Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright 2015 The Chromium Authors. All rights reserved. | 1 // Copyright 2015 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "content/renderer/media/media_permission_dispatcher.h" | 5 #include "content/renderer/media/media_permission_dispatcher.h" |
| 6 | 6 |
| 7 #include "base/bind.h" | |
| 7 #include "base/logging.h" | 8 #include "base/logging.h" |
| 9 #include "base/single_thread_task_runner.h" | |
| 10 #include "base/thread_task_runner_handle.h" | |
| 11 #include "content/public/common/service_registry.h" | |
| 12 #include "content/public/renderer/render_frame.h" | |
| 13 #include "media/base/bind_to_current_loop.h" | |
| 14 #include "third_party/WebKit/public/web/WebUserGestureIndicator.h" | |
| 15 #include "url/gurl.h" | |
| 16 | |
| 17 namespace { | |
| 18 | |
| 19 using Type = media::MediaPermission::Type; | |
| 20 | |
| 21 content::PermissionName MediaPermissionTypeToPermissionName(Type type) { | |
| 22 switch (type) { | |
| 23 case Type::PROTECTED_MEDIA_IDENTIFIER: | |
| 24 return content::PERMISSION_NAME_PROTECTED_MEDIA_IDENTIFIER; | |
| 25 case Type::AUDIO_CAPTURE: | |
| 26 return content::PERMISSION_NAME_AUDIO_CAPTURE; | |
| 27 case Type::VIDEO_CAPTURE: | |
| 28 return content::PERMISSION_NAME_VIDEO_CAPTURE; | |
| 29 } | |
| 30 NOTREACHED(); | |
| 31 return content::PERMISSION_NAME_PROTECTED_MEDIA_IDENTIFIER; | |
| 32 } | |
| 33 | |
| 34 } // namespace | |
| 8 | 35 |
| 9 namespace content { | 36 namespace content { |
| 10 | 37 |
| 11 MediaPermissionDispatcher::MediaPermissionDispatcher() : next_request_id_(0) {} | 38 MediaPermissionDispatcher::MediaPermissionDispatcher(RenderFrame* render_frame) |
| 39 : RenderFrameObserver(render_frame), | |
| 40 task_runner_(base::ThreadTaskRunnerHandle::Get()), | |
| 41 next_request_id_(0), | |
| 42 weak_factory_(this) { | |
| 43 weak_ptr_ = weak_factory_.GetWeakPtr(); | |
|
dcheng
2016/01/12 21:55:53
This needs a comment: WeakPtrFactory and WeakPtr t
Wez
2016/01/15 18:59:30
Yeah, there's a tension between allowing GetWeakPt
xhwang
2016/01/19 20:44:32
Acknowledged.
| |
| 44 } | |
| 12 | 45 |
| 13 MediaPermissionDispatcher::~MediaPermissionDispatcher() { | 46 MediaPermissionDispatcher::~MediaPermissionDispatcher() { |
| 14 DCHECK(thread_checker_.CalledOnValidThread()); | 47 DCHECK(task_runner_->RunsTasksOnCurrentThread()); |
| 48 | |
| 15 // Fire all pending callbacks with |false|. | 49 // Fire all pending callbacks with |false|. |
| 16 for (auto& request : requests_) | 50 for (auto& request : requests_) |
| 17 request.second.Run(false); | 51 request.second.Run(false); |
| 18 | 52 |
| 19 requests_.clear(); | 53 requests_.clear(); |
| 20 } | 54 } |
| 21 | 55 |
| 56 void MediaPermissionDispatcher::HasPermission( | |
| 57 Type type, | |
| 58 const GURL& security_origin, | |
| 59 const PermissionStatusCB& permission_status_cb) { | |
| 60 if (!task_runner_->RunsTasksOnCurrentThread()) { | |
| 61 // Use BindToCurrentLoop to bind the callback to the current thread. | |
| 62 task_runner_->PostTask( | |
| 63 FROM_HERE, base::Bind(&MediaPermissionDispatcher::HasPermission, | |
| 64 weak_ptr_, type, security_origin, | |
| 65 media::BindToCurrentLoop(permission_status_cb))); | |
| 66 return; | |
| 67 } | |
| 68 | |
| 69 DCHECK(task_runner_->RunsTasksOnCurrentThread()); | |
| 70 | |
| 71 if (!permission_service_.get()) { | |
|
dcheng
2016/01/12 21:55:53
No .get() here and elsewhere.
xhwang
2016/01/19 20:44:32
Done.
