| // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 
 | // Use of this source code is governed by a BSD-style license that can be | 
 | // found in the LICENSE file. | 
 |  | 
 | #include "base/files/file_util.h" | 
 |  | 
 | #include <windows.h> | 
 | #include <io.h> | 
 | #include <psapi.h> | 
 | #include <shellapi.h> | 
 | #include <shlobj.h> | 
 | #include <time.h> | 
 | #include <winsock2.h> | 
 |  | 
 | #include <algorithm> | 
 | #include <limits> | 
 | #include <string> | 
 |  | 
 | #include "base/files/file_enumerator.h" | 
 | #include "base/files/file_path.h" | 
 | #include "base/guid.h" | 
 | #include "base/logging.h" | 
 | #include "base/macros.h" | 
 | #include "base/metrics/histogram_functions.h" | 
 | #include "base/process/process_handle.h" | 
 | #include "base/rand_util.h" | 
 | #include "base/strings/string_number_conversions.h" | 
 | #include "base/strings/string_piece.h" | 
 | #include "base/strings/string_util.h" | 
 | #include "base/strings/utf_string_conversions.h" | 
 | #include "base/threading/scoped_blocking_call.h" | 
 | #include "base/time/time.h" | 
 | #include "base/win/scoped_handle.h" | 
 | #include "base/win/windows_version.h" | 
 | #include "starboard/types.h" | 
 |  | 
 | namespace base { | 
 |  | 
 | namespace { | 
 |  | 
 | const DWORD kFileShareAll = | 
 |     FILE_SHARE_READ | FILE_SHARE_WRITE | FILE_SHARE_DELETE; | 
 |  | 
 | // Records a sample in a histogram named | 
 | // "Windows.PostOperationState.|operation|" indicating the state of |path| | 
 | // following the named operation. If |operation_succeeded| is true, the | 
 | // "operation succeeded" sample is recorded. Otherwise, the state of |path| is | 
 | // queried and the most meaningful sample is recorded. | 
 | void RecordPostOperationState(const FilePath& path, | 
 |                               StringPiece operation, | 
 |                               bool operation_succeeded) { | 
 |   // The state of a filesystem item after an operation. | 
 |   // These values are persisted to logs. Entries should not be renumbered and | 
 |   // numeric values should never be reused. | 
 |   enum class PostOperationState { | 
 |     kOperationSucceeded = 0, | 
 |     kFileNotFoundAfterFailure = 1, | 
 |     kPathNotFoundAfterFailure = 2, | 
 |     kAccessDeniedAfterFailure = 3, | 
 |     kNoAttributesAfterFailure = 4, | 
 |     kEmptyDirectoryAfterFailure = 5, | 
 |     kNonEmptyDirectoryAfterFailure = 6, | 
 |     kNotDirectoryAfterFailure = 7, | 
 |     kCount | 
 |   } metric = PostOperationState::kOperationSucceeded; | 
 |  | 
 |   if (!operation_succeeded) { | 
 |     const DWORD attributes = ::GetFileAttributes(path.value().c_str()); | 
 |     if (attributes == INVALID_FILE_ATTRIBUTES) { | 
 |       // On failure to delete, one might expect the file/directory to still be | 
 |       // in place. Slice a failure to get its attributes into a few common error | 
 |       // buckets. | 
 |       const DWORD error_code = ::GetLastError(); | 
 |       if (error_code == ERROR_FILE_NOT_FOUND) | 
 |         metric = PostOperationState::kFileNotFoundAfterFailure; | 
 |       else if (error_code == ERROR_PATH_NOT_FOUND) | 
 |         metric = PostOperationState::kPathNotFoundAfterFailure; | 
 |       else if (error_code == ERROR_ACCESS_DENIED) | 
 |         metric = PostOperationState::kAccessDeniedAfterFailure; | 
 |       else | 
 |         metric = PostOperationState::kNoAttributesAfterFailure; | 
 |     } else if (attributes & FILE_ATTRIBUTE_DIRECTORY) { | 
 |       if (IsDirectoryEmpty(path)) | 
 |         metric = PostOperationState::kEmptyDirectoryAfterFailure; | 
 |       else | 
 |         metric = PostOperationState::kNonEmptyDirectoryAfterFailure; | 
 |     } else { | 
 |       metric = PostOperationState::kNotDirectoryAfterFailure; | 
 |     } | 
 |   } | 
 |  | 
 |   std::string histogram_name = "Windows.PostOperationState."; | 
 |   operation.AppendToString(&histogram_name); | 
 |   UmaHistogramEnumeration(histogram_name, metric, PostOperationState::kCount); | 
 | } | 
 |  | 
 | // Records the sample |error| in a histogram named | 
 | // "Windows.FilesystemError.|operation|". | 
 | void RecordFilesystemError(StringPiece operation, DWORD error) { | 
 |   std::string histogram_name = "Windows.FilesystemError."; | 
 |   operation.AppendToString(&histogram_name); | 
 |   UmaHistogramSparse(histogram_name, error); | 
 | } | 
 |  | 
 | // Returns the Win32 last error code or ERROR_SUCCESS if the last error code is | 
 | // ERROR_FILE_NOT_FOUND or ERROR_PATH_NOT_FOUND. This is useful in cases where | 
 | // the absence of a file or path is a success condition (e.g., when attempting | 
 | // to delete an item in the filesystem). | 
 | DWORD ReturnLastErrorOrSuccessOnNotFound() { | 
 |   const DWORD error_code = ::GetLastError(); | 
 |   return (error_code == ERROR_FILE_NOT_FOUND || | 
 |           error_code == ERROR_PATH_NOT_FOUND) | 
 |              ? ERROR_SUCCESS | 
 |              : error_code; | 
 | } | 
 |  | 
 | // Deletes all files and directories in a path. | 
 | // Returns ERROR_SUCCESS on success or the Windows error code corresponding to | 
 | // the first error encountered. ERROR_FILE_NOT_FOUND and ERROR_PATH_NOT_FOUND | 
 | // are considered success conditions, and are therefore never returned. | 
 | DWORD DeleteFileRecursive(const FilePath& path, | 
