Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Change the API for exposing the sandboxed file system. #174

Merged
merged 2 commits into from Apr 17, 2020

Conversation

mkruisselbrink
Copy link
Contributor

@mkruisselbrink mkruisselbrink commented Apr 16, 2020

Also explain what and why the sandboxed file system is.

This fixes #66 and partially addresses #27.


Preview | Diff

Also explain what and why the sandboxed file system is.

This fixes #66 and partially addresses #27.
@mkruisselbrink
Copy link
Contributor Author

@inexorabletash @pwnall what do you think of this change? Decoupling sandboxed file system from "special/system/standard/well known" directories seems like it would be less confusing to me...

@mkruisselbrink mkruisselbrink requested review from inexorabletash and pwnall and removed request for inexorabletash April 17, 2020 00:00
Copy link
Collaborator

@inexorabletash inexorabletash left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

just discussion, lgtm to merge

EXPLAINER.md Outdated Show resolved Hide resolved
index.bs Outdated Show resolved Hide resolved
};
</xmp>

Advisement: In Chrome this functionality is currently exposed as `FileSystemDirectoryHandle.getSystemDirectory({type: "sandbox"})`.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Add the milestone? I also like tossing in 🚧 markers, but I'm silly that way.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Well, currently it's all milestones... Once we've implemented these changes I definitely want to go back and update this to mention milestones, just not sure what milestone to mention now.

@mkruisselbrink mkruisselbrink merged commit a45806a into master Apr 17, 2020
@mkruisselbrink mkruisselbrink deleted the sandboxed-fs branch April 17, 2020 23:42
mkruisselbrink added a commit that referenced this pull request May 27, 2020
This method was renamed/moved in #174, but unintentionally that change
also started limiting the API to only be available in windows. This
changes it back to also expose the origin private directory to workers.
mkruisselbrink added a commit that referenced this pull request May 28, 2020
This method was renamed/moved in #174, but unintentionally that change
also started limiting the API to only be available in windows. This
changes it back to also expose the origin private directory to workers.
chromium-wpt-export-bot pushed a commit to web-platform-tests/wpt that referenced this pull request May 29, 2020
In WICG/file-system-access#174 the spec
for how sandboxed FS is exposed was change, this updates to
implementation to match the spec.

R=mek@chromium.org

https://bugs.chromium.org/p/chromium/issues/detail?id=1081287#c2

Change-Id: I0e381c873db98e30baed6679be048031b385cc50
chromium-wpt-export-bot pushed a commit to web-platform-tests/wpt that referenced this pull request Jun 1, 2020
In WICG/file-system-access#174 the spec
for how sandboxed FS is exposed was change, this updates to
implementation to match the spec.

R=mek@chromium.org

https://bugs.chromium.org/p/chromium/issues/detail?id=1081287#c2

Change-Id: I0e381c873db98e30baed6679be048031b385cc50
chromium-wpt-export-bot pushed a commit to web-platform-tests/wpt that referenced this pull request Jun 1, 2020
In WICG/file-system-access#174 the spec
for how sandboxed FS is exposed was change, this updates to
implementation to match the spec.

R=mek@chromium.org

Bug: 1081287

Change-Id: I0e381c873db98e30baed6679be048031b385cc50
chromium-wpt-export-bot pushed a commit to web-platform-tests/wpt that referenced this pull request Jun 2, 2020
In WICG/file-system-access#174 the spec
for how sandboxed FS is exposed was change, this updates to
implementation to match the spec.

R=mek@chromium.org

Bug: 1081287

Change-Id: I0e381c873db98e30baed6679be048031b385cc50
chromium-wpt-export-bot pushed a commit to web-platform-tests/wpt that referenced this pull request Jun 3, 2020
In WICG/file-system-access#174 the spec
for how sandboxed FS is exposed was change, this updates to
implementation to match the spec.

