Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright 2015 The Chromium Authors. All rights reserved. | 1 // Copyright 2015 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "modules/quota/StorageManager.h" | 5 #include "modules/quota/StorageManager.h" |
| 6 | 6 |
| 7 #include "bindings/core/v8/ScriptPromiseResolver.h" | 7 #include "bindings/core/v8/ScriptPromiseResolver.h" |
| 8 #include "bindings/modules/v8/V8StorageEstimate.h" | 8 #include "bindings/modules/v8/V8StorageEstimate.h" |
| 9 #include "core/dom/DOMException.h" | 9 #include "core/dom/DOMException.h" |
| 10 #include "core/dom/Document.h" | 10 #include "core/dom/Document.h" |
| 11 #include "core/dom/ExceptionCode.h" | 11 #include "core/dom/ExceptionCode.h" |
| 12 #include "modules/permissions/Permissions.h" | 12 #include "modules/permissions/Permissions.h" |
| 13 #include "modules/quota/StorageEstimate.h" | 13 #include "modules/quota/StorageEstimate.h" |
| 14 #include "platform/StorageQuotaCallbacks.h" | 14 #include "platform/StorageQuotaCallbacks.h" |
| 15 #include "platform/UserGestureIndicator.h" | |
| 16 #include "platform/mojo/MojoHelper.h" | |
| 15 #include "public/platform/Platform.h" | 17 #include "public/platform/Platform.h" |
| 16 #include "public/platform/WebCallbacks.h" | |
| 17 #include "public/platform/modules/permissions/WebPermissionClient.h" | |
| 18 #include "public/platform/modules/permissions/WebPermissionStatus.h" | |
| 19 | 18 |
| 20 namespace blink { | 19 namespace blink { |
| 21 | 20 |
| 21 using mojom::blink::PermissionName; | |
| 22 using mojom::blink::PermissionService; | |
| 23 using mojom::blink::PermissionStatus; | |
| 24 | |
| 22 namespace { | 25 namespace { |
| 23 | 26 |
| 24 class DurableStorageCallbacks final : public WebPermissionCallback { | |
| 25 public: | |
| 26 DurableStorageCallbacks(ScriptPromiseResolver* resolver) | |
| 27 : m_resolver(resolver) | |
| 28 { | |
| 29 } | |
| 30 | |
| 31 void onSuccess(WebPermissionStatus status) override | |
| 32 { | |
| 33 m_resolver->resolve(status == WebPermissionStatusGranted); | |
| 34 } | |
| 35 void onError() override | |
| 36 { | |
| 37 ASSERT_NOT_REACHED(); | |
| 38 } | |
| 39 | |
| 40 private: | |
| 41 Persistent<ScriptPromiseResolver> m_resolver; | |
| 42 }; | |
| 43 | |
| 44 class EstimateCallbacks final : public StorageQuotaCallbacks { | 27 class EstimateCallbacks final : public StorageQuotaCallbacks { |
| 45 WTF_MAKE_NONCOPYABLE(EstimateCallbacks); | 28 WTF_MAKE_NONCOPYABLE(EstimateCallbacks); |
| 46 public: | 29 public: |
| 47 explicit EstimateCallbacks(ScriptPromiseResolver* resolver) | 30 explicit EstimateCallbacks(ScriptPromiseResolver* resolver) |
| 48 : m_resolver(resolver) {} | 31 : m_resolver(resolver) {} |
| 49 | 32 |
| 50 ~EstimateCallbacks() override {} | 33 ~EstimateCallbacks() override {} |
| 51 | 34 |
| 52 void didQueryStorageUsageAndQuota(unsigned long long usageInBytes, unsigned long long quotaInBytes) override | 35 void didQueryStorageUsageAndQuota(unsigned long long usageInBytes, unsigned long long quotaInBytes) override |
| 53 { | 36 { |
| (...skipping 32 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 86 if (securityOrigin->isUnique()) { | 69 if (securityOrigin->isUnique()) { |
| 87 resolver->reject(DOMException::create(NotSupportedError)); | 70 resolver->reject(DOMException::create(NotSupportedError)); |