 |                           const FilePath::StringType& pattern, | 
 |                           bool recursive) { | 
 |   FileEnumerator traversal(path, false, | 
 |                            FileEnumerator::FILES | FileEnumerator::DIRECTORIES, | 
 |                            pattern); | 
 |   DWORD result = ERROR_SUCCESS; | 
 |   for (FilePath current = traversal.Next(); !current.empty(); | 
 |        current = traversal.Next()) { | 
 |     // Try to clear the read-only bit if we find it. | 
 |     FileEnumerator::FileInfo info = traversal.GetInfo(); | 
 |     if ((info.find_data().dwFileAttributes & FILE_ATTRIBUTE_READONLY) && | 
 |         (recursive || !info.IsDirectory())) { | 
 |       ::SetFileAttributes( | 
 |           current.value().c_str(), | 
 |           info.find_data().dwFileAttributes & ~FILE_ATTRIBUTE_READONLY); | 
 |     } | 
 |  | 
 |     DWORD this_result = ERROR_SUCCESS; | 
 |     if (info.IsDirectory()) { | 
 |       if (recursive) { | 
 |         this_result = DeleteFileRecursive(current, pattern, true); | 
 |         DCHECK_NE(static_cast<LONG>(this_result), ERROR_FILE_NOT_FOUND); | 
 |         DCHECK_NE(static_cast<LONG>(this_result), ERROR_PATH_NOT_FOUND); | 
 |         if (this_result == ERROR_SUCCESS && | 
 |             !::RemoveDirectory(current.value().c_str())) { | 
 |           this_result = ReturnLastErrorOrSuccessOnNotFound(); | 
 |         } | 
 |       } | 
 |     } else if (!::DeleteFile(current.value().c_str())) { | 
 |       this_result = ReturnLastErrorOrSuccessOnNotFound(); | 
 |     } | 
 |     if (result == ERROR_SUCCESS) | 
 |       result = this_result; | 
 |   } | 
 |   return result; | 
 | } | 
 |  | 
 | // Appends |mode_char| to |mode| before the optional character set encoding; see | 
 | // https://msdn.microsoft.com/library/yeby3zcb.aspx for details. | 
 | void AppendModeCharacter(base::char16 mode_char, base::string16* mode) { | 
 |   size_t comma_pos = mode->find(L','); | 
 |   mode->insert(comma_pos == base::string16::npos ? mode->length() : comma_pos, | 
 |                1, mode_char); | 
 | } | 
 |  | 
 | bool DoCopyFile(const FilePath& from_path, | 
 |                 const FilePath& to_path, | 
 |                 bool fail_if_exists) { | 
 |   ScopedBlockingCall scoped_blocking_call(BlockingType::MAY_BLOCK); | 
 |   if (from_path.ReferencesParent() || to_path.ReferencesParent()) | 
 |     return false; | 
 |  | 
 |   // NOTE: I suspect we could support longer paths, but that would involve | 
 |   // analyzing all our usage of files. | 
 |   if (from_path.value().length() >= MAX_PATH || | 
 |       to_path.value().length() >= MAX_PATH) { | 
 |     return false; | 
 |   } | 
 |  | 
 |   // Unlike the posix implementation that copies the file manually and discards | 
 |   // the ACL bits, CopyFile() copies the complete SECURITY_DESCRIPTOR and access | 
 |   // bits, which is usually not what we want. We can't do much about the | 
 |   // SECURITY_DESCRIPTOR but at least remove the read only bit. | 
 |   const wchar_t* dest = to_path.value().c_str(); | 
 |   if (!::CopyFile(from_path.value().c_str(), dest, fail_if_exists)) { | 
 |     // Copy failed. | 
 |     return false; | 
 |   } | 
 |   DWORD attrs = GetFileAttributes(dest); | 
 |   if (attrs == INVALID_FILE_ATTRIBUTES) { | 
 |     return false; | 
 |   } | 
 |   if (attrs & FILE_ATTRIBUTE_READONLY) { | 
 |     SetFileAttributes(dest, attrs & ~FILE_ATTRIBUTE_READONLY); | 
 |   } | 
 |   return true; | 
 | } | 
 |  | 
 | bool DoCopyDirectory(const FilePath& from_path, | 
 |                      const FilePath& to_path, | 
 |                      bool recursive, | 
 |                      bool fail_if_exists) { | 
 |   // NOTE(maruel): Previous version of this function used to call | 
 |   // SHFileOperation().  This used to copy the file attributes and extended | 
 |   // attributes, OLE structured storage, NTFS file system alternate data | 
 |   // streams, SECURITY_DESCRIPTOR. In practice, this is not what we want, we | 
 |   // want the containing directory to propagate its SECURITY_DESCRIPTOR. | 
 |   ScopedBlockingCall scoped_blocking_call(BlockingType::MAY_BLOCK); | 
 |  | 
 |   // NOTE: I suspect we could support longer paths, but that would involve | 
 |   // analyzing all our usage of files. | 
 |   if (from_path.value().length() >= MAX_PATH || | 
 |       to_path.value().length() >= MAX_PATH) { | 
 |     return false; | 
 |   } | 
 |  | 
 |   // This function does not properly handle destinations within the source. | 
 |   FilePath real_to_path = to_path; | 
 |   if (PathExists(real_to_path)) { | 
 |     real_to_path = MakeAbsoluteFilePath(real_to_path); | 
 |     if (real_to_path.empty()) | 
 |       return false; | 
 |   } else { | 
 |     real_to_path = MakeAbsoluteFilePath(real_to_path.DirName()); | 
 |     if (real_to_path.empty()) | 
 |       return false; | 
 |   } | 
 |   FilePath real_from_path = MakeAbsoluteFilePath(from_path); | 
 |   if (real_from_path.empty()) | 
 |     return false; | 
 |   if (real_to_path == real_from_path || real_from_path.IsParent(real_to_path)) | 
 |     return false; | 
 |  | 
 |   int traverse_type = FileEnumerator::FILES; | 
 |   if (recursive) | 
 |     traverse_type |= FileEnumerator::DIRECTORIES; | 
 |   FileEnumerator traversal(from_path, recursive, traverse_type); | 
 |  | 
