Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(116)

Side by Side Diff: chrome/browser/media/media_capture_devices_dispatcher.cc

Issue 1095393004: Refactor: Make MediaCaptureDevicesDispatcher have pluggable handlers. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Created 5 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "chrome/browser/media/media_capture_devices_dispatcher.h" 5 #include "chrome/browser/media/media_capture_devices_dispatcher.h"
6 6
7 #include "base/command_line.h" 7 #include "base/command_line.h"
8 #include "base/logging.h" 8 #include "base/logging.h"
9 #include "base/metrics/field_trial.h" 9 #include "base/metrics/field_trial.h"
10 #include "base/prefs/pref_service.h" 10 #include "base/prefs/pref_service.h"
11 #include "base/prefs/scoped_user_pref_update.h" 11 #include "base/prefs/scoped_user_pref_update.h"
12 #include "base/sha1.h" 12 #include "base/sha1.h"
13 #include "base/strings/string_number_conversions.h" 13 #include "base/strings/string_number_conversions.h"
14 #include "base/strings/string_util.h" 14 #include "base/strings/string_util.h"
15 #include "base/strings/utf_string_conversions.h" 15 #include "base/strings/utf_string_conversions.h"
16 #include "chrome/browser/media/desktop_capture_access_handler.h"
16 #include "chrome/browser/media/desktop_streams_registry.h" 17 #include "chrome/browser/media/desktop_streams_registry.h"
17 #include "chrome/browser/media/media_stream_capture_indicator.h" 18 #include "chrome/browser/media/media_stream_capture_indicator.h"
18 #include "chrome/browser/media/media_stream_device_permissions.h" 19 #include "chrome/browser/media/media_stream_device_permissions.h"
19 #include "chrome/browser/media/media_stream_infobar_delegate.h" 20 #include "chrome/browser/media/regular_media_access_handler.h"
20 #include "chrome/browser/profiles/profile.h" 21 #include "chrome/browser/media/tab_capture_access_handler.h"
21 #include "chrome/browser/ui/browser.h" 22 #include "chrome/browser/ui/browser.h"
22 #include "chrome/browser/ui/browser_finder.h"
23 #include "chrome/browser/ui/browser_window.h" 23 #include "chrome/browser/ui/browser_window.h"
24 #include "chrome/browser/ui/screen_capture_notification_ui.h"
25 #include "chrome/browser/ui/simple_message_box.h"
26 #include "chrome/browser/ui/website_settings/permission_bubble_manager.h"
27 #include "chrome/common/chrome_switches.h" 24 #include "chrome/common/chrome_switches.h"
28 #include "chrome/common/chrome_version_info.h" 25 #include "chrome/common/chrome_version_info.h"
29 #include "chrome/common/pref_names.h" 26 #include "chrome/common/pref_names.h"
30 #include "chrome/grit/generated_resources.h"
31 #include "components/content_settings/core/browser/host_content_settings_map.h" 27 #include "components/content_settings/core/browser/host_content_settings_map.h"
32 #include "components/pref_registry/pref_registry_syncable.h" 28 #include "components/pref_registry/pref_registry_syncable.h"
33 #include "content/public/browser/browser_thread.h" 29 #include "content/public/browser/browser_thread.h"
34 #include "content/public/browser/desktop_media_id.h" 30 #include "content/public/browser/desktop_media_id.h"
35 #include "content/public/browser/media_capture_devices.h" 31 #include "content/public/browser/media_capture_devices.h"
36 #include "content/public/browser/notification_service.h" 32 #include "content/public/browser/notification_service.h"
37 #include "content/public/browser/notification_source.h" 33 #include "content/public/browser/notification_source.h"
38 #include "content/public/browser/notification_types.h" 34 #include "content/public/browser/notification_types.h"
39 #include "content/public/browser/render_frame_host.h" 35 #include "content/public/browser/render_frame_host.h"
40 #include "content/public/browser/render_process_host.h" 36 #include "content/public/browser/render_process_host.h"
41 #include "content/public/browser/web_contents.h" 37 #include "content/public/browser/web_contents.h"
42 #include "content/public/common/media_stream_request.h" 38 #include "content/public/common/media_stream_request.h"
43 #include "extensions/common/constants.h" 39 #include "extensions/common/constants.h"
44 #include "media/audio/audio_manager_base.h"
45 #include "media/base/media_switches.h" 40 #include "media/base/media_switches.h"
46 #include "net/base/net_util.h" 41 #include "net/base/net_util.h"
47 #include "third_party/webrtc/modules/desktop_capture/desktop_capture_types.h"
48 #include "ui/base/l10n/l10n_util.h"
49 42
50 #if defined(OS_CHROMEOS) 43 #if defined(OS_CHROMEOS)
51 #include "ash/shell.h" 44 #include "ash/shell.h"
52 #endif // defined(OS_CHROMEOS) 45 #endif // defined(OS_CHROMEOS)
53 46
54 #if defined(ENABLE_EXTENSIONS) 47 #if defined(ENABLE_EXTENSIONS)
55 #include "chrome/browser/extensions/api/tab_capture/tab_capture_registry.h" 48 #include "chrome/browser/media/extension_media_access_handler.h"
56 #include "extensions/browser/app_window/app_window.h"
57 #include "extensions/browser/app_window/app_window_registry.h"
58 #include "extensions/browser/extension_registry.h" 49 #include "extensions/browser/extension_registry.h"
59 #include "extensions/common/extension.h" 50 #include "extensions/common/extension.h"
60 #include "extensions/common/permissions/permissions_data.h" 51 #include "extensions/common/permissions/permissions_data.h"
61 #endif 52 #endif
62 53
63 using content::BrowserThread; 54 using content::BrowserThread;
64 using content::MediaCaptureDevices; 55 using content::MediaCaptureDevices;
65 using content::MediaStreamDevices; 56 using content::MediaStreamDevices;
66 57
67 namespace { 58 namespace {
68 59
69 // A finch experiment to enable the permission bubble for media requests only.
