New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Change the API for exposing the sandboxed file system. #174
Conversation
@inexorabletash @pwnall what do you think of this change? Decoupling sandboxed file system from "special/system/standard/well known" directories seems like it would be less confusing to me... |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
just discussion, lgtm to merge
}; | ||
</xmp> | ||
|
||
Advisement: In Chrome this functionality is currently exposed as `FileSystemDirectoryHandle.getSystemDirectory({type: "sandbox"})`. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Add the milestone? I also like tossing in 🚧 markers, but I'm silly that way.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Well, currently it's all milestones... Once we've implemented these changes I definitely want to go back and update this to mention milestones, just not sure what milestone to mention now.
This method was renamed/moved in #174, but unintentionally that change also started limiting the API to only be available in windows. This changes it back to also expose the origin private directory to workers.
This method was renamed/moved in #174, but unintentionally that change also started limiting the API to only be available in windows. This changes it back to also expose the origin private directory to workers.
In WICG/file-system-access#174 the spec for how sandboxed FS is exposed was change, this updates to implementation to match the spec. R=mek@chromium.org https://bugs.chromium.org/p/chromium/issues/detail?id=1081287#c2 Change-Id: I0e381c873db98e30baed6679be048031b385cc50
In WICG/file-system-access#174 the spec for how sandboxed FS is exposed was change, this updates to implementation to match the spec. R=mek@chromium.org https://bugs.chromium.org/p/chromium/issues/detail?id=1081287#c2 Change-Id: I0e381c873db98e30baed6679be048031b385cc50
In WICG/file-system-access#174 the spec for how sandboxed FS is exposed was change, this updates to implementation to match the spec. R=mek@chromium.org Bug: 1081287 Change-Id: I0e381c873db98e30baed6679be048031b385cc50
In WICG/file-system-access#174 the spec for how sandboxed FS is exposed was change, this updates to implementation to match the spec. R=mek@chromium.org Bug: 1081287 Change-Id: I0e381c873db98e30baed6679be048031b385cc50
In WICG/file-system-access#174 the spec for how sandboxed FS is exposed was change, this updates to implementation to match the spec. R=mek@chromium.org Bug: 1081287 Change-Id: I0e381c873db98e30baed6679be048031b385cc50
In WICG/file-system-access#174 the spec for how sandboxed FS is exposed was change, this updates to implementation to match the spec. R=mek@chromium.org Bug: 1081287 Change-Id: I0e381c873db98e30baed6679be048031b385cc50 Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/2220685 Commit-Queue: Hazim Mohamed <hazimmohamed@google.com> Reviewed-by: Marijn Kruisselbrink <mek@chromium.org> Reviewed-by: Jeremy Roman <jbroman@chromium.org> Cr-Commit-Position: refs/heads/master@{#774745}
In WICG/file-system-access#174 the spec for how sandboxed FS is exposed was change, this updates to implementation to match the spec. R=mek@chromium.org Bug: 1081287 Change-Id: I0e381c873db98e30baed6679be048031b385cc50 Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/2220685 Commit-Queue: Hazim Mohamed <hazimmohamed@google.com> Reviewed-by: Marijn Kruisselbrink <mek@chromium.org> Reviewed-by: Jeremy Roman <jbroman@chromium.org> Cr-Commit-Position: refs/heads/master@{#774745}
In WICG/file-system-access#174 the spec for how sandboxed FS is exposed was change, this updates to implementation to match the spec. R=mek@chromium.org Bug: 1081287 Change-Id: I0e381c873db98e30baed6679be048031b385cc50 Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/2220685 Commit-Queue: Hazim Mohamed <hazimmohamed@google.com> Reviewed-by: Marijn Kruisselbrink <mek@chromium.org> Reviewed-by: Jeremy Roman <jbroman@chromium.org> Cr-Commit-Position: refs/heads/master@{#774745}
