OLD | NEW |
1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "config.h" | 5 #include "config.h" |
6 #include "modules/permissions/Permissions.h" | 6 #include "modules/permissions/Permissions.h" |
7 | 7 |
8 #include "bindings/core/v8/ScriptPromise.h" | 8 #include "bindings/core/v8/ScriptPromise.h" |
9 #include "bindings/core/v8/ScriptPromiseResolver.h" | 9 #include "bindings/core/v8/ScriptPromiseResolver.h" |
10 #include "bindings/modules/v8/V8MidiPermissionDescriptor.h" | 10 #include "bindings/modules/v8/V8MidiPermissionDescriptor.h" |
11 #include "bindings/modules/v8/V8PermissionDescriptor.h" | 11 #include "bindings/modules/v8/V8PermissionDescriptor.h" |
12 #include "bindings/modules/v8/V8PushPermissionDescriptor.h" | 12 #include "bindings/modules/v8/V8PushPermissionDescriptor.h" |
13 #include "core/dom/DOMException.h" | 13 #include "core/dom/DOMException.h" |
14 #include "core/dom/Document.h" | 14 #include "core/dom/Document.h" |
15 #include "core/dom/ExceptionCode.h" | 15 #include "core/dom/ExceptionCode.h" |
| 16 #include "modules/permissions/PermissionCallback.h" |
16 #include "modules/permissions/PermissionController.h" | 17 #include "modules/permissions/PermissionController.h" |
17 #include "modules/permissions/PermissionDescriptor.h" | 18 #include "modules/permissions/PermissionDescriptor.h" |
18 #include "modules/permissions/PermissionQueryCallback.h" | |
19 #include "modules/permissions/PermissionStatus.h" | 19 #include "modules/permissions/PermissionStatus.h" |
20 #include "public/platform/Platform.h" | 20 #include "public/platform/Platform.h" |
21 #include "public/platform/modules/permissions/WebPermissionClient.h" | 21 #include "public/platform/modules/permissions/WebPermissionClient.h" |
22 | 22 |
23 namespace blink { | 23 namespace blink { |
24 | 24 |
25 namespace { | 25 namespace { |
26 | 26 |
27 WebPermissionClient* permissionClient(ExecutionContext* executionContext) | 27 WebPermissionClient* permissionClient(ExecutionContext* executionContext) |
28 { | 28 { |
29 if (executionContext->isDocument()) { | 29 if (executionContext->isDocument()) { |
30 Document* document = toDocument(executionContext); | 30 Document* document = toDocument(executionContext); |
31 if (!document->frame()) | 31 if (!document->frame()) |
32 return nullptr; | 32 return nullptr; |
33 PermissionController* controller = PermissionController::from(*document-
>frame()); | 33 PermissionController* controller = PermissionController::from(*document-
>frame()); |
34 return controller ? controller->client() : nullptr; | 34 return controller ? controller->client() : nullptr; |
35 } | 35 } |
36 return Platform::current()->permissionClient(); | 36 return Platform::current()->permissionClient(); |
37 } | 37 } |
38 | 38 |
| 39 // Here we handle some common permission patterns to prevent propogation up to t
he content layer |
| 40 // Examples of behaviours which would go here are rejecting unsupported permissi
ons, accepting |
| 41 // permissions which are always granted or always denied according to the spec e
tc. |
| 42 bool handleDefaultBehaviour( |
| 43 ScriptState* scriptState, const ScriptValue& rawPermission, PassRefPtr<Scrip
tPromiseResolver> resolver, WebPermissionType type, TrackExceptionState& excepti
onState) |
| 44 { |
| 45 if (type == WebPermissionTypePushNotifications) { |
| 46 PushPermissionDescriptor pushPermission = NativeValueTraits<PushPermissi
onDescriptor>::nativeValue(scriptState->isolate(), rawPermission.v8Value(), exce
ptionState); |
| 47 // Only "userVisibleOnly" push is supported for now. |
| 48 if (!pushPermission.userVisibleOnly()) { |