70 bool MediaStreamPermissionBubbleExperimentEnabled() {
71 const std::string group =
72 base::FieldTrialList::FindFullName("MediaStreamPermissionBubble");
73 if (group == "enabled")
74 return true;
75
76 return false;
77 }
78
79 // Finds a device in |devices| that has |device_id|, or NULL if not found. 60 // Finds a device in |devices| that has |device_id|, or NULL if not found.
80 const content::MediaStreamDevice* FindDeviceWithId( 61 const content::MediaStreamDevice* FindDeviceWithId(
81 const content::MediaStreamDevices& devices, 62 const content::MediaStreamDevices& devices,
82 const std::string& device_id) { 63 const std::string& device_id) {
83 content::MediaStreamDevices::const_iterator iter = devices.begin(); 64 content::MediaStreamDevices::const_iterator iter = devices.begin();
84 for (; iter != devices.end(); ++iter) { 65 for (; iter != devices.end(); ++iter) {
85 if (iter->id == device_id) { 66 if (iter->id == device_id) {
86 return &(*iter); 67 return &(*iter);
87 } 68 }
88 } 69 }
(...skipping 14 matching lines...) Expand all
103 bool IsMediaRequestWhitelistedForExtension( 84 bool IsMediaRequestWhitelistedForExtension(
104 const extensions::Extension* extension) { 85 const extensions::Extension* extension) {
105 return extension->id() == "mppnpdlheglhdfmldimlhpnegondlapf" || 86 return extension->id() == "mppnpdlheglhdfmldimlhpnegondlapf" ||
106 extension->id() == "jokbpnebhdcladagohdnfgjcpejggllo" || 87 extension->id() == "jokbpnebhdcladagohdnfgjcpejggllo" ||
107 extension->id() == "clffjmdilanldobdnedchkdbofoimcgb" || 88 extension->id() == "clffjmdilanldobdnedchkdbofoimcgb" ||
108 extension->id() == "nnckehldicaciogcbchegobnafnjkcne" || 89 extension->id() == "nnckehldicaciogcbchegobnafnjkcne" ||
109 extension->id() == "nbpagnldghgfoolbancepceaanlmhfmd" || 90 extension->id() == "nbpagnldghgfoolbancepceaanlmhfmd" ||
110 extension->id() == "jkghodnilhceideoidjikpgommlajknk" || 91 extension->id() == "jkghodnilhceideoidjikpgommlajknk" ||
111 extension->id() == "gjaehgfemfahhmlgpdfknkhdnemmolop"; 92 extension->id() == "gjaehgfemfahhmlgpdfknkhdnemmolop";
112 } 93 }
113
114 bool IsBuiltInExtension(const GURL& origin) {
115 return
116 // Feedback Extension.
117 origin.spec() == "chrome-extension://gfdkimpbcpahaombhbimeihdjnejgicl/";
118 }
119
120 // Returns true of the security origin is associated with casting.
121 bool IsOriginForCasting(const GURL& origin) {
122 // Whitelisted tab casting extensions.
123 return
124 // Dev
125 origin.spec() == "chrome-extension://enhhojjnijigcajfphajepfemndkmdlo/" ||
126 // Canary
127 origin.spec() == "chrome-extension://hfaagokkkhdbgiakmmlclaapfelnkoah/" ||
128 // Beta (internal)
129 origin.spec() == "chrome-extension://fmfcbgogabcbclcofgocippekhfcmgfj/" ||
130 // Google Cast Beta
131 origin.spec() == "chrome-extension://dliochdbjfkdbacpmhlcpmleaejidimm/" ||
132 // Google Cast Stable
133 origin.spec() == "chrome-extension://boadgeojelhgndaghljhdicfkmllpafd/" ||
134 // http://crbug.com/457908
135 origin.spec() == "chrome-extension://ekpaaapppgpmolpcldedioblbkmijaca/" ||
136 origin.spec() == "chrome-extension://fjhoaacokmgbjemoflkofnenfaiekifl/";
137 }
138
139 bool IsExtensionWhitelistedForScreenCapture(
140 const extensions::Extension* extension) {
141 #if defined(OS_CHROMEOS)
142 std::string hash = base::SHA1HashString(extension->id());
143 std::string hex_hash = base::HexEncode(hash.c_str(), hash.length());
144
145 // crbug.com/446688
146 return hex_hash == "4F25792AF1AA7483936DE29C07806F203C7170A0" ||
147 hex_hash == "BD8781D757D830FC2E85470A1B6E8A718B7EE0D9" ||
148 hex_hash == "4AC2B6C63C6480D150DFDA13E4A5956EB1D0DDBB" ||
149 hex_hash == "81986D4F846CEDDDB962643FA501D1780DD441BB";
150 #else
151 return false;
152 #endif // defined(OS_CHROMEOS)
153 }
154 #endif // defined(ENABLE_EXTENSIONS) 94 #endif // defined(ENABLE_EXTENSIONS)
155 95
156 // Helper to get title of the calling application shown in the screen capture
157 // notification.
