2015-11-13 04:37:12 +00:00
|
|
|
// Copyright (c) 2012 The Chromium Authors. All rights reserved.
|
|
|
|
// Use of this source code is governed by a BSD-style license that can be
|
|
|
|
// found in the LICENSE file.
|
|
|
|
|
|
|
|
#include "chrome/common/chrome_paths_internal.h"
|
|
|
|
|
|
|
|
#include <knownfolders.h>
|
|
|
|
#include <shellapi.h>
|
|
|
|
#include <shlobj.h>
|
|
|
|
#include <shobjidl.h>
|
2018-04-18 01:57:05 +00:00
|
|
|
#include <windows.h>
|
2015-11-13 04:37:12 +00:00
|
|
|
|
|
|
|
#include "base/files/file_path.h"
|
|
|
|
#include "base/path_service.h"
|
|
|
|
#include "base/win/scoped_co_mem.h"
|
|
|
|
#include "chrome/common/chrome_constants.h"
|
|
|
|
|
|
|
|
namespace chrome {
|
|
|
|
|
|
|
|
namespace {
|
|
|
|
|
|
|
|
// Generic function to call SHGetFolderPath().
|
|
|
|
bool GetUserDirectory(int csidl_folder, base::FilePath* result) {
|
|
|
|
// We need to go compute the value. It would be nice to support paths
|
|
|
|
// with names longer than MAX_PATH, but the system functions don't seem
|
|
|
|
// to be designed for it either, with the exception of GetTempPath
|
|
|
|
// (but other things will surely break if the temp path is too long,
|
|
|
|
// so we don't bother handling it.
|
|
|
|
wchar_t path_buf[MAX_PATH];
|
|
|
|
path_buf[0] = 0;
|
2018-04-18 01:57:05 +00:00
|
|
|
if (FAILED(SHGetFolderPath(NULL, csidl_folder, NULL, SHGFP_TYPE_CURRENT,
|
|
|
|
path_buf))) {
|
2015-11-13 04:37:12 +00:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
*result = base::FilePath(path_buf);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
} // namespace
|
|
|
|
|
|
|
|
bool GetDefaultUserDataDirectory(base::FilePath* result) {
|
2015-11-13 05:23:13 +00:00
|
|
|
return PathService::Get(base::DIR_LOCAL_APP_DATA, result);
|
2015-11-13 04:37:12 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void GetUserCacheDirectory(const base::FilePath& profile_dir,
|
|
|
|
base::FilePath* result) {
|
|
|
|
// This function does more complicated things on Mac/Linux.
|
|
|
|
*result = profile_dir;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool GetUserDocumentsDirectory(base::FilePath* result) {
|
|
|
|
return GetUserDirectory(CSIDL_MYDOCUMENTS, result);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Return a default path for downloads that is safe.
|
|
|
|
// We just use 'Downloads' under DIR_USER_DOCUMENTS. Localizing
|
|
|
|
// 'downloads' is not a good idea because Chrome's UI language
|
|
|
|
// can be changed.
|
|
|
|
bool GetUserDownloadsDirectorySafe(base::FilePath* result) {
|
|
|
|
if (!GetUserDocumentsDirectory(result))
|
|
|
|
return false;
|
|
|
|
|
|
|
|
*result = result->Append(L"Downloads");
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
// On Vista and higher, use the downloads known folder. Since it can be
|
|
|
|
// relocated to point to a "dangerous" folder, callers should validate that the
|
|
|
|
// returned path is not dangerous before using it.
|
|
|
|
bool GetUserDownloadsDirectory(base::FilePath* result) {
|
2018-04-18 01:57:05 +00:00
|
|
|
typedef HRESULT(WINAPI * GetKnownFolderPath)(REFKNOWNFOLDERID, DWORD, HANDLE,
|
|
|
|
PWSTR*);
|
2015-11-13 04:37:12 +00:00
|
|
|
GetKnownFolderPath f = reinterpret_cast<GetKnownFolderPath>(
|
|
|
|
GetProcAddress(GetModuleHandle(L"shell32.dll"), "SHGetKnownFolderPath"));
|
|
|
|
base::win::ScopedCoMem<wchar_t> path_buf;
|
|
|
|
if (f && SUCCEEDED(f(FOLDERID_Downloads, 0, NULL, &path_buf))) {
|
|
|
|
*result = base::FilePath(std::wstring(path_buf));
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
return GetUserDownloadsDirectorySafe(result);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool GetUserMusicDirectory(base::FilePath* result) {
|
|
|
|
return GetUserDirectory(CSIDL_MYMUSIC, result);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool GetUserPicturesDirectory(base::FilePath* result) {
|
|
|
|
return GetUserDirectory(CSIDL_MYPICTURES, result);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool GetUserVideosDirectory(base::FilePath* result) {
|
|
|
|
return GetUserDirectory(CSIDL_MYVIDEO, result);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool ProcessNeedsProfileDir(const std::string& process_type) {
|
|
|
|
// On windows we don't want subprocesses other than the browser process and
|
|
|
|
// service processes to be able to use the profile directory because if it
|
|
|
|
// lies on a network share the sandbox will prevent us from accessing it.
|
|
|
|
|
2015-11-13 05:23:13 +00:00
|
|
|
if (process_type.empty())
|
2015-11-13 04:37:12 +00:00
|
|
|
return true;
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
} // namespace chrome
|