 |   if (!PathExists(from_path)) { | 
 |     DLOG(ERROR) << "CopyDirectory() couldn't stat source directory: " | 
 |                 << from_path.value().c_str(); | 
 |     return false; | 
 |   } | 
 |   // TODO(maruel): This is not necessary anymore. | 
 |   DCHECK(recursive || DirectoryExists(from_path)); | 
 |  | 
 |   FilePath current = from_path; | 
 |   bool from_is_dir = DirectoryExists(from_path); | 
 |   bool success = true; | 
 |   FilePath from_path_base = from_path; | 
 |   if (recursive && DirectoryExists(to_path)) { | 
 |     // If the destination already exists and is a directory, then the | 
 |     // top level of source needs to be copied. | 
 |     from_path_base = from_path.DirName(); | 
 |   } | 
 |  | 
 |   while (success && !current.empty()) { | 
 |     // current is the source path, including from_path, so append | 
 |     // the suffix after from_path to to_path to create the target_path. | 
 |     FilePath target_path(to_path); | 
 |     if (from_path_base != current) { | 
 |       if (!from_path_base.AppendRelativePath(current, &target_path)) { | 
 |         success = false; | 
 |         break; | 
 |       } | 
 |     } | 
 |  | 
 |     if (from_is_dir) { | 
 |       if (!DirectoryExists(target_path) && | 
 |           !::CreateDirectory(target_path.value().c_str(), NULL)) { | 
 |         DLOG(ERROR) << "CopyDirectory() couldn't create directory: " | 
 |                     << target_path.value().c_str(); | 
 |         success = false; | 
 |       } | 
 |     } else if (!DoCopyFile(current, target_path, fail_if_exists)) { | 
 |       DLOG(ERROR) << "CopyDirectory() couldn't create file: " | 
 |                   << target_path.value().c_str(); | 
 |       success = false; | 
 |     } | 
 |  | 
 |     current = traversal.Next(); | 
 |     if (!current.empty()) | 
 |       from_is_dir = traversal.GetInfo().IsDirectory(); | 
 |   } | 
 |  | 
 |   return success; | 
 | } | 
 |  | 
 | // Returns ERROR_SUCCESS on success, or a Windows error code on failure. | 
 | DWORD DoDeleteFile(const FilePath& path, bool recursive) { | 
 |   ScopedBlockingCall scoped_blocking_call(BlockingType::MAY_BLOCK); | 
 |  | 
 |   if (path.empty()) | 
 |     return ERROR_SUCCESS; | 
 |  | 
 |   if (path.value().length() >= MAX_PATH) | 
 |     return ERROR_BAD_PATHNAME; | 
 |  | 
 |   // Handle any path with wildcards. | 
 |   if (path.BaseName().value().find_first_of(L"*?") != | 
 |       FilePath::StringType::npos) { | 
 |     const DWORD error_code = | 
 |         DeleteFileRecursive(path.DirName(), path.BaseName().value(), recursive); | 
 |     DCHECK_NE(static_cast<LONG>(error_code), ERROR_FILE_NOT_FOUND); | 
 |     DCHECK_NE(static_cast<LONG>(error_code), ERROR_PATH_NOT_FOUND); | 
 |     return error_code; | 
 |   } | 
 |  | 
 |   // Report success if the file or path does not exist. | 
 |   const DWORD attr = ::GetFileAttributes(path.value().c_str()); | 
 |   if (attr == INVALID_FILE_ATTRIBUTES) | 
 |     return ReturnLastErrorOrSuccessOnNotFound(); | 
 |  | 
 |   // Clear the read-only bit if it is set. | 
 |   if ((attr & FILE_ATTRIBUTE_READONLY) && | 
 |       !::SetFileAttributes(path.value().c_str(), | 
 |                            attr & ~FILE_ATTRIBUTE_READONLY)) { | 
 |     // It's possible for |path| to be gone now under a race with other deleters. | 
 |     return ReturnLastErrorOrSuccessOnNotFound(); | 
 |   } | 
 |  | 
 |   // Perform a simple delete on anything that isn't a directory. | 
 |   if (!(attr & FILE_ATTRIBUTE_DIRECTORY)) { | 
 |     return ::DeleteFile(path.value().c_str()) | 
 |                ? ERROR_SUCCESS | 
 |                : ReturnLastErrorOrSuccessOnNotFound(); | 
 |   } | 
 |  | 
 |   if (recursive) { | 
 |     const DWORD error_code = DeleteFileRecursive(path, L"*", true); | 
 |     DCHECK_NE(static_cast<LONG>(error_code), ERROR_FILE_NOT_FOUND); | 
 |     DCHECK_NE(static_cast<LONG>(error_code), ERROR_PATH_NOT_FOUND); | 
 |     if (error_code != ERROR_SUCCESS) | 
 |       return error_code; | 
 |   } | 
 |   return ::RemoveDirectory(path.value().c_str()) | 
 |              ? ERROR_SUCCESS | 
 |              : ReturnLastErrorOrSuccessOnNotFound(); | 
 | } | 
 |  | 
 | }  // namespace | 
 |  | 
 | FilePath MakeAbsoluteFilePath(const FilePath& input) { | 
 |   ScopedBlockingCall scoped_blocking_call(BlockingType::MAY_BLOCK); | 
 |   wchar_t file_path[MAX_PATH]; | 
 |   if (!_wfullpath(file_path, input.value().c_str(), MAX_PATH)) | 
 |     return FilePath(); | 
 |   return FilePath(file_path); | 
 | } | 
 |  | 
 | bool DeleteFile(const FilePath& path, bool recursive) { | 
 |   static constexpr char kRecursive[] = "DeleteFile.Recursive"; | 
 |   static constexpr char kNonRecursive[] = "DeleteFile.NonRecursive"; | 
 |   const StringPiece operation(recursive ? kRecursive : kNonRecursive); | 
 |  | 
 |   ScopedBlockingCall scoped_blocking_call(BlockingType::MAY_BLOCK); | 
 |  | 
 |   // Metrics for delete failures tracked in https://crbug.com/599084. Delete may | 
 |   // fail for a number of reasons. Log some metrics relating to failures in the | 
 |   // current code so that any improvements or regressions resulting from | 
 |   // subsequent code changes can be detected. | 
 |   const DWORD error = DoDeleteFile(path, recursive); | 
 |   RecordPostOperationState(path, operation, error == ERROR_SUCCESS); | 
 |   if (error == ERROR_SUCCESS) | 