158 base::string16 GetApplicationTitle(content::WebContents* web_contents,
159 const extensions::Extension* extension) {
160 // Use extension name as title for extensions and host/origin for drive-by
161 // web.
162 std::string title;
163 #if defined(ENABLE_EXTENSIONS)
164 if (extension) {
165 title = extension->name();
166 return base::UTF8ToUTF16(title);
167 }
168 #endif
169 GURL url = web_contents->GetURL();
170 title = url.SchemeIsSecure() ? net::GetHostAndOptionalPort(url)
171 : url.GetOrigin().spec();
172 return base::UTF8ToUTF16(title);
173 }
174
175 // Helper to get list of media stream devices for desktop capture in |devices|.
176 // Registers to display notification if |display_notification| is true.
177 // Returns an instance of MediaStreamUI to be passed to content layer.
178 scoped_ptr<content::MediaStreamUI> GetDevicesForDesktopCapture(
179 content::MediaStreamDevices* devices,
180 content::DesktopMediaID media_id,
181 bool capture_audio,
182 bool display_notification,
183 const base::string16& application_title,
184 const base::string16& registered_extension_name) {
185 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
186 scoped_ptr<content::MediaStreamUI> ui;
187
188 // Add selected desktop source to the list.
189 devices->push_back(content::MediaStreamDevice(
190 content::MEDIA_DESKTOP_VIDEO_CAPTURE, media_id.ToString(), "Screen"));
191 if (capture_audio) {
192 // Use the special loopback device ID for system audio capture.
193 devices->push_back(content::MediaStreamDevice(
194 content::MEDIA_DESKTOP_AUDIO_CAPTURE,
195 media::AudioManagerBase::kLoopbackInputDeviceId, "System Audio"));
196 }
197
198 // If required, register to display the notification for stream capture.
199 if (display_notification) {
200 if (application_title == registered_extension_name) {
201 ui = ScreenCaptureNotificationUI::Create(l10n_util::GetStringFUTF16(
202 IDS_MEDIA_SCREEN_CAPTURE_NOTIFICATION_TEXT,
203 application_title));
204 } else {
205 ui = ScreenCaptureNotificationUI::Create(l10n_util::GetStringFUTF16(
206 IDS_MEDIA_SCREEN_CAPTURE_NOTIFICATION_TEXT_DELEGATED,
207 registered_extension_name,
208 application_title));
209 }
210 }
211
212 return ui.Pass();
213 }
214
215 #if !defined(OS_ANDROID)
216 // Find browser or app window from a given |web_contents|.
217 gfx::NativeWindow FindParentWindowForWebContents(
218 content::WebContents* web_contents) {
219 Browser* browser = chrome::FindBrowserWithWebContents(web_contents);
220 if (browser && browser->window())
221 return browser->window()->GetNativeWindow();
222
223 const extensions::AppWindowRegistry::AppWindowList& window_list =
224 extensions::AppWindowRegistry::Get(
225 web_contents->GetBrowserContext())->app_windows();
226 for (extensions::AppWindowRegistry::AppWindowList::const_iterator iter =
227 window_list.begin();
228 iter != window_list.end(); ++iter) {
229 if ((*iter)->web_contents() == web_contents)
230 return (*iter)->GetNativeWindow();
231 }
232
233 return NULL;
234 }
235 #endif
236
237 #if defined(ENABLE_EXTENSIONS) 96 #if defined(ENABLE_EXTENSIONS)
238 const extensions::Extension* GetExtensionForOrigin( 97 const extensions::Extension* GetExtensionForOrigin(
239 Profile* profile, 98 Profile* profile,
240 const GURL& security_origin) { 99 const GURL& security_origin) {
241 if (!security_origin.SchemeIs(extensions::kExtensionScheme)) 100 if (!security_origin.SchemeIs(extensions::kExtensionScheme))
242 return NULL; 101 return NULL;
243 102
244 const extensions::Extension* extension = 103 const extensions::Extension* extension =
245 extensions::ExtensionRegistry::Get(profile)->enabled_extensions().GetByID( 104 extensions::ExtensionRegistry::Get(profile)->enabled_extensions().GetByID(
246 security_origin.host()); 105 security_origin.host());
247 DCHECK(extension); 106 DCHECK(extension);
248 return extension; 107 return extension;
249 } 108 }
250 #endif 109 #endif
251 110
252 } // namespace 111 } // namespace
253 112
254 MediaCaptureDevicesDispatcher::PendingAccessRequest::PendingAccessRequest(
