Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(354)

Side by Side Diff: third_party/WebKit/Source/modules/quota/StorageManager.cpp

Issue 2108003002: Merge //content/child/permissions into Blink's permissions module. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Fixing presubmits. Created 4 years, 5 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2015 The Chromium Authors. All rights reserved. 1 // Copyright 2015 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "modules/quota/StorageManager.h" 5 #include "modules/quota/StorageManager.h"
6 6
7 #include "bindings/core/v8/ScriptPromiseResolver.h" 7 #include "bindings/core/v8/ScriptPromiseResolver.h"
8 #include "bindings/modules/v8/V8StorageEstimate.h" 8 #include "bindings/modules/v8/V8StorageEstimate.h"
9 #include "core/dom/DOMException.h" 9 #include "core/dom/DOMException.h"
10 #include "core/dom/Document.h" 10 #include "core/dom/Document.h"
11 #include "core/dom/ExceptionCode.h" 11 #include "core/dom/ExceptionCode.h"
12 #include "modules/permissions/Permissions.h" 12 #include "modules/permissions/Permissions.h"
13 #include "modules/quota/StorageEstimate.h" 13 #include "modules/quota/StorageEstimate.h"
14 #include "platform/StorageQuotaCallbacks.h" 14 #include "platform/StorageQuotaCallbacks.h"
15 #include "platform/UserGestureIndicator.h"
16 #include "platform/mojo/MojoHelper.h"
15 #include "public/platform/Platform.h" 17 #include "public/platform/Platform.h"
16 #include "public/platform/WebCallbacks.h"
17 #include "public/platform/modules/permissions/WebPermissionClient.h"
18 #include "public/platform/modules/permissions/WebPermissionStatus.h"
19 18
20 namespace blink { 19 namespace blink {
21 20
21 using mojom::blink::PermissionName;
22 using mojom::blink::PermissionService;
23 using mojom::blink::PermissionStatus;
24
22 namespace { 25 namespace {
23 26
24 class DurableStorageCallbacks final : public WebPermissionCallback {
25 public:
26 DurableStorageCallbacks(ScriptPromiseResolver* resolver)
27 : m_resolver(resolver)
28 {
29 }
30
31 void onSuccess(WebPermissionStatus status) override
32 {
33 m_resolver->resolve(status == WebPermissionStatusGranted);
34 }
35 void onError() override
36 {
37 ASSERT_NOT_REACHED();
38 }
39
40 private:
41 Persistent<ScriptPromiseResolver> m_resolver;
42 };
43
44 class EstimateCallbacks final : public StorageQuotaCallbacks { 27 class EstimateCallbacks final : public StorageQuotaCallbacks {
45 WTF_MAKE_NONCOPYABLE(EstimateCallbacks); 28 WTF_MAKE_NONCOPYABLE(EstimateCallbacks);
46 public: 29 public:
47 explicit EstimateCallbacks(ScriptPromiseResolver* resolver) 30 explicit EstimateCallbacks(ScriptPromiseResolver* resolver)
48 : m_resolver(resolver) {} 31 : m_resolver(resolver) {}
49 32
50 ~EstimateCallbacks() override {} 33 ~EstimateCallbacks() override {}
51 34
52 void didQueryStorageUsageAndQuota(unsigned long long usageInBytes, unsigned long long quotaInBytes) override 35 void didQueryStorageUsageAndQuota(unsigned long long usageInBytes, unsigned long long quotaInBytes) override
53 { 36 {
(...skipping 32 matching lines...) Expand 10 before | Expand all | Expand 10 after
86 if (securityOrigin->isUnique()) { 69 if (securityOrigin->isUnique()) {
87 resolver->reject(DOMException::create(NotSupportedError)); 70 resolver->reject(DOMException::create(NotSupportedError));
88 return promise; 71 return promise;
89 } 72 }
90 String errorMessage; 73 String errorMessage;
91 if (!executionContext->isSecureContext(errorMessage)) { 74 if (!executionContext->isSecureContext(errorMessage)) {
92 resolver->reject(DOMException::create(SecurityError, errorMessage)); 75 resolver->reject(DOMException::create(SecurityError, errorMessage));
93 return promise; 76 return promise;
94 } 77 }
95 ASSERT(executionContext->isDocument()); 78 ASSERT(executionContext->isDocument());
96 WebPermissionClient* permissionClient = Permissions::getClient(executionCont ext); 79 PermissionService* permissionService = getPermissionService(scriptState->get ExecutionContext());
97 if (!permissionClient) { 80 if (!permissionService) {
98 resolver->reject(DOMException::create(InvalidStateError, "In its current state, the global scope can't request permissions.")); 81 resolver->reject(DOMException::create(InvalidStateError, "In its current state, the global scope can't request permissions."));
99 return promise; 82 return promise;
100 } 83 }
101 permissionClient->requestPermission(WebPermissionTypeDurableStorage, KURL(KU RL(), scriptState->getExecutionContext()->getSecurityOrigin()->toString()), new DurableStorageCallbacks(resolver)); 84 permissionService->RequestPermission(PermissionName::DURABLE_STORAGE, script State->getExecutionContext()->getSecurityOrigin()->toString(), UserGestureIndica tor::processingUserGesture(), createBaseCallback(bind(&StorageManager::permissio nRequestComplete, wrapPersistent(this), wrapPersistent(resolver))));
