001/* 002 * Copyright (C) 2014 The Guava Authors 003 * 004 * Licensed under the Apache License, Version 2.0 (the "License"); 005 * you may not use this file except in compliance with the License. 006 * You may obtain a copy of the License at 007 * 008 * http://www.apache.org/licenses/LICENSE-2.0 009 * 010 * Unless required by applicable law or agreed to in writing, software 011 * distributed under the License is distributed on an "AS IS" BASIS, 012 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 013 * See the License for the specific language governing permissions and 014 * limitations under the License. 015 */ 016 017package com.google.common.io; 018 019import com.google.common.annotations.GwtIncompatible; 020import com.google.common.annotations.J2ktIncompatible; 021import com.google.j2objc.annotations.J2ObjCIncompatible; 022import java.nio.file.SecureDirectoryStream; 023 024/** 025 * Options for use with recursive delete methods ({@link MoreFiles#deleteRecursively} and {@link 026 * MoreFiles#deleteDirectoryContents}). 027 * 028 * @since 21.0 (but only since 33.4.0 in the Android flavor) 029 * @author Colin Decker 030 */ 031@J2ktIncompatible 032@GwtIncompatible 033@J2ObjCIncompatible // java.nio.file 034@ElementTypesAreNonnullByDefault 035public enum RecursiveDeleteOption { 036 /** 037 * Specifies that the recursive delete should not throw an exception when it can't be guaranteed 038 * that it can be done securely, without vulnerability to race conditions (i.e. when the file 039 * system does not support {@link SecureDirectoryStream}). 040 * 041 * <p><b>Warning:</b> On a file system that supports symbolic links, it is possible for an 042 * insecure recursive delete to delete files and directories that are <i>outside</i> the directory 043 * being deleted. This can happen if, after checking that a file is a directory (and not a 044 * symbolic link), that directory is deleted and replaced by a symbolic link to an outside 045 * directory before the call that opens the directory to read its entries. File systems that 046 * support {@code SecureDirectoryStream} do not have this vulnerability. 047 */ 048 ALLOW_INSECURE 049}