255 const content::MediaStreamRequest& request,
256 const content::MediaResponseCallback& callback)
257 : request(request),
258 callback(callback) {
259 }
260
261 MediaCaptureDevicesDispatcher::PendingAccessRequest::~PendingAccessRequest() {}
262
263 MediaCaptureDevicesDispatcher* MediaCaptureDevicesDispatcher::GetInstance() { 113 MediaCaptureDevicesDispatcher* MediaCaptureDevicesDispatcher::GetInstance() {
264 return Singleton<MediaCaptureDevicesDispatcher>::get(); 114 return Singleton<MediaCaptureDevicesDispatcher>::get();
265 } 115 }
266 116
267 MediaCaptureDevicesDispatcher::MediaCaptureDevicesDispatcher() 117 MediaCaptureDevicesDispatcher::MediaCaptureDevicesDispatcher()
268 : is_device_enumeration_disabled_(false), 118 : is_device_enumeration_disabled_(false),
269 media_stream_capture_indicator_(new MediaStreamCaptureIndicator()) { 119 media_stream_capture_indicator_(new MediaStreamCaptureIndicator()) {
270 // MediaCaptureDevicesDispatcher is a singleton. It should be created on 120 // MediaCaptureDevicesDispatcher is a singleton. It should be created on
271 // UI thread. Otherwise, it will not receive 121 // UI thread. Otherwise, it will not receive
272 // content::NOTIFICATION_WEB_CONTENTS_DESTROYED, and that will result in 122 // content::NOTIFICATION_WEB_CONTENTS_DESTROYED, and that will result in
(...skipping 68 matching lines...) Expand 10 before | Expand all | Expand 10 after
341 } 191 }
342 } 192 }
343 193
344 void MediaCaptureDevicesDispatcher::ProcessMediaAccessRequest( 194 void MediaCaptureDevicesDispatcher::ProcessMediaAccessRequest(
345 content::WebContents* web_contents, 195 content::WebContents* web_contents,
346 const content::MediaStreamRequest& request, 196 const content::MediaStreamRequest& request,
347 const content::MediaResponseCallback& callback, 197 const content::MediaResponseCallback& callback,
348 const extensions::Extension* extension) { 198 const extensions::Extension* extension) {
349 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); 199 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
350 200
351 if (request.video_type == content::MEDIA_DESKTOP_VIDEO_CAPTURE || 201 if (request.video_type == content::MEDIA_DESKTOP_VIDEO_CAPTURE ||
Sergey Ulanov 2015/04/24 22:43:51 This code shouldn't need to know or care about typ
changbin 2015/04/29 05:24:34 This sounds better;) Use list of MediaAccessHandl
352 request.audio_type == content::MEDIA_DESKTOP_AUDIO_CAPTURE) { 202 request.audio_type == content::MEDIA_DESKTOP_AUDIO_CAPTURE) {
353 ProcessDesktopCaptureAccessRequest( 203 media_access_handler_.reset(
354 web_contents, request, callback, extension); 204 new DesktopCaptureAccessHandler(GetDesktopStreamsRegistry()));
355 } else if (request.video_type == content::MEDIA_TAB_VIDEO_CAPTURE || 205 } else if (request.video_type == content::MEDIA_TAB_VIDEO_CAPTURE ||
356 request.audio_type == content::MEDIA_TAB_AUDIO_CAPTURE) { 206 request.audio_type == content::MEDIA_TAB_AUDIO_CAPTURE) {
357 ProcessTabCaptureAccessRequest( 207 media_access_handler_.reset(
358 web_contents, request, callback, extension); 208 new TabCaptureAccessHandler(media_stream_capture_indicator_));
359 } else { 209 } else {
210 media_access_handler_.reset(
Sergey Ulanov 2015/04/24 22:43:51 RegularMediaAccessHandler keeps queue of pending r
changbin 2015/04/29 05:24:34 That means it should pass pointer of RequestsQueue
Sergey Ulanov 2015/05/07 01:05:48 No. It means you shouldn't be reset handler for ev
211 new RegularMediaAccessHandler(pending_requests_));
360 #if defined(ENABLE_EXTENSIONS) 212 #if defined(ENABLE_EXTENSIONS)
361 bool is_whitelisted = 213 bool is_whitelisted =
362 extension && (extension->is_platform_app() || 214 extension && (extension->is_platform_app() ||
363 IsMediaRequestWhitelistedForExtension(extension)); 215 IsMediaRequestWhitelistedForExtension(extension));
364 if (is_whitelisted) { 216 if (is_whitelisted) {
365 // For extensions access is approved based on extension permissions. 217 // For extensions access is approved based on extension permissions.