 |     return true; | 
 |  | 
 |   RecordFilesystemError(operation, error); | 
 |   return false; | 
 | } | 
 |  | 
 | bool DeleteFileAfterReboot(const FilePath& path) { | 
 |   ScopedBlockingCall scoped_blocking_call(BlockingType::MAY_BLOCK); | 
 |  | 
 |   if (path.value().length() >= MAX_PATH) | 
 |     return false; | 
 |  | 
 |   return MoveFileEx(path.value().c_str(), NULL, | 
 |                     MOVEFILE_DELAY_UNTIL_REBOOT | | 
 |                         MOVEFILE_REPLACE_EXISTING) != FALSE; | 
 | } | 
 |  | 
 | bool ReplaceFile(const FilePath& from_path, | 
 |                  const FilePath& to_path, | 
 |                  File::Error* error) { | 
 |   ScopedBlockingCall scoped_blocking_call(BlockingType::MAY_BLOCK); | 
 |   // Try a simple move first.  It will only succeed when |to_path| doesn't | 
 |   // already exist. | 
 |   if (::MoveFile(from_path.value().c_str(), to_path.value().c_str())) | 
 |     return true; | 
 |   File::Error move_error = File::OSErrorToFileError(GetLastError()); | 
 |  | 
 |   // Try the full-blown replace if the move fails, as ReplaceFile will only | 
 |   // succeed when |to_path| does exist. When writing to a network share, we may | 
 |   // not be able to change the ACLs. Ignore ACL errors then | 
 |   // (REPLACEFILE_IGNORE_MERGE_ERRORS). | 
 |   if (::ReplaceFile(to_path.value().c_str(), from_path.value().c_str(), NULL, | 
 |                     REPLACEFILE_IGNORE_MERGE_ERRORS, NULL, NULL)) { | 
 |     return true; | 
 |   } | 
 |   // In the case of FILE_ERROR_NOT_FOUND from ReplaceFile, it is likely that | 
 |   // |to_path| does not exist. In this case, the more relevant error comes | 
 |   // from the call to MoveFile. | 
 |   if (error) { | 
 |     File::Error replace_error = File::OSErrorToFileError(GetLastError()); | 
 |     *error = replace_error == File::FILE_ERROR_NOT_FOUND ? move_error | 
 |                                                          : replace_error; | 
 |   } | 
 |   return false; | 
 | } | 
 |  | 
 | bool CopyDirectory(const FilePath& from_path, | 
 |                    const FilePath& to_path, | 
 |                    bool recursive) { | 
 |   return DoCopyDirectory(from_path, to_path, recursive, false); | 
 | } | 
 |  | 
 | bool CopyDirectoryExcl(const FilePath& from_path, | 
 |                        const FilePath& to_path, | 
 |                        bool recursive) { | 
 |   return DoCopyDirectory(from_path, to_path, recursive, true); | 
 | } | 
 |  | 
 | bool PathExists(const FilePath& path) { | 
 |   ScopedBlockingCall scoped_blocking_call(BlockingType::MAY_BLOCK); | 
 |   return (GetFileAttributes(path.value().c_str()) != INVALID_FILE_ATTRIBUTES); | 
 | } | 
 |  | 
 | bool PathIsWritable(const FilePath& path) { | 
 |   ScopedBlockingCall scoped_blocking_call(BlockingType::MAY_BLOCK); | 
 |   HANDLE dir = | 
 |       CreateFile(path.value().c_str(), FILE_ADD_FILE, kFileShareAll, | 
 |                  NULL, OPEN_EXISTING, FILE_FLAG_BACKUP_SEMANTICS, NULL); | 
 |  | 
 |   if (dir == INVALID_HANDLE_VALUE) | 
 |     return false; | 
 |  | 
 |   CloseHandle(dir); | 
 |   return true; | 
 | } | 
 |  | 
 | bool DirectoryExists(const FilePath& path) { | 
 |   ScopedBlockingCall scoped_blocking_call(BlockingType::MAY_BLOCK); | 
 |   DWORD fileattr = GetFileAttributes(path.value().c_str()); | 
 |   if (fileattr != INVALID_FILE_ATTRIBUTES) | 
 |     return (fileattr & FILE_ATTRIBUTE_DIRECTORY) != 0; | 
 |   return false; | 
 | } | 
 |  | 
 | bool GetTempDir(FilePath* path) { | 
 |   wchar_t temp_path[MAX_PATH + 1]; | 
 |   DWORD path_len = ::GetTempPath(MAX_PATH, temp_path); | 
 |   if (path_len >= MAX_PATH || path_len <= 0) | 
 |     return false; | 
 |   // TODO(evanm): the old behavior of this function was to always strip the | 
 |   // trailing slash.  We duplicate this here, but it shouldn't be necessary | 
 |   // when everyone is using the appropriate FilePath APIs. | 
 |   *path = FilePath(temp_path).StripTrailingSeparators(); | 
 |   return true; | 
 | } | 
 |  | 
 | FilePath GetHomeDir() { | 
 |   char16 result[MAX_PATH]; | 
 |   if (SUCCEEDED(SHGetFolderPath(NULL, CSIDL_PROFILE, NULL, SHGFP_TYPE_CURRENT, | 
 |                                 result)) && | 
 |       result[0]) { | 
 |     return FilePath(result); | 
 |   } | 
 |  | 
 |   // Fall back to the temporary directory on failure. | 
 |   FilePath temp; | 
 |   if (GetTempDir(&temp)) | 
 |     return temp; | 
 |  | 
 |   // Last resort. | 
 |   return FilePath(L"C:\\"); | 
 | } | 
 |  | 
 | bool CreateTemporaryFile(FilePath* path) { | 
 |   ScopedBlockingCall scoped_blocking_call(BlockingType::MAY_BLOCK); | 
 |  | 
 |   FilePath temp_file; | 
 |  | 
 |   if (!GetTempDir(path)) | 
 |     return false; | 
 |  | 
 |   if (CreateTemporaryFileInDir(*path, &temp_file)) { | 
 |     *path = temp_file; | 
 |     return true; | 
 |   } | 
 |  | 
 |   return false; | 
 | } | 
 |  | 
 | // On POSIX we have semantics to create and open a temporary file | 
 | // atomically. | 
 | // TODO(jrg): is there equivalent call to use on Windows instead of | 
 | // going 2-step? | 
 | FILE* CreateAndOpenTemporaryFileInDir(const FilePath& dir, FilePath* path) { | 
 |   ScopedBlockingCall scoped_blocking_call(BlockingType::MAY_BLOCK); | 
 |   if (!CreateTemporaryFileInDir(dir, path)) { | 
 |     return NULL; | 
 |   } | 