102 85
103 return promise; 86 return promise;
104 } 87 }
105 88
106 ScriptPromise StorageManager::persisted(ScriptState* scriptState) 89 ScriptPromise StorageManager::persisted(ScriptState* scriptState)
107 { 90 {
108 ScriptPromiseResolver* resolver = ScriptPromiseResolver::create(scriptState) ; 91 ScriptPromiseResolver* resolver = ScriptPromiseResolver::create(scriptState) ;
109 ScriptPromise promise = resolver->promise(); 92 ScriptPromise promise = resolver->promise();
110 WebPermissionClient* permissionClient = Permissions::getClient(scriptState-> getExecutionContext()); 93 PermissionService* permissionService = getPermissionService(scriptState->get ExecutionContext());
111 if (!permissionClient) { 94 if (!permissionService) {
112 resolver->reject(DOMException::create(InvalidStateError, "In its current state, the global scope can't query permissions.")); 95 resolver->reject(DOMException::create(InvalidStateError, "In its current state, the global scope can't query permissions."));
113 return promise; 96 return promise;
114 } 97 }
115 permissionClient->queryPermission(WebPermissionTypeDurableStorage, KURL(KURL (), scriptState->getExecutionContext()->getSecurityOrigin()->toString()), new Du rableStorageCallbacks(resolver)); 98 permissionService->HasPermission(PermissionName::DURABLE_STORAGE, scriptStat e->getExecutionContext()->getSecurityOrigin()->toString(), createBaseCallback(bi nd(&StorageManager::permissionRequestComplete, wrapPersistent(this), wrapPersist ent(resolver))));
116 return promise; 99 return promise;
117 } 100 }
118 101
119 ScriptPromise StorageManager::estimate(ScriptState* scriptState) 102 ScriptPromise StorageManager::estimate(ScriptState* scriptState)
120 { 103 {
121 ScriptPromiseResolver* resolver = ScriptPromiseResolver::create(scriptState) ; 104 ScriptPromiseResolver* resolver = ScriptPromiseResolver::create(scriptState) ;
122 ScriptPromise promise = resolver->promise(); 105 ScriptPromise promise = resolver->promise();
123 ExecutionContext* executionContext = scriptState->getExecutionContext(); 106 ExecutionContext* executionContext = scriptState->getExecutionContext();
124 SecurityOrigin* securityOrigin = executionContext->getSecurityOrigin(); 107 SecurityOrigin* securityOrigin = executionContext->getSecurityOrigin();
125 if (securityOrigin->isUnique()) { 108 if (securityOrigin->isUnique()) {
126 resolver->reject(DOMException::create(NotSupportedError)); 109 resolver->reject(DOMException::create(NotSupportedError));
127 return promise; 110 return promise;
128 } 111 }
129 // IDL has: [SecureContext] 112 // IDL has: [SecureContext]
130 String errorMessage; 113 String errorMessage;
131 if (!executionContext->isSecureContext(errorMessage)) { 114 if (!executionContext->isSecureContext(errorMessage)) {
132 resolver->reject(DOMException::create(SecurityError, errorMessage)); 115 resolver->reject(DOMException::create(SecurityError, errorMessage));
133 return promise; 116 return promise;
134 } 117 }
135 118
136 KURL storagePartition = KURL(KURL(), securityOrigin->toString()); 119 KURL storagePartition = KURL(KURL(), securityOrigin->toString());
137 Platform::current()->queryStorageUsageAndQuota(storagePartition, WebStorageQ uotaTypeTemporary, new EstimateCallbacks(resolver)); 120 Platform::current()->queryStorageUsageAndQuota(storagePartition, WebStorageQ uotaTypeTemporary, new EstimateCallbacks(resolver));
138 return promise; 121 return promise;
139 } 122 }
140 123
141 DEFINE_TRACE(StorageManager) 124 DEFINE_TRACE(StorageManager)
142 { 125 {
143 } 126 }
144 127
128 mojom::blink::PermissionService* StorageManager::getPermissionService(ExecutionC ontext* executionContext)
129 {
130 if (!m_permissionService) {
131 if (Permissions::connectToService(executionContext, mojo::GetProxy(&m_pe rmissionService)))
132 m_permissionService.set_connection_error_handler(createBaseCallback( bind(&StorageManager::permissionServiceConnectionError, wrapWeakPersistent(this) )));
mlamouri (slow - plz ping) 2016/07/18 10:25:57 It's a bit odd because you don't handle a branch.
Reilly Grant (use Gerrit) 2016/07/19 20:10:28 I took the second option.
133 }
134 return m_permissionService.get();
135 }
136
137 void StorageManager::permissionServiceConnectionError()
138 {
139 m_permissionService.reset();
140 }
141
142 void StorageManager::permissionRequestComplete(ScriptPromiseResolver* resolver, PermissionStatus status)
143 {
144 if (!resolver->getExecutionContext() || resolver->getExecutionContext()->act iveDOMObjectsAreStopped())
145 return;
146 resolver->resolve(status == PermissionStatus::GRANTED);
147 }
148
145 } // namespace blink 149 } // namespace blink
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698