| 49 resolver->reject(DOMException::create(NotSupportedError, "Push Permi
ssion without userVisibleOnly:true isn't supported yet.")); |
| 50 return true; |
| 51 } |
| 52 } else if (type == WebPermissionTypeMidiSysEx) { |
| 53 MidiPermissionDescriptor midiPermission = NativeValueTraits<MidiPermissi
onDescriptor>::nativeValue(scriptState->isolate(), rawPermission.v8Value(), exce
ptionState); |
| 54 // Only sysex usage requires a permission, otherwise it is granted. |
| 55 if (!midiPermission.sysex()) { |
| 56 resolver->resolve(PermissionStatus::create(scriptState->executionCon
text(), WebPermissionStatusGranted, WebPermissionTypeMidi)); |
| 57 return true; |
| 58 } |
| 59 } |
| 60 return false; |
| 61 } |
| 62 |
| 63 WebPermissionType convertPermissionStringToType(const String& name) |
| 64 { |
| 65 if (name == "geolocation") |
| 66 return WebPermissionTypeGeolocation; |
| 67 if (name == "notifications") |
| 68 return WebPermissionTypeNotifications; |
| 69 if (name == "push") |
| 70 return WebPermissionTypePushNotifications; |
| 71 if (name == "midi") |
| 72 return WebPermissionTypeMidiSysEx; |
| 73 |
| 74 ASSERT_NOT_REACHED(); |
| 75 return WebPermissionTypeGeolocation; |
| 76 } |
| 77 |
39 } // anonymous namespace | 78 } // anonymous namespace |
40 | 79 |
41 ScriptPromise Permissions::query(ScriptState* scriptState, const ScriptValue& ra
wPermission) | 80 ScriptPromise Permissions::query(ScriptState* scriptState, const ScriptValue& ra
wPermission) |
42 { | 81 { |
43 WebPermissionClient* client = permissionClient(scriptState->executionContext
()); | 82 WebPermissionClient* client = permissionClient(scriptState->executionContext
()); |
44 if (!client) | 83 if (!client) |
45 return ScriptPromise::rejectWithDOMException(scriptState, DOMException::
create(InvalidStateError, "In its current state, the global scope can't query pe
rmissions.")); | 84 return ScriptPromise::rejectWithDOMException(scriptState, DOMException::
create(InvalidStateError, "In its current state, the global scope can't query pe
rmissions.")); |
46 | 85 |
47 TrackExceptionState exceptionState; | 86 TrackExceptionState exceptionState; |
48 PermissionDescriptor permission = NativeValueTraits<PermissionDescriptor>::n
ativeValue(scriptState->isolate(), rawPermission.v8Value(), exceptionState); | 87 PermissionDescriptor permission = NativeValueTraits<PermissionDescriptor>::n
ativeValue(scriptState->isolate(), rawPermission.v8Value(), exceptionState); |
49 | 88 |
50 | 89 |
51 if (exceptionState.hadException()) | 90 if (exceptionState.hadException()) |
52 return ScriptPromise::reject(scriptState, v8::Exception::TypeError(v8Str
ing(scriptState->isolate(), exceptionState.message()))); | 91 return ScriptPromise::reject(scriptState, v8::Exception::TypeError(v8Str
ing(scriptState->isolate(), exceptionState.message()))); |
53 | 92 |
54 RefPtr<ScriptPromiseResolver> resolver = ScriptPromiseResolver::create(scrip
tState); | 93 RefPtr<ScriptPromiseResolver> resolver = ScriptPromiseResolver::create(scrip
tState); |
55 ScriptPromise promise = resolver->promise(); | 94 ScriptPromise promise = resolver->promise(); |
56 | 95 |
57 String name = permission.name(); | 96 String name = permission.name(); |
58 WebPermissionType type; | 97 WebPermissionType type = convertPermissionStringToType(name); |
59 if (name == "geolocation") { | 98 |
60 type = WebPermissionTypeGeolocation; | 99 if (handleDefaultBehaviour(scriptState, rawPermission, resolver, type, excep
tionState)) |
61 } else if (name == "notifications") { | 100 return promise; |
62 type = WebPermissionTypeNotifications; | |