 |   // Open file in binary mode, to avoid problems with fwrite. On Windows | 
 |   // it replaces \n's with \r\n's, which may surprise you. | 
 |   // Reference: http://msdn.microsoft.com/en-us/library/h9t88zwz(VS.71).aspx | 
 |   return OpenFile(*path, "wb+"); | 
 | } | 
 |  | 
 | bool CreateTemporaryFileInDir(const FilePath& dir, FilePath* temp_file) { | 
 |   ScopedBlockingCall scoped_blocking_call(BlockingType::MAY_BLOCK); | 
 |  | 
 |   // Use GUID instead of ::GetTempFileName() to generate unique file names. | 
 |   // "Due to the algorithm used to generate file names, GetTempFileName can | 
 |   // perform poorly when creating a large number of files with the same prefix. | 
 |   // In such cases, it is recommended that you construct unique file names based | 
 |   // on GUIDs." | 
 |   // https://msdn.microsoft.com/library/windows/desktop/aa364991.aspx | 
 |  | 
 |   FilePath temp_name; | 
 |   bool create_file_success = false; | 
 |  | 
 |   // Although it is nearly impossible to get a duplicate name with GUID, we | 
 |   // still use a loop here in case it happens. | 
 |   for (int i = 0; i < 100; ++i) { | 
 |     temp_name = dir.Append(ASCIIToUTF16(base::GenerateGUID()) + L".tmp"); | 
 |     File file(temp_name, | 
 |               File::FLAG_CREATE | File::FLAG_READ | File::FLAG_WRITE); | 
 |     if (file.IsValid()) { | 
 |       file.Close(); | 
 |       create_file_success = true; | 
 |       break; | 
 |     } | 
 |   } | 
 |  | 
 |   if (!create_file_success) { | 
 |     DPLOG(WARNING) << "Failed to get temporary file name in " | 
 |                    << UTF16ToUTF8(dir.value()); | 
 |     return false; | 
 |   } | 
 |  | 
 |   wchar_t long_temp_name[MAX_PATH + 1]; | 
 |   DWORD long_name_len = | 
 |       GetLongPathName(temp_name.value().c_str(), long_temp_name, MAX_PATH); | 
 |   if (long_name_len > MAX_PATH || long_name_len == 0) { | 
 |     // GetLongPathName() failed, but we still have a temporary file. | 
 |     *temp_file = std::move(temp_name); | 
 |     return true; | 
 |   } | 
 |  | 
 |   FilePath::StringType long_temp_name_str; | 
 |   long_temp_name_str.assign(long_temp_name, long_name_len); | 
 |   *temp_file = FilePath(std::move(long_temp_name_str)); | 
 |   return true; | 
 | } | 
 |  | 
 | bool CreateTemporaryDirInDir(const FilePath& base_dir, | 
 |                              const FilePath::StringType& prefix, | 
 |                              FilePath* new_dir) { | 
 |   ScopedBlockingCall scoped_blocking_call(BlockingType::MAY_BLOCK); | 
 |  | 
 |   FilePath path_to_create; | 
 |  | 
 |   for (int count = 0; count < 50; ++count) { | 
 |     // Try create a new temporary directory with random generated name. If | 
 |     // the one exists, keep trying another path name until we reach some limit. | 
 |     string16 new_dir_name; | 
 |     new_dir_name.assign(prefix); | 
 |     new_dir_name.append(IntToString16(GetCurrentProcId())); | 
 |     new_dir_name.push_back('_'); | 
 |     new_dir_name.append( | 
 |         IntToString16(RandInt(0, std::numeric_limits<int16_t>::max()))); | 
 |  | 
 |     path_to_create = base_dir.Append(new_dir_name); | 
 |     if (::CreateDirectory(path_to_create.value().c_str(), NULL)) { | 
 |       *new_dir = path_to_create; | 
 |       return true; | 
 |     } | 
 |   } | 
 |  | 
 |   return false; | 
 | } | 
 |  | 
 | bool CreateNewTempDirectory(const FilePath::StringType& prefix, | 
 |                             FilePath* new_temp_path) { | 
 |   ScopedBlockingCall scoped_blocking_call(BlockingType::MAY_BLOCK); | 
 |  | 
 |   FilePath system_temp_dir; | 
 |   if (!GetTempDir(&system_temp_dir)) | 
 |     return false; | 
 |  | 
 |   return CreateTemporaryDirInDir(system_temp_dir, prefix, new_temp_path); | 
 | } | 
 |  | 
 | bool CreateDirectoryAndGetError(const FilePath& full_path, | 
 |                                 File::Error* error) { | 
 |   ScopedBlockingCall scoped_blocking_call(BlockingType::MAY_BLOCK); | 
 |  | 
 |   // If the path exists, we've succeeded if it's a directory, failed otherwise. | 
 |   const wchar_t* const full_path_str = full_path.value().c_str(); | 
 |   const DWORD fileattr = ::GetFileAttributes(full_path_str); | 
 |   if (fileattr != INVALID_FILE_ATTRIBUTES) { | 
 |     if ((fileattr & FILE_ATTRIBUTE_DIRECTORY) != 0) { | 
 |       DVLOG(1) << "CreateDirectory(" << full_path_str << "), " | 
 |                << "directory already exists."; | 
 |       return true; | 
 |     } | 
 |     DLOG(WARNING) << "CreateDirectory(" << full_path_str << "), " | 
 |                   << "conflicts with existing file."; | 
 |     if (error) | 
 |       *error = File::FILE_ERROR_NOT_A_DIRECTORY; | 
 |     ::SetLastError(ERROR_FILE_EXISTS); | 
 |     return false; | 
 |   } | 
 |  | 
 |   // Invariant:  Path does not exist as file or directory. | 
 |  | 
 |   // Attempt to create the parent recursively.  This will immediately return | 
 |   // true if it already exists, otherwise will create all required parent | 
 |   // directories starting with the highest-level missing parent. | 
 |   FilePath parent_path(full_path.DirName()); | 
 |   if (parent_path.value() == full_path.value()) { | 
 |     if (error) | 
 |       *error = File::FILE_ERROR_NOT_FOUND; | 
 |     ::SetLastError(ERROR_FILE_NOT_FOUND); | 
 |     return false; | 
 |   } | 
 |   if (!CreateDirectoryAndGetError(parent_path, error)) { | 