366 ProcessMediaAccessRequestFromPlatformAppOrExtension( 218 media_access_handler_.reset(
367 web_contents, request, callback, extension); 219 new ExtensionMediaAccessHandler(media_stream_capture_indicator_));
368 return;
369 } 220 }
370 #endif 221 #endif
371 ProcessRegularMediaAccessRequest(web_contents, request, callback);
372 } 222 }
223 media_access_handler_->HandleRequest(web_contents, request, callback,
224 extension);
373 } 225 }
374 226
375 bool MediaCaptureDevicesDispatcher::CheckMediaAccessPermission( 227 bool MediaCaptureDevicesDispatcher::CheckMediaAccessPermission(
376 content::BrowserContext* browser_context, 228 content::BrowserContext* browser_context,
377 const GURL& security_origin, 229 const GURL& security_origin,
378 content::MediaStreamType type) { 230 content::MediaStreamType type) {
379 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); 231 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
380 DCHECK(type == content::MEDIA_DEVICE_AUDIO_CAPTURE || 232 DCHECK(type == content::MEDIA_DEVICE_AUDIO_CAPTURE ||
381 type == content::MEDIA_DEVICE_VIDEO_CAPTURE); 233 type == content::MEDIA_DEVICE_VIDEO_CAPTURE);
382 234
(...skipping 107 matching lines...) Expand 10 before | Expand all | Expand 10 after
490 return extension->permissions_data()->HasAPIPermission( 342 return extension->permissions_data()->HasAPIPermission(
491 type == content::MEDIA_DEVICE_AUDIO_CAPTURE 343 type == content::MEDIA_DEVICE_AUDIO_CAPTURE
492 ? extensions::APIPermission::kAudioCapture 344 ? extensions::APIPermission::kAudioCapture
493 : extensions::APIPermission::kVideoCapture); 345 : extensions::APIPermission::kVideoCapture);
494 } 346 }
495 347
496 return CheckMediaAccessPermission(web_contents, security_origin, type); 348 return CheckMediaAccessPermission(web_contents, security_origin, type);
497 } 349 }
498 #endif 350 #endif
499 351
500 void MediaCaptureDevicesDispatcher::ProcessDesktopCaptureAccessRequest(
501 content::WebContents* web_contents,
502 const content::MediaStreamRequest& request,
503 const content::MediaResponseCallback& callback,
504 const extensions::Extension* extension) {
505 content::MediaStreamDevices devices;
506 scoped_ptr<content::MediaStreamUI> ui;
507
508 if (request.video_type != content::MEDIA_DESKTOP_VIDEO_CAPTURE) {
509 callback.Run(devices, content::MEDIA_DEVICE_INVALID_STATE, ui.Pass());
510 return;
511 }
512
513 // If the device id wasn't specified then this is a screen capture request
514 // (i.e. chooseDesktopMedia() API wasn't used to generate device id).
515 if (request.requested_video_device_id.empty()) {
516 ProcessScreenCaptureAccessRequest(
517 web_contents, request, callback, extension);
518 return;
519 }
520
521 // The extension name that the stream is registered with.
522 std::string original_extension_name;
523 // Resolve DesktopMediaID for the specified device id.
524 content::DesktopMediaID media_id;
525 // TODO(miu): Replace "main RenderFrame" IDs with the request's actual
526 // RenderFrame IDs once the desktop capture extension API implementation is
527 // fixed. http://crbug.com/304341
528 content::WebContents* const web_contents_for_stream =
529 content::WebContents::FromRenderFrameHost(
530 content::RenderFrameHost::FromID(request.render_process_id,
531 request.render_frame_id));
532 content::RenderFrameHost* const main_frame = web_contents_for_stream ?
533 web_contents_for_stream->GetMainFrame() : NULL;
534 if (main_frame) {
535 media_id = GetDesktopStreamsRegistry()->RequestMediaForStreamId(
536 request.requested_video_device_id,
537 main_frame->GetProcess()->GetID(),
538 main_frame->GetRoutingID(),
539 request.security_origin,
540 &original_extension_name);
541 }
542
543 // Received invalid device id.
544 if (media_id.type == content::DesktopMediaID::TYPE_NONE) {
545 callback.Run(devices, content::MEDIA_DEVICE_INVALID_STATE, ui.Pass());
546 return;
547 }
548
549 bool loopback_audio_supported = false;
550 #if defined(USE_CRAS) || defined(OS_WIN)
551 // Currently loopback audio capture is supported only on Windows and ChromeOS.
552 loopback_audio_supported = true;
553 #endif
554
555 // Audio is only supported for screen capture streams.
556 bool capture_audio =
557 (media_id.type == content::DesktopMediaID::TYPE_SCREEN &&
558 request.audio_type == content::MEDIA_DESKTOP_AUDIO_CAPTURE &&
559 loopback_audio_supported);
560
561 ui = GetDevicesForDesktopCapture(
562 &devices, media_id, capture_audio, true,
563 GetApplicationTitle(web_contents, extension),
564 base::UTF8ToUTF16(original_extension_name));
565
566 callback.Run(devices, content::MEDIA_DEVICE_OK, ui.Pass());
567 }
568
569 void MediaCaptureDevicesDispatcher::ProcessScreenCaptureAccessRequest(
570 content::WebContents* web_contents,
571 const content::MediaStreamRequest& request,
572 const content::MediaResponseCallback& callback,
573 const extensions::Extension* extension) {
574 content::MediaStreamDevices devices;
575 scoped_ptr<content::MediaStreamUI> ui;
576
577 DCHECK_EQ(request.video_type, content::MEDIA_DESKTOP_VIDEO_CAPTURE);
578
579 bool loopback_audio_supported = false;
580 #if defined(USE_CRAS) || defined(OS_WIN)
581 // Currently loopback audio capture is supported only on Windows and ChromeOS.
