1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186
|
// Copyright 2019 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "components/permissions/contexts/webxr_permission_context.h"
#include <memory>
#include "base/check.h"
#include "build/build_config.h"
#include "components/content_settings/core/common/content_settings_utils.h"
#include "components/permissions/permission_decision.h"
#include "components/permissions/permission_request_data.h"
#include "device/vr/buildflags/buildflags.h"
#include "services/network/public/mojom/permissions_policy/permissions_policy_feature.mojom.h"
#if BUILDFLAG(IS_ANDROID)
#include "components/permissions/android/android_permission_util.h"
#include "components/permissions/android/permissions_reprompt_controller_android.h"
#include "components/permissions/permission_request_id.h"
#include "components/permissions/permissions_client.h"
#include "content/public/browser/web_contents.h"
#if BUILDFLAG(ENABLE_VR)
#include "base/feature_list.h"
#include "device/vr/public/cpp/features.h"
#endif
#endif
namespace permissions {
WebXrPermissionContext::WebXrPermissionContext(
content::BrowserContext* browser_context,
ContentSettingsType content_settings_type)
: ContentSettingPermissionContextBase(
browser_context,
content_settings_type,
network::mojom::PermissionsPolicyFeature::kWebXr),
content_settings_type_(content_settings_type) {
DCHECK(content_settings_type_ == ContentSettingsType::VR ||
content_settings_type_ == ContentSettingsType::AR ||
content_settings_type_ == ContentSettingsType::HAND_TRACKING);
}
WebXrPermissionContext::~WebXrPermissionContext() = default;
#if BUILDFLAG(IS_ANDROID)
// There are two other permissions that need to check corresponding OS-level
// permissions, and they take two different approaches to this. Geolocation only
// stores the permission ContentSetting if both requests are granted (or if the
// site permission is "Block"). The media permissions are now following the
// approach found here.
void WebXrPermissionContext::NotifyPermissionSet(
const PermissionRequestData& request_data,
BrowserPermissionCallback callback,
bool persist,
PermissionDecision decision,
bool is_final_decision) {
DCHECK(is_final_decision);
// Note that this method calls into base class implementation version of
// `NotifyPermissionSet()`, which would call `UpdateTabContext()`.
// This is fine, even in cases where we call the base method with a parameter
// that does not correspond to user's answer to Chrome-level permission,
// because `WebXrPermissionContext` does *not* have a custom implementation
// for `UpdateTabContext()` - if it did, we'd need to stop calling into base
// class with the parameter not matching user's answer.
// If permission was denied, we don't need to check for additional
// permissions. We also don't need to check for additional permissions for
// non-OpenXR VR.
const bool permission_granted = decision == PermissionDecision::kAllow;
bool is_openxr = false;
#if BUILDFLAG(ENABLE_OPENXR)
is_openxr = content_settings_type_ == ContentSettingsType::VR &&
device::features::IsOpenXrEnabled();
#endif
const bool is_hands =
content_settings_type_ == ContentSettingsType::HAND_TRACKING;
const bool is_ar = content_settings_type_ == ContentSettingsType::AR;
const bool additional_permissions_needed =
permission_granted && (is_ar || is_openxr || is_hands);
if (!additional_permissions_needed) {
ContentSettingPermissionContextBase::NotifyPermissionSet(
request_data, std::move(callback), persist, decision,
is_final_decision);
return;
}
// Must exist since permission requests must be initiated from an RFH
auto* rfh = content::RenderFrameHost::FromID(
request_data.id.global_render_frame_host_id());
// Whether or not the user will ultimately accept the OS permissions, we want
// to save the content_setting here if we should.
if (persist) {
// Need to reretrieve the persisted value, since the underlying permission
// status may have changed in the meantime.
auto previous_setting = GetContentSettingStatusInternal(
rfh, request_data.requesting_origin, request_data.embedding_origin);
auto new_setting = content_settings::ValueToContentSetting(
request_data.resolver->ComputePermissionDecisionResult(
base::Value(previous_setting), decision,
request_data.prompt_options));
ContentSettingPermissionContextBase::UpdateContentSetting(
request_data, new_setting,
decision == PermissionDecision::kAllowThisTime);
}
content::WebContents* web_contents =
content::WebContents::FromRenderFrameHost(rfh);
if (!web_contents) {
// If we can't get the web contents, we don't know the state of the OS
// permission, so assume we don't have it.
OnAndroidPermissionDecided(request_data, std::move(callback),
false /*permission_granted*/);
return;
}
// Otherwise, the user granted permission to use AR, so now we need to check
// if we need to prompt for android system permissions.
std::vector<ContentSettingsType> permission_type = {content_settings_type_};
PermissionRepromptState reprompt_state =
ShouldRepromptUserForPermissions(web_contents, permission_type);
switch (reprompt_state) {
case PermissionRepromptState::kNoNeed:
// We have already returned if permission was denied by the user, and this
// indicates that we have all the OS permissions we need.
OnAndroidPermissionDecided(request_data, std::move(callback),
true /*permission_granted*/);
return;
case PermissionRepromptState::kCannotShow:
// If we cannot show the info bar, then we have to assume we don't have
// the permissions we need.
OnAndroidPermissionDecided(request_data, std::move(callback),
false /*permission_granted*/);
return;
case PermissionRepromptState::kShow:
// Otherwise, prompt the user that we need additional permissions.
permissions::PermissionsRepromptControllerAndroid::CreateForWebContents(
web_contents);
permissions::PermissionsRepromptControllerAndroid::FromWebContents(
web_contents)
->RepromptPermissionRequest(
permission_type, content_settings_type(),
base::BindOnce(
&WebXrPermissionContext::OnAndroidPermissionDecided,
weak_ptr_factory_.GetWeakPtr(),
PermissionRequestData(this, request_data.id,
request_data.user_gesture,
request_data.requesting_origin,
request_data.embedding_origin),
std::move(callback)));
return;
}
}
void WebXrPermissionContext::OnAndroidPermissionDecided(
const PermissionRequestData& request_data,
BrowserPermissionCallback callback,
bool permission_granted) {
// If we were supposed to persist the setting we've already done so in the
// initial override of |NotifyPermissionSet|. At this point, if the user
// has denied the OS level permission, we want to notify the requestor that
// the permission has been blocked.
// TODO(crbug.com/40678885): Ensure that this is taken into account
// when returning navigator.permissions results.
PermissionDecision decision = permission_granted ? PermissionDecision::kAllow
: PermissionDecision::kDeny;
ContentSettingPermissionContextBase::NotifyPermissionSet(
request_data, std::move(callback), false /*persist*/, decision,
/*is_final_decision=*/true);
}
void WebXrPermissionContext::UpdateTabContext(
const permissions::PermissionRequestID& id,
const GURL& requesting_origin,
bool allowed) {
// See the comment in `NotifyPermissionSet()` for context on why this method
// should be empty.
}
#endif // BUILDFLAG(IS_ANDROID)
} // namespace permissions
|