 |     DLOG(WARNING) << "Failed to create one of the parent directories."; | 
 |     DCHECK(!error || *error != File::FILE_OK); | 
 |     return false; | 
 |   } | 
 |  | 
 |   if (::CreateDirectory(full_path_str, NULL)) | 
 |     return true; | 
 |  | 
 |   const DWORD error_code = ::GetLastError(); | 
 |   if (error_code == ERROR_ALREADY_EXISTS && DirectoryExists(full_path)) { | 
 |     // This error code ERROR_ALREADY_EXISTS doesn't indicate whether we were | 
 |     // racing with someone creating the same directory, or a file with the same | 
 |     // path.  If DirectoryExists() returns true, we lost the race to create the | 
 |     // same directory. | 
 |     return true; | 
 |   } | 
 |   if (error) | 
 |     *error = File::OSErrorToFileError(error_code); | 
 |   ::SetLastError(error_code); | 
 |   DPLOG(WARNING) << "Failed to create directory " << full_path_str; | 
 |   return false; | 
 | } | 
 |  | 
 | bool NormalizeFilePath(const FilePath& path, FilePath* real_path) { | 
 |   ScopedBlockingCall scoped_blocking_call(BlockingType::MAY_BLOCK); | 
 |   FilePath mapped_file; | 
 |   if (!NormalizeToNativeFilePath(path, &mapped_file)) | 
 |     return false; | 
 |   // NormalizeToNativeFilePath() will return a path that starts with | 
 |   // "\Device\Harddisk...".  Helper DevicePathToDriveLetterPath() | 
 |   // will find a drive letter which maps to the path's device, so | 
 |   // that we return a path starting with a drive letter. | 
 |   return DevicePathToDriveLetterPath(mapped_file, real_path); | 
 | } | 
 |  | 
 | bool DevicePathToDriveLetterPath(const FilePath& nt_device_path, | 
 |                                  FilePath* out_drive_letter_path) { | 
 |   ScopedBlockingCall scoped_blocking_call(BlockingType::MAY_BLOCK); | 
 |  | 
 |   // Get the mapping of drive letters to device paths. | 
 |   const int kDriveMappingSize = 1024; | 
 |   wchar_t drive_mapping[kDriveMappingSize] = {'\0'}; | 
 |   if (!::GetLogicalDriveStrings(kDriveMappingSize - 1, drive_mapping)) { | 
 |     DLOG(ERROR) << "Failed to get drive mapping."; | 
 |     return false; | 
 |   } | 
 |  | 
 |   // The drive mapping is a sequence of null terminated strings. | 
 |   // The last string is empty. | 
 |   wchar_t* drive_map_ptr = drive_mapping; | 
 |   wchar_t device_path_as_string[MAX_PATH]; | 
 |   wchar_t drive[] = L" :"; | 
 |  | 
 |   // For each string in the drive mapping, get the junction that links | 
 |   // to it.  If that junction is a prefix of |device_path|, then we | 
 |   // know that |drive| is the real path prefix. | 
 |   while (*drive_map_ptr) { | 
 |     drive[0] = drive_map_ptr[0];  // Copy the drive letter. | 
 |  | 
 |     if (QueryDosDevice(drive, device_path_as_string, MAX_PATH)) { | 
 |       FilePath device_path(device_path_as_string); | 
 |       if (device_path == nt_device_path || | 
 |           device_path.IsParent(nt_device_path)) { | 
 |         *out_drive_letter_path = FilePath(drive + | 
 |             nt_device_path.value().substr(wcslen(device_path_as_string))); | 
 |         return true; | 
 |       } | 
 |     } | 
 |     // Move to the next drive letter string, which starts one | 
 |     // increment after the '\0' that terminates the current string. | 
 |     while (*drive_map_ptr++) {} | 
 |   } | 
 |  | 
 |   // No drive matched.  The path does not start with a device junction | 
 |   // that is mounted as a drive letter.  This means there is no drive | 
 |   // letter path to the volume that holds |device_path|, so fail. | 
 |   return false; | 
 | } | 
 |  | 
 | bool NormalizeToNativeFilePath(const FilePath& path, FilePath* nt_path) { | 
 |   ScopedBlockingCall scoped_blocking_call(BlockingType::MAY_BLOCK); | 
 |   // In Vista, GetFinalPathNameByHandle() would give us the real path | 
 |   // from a file handle.  If we ever deprecate XP, consider changing the | 
 |   // code below to a call to GetFinalPathNameByHandle().  The method this | 
 |   // function uses is explained in the following msdn article: | 
 |   // http://msdn.microsoft.com/en-us/library/aa366789(VS.85).aspx | 
 |   win::ScopedHandle file_handle( | 
 |       ::CreateFile(path.value().c_str(), | 
 |                    GENERIC_READ, | 
 |                    kFileShareAll, | 
 |                    NULL, | 
 |                    OPEN_EXISTING, | 
 |                    FILE_ATTRIBUTE_NORMAL, | 
 |                    NULL)); | 
 |   if (!file_handle.IsValid()) | 
 |     return false; | 
 |  | 
 |   // Create a file mapping object.  Can't easily use MemoryMappedFile, because | 
 |   // we only map the first byte, and need direct access to the handle. You can | 
 |   // not map an empty file, this call fails in that case. | 
 |   win::ScopedHandle file_map_handle( | 
 |       ::CreateFileMapping(file_handle.Get(), | 
 |                           NULL, | 
 |                           PAGE_READONLY, | 
 |                           0, | 
 |                           1,  // Just one byte.  No need to look at the data. | 
 |                           NULL)); | 
 |   if (!file_map_handle.IsValid()) | 
 |     return false; | 
 |  | 
 |   // Use a view of the file to get the path to the file. | 
 |   void* file_view = MapViewOfFile(file_map_handle.Get(), | 
 |                                   FILE_MAP_READ, 0, 0, 1); | 
 |   if (!file_view) | 