| |
| 72 render_frame()->GetServiceRegistry()->ConnectToRemoteService( | |
| 73 mojo::GetProxy(&permission_service_)); | |
| 74 } | |
| 75 | |
| 76 int request_id = RegisterCallback(permission_status_cb); | |
| 77 DVLOG(2) << __FUNCTION__ << ": request ID " << request_id; | |
| 78 | |
| 79 permission_service_->HasPermission( | |
| 80 MediaPermissionTypeToPermissionName(type), security_origin.spec(), | |
| 81 base::Bind(&MediaPermissionDispatcher::OnPermissionStatus, weak_ptr_, | |
| 82 request_id)); | |
| 83 } | |
| 84 | |
| 85 void MediaPermissionDispatcher::RequestPermission( | |
| 86 Type type, | |
| 87 const GURL& security_origin, | |
| 88 const PermissionStatusCB& permission_status_cb) { | |
| 89 if (!task_runner_->RunsTasksOnCurrentThread()) { | |
| 90 // Use BindToCurrentLoop to bind the callback to the current thread. | |
| 91 task_runner_->PostTask( | |
| 92 FROM_HERE, base::Bind(&MediaPermissionDispatcher::RequestPermission, | |
| 93 weak_ptr_, type, security_origin, | |
| 94 media::BindToCurrentLoop(permission_status_cb))); | |
| 95 return; | |
| 96 } | |
| 97 | |
| 98 DCHECK(task_runner_->RunsTasksOnCurrentThread()); | |
| 99 | |
| 100 if (!permission_service_.get()) { | |
| 101 render_frame()->GetServiceRegistry()->ConnectToRemoteService( | |
| 102 mojo::GetProxy(&permission_service_)); | |
| 103 } | |
| 104 | |
| 105 int request_id = RegisterCallback(permission_status_cb); | |
| 106 DVLOG(2) << __FUNCTION__ << ": request ID " << request_id; | |
| 107 | |
| 108 permission_service_->RequestPermission( | |
| 109 MediaPermissionTypeToPermissionName(type), security_origin.spec(), | |
| 110 blink::WebUserGestureIndicator::isProcessingUserGesture(), | |
| 111 base::Bind(&MediaPermissionDispatcher::OnPermissionStatus, weak_ptr_, | |
| 112 request_id)); | |
| 113 } | |
| 114 | |
| 22 uint32_t MediaPermissionDispatcher::RegisterCallback( | 115 uint32_t MediaPermissionDispatcher::RegisterCallback( |
| 23 const PermissionStatusCB& permission_status_cb) { | 116 const PermissionStatusCB& permission_status_cb) { |
| 24 DCHECK(thread_checker_.CalledOnValidThread()); | 117 DCHECK(task_runner_->RunsTasksOnCurrentThread()); |
| 118 | |
| 25 uint32_t request_id = next_request_id_++; | 119 uint32_t request_id = next_request_id_++; |
| 26 DCHECK(!requests_.count(request_id)); | 120 DCHECK(!requests_.count(request_id)); |
| 27 requests_[request_id] = permission_status_cb; | 121 requests_[request_id] = permission_status_cb; |
| 122 | |
| 28 return request_id; | 123 return request_id; |
| 29 } | 124 } |
| 30 | 125 |
| 31 void MediaPermissionDispatcher::DeliverResult(uint32_t request_id, | 126 void MediaPermissionDispatcher::OnPermissionStatus(uint32_t request_id, |
| 32 bool granted) { | 127 PermissionStatus status) { |
| 33 DCHECK(thread_checker_.CalledOnValidThread()); | 128 DVLOG(2) << __FUNCTION__ << ": (" << request_id << ", " << status << ")"; |
| 34 DVLOG(2) << __FUNCTION__ << ": (" << request_id << ", " << granted << ")"; | 129 DCHECK(task_runner_->RunsTasksOnCurrentThread()); |
| 35 | 130 |
| 36 RequestMap::iterator iter = requests_.find(request_id); | 131 RequestMap::iterator iter = requests_.find(request_id); |
| 37 if (iter == requests_.end()) { | 132 if (iter == requests_.end()) { |
| 38 DVLOG(2) << "Request not found."; | 133 DVLOG(2) << "Request not found."; |
| 39 return; | 134 return; |
| 40 } | 135 } |
| 41 | 136 |
| 42 PermissionStatusCB permission_status_cb = iter->second; | 137 PermissionStatusCB permission_status_cb = iter->second; |
| 43 requests_.erase(iter); | 138 requests_.erase(iter); |
| 44 | 139 |
| 45 permission_status_cb.Run(granted); | 140 permission_status_cb.Run(status == PERMISSION_STATUS_GRANTED); |
| 46 } | 141 } |
| 47 | 142 |
| 48 } // namespace content | 143 } // namespace content |
| OLD | NEW |