OLD | NEW |
---|---|
1 // Copyright 2015 The Chromium Authors. All rights reserved. | 1 // Copyright 2015 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "modules/quota/StorageManager.h" | 5 #include "modules/quota/StorageManager.h" |
6 | 6 |
7 #include "bindings/core/v8/ScriptPromiseResolver.h" | 7 #include "bindings/core/v8/ScriptPromiseResolver.h" |
8 #include "bindings/modules/v8/V8StorageEstimate.h" | 8 #include "bindings/modules/v8/V8StorageEstimate.h" |
9 #include "core/dom/DOMException.h" | 9 #include "core/dom/DOMException.h" |
10 #include "core/dom/Document.h" | 10 #include "core/dom/Document.h" |
11 #include "core/dom/ExceptionCode.h" | 11 #include "core/dom/ExceptionCode.h" |
12 #include "modules/permissions/Permissions.h" | 12 #include "modules/permissions/Permissions.h" |
13 #include "modules/quota/StorageEstimate.h" | 13 #include "modules/quota/StorageEstimate.h" |
14 #include "platform/StorageQuotaCallbacks.h" | 14 #include "platform/StorageQuotaCallbacks.h" |
15 #include "platform/UserGestureIndicator.h" | |
16 #include "platform/mojo/MojoHelper.h" | |
15 #include "public/platform/Platform.h" | 17 #include "public/platform/Platform.h" |
16 #include "public/platform/WebCallbacks.h" | |
17 #include "public/platform/modules/permissions/WebPermissionClient.h" | |
18 #include "public/platform/modules/permissions/WebPermissionStatus.h" | |
19 | 18 |
20 namespace blink { | 19 namespace blink { |
21 | 20 |
21 using mojom::blink::PermissionName; | |
22 using mojom::blink::PermissionService; | |
23 using mojom::blink::PermissionStatus; | |
24 | |
22 namespace { | 25 namespace { |
23 | 26 |
24 class DurableStorageCallbacks final : public WebPermissionCallback { | |
25 public: | |
26 DurableStorageCallbacks(ScriptPromiseResolver* resolver) | |
27 : m_resolver(resolver) | |
28 { | |
29 } | |
30 | |
31 void onSuccess(WebPermissionStatus status) override | |
32 { | |
33 m_resolver->resolve(status == WebPermissionStatusGranted); | |
34 } | |
35 void onError() override | |
36 { | |
37 ASSERT_NOT_REACHED(); | |
38 } | |
39 | |
40 private: | |
41 Persistent<ScriptPromiseResolver> m_resolver; | |
42 }; | |
43 | |
44 class EstimateCallbacks final : public StorageQuotaCallbacks { | 27 class EstimateCallbacks final : public StorageQuotaCallbacks { |
45 WTF_MAKE_NONCOPYABLE(EstimateCallbacks); | 28 WTF_MAKE_NONCOPYABLE(EstimateCallbacks); |
46 public: | 29 public: |
47 explicit EstimateCallbacks(ScriptPromiseResolver* resolver) | 30 explicit EstimateCallbacks(ScriptPromiseResolver* resolver) |
48 : m_resolver(resolver) {} | 31 : m_resolver(resolver) {} |
49 | 32 |
50 ~EstimateCallbacks() override {} | 33 ~EstimateCallbacks() override {} |
51 | 34 |
52 void didQueryStorageUsageAndQuota(unsigned long long usageInBytes, unsigned long long quotaInBytes) override | 35 void didQueryStorageUsageAndQuota(unsigned long long usageInBytes, unsigned long long quotaInBytes) override |
53 { | 36 { |
(...skipping 32 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
86 if (securityOrigin->isUnique()) { | 69 if (securityOrigin->isUnique()) { |
87 resolver->reject(DOMException::create(NotSupportedError)); | 70 resolver->reject(DOMException::create(NotSupportedError)); |
88 return promise; | 71 return promise; |
89 } | 72 } |
90 String errorMessage; | 73 String errorMessage; |
91 if (!executionContext->isSecureContext(errorMessage)) { | 74 if (!executionContext->isSecureContext(errorMessage)) { |
92 resolver->reject(DOMException::create(SecurityError, errorMessage)); | 75 resolver->reject(DOMException::create(SecurityError, errorMessage)); |
93 return promise; | 76 return promise; |
94 } | 77 } |
95 ASSERT(executionContext->isDocument()); | 78 ASSERT(executionContext->isDocument()); |
96 WebPermissionClient* permissionClient = Permissions::getClient(executionCont ext); | 79 PermissionService* permissionService = getPermissionService(scriptState->get ExecutionContext()); |
97 if (!permissionClient) { | 80 if (!permissionService) { |
98 resolver->reject(DOMException::create(InvalidStateError, "In its current state, the global scope can't request permissions.")); | 81 resolver->reject(DOMException::create(InvalidStateError, "In its current state, the global scope can't request permissions.")); |
99 return promise; | 82 return promise; |
100 } | 83 } |
101 permissionClient->requestPermission(WebPermissionTypeDurableStorage, KURL(KU RL(), scriptState->getExecutionContext()->getSecurityOrigin()->toString()), new DurableStorageCallbacks(resolver)); | 84 permissionService->RequestPermission(PermissionName::DURABLE_STORAGE, script State->getExecutionContext()->getSecurityOrigin()->toString(), UserGestureIndica tor::processingUserGesture(), createBaseCallback(bind(&StorageManager::permissio nRequestComplete, wrapPersistent(this), wrapPersistent(resolver)))); |
102 | 85 |
103 return promise; | 86 return promise; |