 |     return false; | 
 |  | 
 |   // The expansion of |path| into a full path may make it longer. | 
 |   // GetMappedFileName() will fail if the result is longer than MAX_PATH. | 
 |   // Pad a bit to be safe.  If kMaxPathLength is ever changed to be less | 
 |   // than MAX_PATH, it would be nessisary to test that GetMappedFileName() | 
 |   // not return kMaxPathLength.  This would mean that only part of the | 
 |   // path fit in |mapped_file_path|. | 
 |   const int kMaxPathLength = MAX_PATH + 10; | 
 |   wchar_t mapped_file_path[kMaxPathLength]; | 
 |   bool success = false; | 
 |   HANDLE cp = GetCurrentProcess(); | 
 |   if (::GetMappedFileNameW(cp, file_view, mapped_file_path, kMaxPathLength)) { | 
 |     *nt_path = FilePath(mapped_file_path); | 
 |     success = true; | 
 |   } | 
 |   ::UnmapViewOfFile(file_view); | 
 |   return success; | 
 | } | 
 |  | 
 | // TODO(rkc): Work out if we want to handle NTFS junctions here or not, handle | 
 | // them if we do decide to. | 
 | bool IsLink(const FilePath& file_path) { | 
 |   return false; | 
 | } | 
 |  | 
 | bool GetFileInfo(const FilePath& file_path, File::Info* results) { | 
 |   ScopedBlockingCall scoped_blocking_call(BlockingType::MAY_BLOCK); | 
 |  | 
 |   WIN32_FILE_ATTRIBUTE_DATA attr; | 
 |   if (!GetFileAttributesEx(file_path.value().c_str(), | 
 |                            GetFileExInfoStandard, &attr)) { | 
 |     return false; | 
 |   } | 
 |  | 
 |   ULARGE_INTEGER size; | 
 |   size.HighPart = attr.nFileSizeHigh; | 
 |   size.LowPart = attr.nFileSizeLow; | 
 |   results->size = size.QuadPart; | 
 |  | 
 |   results->is_directory = | 
 |       (attr.dwFileAttributes & FILE_ATTRIBUTE_DIRECTORY) != 0; | 
 |   results->last_modified = Time::FromFileTime(attr.ftLastWriteTime); | 
 |   results->last_accessed = Time::FromFileTime(attr.ftLastAccessTime); | 
 |   results->creation_time = Time::FromFileTime(attr.ftCreationTime); | 
 |  | 
 |   return true; | 
 | } | 
 |  | 
 | FILE* OpenFile(const FilePath& filename, const char* mode) { | 
 |   // 'N' is unconditionally added below, so be sure there is not one already | 
 |   // present before a comma in |mode|. | 
 |   DCHECK( | 
 |       strchr(mode, 'N') == nullptr || | 
 |       (strchr(mode, ',') != nullptr && strchr(mode, 'N') > strchr(mode, ','))); | 
 |   ScopedBlockingCall scoped_blocking_call(BlockingType::MAY_BLOCK); | 
 |   string16 w_mode = ASCIIToUTF16(mode); | 
 |   AppendModeCharacter(L'N', &w_mode); | 
 |   return _wfsopen(filename.value().c_str(), w_mode.c_str(), _SH_DENYNO); | 
 | } | 
 |  | 
 | FILE* FileToFILE(File file, const char* mode) { | 
 |   if (!file.IsValid()) | 
 |     return NULL; | 
 |   int fd = | 
 |       _open_osfhandle(reinterpret_cast<intptr_t>(file.GetPlatformFile()), 0); | 
 |   if (fd < 0) | 
 |     return NULL; | 
 |   file.TakePlatformFile(); | 
 |   FILE* stream = _fdopen(fd, mode); | 
 |   if (!stream) | 
 |     _close(fd); | 
 |   return stream; | 
 | } | 
 |  | 
 | int ReadFile(const FilePath& filename, char* data, int max_size) { | 
 |   ScopedBlockingCall scoped_blocking_call(BlockingType::MAY_BLOCK); | 
 |   win::ScopedHandle file(CreateFile(filename.value().c_str(), | 
 |                                     GENERIC_READ, | 
 |                                     FILE_SHARE_READ | FILE_SHARE_WRITE, | 
 |                                     NULL, | 
 |                                     OPEN_EXISTING, | 
 |                                     FILE_FLAG_SEQUENTIAL_SCAN, | 
 |                                     NULL)); | 
 |   if (!file.IsValid()) | 
 |     return -1; | 
 |  | 
 |   DWORD read; | 
 |   if (::ReadFile(file.Get(), data, max_size, &read, NULL)) | 
 |     return read; | 
 |  | 
 |   return -1; | 
 | } | 
 |  | 
 | int WriteFile(const FilePath& filename, const char* data, int size) { | 
 |   ScopedBlockingCall scoped_blocking_call(BlockingType::MAY_BLOCK); | 
 |   win::ScopedHandle file(CreateFile(filename.value().c_str(), GENERIC_WRITE, 0, | 
 |                                     NULL, CREATE_ALWAYS, FILE_ATTRIBUTE_NORMAL, | 
 |                                     NULL)); | 
 |   if (!file.IsValid()) { | 
 |     DPLOG(WARNING) << "CreateFile failed for path " | 
 |                    << UTF16ToUTF8(filename.value()); | 
 |     return -1; | 
 |   } | 
 |  | 
 |   DWORD written; | 
 |   BOOL result = ::WriteFile(file.Get(), data, size, &written, NULL); | 
 |   if (result && static_cast<int>(written) == size) | 
 |     return written; | 
 |  | 
 |   if (!result) { | 
 |     // WriteFile failed. | 
 |     DPLOG(WARNING) << "writing file " << UTF16ToUTF8(filename.value()) | 
 |                    << " failed"; | 
 |   } else { | 
 |     // Didn't write all the bytes. | 
 |     DLOG(WARNING) << "wrote" << written << " bytes to " | 
 |                   << UTF16ToUTF8(filename.value()) << " expected " << size; | 
 |   } | 
 |   return -1; | 
 | } | 
 |  | 
 | bool AppendToFile(const FilePath& filename, const char* data, int size) { | 
 |   ScopedBlockingCall scoped_blocking_call(BlockingType::MAY_BLOCK); | 
 |   win::ScopedHandle file(CreateFile(filename.value().c_str(), | 
 |                                     FILE_APPEND_DATA, | 
 |                                     0, | 
 |                                     NULL, | 
 |                                     OPEN_EXISTING, | 