582 loopback_audio_supported = true;
583 #endif
584
585 bool component_extension = false;
586 #if defined(ENABLE_EXTENSIONS)
587 component_extension =
588 extension && extension->location() == extensions::Manifest::COMPONENT;
589 #endif
590
591 bool screen_capture_enabled =
592 base::CommandLine::ForCurrentProcess()->HasSwitch(
593 switches::kEnableUserMediaScreenCapturing);
594 #if defined(ENABLE_EXTENSIONS)
595 screen_capture_enabled |=
596 IsOriginForCasting(request.security_origin) ||
597 IsExtensionWhitelistedForScreenCapture(extension) ||
598 IsBuiltInExtension(request.security_origin);
599 #endif
600
601 const bool origin_is_secure =
602 request.security_origin.SchemeIsSecure() ||
603 request.security_origin.SchemeIs(extensions::kExtensionScheme) ||
604 base::CommandLine::ForCurrentProcess()->HasSwitch(
605 switches::kAllowHttpScreenCapture);
606
607 // If basic conditions (screen capturing is enabled and origin is secure)
608 // aren't fulfilled, we'll use "invalid state" as result. Otherwise, we set
609 // it after checking permission.
610 // TODO(grunell): It would be good to change this result for something else,
611 // probably a new one.
612 content::MediaStreamRequestResult result =
613 content::MEDIA_DEVICE_INVALID_STATE;
614
615 // Approve request only when the following conditions are met:
616 // 1. Screen capturing is enabled via command line switch or white-listed for
617 // the given origin.
618 // 2. Request comes from a page with a secure origin or from an extension.
619 if (screen_capture_enabled && origin_is_secure) {
620 // Get title of the calling application prior to showing the message box.
621 // chrome::ShowMessageBox() starts a nested message loop which may allow
622 // |web_contents| to be destroyed on the UI thread before the message box
623 // is closed. See http://crbug.com/326690.
624 base::string16 application_title =
625 GetApplicationTitle(web_contents, extension);
626 #if !defined(OS_ANDROID)
627 gfx::NativeWindow parent_window =
628 FindParentWindowForWebContents(web_contents);
629 #else
630 gfx::NativeWindow parent_window = NULL;
631 #endif
632 web_contents = NULL;
633
634 bool whitelisted_extension = false;
635 #if defined(ENABLE_EXTENSIONS)
636 whitelisted_extension = IsExtensionWhitelistedForScreenCapture(
637 extension);
638 #endif
639
640 // For whitelisted or component extensions, bypass message box.
641 bool user_approved = false;
642 if (!whitelisted_extension && !component_extension) {
643 base::string16 application_name =
644 base::UTF8ToUTF16(request.security_origin.spec());
645 #if defined(ENABLE_EXTENSIONS)
646 if (extension)
647 application_name = base::UTF8ToUTF16(extension->name());
648 #endif
649 base::string16 confirmation_text = l10n_util::GetStringFUTF16(
650 request.audio_type == content::MEDIA_NO_SERVICE ?
651 IDS_MEDIA_SCREEN_CAPTURE_CONFIRMATION_TEXT :
652 IDS_MEDIA_SCREEN_AND_AUDIO_CAPTURE_CONFIRMATION_TEXT,
653 application_name);
654 chrome::MessageBoxResult result = chrome::ShowMessageBox(
655 parent_window,
656 l10n_util::GetStringFUTF16(
657 IDS_MEDIA_SCREEN_CAPTURE_CONFIRMATION_TITLE, application_name),
658 confirmation_text,
659 chrome::MESSAGE_BOX_TYPE_QUESTION);
660 user_approved = (result == chrome::MESSAGE_BOX_RESULT_YES);
661 }
662
663 if (user_approved || component_extension || whitelisted_extension) {
664 content::DesktopMediaID screen_id;
665 #if defined(OS_CHROMEOS)
666 screen_id = content::DesktopMediaID::RegisterAuraWindow(
667 ash::Shell::GetInstance()->GetPrimaryRootWindow());
668 #else // defined(OS_CHROMEOS)
669 screen_id =
670 content::DesktopMediaID(content::DesktopMediaID::TYPE_SCREEN,
671 webrtc::kFullDesktopScreenId);
672 #endif // !defined(OS_CHROMEOS)
673
674 bool capture_audio =
675 (request.audio_type == content::MEDIA_DESKTOP_AUDIO_CAPTURE &&
676 loopback_audio_supported);
677
678 // Unless we're being invoked from a component extension, register to
679 // display the notification for stream capture.
680 bool display_notification = !component_extension;
681
682 ui = GetDevicesForDesktopCapture(&devices, screen_id, capture_audio,
683 display_notification, application_title,
684 application_title);
685 DCHECK(!devices.empty());
686 }
687
688 // The only case when devices can be empty is if the user has denied
689 // permission.