63 } else if (name == "push") { | |
64 PushPermissionDescriptor pushPermission = NativeValueTraits<PushPermissi
onDescriptor>::nativeValue(scriptState->isolate(), rawPermission.v8Value(), exce
ptionState); | |
65 // Only "userVisibleOnly" push is supported for now. | |
66 if (!pushPermission.userVisibleOnly()) { | |
67 resolver->reject(DOMException::create(NotSupportedError, "Push Permi
ssion without userVisibleOnly:true isn't supported yet.")); | |
68 return promise; | |
69 } | |
70 type = WebPermissionTypePushNotifications; | |
71 } else if (name == "midi") { | |
72 MidiPermissionDescriptor midiPermission = NativeValueTraits<MidiPermissi
onDescriptor>::nativeValue(scriptState->isolate(), rawPermission.v8Value(), exce
ptionState); | |
73 // Only sysex usage requires a permission, otherwise it is granted. | |
74 if (!midiPermission.sysex()) { | |
75 resolver->resolve(PermissionStatus::create(scriptState->executionCon
text(), WebPermissionStatusGranted, WebPermissionTypeMidi)); | |
76 return promise; | |
77 } | |
78 type = WebPermissionTypeMidiSysEx; | |
79 } else { | |
80 ASSERT_NOT_REACHED(); | |
81 type = WebPermissionTypeGeolocation; | |
82 } | |
83 | 101 |
84 // If the current origin is a file scheme, it will unlikely return a | 102 // If the current origin is a file scheme, it will unlikely return a |
85 // meaningful value because most APIs are broken on file scheme and no | 103 // meaningful value because most APIs are broken on file scheme and no |
86 // permission prompt will be shown even if the returned permission will most | 104 // permission prompt will be shown even if the returned permission will most |
87 // likely be "prompt". | 105 // likely be "prompt". |
88 client->queryPermission(type, KURL(KURL(), scriptState->executionContext()->
securityOrigin()->toString()), new PermissionQueryCallback(resolver, type)); | 106 client->queryPermission(type, KURL(KURL(), scriptState->executionContext()->
securityOrigin()->toString()), new PermissionCallback(resolver, type)); |
89 return promise; | 107 return promise; |
90 } | 108 } |
91 | 109 |
| 110 ScriptPromise Permissions::revoke(ScriptState* scriptState, const ScriptValue& r
awPermission) |
| 111 { |
| 112 WebPermissionClient* client = permissionClient(scriptState->executionContext
()); |
| 113 if (!client) |
| 114 return ScriptPromise::rejectWithDOMException(scriptState, DOMException::
create(InvalidStateError, "In its current state, the global scope can't revoke p
ermissions.")); |
| 115 |
| 116 TrackExceptionState exceptionState; |
| 117 PermissionDescriptor permission = NativeValueTraits<PermissionDescriptor>::n
ativeValue(scriptState->isolate(), rawPermission.v8Value(), exceptionState); |
| 118 |
| 119 if (exceptionState.hadException()) |
| 120 return ScriptPromise::reject(scriptState, v8::Exception::TypeError(v8Str
ing(scriptState->isolate(), exceptionState.message()))); |
| 121 |
| 122 RefPtr<ScriptPromiseResolver> resolver = ScriptPromiseResolver::create(scrip
tState); |
| 123 ScriptPromise promise = resolver->promise(); |
| 124 |
| 125 String name = permission.name(); |
| 126 WebPermissionType type = convertPermissionStringToType(name); |
| 127 |
| 128 if (handleDefaultBehaviour(scriptState, rawPermission, resolver, type, excep
tionState)) |
| 129 return promise; |
| 130 |
| 131 client->revokePermission(type, KURL(KURL(), scriptState->executionContext()-
>securityOrigin()->toString()), new PermissionCallback(resolver, type)); |
| 132 return promise; |
| 133 } |
| 134 |
92 } // namespace blink | 135 } // namespace blink |
OLD | NEW |