R=mek@chromium.org

Bug: 1081287

Change-Id: I0e381c873db98e30baed6679be048031b385cc50
pull bot pushed a commit to Yannic/chromium that referenced this pull request Jun 3, 2020
In WICG/file-system-access#174 the spec
for how sandboxed FS is exposed was change, this updates to
implementation to match the spec.

R=mek@chromium.org

Bug: 1081287

Change-Id: I0e381c873db98e30baed6679be048031b385cc50
Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/2220685
Commit-Queue: Hazim Mohamed <hazimmohamed@google.com>
Reviewed-by: Marijn Kruisselbrink <mek@chromium.org>
Reviewed-by: Jeremy Roman <jbroman@chromium.org>
Cr-Commit-Position: refs/heads/master@{#774745}
chromium-wpt-export-bot pushed a commit to web-platform-tests/wpt that referenced this pull request Jun 3, 2020
In WICG/file-system-access#174 the spec
for how sandboxed FS is exposed was change, this updates to
implementation to match the spec.

R=mek@chromium.org

Bug: 1081287

Change-Id: I0e381c873db98e30baed6679be048031b385cc50
Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/2220685
Commit-Queue: Hazim Mohamed <hazimmohamed@google.com>
Reviewed-by: Marijn Kruisselbrink <mek@chromium.org>
Reviewed-by: Jeremy Roman <jbroman@chromium.org>
Cr-Commit-Position: refs/heads/master@{#774745}
chromium-wpt-export-bot pushed a commit to web-platform-tests/wpt that referenced this pull request Jun 3, 2020
In WICG/file-system-access#174 the spec
for how sandboxed FS is exposed was change, this updates to
implementation to match the spec.

R=mek@chromium.org

Bug: 1081287

Change-Id: I0e381c873db98e30baed6679be048031b385cc50
Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/2220685
Commit-Queue: Hazim Mohamed <hazimmohamed@google.com>
Reviewed-by: Marijn Kruisselbrink <mek@chromium.org>
Reviewed-by: Jeremy Roman <jbroman@chromium.org>
Cr-Commit-Position: refs/heads/master@{#774745}
moz-v2v-gh pushed a commit to mozilla/gecko-dev that referenced this pull request Jun 13, 2020
…getOriginPrivateDirectory., a=testonly

Automatic update from web-platform-tests
[NativeFS] Change getSystemDirectory to getOriginPrivateDirectory.

In WICG/file-system-access#174 the spec
for how sandboxed FS is exposed was change, this updates to
implementation to match the spec.

R=mek@chromium.org

Bug: 1081287

Change-Id: I0e381c873db98e30baed6679be048031b385cc50
Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/2220685
Commit-Queue: Hazim Mohamed <hazimmohamed@google.com>
Reviewed-by: Marijn Kruisselbrink <mek@chromium.org>
Reviewed-by: Jeremy Roman <jbroman@chromium.org>
Cr-Commit-Position: refs/heads/master@{#774745}

--

wpt-commits: 1e1431774d766756367132d3c976aeaf8998a8d0
wpt-pr: 23844
xeonchen pushed a commit to xeonchen/gecko that referenced this pull request Jun 13, 2020
…getOriginPrivateDirectory., a=testonly

Automatic update from web-platform-tests
[NativeFS] Change getSystemDirectory to getOriginPrivateDirectory.

In WICG/file-system-access#174 the spec
for how sandboxed FS is exposed was change, this updates to
implementation to match the spec.

R=mek@chromium.org

Bug: 1081287

Change-Id: I0e381c873db98e30baed6679be048031b385cc50
Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/2220685
Commit-Queue: Hazim Mohamed <hazimmohamed@google.com>
Reviewed-by: Marijn Kruisselbrink <mek@chromium.org>
Reviewed-by: Jeremy Roman <jbroman@chromium.org>
Cr-Commit-Position: refs/heads/master@{#774745}

--

wpt-commits: 1e1431774d766756367132d3c976aeaf8998a8d0
wpt-pr: 23844
gecko-dev-updater pushed a commit to marco-c/gecko-dev-comments-removed that referenced this pull request Jun 15, 2020
…getOriginPrivateDirectory., a=testonly

Automatic update from web-platform-tests
[NativeFS] Change getSystemDirectory to getOriginPrivateDirectory.