 |                                     0, | 
 |                                     NULL)); | 
 |   if (!file.IsValid()) { | 
 |     VPLOG(1) << "CreateFile failed for path " << UTF16ToUTF8(filename.value()); | 
 |     return false; | 
 |   } | 
 |  | 
 |   DWORD written; | 
 |   BOOL result = ::WriteFile(file.Get(), data, size, &written, NULL); | 
 |   if (result && static_cast<int>(written) == size) | 
 |     return true; | 
 |  | 
 |   if (!result) { | 
 |     // WriteFile failed. | 
 |     VPLOG(1) << "Writing file " << UTF16ToUTF8(filename.value()) << " failed"; | 
 |   } else { | 
 |     // Didn't write all the bytes. | 
 |     VPLOG(1) << "Only wrote " << written << " out of " << size << " byte(s) to " | 
 |              << UTF16ToUTF8(filename.value()); | 
 |   } | 
 |   return false; | 
 | } | 
 |  | 
 | bool GetCurrentDirectory(FilePath* dir) { | 
 |   ScopedBlockingCall scoped_blocking_call(BlockingType::MAY_BLOCK); | 
 |  | 
 |   wchar_t system_buffer[MAX_PATH]; | 
 |   system_buffer[0] = 0; | 
 |   DWORD len = ::GetCurrentDirectory(MAX_PATH, system_buffer); | 
 |   if (len == 0 || len > MAX_PATH) | 
 |     return false; | 
 |   // TODO(evanm): the old behavior of this function was to always strip the | 
 |   // trailing slash.  We duplicate this here, but it shouldn't be necessary | 
 |   // when everyone is using the appropriate FilePath APIs. | 
 |   std::wstring dir_str(system_buffer); | 
 |   *dir = FilePath(dir_str).StripTrailingSeparators(); | 
 |   return true; | 
 | } | 
 |  | 
 | bool SetCurrentDirectory(const FilePath& directory) { | 
 |   ScopedBlockingCall scoped_blocking_call(BlockingType::MAY_BLOCK); | 
 |   return ::SetCurrentDirectory(directory.value().c_str()) != 0; | 
 | } | 
 |  | 
 | int GetMaximumPathComponentLength(const FilePath& path) { | 
 |   ScopedBlockingCall scoped_blocking_call(BlockingType::MAY_BLOCK); | 
 |  | 
 |   wchar_t volume_path[MAX_PATH]; | 
 |   if (!GetVolumePathNameW(path.NormalizePathSeparators().value().c_str(), | 
 |                           volume_path, | 
 |                           arraysize(volume_path))) { | 
 |     return -1; | 
 |   } | 
 |  | 
 |   DWORD max_length = 0; | 
 |   if (!GetVolumeInformationW(volume_path, NULL, 0, NULL, &max_length, NULL, | 
 |                              NULL, 0)) { | 
 |     return -1; | 
 |   } | 
 |  | 
 |   // Length of |path| with path separator appended. | 
 |   size_t prefix = path.StripTrailingSeparators().value().size() + 1; | 
 |   // The whole path string must be shorter than MAX_PATH. That is, it must be | 
 |   // prefix + component_length < MAX_PATH (or equivalently, <= MAX_PATH - 1). | 
 |   int whole_path_limit = std::max(0, MAX_PATH - 1 - static_cast<int>(prefix)); | 
 |   return std::min(whole_path_limit, static_cast<int>(max_length)); | 
 | } | 
 |  | 
 | bool CopyFile(const FilePath& from_path, const FilePath& to_path) { | 
 |   return DoCopyFile(from_path, to_path, false); | 
 | } | 
 |  | 
 | bool SetNonBlocking(int fd) { | 
 |   unsigned long nonblocking = 1; | 
 |   if (ioctlsocket(fd, FIONBIO, &nonblocking) == 0) | 
 |     return true; | 
 |   return false; | 
 | } | 
 |  | 
 | // ----------------------------------------------------------------------------- | 
 |  | 
 | namespace internal { | 
 |  | 
 | bool MoveUnsafe(const FilePath& from_path, const FilePath& to_path) { | 
 |   ScopedBlockingCall scoped_blocking_call(BlockingType::MAY_BLOCK); | 
 |  | 
 |   // NOTE: I suspect we could support longer paths, but that would involve | 
 |   // analyzing all our usage of files. | 
 |   if (from_path.value().length() >= MAX_PATH || | 
 |       to_path.value().length() >= MAX_PATH) { | 
 |     return false; | 
 |   } | 
 |   if (MoveFileEx(from_path.value().c_str(), to_path.value().c_str(), | 
 |                  MOVEFILE_COPY_ALLOWED | MOVEFILE_REPLACE_EXISTING) != 0) | 
 |     return true; | 
 |  | 
 |   // Keep the last error value from MoveFileEx around in case the below | 
 |   // fails. | 
 |   bool ret = false; | 
 |   DWORD last_error = ::GetLastError(); | 
 |  | 
 |   if (DirectoryExists(from_path)) { | 
 |     // MoveFileEx fails if moving directory across volumes. We will simulate | 
 |     // the move by using Copy and Delete. Ideally we could check whether | 
 |     // from_path and to_path are indeed in different volumes. | 
 |     ret = internal::CopyAndDeleteDirectory(from_path, to_path); | 
 |   } | 
 |  | 
 |   if (!ret) { | 
 |     // Leave a clue about what went wrong so that it can be (at least) picked | 
 |     // up by a PLOG entry. | 
 |     ::SetLastError(last_error); | 
 |   } | 
 |  | 
 |   return ret; | 
 | } | 
 |  | 
 | bool CopyAndDeleteDirectory(const FilePath& from_path, | 
 |                             const FilePath& to_path) { | 
 |   ScopedBlockingCall scoped_blocking_call(BlockingType::MAY_BLOCK); | 
 |   if (CopyDirectory(from_path, to_path, true)) { | 
 |     if (DeleteFile(from_path, true)) | 
 |       return true; | 
 |  | 
 |     // Like Move, this function is not transactional, so we just | 
 |     // leave the copied bits behind if deleting from_path fails. | 
 |     // If to_path exists previously then we have already overwritten | 
 |     // it by now, we don't get better off by deleting the new bits. | 
 |   } | 
 |   return false; | 
 | } | 
 |  | 
 | }  // namespace internal | 
 | }  // namespace base |