| 88 return promise; | 71 return promise; |
| 89 } | 72 } |
| 90 String errorMessage; | 73 String errorMessage; |
| 91 if (!executionContext->isSecureContext(errorMessage)) { | 74 if (!executionContext->isSecureContext(errorMessage)) { |
| 92 resolver->reject(DOMException::create(SecurityError, errorMessage)); | 75 resolver->reject(DOMException::create(SecurityError, errorMessage)); |
| 93 return promise; | 76 return promise; |
| 94 } | 77 } |
| 95 ASSERT(executionContext->isDocument()); | 78 ASSERT(executionContext->isDocument()); |
| 96 WebPermissionClient* permissionClient = Permissions::getClient(executionCont ext); | 79 PermissionService* permissionService = getPermissionService(scriptState->get ExecutionContext()); |
| 97 if (!permissionClient) { | 80 if (!permissionService) { |
| 98 resolver->reject(DOMException::create(InvalidStateError, "In its current state, the global scope can't request permissions.")); | 81 resolver->reject(DOMException::create(InvalidStateError, "In its current state, the global scope can't request permissions.")); |
| 99 return promise; | 82 return promise; |
| 100 } | 83 } |
| 101 permissionClient->requestPermission(WebPermissionTypeDurableStorage, KURL(KU RL(), scriptState->getExecutionContext()->getSecurityOrigin()->toString()), new DurableStorageCallbacks(resolver)); | 84 permissionService->RequestPermission(PermissionName::DURABLE_STORAGE, script State->getExecutionContext()->getSecurityOrigin()->toString(), UserGestureIndica tor::processingUserGesture(), createBaseCallback(bind(&StorageManager::permissio nRequestComplete, wrapPersistent(this), wrapPersistent(resolver)))); |
| 102 | 85 |
| 103 return promise; | 86 return promise; |
| 104 } | 87 } |
| 105 | 88 |
| 106 ScriptPromise StorageManager::persisted(ScriptState* scriptState) | 89 ScriptPromise StorageManager::persisted(ScriptState* scriptState) |
| 107 { | 90 { |
| 108 ScriptPromiseResolver* resolver = ScriptPromiseResolver::create(scriptState) ; | 91 ScriptPromiseResolver* resolver = ScriptPromiseResolver::create(scriptState) ; |
| 109 ScriptPromise promise = resolver->promise(); | 92 ScriptPromise promise = resolver->promise(); |
| 110 WebPermissionClient* permissionClient = Permissions::getClient(scriptState-> getExecutionContext()); | 93 PermissionService* permissionService = getPermissionService(scriptState->get ExecutionContext()); |
| 111 if (!permissionClient) { | 94 if (!permissionService) { |
| 112 resolver->reject(DOMException::create(InvalidStateError, "In its current state, the global scope can't query permissions.")); | 95 resolver->reject(DOMException::create(InvalidStateError, "In its current state, the global scope can't query permissions.")); |
| 113 return promise; | 96 return promise; |
| 114 } | 97 } |
| 115 permissionClient->queryPermission(WebPermissionTypeDurableStorage, KURL(KURL (), scriptState->getExecutionContext()->getSecurityOrigin()->toString()), new Du rableStorageCallbacks(resolver)); | 98 permissionService->HasPermission(PermissionName::DURABLE_STORAGE, scriptStat e->getExecutionContext()->getSecurityOrigin()->toString(), createBaseCallback(bi nd(&StorageManager::permissionRequestComplete, wrapPersistent(this), wrapPersist ent(resolver)))); |
| 116 return promise; | 99 return promise; |
| 117 } | 100 } |
| 118 | 101 |
