816 | 2013-12-04 22:49:00 | [diff] [blame] | 315 | |
rvargas@chromium.org | 54124ed0 | 2014-01-07 10:06:58 | [diff] [blame] | 316 | return file.SetTimes(last_accessed, last_modified); |
brettw@chromium.org | c0d50816 | 2013-12-04 22:49:00 | [diff] [blame] | 317 | } |
hidehiko | 8fc7c82 | 2015-06-09 02:50:57 | [diff] [blame] | 318 | #endif // !defined(OS_NACL_NONSFI) |
brettw@chromium.org | c0d50816 | 2013-12-04 22:49:00 | [diff] [blame] | 319 | |
mark@chromium.org | 836f134 | 2008-10-01 17:40:13 | [diff] [blame] | 320 | bool CloseFile(FILE* file) { |
Ivan Kotenkov | a16212a5 | 2017-11-08 12:37:33 | [diff] [blame] | 321 | if (file == nullptr) |
sidchat@google.com | a1a1950 | 2008-10-21 17:14:45 | [diff] [blame] | 322 | return true; |
mark@chromium.org | 836f134 | 2008-10-01 17:40:13 | [diff] [blame] | 323 | return fclose(file) == 0; |
| 324 | } |
| 325 | |
hidehiko | 8fc7c82 | 2015-06-09 02:50:57 | [diff] [blame] | 326 | #if !defined(OS_NACL_NONSFI) |
jeremy@chromium.org | c2c998c | 2009-01-27 19:08:39 | [diff] [blame] | 327 | bool TruncateFile(FILE* file) { |
Ivan Kotenkov | a16212a5 | 2017-11-08 12:37:33 | [diff] [blame] | 328 | if (file == nullptr) |
jeremy@chromium.org | c2c998c | 2009-01-27 19:08:39 | [diff] [blame] | 329 | return false; |
| 330 | long current_offset = ftell(file); |
| 331 | if (current_offset == -1) |
| 332 | return false; |
| 333 | #if defined(OS_WIN) |
| 334 | int fd = _fileno(file); |
| 335 | if (_chsize(fd, current_offset) != 0) |
| 336 | return false; |
| 337 | #else |
| 338 | int fd = fileno(file); |
| 339 | if (ftruncate(fd, current_offset) != 0) |
| 340 | return false; |
| 341 | #endif |
| 342 | return true; |
| 343 | } |
| 344 | |
Lei Zhang | eebbef6 | 2020-05-05 20:16:05 | [diff] [blame] | 345 | bool WriteFile(const FilePath& filename, span<const uint8_t> data) { |
| 346 | int size = checked_cast<int>(data.size()); |
| 347 | return WriteFile(filename, reinterpret_cast<const char*>(data.data()), |
| 348 | size) == size; |
| 349 | } |
| 350 | |
| 351 | bool WriteFile(const FilePath& filename, StringPiece data) { |
| 352 | int size = checked_cast<int>(data.size()); |
| 353 | return WriteFile(filename, data.data(), size) == size; |
| 354 | } |
| 355 | |
Greg Thompson | b4abcb4 | 2019-08-23 01:42:56 | [diff] [blame] | 356 | int GetUniquePathNumber(const FilePath& path) { |
| 357 | DCHECK(!path.empty()); |
| 358 | if (!PathExists(path)) |
Greg Thompson | 42373544a | 2019-08-14 10:11:10 | [diff] [blame] | 359 | return 0; |
| 360 | |
| 361 | std::string number; |
| 362 | for (int count = 1; count <= kMaxUniqueFiles; ++count) { |
| 363 | StringAppendF(&number, " (%d)", count); |
Greg Thompson | b4abcb4 | 2019-08-23 01:42:56 | [diff] [blame] | 364 | if (!PathExists(path.InsertBeforeExtensionASCII(number))) |
Greg Thompson | 42373544a | 2019-08-14 10:11:10 | [diff] [blame] | 365 | return count; |
| 366 | number.clear(); |
jam@chromium.org | e285afa | 2012-01-31 23:16:39 | [diff] [blame] | 367 | } |
| 368 | |
| 369 | return -1; |
| 370 | } |
Bruce Long | d096e48 | 2019-02-28 17:50:00 | [diff] [blame] | 371 | |
| 372 | FilePath GetUniquePath(const FilePath& path) { |
Greg Thompson | b4abcb4 | 2019-08-23 01:42:56 | [diff] [blame] | 373 | DCHECK(!path.empty()); |
| 374 | const int uniquifier = GetUniquePathNumber(path); |
| 375 | if (uniquifier > 0) |
| 376 | return path.InsertBeforeExtensionASCII(StringPrintf(" (%d)", uniquifier)); |
| 377 | return uniquifier == 0 ? path : base::FilePath(); |
Bruce Long | d096e48 | 2019-02-28 17:50:00 | [diff] [blame] | 378 | } |
Victor Costan | b5a0a9700 | 2019-09-08 04:55:15 | [diff] [blame] | 379 | |
| 380 | namespace internal { |
| 381 | |
| 382 | bool PreReadFileSlow(const FilePath& file_path, int64_t max_bytes) { |
| 383 | DCHECK_GE(max_bytes, 0); |
| 384 | |
| 385 | File file(file_path, File::FLAG_OPEN | File::FLAG_READ | |
| 386 | File::FLAG_SEQUENTIAL_SCAN | |
| 387 | File::FLAG_SHARE_DELETE); |
| 388 | if (!file.IsValid()) |
| 389 | return false; |
| 390 | |
| 391 | constexpr int kBufferSize = 1024 * 1024; |
| 392 | // Ensures the buffer is deallocated at function exit. |
| 393 | std::unique_ptr<char[]> buffer_deleter(new char[kBufferSize]); |
| 394 | char* const buffer = buffer_deleter.get(); |
| 395 | |
| 396 | while (max_bytes > 0) { |
| 397 | // The static_cast<int> is safe because kBufferSize is int, and both values |
| 398 | // are non-negative. So, the minimum is guaranteed to fit in int. |
| 399 | const int read_size = |
| 400 | static_cast<int>(std::min<int64_t>(max_bytes, kBufferSize)); |
| 401 | DCHECK_GE(read_size, 0); |
| 402 | DCHECK_LE(read_size, kBufferSize); |
| 403 | |
| 404 | const int read_bytes = file.ReadAtCurrentPos(buffer, read_size); |
| 405 | if (read_bytes < 0) |
| 406 | return false; |
| 407 | if (read_bytes == 0) |
| 408 | break; |
| 409 | |
| 410 | max_bytes -= read_bytes; |
| 411 | } |
| 412 | |
| 413 | return true; |
| 414 | } |
| 415 | |
| 416 | } // namespace internal |
| 417 | |
hidehiko | 8fc7c82 | 2015-06-09 02:50:57 | [diff] [blame] | 418 | #endif // !defined(OS_NACL_NONSFI) |
jam@chromium.org | e285afa | 2012-01-31 23:16:39 | [diff] [blame] | 419 | |
brettw@chromium.org | a26f4ae | 2014-03-13 17:26:21 | [diff] [blame] | 420 | } // namespace base |