1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125
|
// Copyright 2014 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "content/browser/permissions/permission_service_impl.h"
#include "content/public/browser/content_browser_client.h"
namespace content {
namespace {
PermissionType PermissionNameToPermissionType(PermissionName name) {
switch(name) {
case PERMISSION_NAME_GEOLOCATION:
return PERMISSION_GEOLOCATION;
case PERMISSION_NAME_MIDI_SYSEX:
return PERMISSION_MIDI_SYSEX;
case PERMISSION_NAME_NOTIFICATIONS:
return PERMISSION_NOTIFICATIONS;
}
NOTREACHED();
return PERMISSION_NUM;
}
} // anonymous namespace
PermissionServiceImpl::PendingRequest::PendingRequest(PermissionType permission,
const GURL& origin)
: permission(permission),
origin(origin) {
}
PermissionServiceImpl::PermissionServiceImpl(PermissionServiceContext* context)
: context_(context),
weak_factory_(this) {
}
PermissionServiceImpl::~PermissionServiceImpl() {
}
void PermissionServiceImpl::OnConnectionError() {
context_->ServiceHadConnectionError(this);
// After that call, |this| will be deleted.
}
void PermissionServiceImpl::RequestPermission(
PermissionName permission,
const mojo::String& origin,
bool user_gesture,
const mojo::Callback<void(PermissionStatus)>& callback) {
// This condition is valid if the call is coming from a ChildThread instead of
// a RenderFrame. Some consumers of the service run in Workers and some in
// Frames. In the context of a Worker, it is not possible to show a
// permission prompt because there is no tab. In the context of a Frame, we
// can. Even if the call comes from a context where it is not possible to show
// any UI, we want to still return something relevant so the current
// permission status is returned.
if (!context_->web_contents()) {
// There is no way to show a UI so the call will simply return the current
// permission.
HasPermission(permission, origin, callback);
return;
}
PermissionType permission_type = PermissionNameToPermissionType(permission);
int request_id = pending_requests_.Add(
new PendingRequest(permission_type, GURL(origin)));
GetContentClient()->browser()->RequestPermission(
permission_type,
context_->web_contents(),
request_id,
GURL(origin),
user_gesture, // TODO(mlamouri): should be removed (crbug.com/423770)
base::Bind(&PermissionServiceImpl::OnRequestPermissionResponse,
weak_factory_.GetWeakPtr(),
callback,
request_id));
}
void PermissionServiceImpl::OnRequestPermissionResponse(
const mojo::Callback<void(PermissionStatus)>& callback,
int request_id,
bool allowed) {
pending_requests_.Remove(request_id);
// TODO(mlamouri): for now, we only get a boolean back, but we would ideally
// need a ContentSetting, see http://crbug.com/432978
callback.Run(allowed ? PERMISSION_STATUS_GRANTED : PERMISSION_STATUS_ASK);
}
void PermissionServiceImpl::CancelPendingRequests() {
DCHECK(context_->web_contents());
for (RequestsMap::Iterator<PendingRequest> it(&pending_requests_);
!it.IsAtEnd(); it.Advance()) {
GetContentClient()->browser()->CancelPermissionRequest(
it.GetCurrentValue()->permission,
context_->web_contents(),
it.GetCurrentKey(),
it.GetCurrentValue()->origin);
}
pending_requests_.Clear();
}
void PermissionServiceImpl::HasPermission(
PermissionName permission,
const mojo::String& origin,
const mojo::Callback<void(PermissionStatus)>& callback) {
DCHECK(context_->GetBrowserContext());
// If the embedding_origin is empty we'll use |origin| instead.
GURL embedding_origin = context_->GetEmbeddingOrigin();
callback.Run(GetContentClient()->browser()->GetPermissionStatus(
PermissionNameToPermissionType(permission),
context_->GetBrowserContext(),
GURL(origin),
embedding_origin.is_empty() ? GURL(origin) : embedding_origin));
}
} // namespace content
|