…getOriginPrivateDirectory., a=testonly Automatic update from web-platform-tests [NativeFS] Change getSystemDirectory to getOriginPrivateDirectory. In WICG/file-system-access#174 the spec for how sandboxed FS is exposed was change, this updates to implementation to match the spec. R=mek@chromium.org Bug: 1081287 Change-Id: I0e381c873db98e30baed6679be048031b385cc50 Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/2220685 Commit-Queue: Hazim Mohamed <hazimmohamed@google.com> Reviewed-by: Marijn Kruisselbrink <mek@chromium.org> Reviewed-by: Jeremy Roman <jbroman@chromium.org> Cr-Commit-Position: refs/heads/master@{#774745} -- wpt-commits: 1e1431774d766756367132d3c976aeaf8998a8d0 wpt-pr: 23844
…getOriginPrivateDirectory., a=testonly Automatic update from web-platform-tests [NativeFS] Change getSystemDirectory to getOriginPrivateDirectory. In WICG/file-system-access#174 the spec for how sandboxed FS is exposed was change, this updates to implementation to match the spec. R=mek@chromium.org Bug: 1081287 Change-Id: I0e381c873db98e30baed6679be048031b385cc50 Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/2220685 Commit-Queue: Hazim Mohamed <hazimmohamed@google.com> Reviewed-by: Marijn Kruisselbrink <mek@chromium.org> Reviewed-by: Jeremy Roman <jbroman@chromium.org> Cr-Commit-Position: refs/heads/master@{#774745} -- wpt-commits: 1e1431774d766756367132d3c976aeaf8998a8d0 wpt-pr: 23844
…getOriginPrivateDirectory., a=testonly Automatic update from web-platform-tests [NativeFS] Change getSystemDirectory to getOriginPrivateDirectory. In WICG/file-system-access#174 the spec for how sandboxed FS is exposed was change, this updates to implementation to match the spec. R=mekchromium.org Bug: 1081287 Change-Id: I0e381c873db98e30baed6679be048031b385cc50 Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/2220685 Commit-Queue: Hazim Mohamed <hazimmohamedgoogle.com> Reviewed-by: Marijn Kruisselbrink <mekchromium.org> Reviewed-by: Jeremy Roman <jbromanchromium.org> Cr-Commit-Position: refs/heads/master{#774745} -- wpt-commits: 1e1431774d766756367132d3c976aeaf8998a8d0 wpt-pr: 23844 UltraBlame original commit: 016c68d65e2ca46987d11f9c1ba4872652f2aa47
…getOriginPrivateDirectory., a=testonly Automatic update from web-platform-tests [NativeFS] Change getSystemDirectory to getOriginPrivateDirectory. In WICG/file-system-access#174 the spec for how sandboxed FS is exposed was change, this updates to implementation to match the spec. R=mekchromium.org Bug: 1081287 Change-Id: I0e381c873db98e30baed6679be048031b385cc50 Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/2220685 Commit-Queue: Hazim Mohamed <hazimmohamedgoogle.com> Reviewed-by: Marijn Kruisselbrink <mekchromium.org> Reviewed-by: Jeremy Roman <jbromanchromium.org> Cr-Commit-Position: refs/heads/master{#774745} -- wpt-commits: 1e1431774d766756367132d3c976aeaf8998a8d0 wpt-pr: 23844 UltraBlame original commit: 016c68d65e2ca46987d11f9c1ba4872652f2aa47
…getOriginPrivateDirectory., a=testonly Automatic update from web-platform-tests [NativeFS] Change getSystemDirectory to getOriginPrivateDirectory. In WICG/file-system-access#174 the spec for how sandboxed FS is exposed was change, this updates to implementation to match the spec. R=mekchromium.org Bug: 1081287 Change-Id: I0e381c873db98e30baed6679be048031b385cc50 Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/2220685 Commit-Queue: Hazim Mohamed <hazimmohamedgoogle.com> Reviewed-by: Marijn Kruisselbrink <mekchromium.org> Reviewed-by: Jeremy Roman <jbromanchromium.org> Cr-Commit-Position: refs/heads/master{#774745} -- wpt-commits: 1e1431774d766756367132d3c976aeaf8998a8d0 wpt-pr: 23844 UltraBlame original commit: 016c68d65e2ca46987d11f9c1ba4872652f2aa47
In WICG/file-system-access#174 the spec for how sandboxed FS is exposed was change, this updates to implementation to match the spec. R=mek@chromium.org Bug: 1081287 Change-Id: I0e381c873db98e30baed6679be048031b385cc50 Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/2220685 Commit-Queue: Hazim Mohamed <hazimmohamed@google.com> Reviewed-by: Marijn Kruisselbrink <mek@chromium.org> Reviewed-by: Jeremy Roman <jbroman@chromium.org> Cr-Original-Commit-Position: refs/heads/master@{#774745} Cr-Mirrored-From: https://chromium.googlesource.com/chromium/src Cr-Mirrored-Commit: bf91fb3db45cd21478447f59fecd0cf7bc4924c0
Also explain what and why the sandboxed file system is.
This fixes #66 and partially addresses #27.
Preview | Diff