690 result = devices.empty() ? content::MEDIA_DEVICE_PERMISSION_DENIED
691 : content::MEDIA_DEVICE_OK;
692 }
693
694 callback.Run(devices, result, ui.Pass());
695 }
696
697 void MediaCaptureDevicesDispatcher::ProcessTabCaptureAccessRequest(
698 content::WebContents* web_contents,
699 const content::MediaStreamRequest& request,
700 const content::MediaResponseCallback& callback,
701 const extensions::Extension* extension) {
702 content::MediaStreamDevices devices;
703 scoped_ptr<content::MediaStreamUI> ui;
704
705 #if defined(ENABLE_EXTENSIONS)
706 Profile* profile =
707 Profile::FromBrowserContext(web_contents->GetBrowserContext());
708 extensions::TabCaptureRegistry* tab_capture_registry =
709 extensions::TabCaptureRegistry::Get(profile);
710 if (!tab_capture_registry) {
711 NOTREACHED();
712 callback.Run(devices, content::MEDIA_DEVICE_INVALID_STATE, ui.Pass());
713 return;
714 }
715 const bool tab_capture_allowed = tab_capture_registry->VerifyRequest(
716 request.render_process_id, request.render_frame_id, extension->id());
717
718 if (request.audio_type == content::MEDIA_TAB_AUDIO_CAPTURE &&
719 tab_capture_allowed &&
720 extension->permissions_data()->HasAPIPermission(
721 extensions::APIPermission::kTabCapture)) {
722 devices.push_back(content::MediaStreamDevice(
723 content::MEDIA_TAB_AUDIO_CAPTURE, std::string(), std::string()));
724 }
725
726 if (request.video_type == content::MEDIA_TAB_VIDEO_CAPTURE &&
727 tab_capture_allowed &&
728 extension->permissions_data()->HasAPIPermission(
729 extensions::APIPermission::kTabCapture)) {
730 devices.push_back(content::MediaStreamDevice(
731 content::MEDIA_TAB_VIDEO_CAPTURE, std::string(), std::string()));
732 }
733
734 if (!devices.empty()) {
735 ui = media_stream_capture_indicator_->RegisterMediaStream(
736 web_contents, devices);
737 }
738 callback.Run(
739 devices,
740 devices.empty() ? content::MEDIA_DEVICE_INVALID_STATE :
741 content::MEDIA_DEVICE_OK,
742 ui.Pass());
743 #else // defined(ENABLE_EXTENSIONS)
744 callback.Run(devices, content::MEDIA_DEVICE_TAB_CAPTURE_FAILURE, ui.Pass());
745 #endif // defined(ENABLE_EXTENSIONS)
746 }
747
748 #if defined(ENABLE_EXTENSIONS)
749 void MediaCaptureDevicesDispatcher::
750 ProcessMediaAccessRequestFromPlatformAppOrExtension(
751 content::WebContents* web_contents,
752 const content::MediaStreamRequest& request,
753 const content::MediaResponseCallback& callback,
754 const extensions::Extension* extension) {
755 // TODO(vrk): This code is largely duplicated in
756 // MediaStreamDevicesController::Accept(). Move this code into a shared method
757 // between the two classes.
758
759 Profile* profile =
760 Profile::FromBrowserContext(web_contents->GetBrowserContext());
761
762 bool audio_allowed =
763 request.audio_type == content::MEDIA_DEVICE_AUDIO_CAPTURE &&
764 extension->permissions_data()->HasAPIPermission(
765 extensions::APIPermission::kAudioCapture) &&
766 GetDevicePolicy(profile, extension->url(),
767 prefs::kAudioCaptureAllowed,
768 prefs::kAudioCaptureAllowedUrls) != ALWAYS_DENY;
769 bool video_allowed =
770 request.video_type == content::MEDIA_DEVICE_VIDEO_CAPTURE &&
771 extension->permissions_data()->HasAPIPermission(
772 extensions::APIPermission::kVideoCapture) &&
773 GetDevicePolicy(profile, extension->url(),
774 prefs::kVideoCaptureAllowed,
775 prefs::kVideoCaptureAllowedUrls) != ALWAYS_DENY;
776
777 bool get_default_audio_device = audio_allowed;
778 bool get_default_video_device = video_allowed;
779
780 content::MediaStreamDevices devices;
781
782 // Set an initial error result. If neither audio or video is allowed, we'll
783 // never try to get any device below but will just create |ui| and return an
784 // empty list with "invalid state" result. If at least one is allowed, we'll
785 // try to get device(s), and if failure, we want to return "no hardware"
786 // result.
787 // TODO(grunell): The invalid state result should be changed to a new denied
788 // result + a dcheck to ensure at least one of audio or video types is
789 // capture.
790 content::MediaStreamRequestResult result =
791 (audio_allowed || video_allowed) ? content::MEDIA_DEVICE_NO_HARDWARE
792 : content::MEDIA_DEVICE_INVALID_STATE;
793
794 // Get the exact audio or video device if an id is specified.
795 // We only set any error result here and before running the callback change
796 // it to OK if we have any device.
797 if (audio_allowed && !request.requested_audio_device_id.empty()) {
798 const content::MediaStreamDevice* audio_device =
799 GetRequestedAudioDevice(request.requested_audio_device_id);
800 if (audio_device) {
801 devices.push_back(*audio_device);
802 get_default_audio_device = false;
803 }
804 }
805 if (video_allowed && !request.requested_video_device_id.empty()) {
806 const content::MediaStreamDevice* video_device =
807 GetRequestedVideoDevice(request.requested_video_device_id);
808 if (video_device) {
809 devices.push_back(*video_device);
810 get_default_video_device = false;
811 }
812 }
813
814 // If either or both audio and video devices were requested but not
815 // specified by id, get the default devices.