| 119 ScriptPromise StorageManager::estimate(ScriptState* scriptState) | 102 ScriptPromise StorageManager::estimate(ScriptState* scriptState) |
| 120 { | 103 { |
| 121 ScriptPromiseResolver* resolver = ScriptPromiseResolver::create(scriptState) ; | 104 ScriptPromiseResolver* resolver = ScriptPromiseResolver::create(scriptState) ; |
| 122 ScriptPromise promise = resolver->promise(); | 105 ScriptPromise promise = resolver->promise(); |
| 123 ExecutionContext* executionContext = scriptState->getExecutionContext(); | 106 ExecutionContext* executionContext = scriptState->getExecutionContext(); |
| 124 SecurityOrigin* securityOrigin = executionContext->getSecurityOrigin(); | 107 SecurityOrigin* securityOrigin = executionContext->getSecurityOrigin(); |
| 125 if (securityOrigin->isUnique()) { | 108 if (securityOrigin->isUnique()) { |
| 126 resolver->reject(DOMException::create(NotSupportedError)); | 109 resolver->reject(DOMException::create(NotSupportedError)); |
| 127 return promise; | 110 return promise; |
| 128 } | 111 } |
| 129 // IDL has: [SecureContext] | 112 // IDL has: [SecureContext] |
| 130 String errorMessage; | 113 String errorMessage; |
| 131 if (!executionContext->isSecureContext(errorMessage)) { | 114 if (!executionContext->isSecureContext(errorMessage)) { |
| 132 resolver->reject(DOMException::create(SecurityError, errorMessage)); | 115 resolver->reject(DOMException::create(SecurityError, errorMessage)); |
| 133 return promise; | 116 return promise; |
| 134 } | 117 } |
| 135 | 118 |
| 136 KURL storagePartition = KURL(KURL(), securityOrigin->toString()); | 119 KURL storagePartition = KURL(KURL(), securityOrigin->toString()); |
| 137 Platform::current()->queryStorageUsageAndQuota(storagePartition, WebStorageQ uotaTypeTemporary, new EstimateCallbacks(resolver)); | 120 Platform::current()->queryStorageUsageAndQuota(storagePartition, WebStorageQ uotaTypeTemporary, new EstimateCallbacks(resolver)); |
| 138 return promise; | 121 return promise; |
| 139 } | 122 } |
| 140 | 123 |
| 141 DEFINE_TRACE(StorageManager) | 124 DEFINE_TRACE(StorageManager) |
| 142 { | 125 { |
| 143 } | 126 } |
| 144 | 127 |
| 128 mojom::blink::PermissionService* StorageManager::getPermissionService(ExecutionC ontext* executionContext) | |
| 129 { | |
| 130 if (!m_permissionService) { | |
| 131 if (Permissions::connectToService(executionContext, mojo::GetProxy(&m_pe rmissionService))) | |
| 132 m_permissionService.set_connection_error_handler(createBaseCallback( bind(&StorageManager::permissionServiceConnectionError, wrapWeakPersistent(this) ))); | |
|
mlamouri (slow - plz ping)
2016/07/18 10:25:57
It's a bit odd because you don't handle a branch.
Reilly Grant (use Gerrit)
2016/07/19 20:10:28
I took the second option.
| |
| 133 } | |
| 134 return m_permissionService.get(); | |
| 135 } | |
| 136 | |
| 137 void StorageManager::permissionServiceConnectionError() | |
| 138 { | |
| 139 m_permissionService.reset(); | |
| 140 } | |
| 141 | |
| 142 void StorageManager::permissionRequestComplete(ScriptPromiseResolver* resolver, PermissionStatus status) | |
| 143 { | |
| 144 if (!resolver->getExecutionContext() || resolver->getExecutionContext()->act iveDOMObjectsAreStopped()) | |
| 145 return; | |
| 146 resolver->resolve(status == PermissionStatus::GRANTED); | |
| 147 } | |
| 148 | |
| 145 } // namespace blink | 149 } // namespace blink |
| OLD | NEW |