104 } | 87 } |
105 | 88 |
106 ScriptPromise StorageManager::persisted(ScriptState* scriptState) | 89 ScriptPromise StorageManager::persisted(ScriptState* scriptState) |
107 { | 90 { |
108 ScriptPromiseResolver* resolver = ScriptPromiseResolver::create(scriptState) ; | 91 ScriptPromiseResolver* resolver = ScriptPromiseResolver::create(scriptState) ; |
109 ScriptPromise promise = resolver->promise(); | 92 ScriptPromise promise = resolver->promise(); |
110 WebPermissionClient* permissionClient = Permissions::getClient(scriptState-> getExecutionContext()); | 93 PermissionService* permissionService = getPermissionService(scriptState->get ExecutionContext()); |
111 if (!permissionClient) { | 94 if (!permissionService) { |
112 resolver->reject(DOMException::create(InvalidStateError, "In its current state, the global scope can't query permissions.")); | 95 resolver->reject(DOMException::create(InvalidStateError, "In its current state, the global scope can't query permissions.")); |
113 return promise; | 96 return promise; |
114 } | 97 } |
115 permissionClient->queryPermission(WebPermissionTypeDurableStorage, KURL(KURL (), scriptState->getExecutionContext()->getSecurityOrigin()->toString()), new Du rableStorageCallbacks(resolver)); | 98 permissionService->HasPermission(PermissionName::DURABLE_STORAGE, scriptStat e->getExecutionContext()->getSecurityOrigin()->toString(), createBaseCallback(bi nd(&StorageManager::permissionRequestComplete, wrapPersistent(this), wrapPersist ent(resolver)))); |
116 return promise; | 99 return promise; |
117 } | 100 } |
118 | 101 |
119 ScriptPromise StorageManager::estimate(ScriptState* scriptState) | 102 ScriptPromise StorageManager::estimate(ScriptState* scriptState) |
120 { | 103 { |
121 ScriptPromiseResolver* resolver = ScriptPromiseResolver::create(scriptState) ; | 104 ScriptPromiseResolver* resolver = ScriptPromiseResolver::create(scriptState) ; |
122 ScriptPromise promise = resolver->promise(); | 105 ScriptPromise promise = resolver->promise(); |
123 ExecutionContext* executionContext = scriptState->getExecutionContext(); | 106 ExecutionContext* executionContext = scriptState->getExecutionContext(); |
124 SecurityOrigin* securityOrigin = executionContext->getSecurityOrigin(); | 107 SecurityOrigin* securityOrigin = executionContext->getSecurityOrigin(); |
125 if (securityOrigin->isUnique()) { | 108 if (securityOrigin->isUnique()) { |
126 resolver->reject(DOMException::create(NotSupportedError)); | 109 resolver->reject(DOMException::create(NotSupportedError)); |
127 return promise; | 110 return promise; |
128 } | 111 } |
129 // IDL has: [SecureContext] | 112 // IDL has: [SecureContext] |
130 String errorMessage; | 113 String errorMessage; |
131 if (!executionContext->isSecureContext(errorMessage)) { | 114 if (!executionContext->isSecureContext(errorMessage)) { |
132 resolver->reject(DOMException::create(SecurityError, errorMessage)); | 115 resolver->reject(DOMException::create(SecurityError, errorMessage)); |
133 return promise; | 116 return promise; |
134 } | 117 } |
135 | 118 |
136 KURL storagePartition = KURL(KURL(), securityOrigin->toString()); | 119 KURL storagePartition = KURL(KURL(), securityOrigin->toString()); |
137 Platform::current()->queryStorageUsageAndQuota(storagePartition, WebStorageQ uotaTypeTemporary, new EstimateCallbacks(resolver)); | 120 Platform::current()->queryStorageUsageAndQuota(storagePartition, WebStorageQ uotaTypeTemporary, new EstimateCallbacks(resolver)); |
138 return promise; | 121 return promise; |
139 } | 122 } |
140 | 123 |
141 DEFINE_TRACE(StorageManager) | 124 DEFINE_TRACE(StorageManager) |
142 { | 125 { |
143 } | 126 } |
144 | 127 |
128 mojom::blink::PermissionService* StorageManager::getPermissionService(ExecutionC ontext* executionContext) | |
129 { | |
130 if (!m_permissionService) { | |
131 if (Permissions::connectToService(executionContext, mojo::GetProxy(&m_pe rmissionService))) | |
132 m_permissionService.set_connection_error_handler(createBaseCallback( bind(&StorageManager::permissionServiceConnectionError, wrapWeakPersistent(this) ))); | |
mlamouri (slow - plz ping)
2016/07/18 10:25:57
It's a bit odd because you don't handle a branch.
Reilly Grant (use Gerrit)
2016/07/19 20:10:28
I took the second option.
| |
133 } | |
134 return m_permissionService.get(); | |
135 } | |
136 | |
137 void StorageManager::permissionServiceConnectionError() | |
138 { | |
139 m_permissionService.reset(); | |
140 } | |
141 | |
142 void StorageManager::permissionRequestComplete(ScriptPromiseResolver* resolver, PermissionStatus status) | |
143 { | |
144 if (!resolver->getExecutionContext() || resolver->getExecutionContext()->act iveDOMObjectsAreStopped()) | |
145 return; | |
146 resolver->resolve(status == PermissionStatus::GRANTED); | |
147 } | |
148 | |
145 } // namespace blink | 149 } // namespace blink |
OLD | NEW |