816 if (get_default_audio_device || get_default_video_device) {
817 GetDefaultDevicesForProfile(profile,
818 get_default_audio_device,
819 get_default_video_device,
820 &devices);
821 }
822
823 scoped_ptr<content::MediaStreamUI> ui;
824 if (!devices.empty()) {
825 result = content::MEDIA_DEVICE_OK;
826 ui = media_stream_capture_indicator_->RegisterMediaStream(
827 web_contents, devices);
828 }
829
830 callback.Run(devices, result, ui.Pass());
831 }
832 #endif
833
834 void MediaCaptureDevicesDispatcher::ProcessRegularMediaAccessRequest(
835 content::WebContents* web_contents,
836 const content::MediaStreamRequest& request,
837 const content::MediaResponseCallback& callback) {
838 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
839
840 RequestsQueue& queue = pending_requests_[web_contents];
841 queue.push_back(PendingAccessRequest(request, callback));
842
843 // If this is the only request then show the infobar.
844 if (queue.size() == 1)
845 ProcessQueuedAccessRequest(web_contents);
846 }
847
848 void MediaCaptureDevicesDispatcher::ProcessQueuedAccessRequest(
849 content::WebContents* web_contents) {
850 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
851
852 std::map<content::WebContents*, RequestsQueue>::iterator it =
853 pending_requests_.find(web_contents);
854
855 if (it == pending_requests_.end() || it->second.empty()) {
856 // Don't do anything if the tab was closed.
857 return;
858 }
859
860 DCHECK(!it->second.empty());
861
862 if (PermissionBubbleManager::Enabled() ||
863 MediaStreamPermissionBubbleExperimentEnabled()) {
864 scoped_ptr<MediaStreamDevicesController> controller(
865 new MediaStreamDevicesController(web_contents,
866 it->second.front().request,
867 base::Bind(&MediaCaptureDevicesDispatcher::OnAccessRequestResponse,
868 base::Unretained(this), web_contents)));
869 if (controller->DismissInfoBarAndTakeActionOnSettings())
870 return;
871 PermissionBubbleManager* bubble_manager =
872 PermissionBubbleManager::FromWebContents(web_contents);
873 if (bubble_manager)
874 bubble_manager->AddRequest(controller.release());
875 return;
876 }
877
878 // TODO(gbillock): delete this block and the MediaStreamInfoBarDelegate
879 // when we've transitioned to bubbles. (crbug/337458)
880 MediaStreamInfoBarDelegate::Create(
881 web_contents, it->second.front().request,
882 base::Bind(&MediaCaptureDevicesDispatcher::OnAccessRequestResponse,
883 base::Unretained(this), web_contents));
884 }
885
886 void MediaCaptureDevicesDispatcher::OnAccessRequestResponse(
887 content::WebContents* web_contents,
888 const content::MediaStreamDevices& devices,
889 content::MediaStreamRequestResult result,
890 scoped_ptr<content::MediaStreamUI> ui) {
891 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
892
893 std::map<content::WebContents*, RequestsQueue>::iterator it =
894 pending_requests_.find(web_contents);
895 if (it == pending_requests_.end()) {
896 // WebContents has been destroyed. Don't need to do anything.
897 return;
898 }
899
900 RequestsQueue& queue(it->second);
901 if (queue.empty())
902 return;
903
904 content::MediaResponseCallback callback = queue.front().callback;
905 queue.pop_front();
906
907 if (!queue.empty()) {
908 // Post a task to process next queued request. It has to be done
909 // asynchronously to make sure that calling infobar is not destroyed until
910 // after this function returns.
911 BrowserThread::PostTask(
912 BrowserThread::UI, FROM_HERE,
913 base::Bind(&MediaCaptureDevicesDispatcher::ProcessQueuedAccessRequest,
914 base::Unretained(this), web_contents));
915 }
916
917 callback.Run(devices, result, ui.Pass());
918 }
919
920 void MediaCaptureDevicesDispatcher::GetDefaultDevicesForProfile( 352 void MediaCaptureDevicesDispatcher::GetDefaultDevicesForProfile(
921 Profile* profile, 353 Profile* profile,
922 bool audio, 354 bool audio,
923 bool video, 355 bool video,
924 content::MediaStreamDevices* devices) { 356 content::MediaStreamDevices* devices) {
925 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); 357 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
926 DCHECK(audio || video); 358 DCHECK(audio || video);
927 359
928 PrefService* prefs = profile->GetPrefs(); 360 PrefService* prefs = profile->GetPrefs();
929 std::string default_device; 361 std::string default_device;
(...skipping 213 matching lines...) Expand 10 before | Expand all | Expand 10 after
1143 575
1144 void MediaCaptureDevicesDispatcher::SetTestAudioCaptureDevices( 576 void MediaCaptureDevicesDispatcher::SetTestAudioCaptureDevices(
1145 const MediaStreamDevices& devices) { 577 const MediaStreamDevices& devices) {
1146 test_audio_devices_ = devices; 578 test_audio_devices_ = devices;
1147 } 579 }
1148 580
1149 void MediaCaptureDevicesDispatcher::SetTestVideoCaptureDevices( 581 void MediaCaptureDevicesDispatcher::SetTestVideoCaptureDevices(
1150 const MediaStreamDevices& devices) { 582 const MediaStreamDevices& devices) {
1151 test_video_devices_ = devices; 583 test_video_devices_ = devices;
1152 } 584 }
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698