In WICG/file-system-access#174 the spec
for how sandboxed FS is exposed was change, this updates to
implementation to match the spec.

R=mekchromium.org

Bug: 1081287

Change-Id: I0e381c873db98e30baed6679be048031b385cc50
Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/2220685
Commit-Queue: Hazim Mohamed <hazimmohamedgoogle.com>
Reviewed-by: Marijn Kruisselbrink <mekchromium.org>
Reviewed-by: Jeremy Roman <jbromanchromium.org>
Cr-Commit-Position: refs/heads/master{#774745}

--

wpt-commits: 1e1431774d766756367132d3c976aeaf8998a8d0
wpt-pr: 23844

UltraBlame original commit: 016c68d65e2ca46987d11f9c1ba4872652f2aa47
gecko-dev-updater pushed a commit to marco-c/gecko-dev-wordified-and-comments-removed that referenced this pull request Jun 15, 2020
…getOriginPrivateDirectory., a=testonly

Automatic update from web-platform-tests
[NativeFS] Change getSystemDirectory to getOriginPrivateDirectory.

In WICG/file-system-access#174 the spec
for how sandboxed FS is exposed was change, this updates to
implementation to match the spec.

R=mekchromium.org

Bug: 1081287

Change-Id: I0e381c873db98e30baed6679be048031b385cc50
Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/2220685
Commit-Queue: Hazim Mohamed <hazimmohamedgoogle.com>
Reviewed-by: Marijn Kruisselbrink <mekchromium.org>
Reviewed-by: Jeremy Roman <jbromanchromium.org>
Cr-Commit-Position: refs/heads/master{#774745}

--

wpt-commits: 1e1431774d766756367132d3c976aeaf8998a8d0
wpt-pr: 23844

UltraBlame original commit: 016c68d65e2ca46987d11f9c1ba4872652f2aa47
gecko-dev-updater pushed a commit to marco-c/gecko-dev-wordified that referenced this pull request Jun 15, 2020
…getOriginPrivateDirectory., a=testonly

Automatic update from web-platform-tests
[NativeFS] Change getSystemDirectory to getOriginPrivateDirectory.

In WICG/file-system-access#174 the spec
for how sandboxed FS is exposed was change, this updates to
implementation to match the spec.

R=mekchromium.org

Bug: 1081287

Change-Id: I0e381c873db98e30baed6679be048031b385cc50
Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/2220685
Commit-Queue: Hazim Mohamed <hazimmohamedgoogle.com>
Reviewed-by: Marijn Kruisselbrink <mekchromium.org>
Reviewed-by: Jeremy Roman <jbromanchromium.org>
Cr-Commit-Position: refs/heads/master{#774745}

--

wpt-commits: 1e1431774d766756367132d3c976aeaf8998a8d0
wpt-pr: 23844

UltraBlame original commit: 016c68d65e2ca46987d11f9c1ba4872652f2aa47
mjfroman pushed a commit to mjfroman/moz-libwebrtc-third-party that referenced this pull request Oct 14, 2022
In WICG/file-system-access#174 the spec
for how sandboxed FS is exposed was change, this updates to
implementation to match the spec.

R=mek@chromium.org

Bug: 1081287

Change-Id: I0e381c873db98e30baed6679be048031b385cc50
Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/2220685
Commit-Queue: Hazim Mohamed <hazimmohamed@google.com>
Reviewed-by: Marijn Kruisselbrink <mek@chromium.org>
Reviewed-by: Jeremy Roman <jbroman@chromium.org>
Cr-Original-Commit-Position: refs/heads/master@{#774745}
Cr-Mirrored-From: https://chromium.googlesource.com/chromium/src
Cr-Mirrored-Commit: bf91fb3db45cd21478447f59fecd0cf7bc4924c0
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Explain what sandboxed file system is.
2 participants