Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(551)

Side by Side Diff: third_party/WebKit/Source/modules/permissions/Permissions.cpp

Issue 2255933002: Add PermissionDescriptor to the permissions Mojo interface. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@no_notification_dispatcher
Patch Set: Collect utility functions into PermissionUtils.h. Created 4 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2014 The Chromium Authors. All rights reserved. 1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "modules/permissions/Permissions.h" 5 #include "modules/permissions/Permissions.h"
6 6
7 #include "bindings/core/v8/Dictionary.h" 7 #include "bindings/core/v8/Dictionary.h"
8 #include "bindings/core/v8/Nullable.h" 8 #include "bindings/core/v8/Nullable.h"
9 #include "bindings/core/v8/ScriptPromise.h" 9 #include "bindings/core/v8/ScriptPromise.h"
10 #include "bindings/core/v8/ScriptPromiseResolver.h" 10 #include "bindings/core/v8/ScriptPromiseResolver.h"
11 #include "bindings/modules/v8/V8MidiPermissionDescriptor.h" 11 #include "bindings/modules/v8/V8MidiPermissionDescriptor.h"
12 #include "bindings/modules/v8/V8PermissionDescriptor.h" 12 #include "bindings/modules/v8/V8PermissionDescriptor.h"
13 #include "bindings/modules/v8/V8PushPermissionDescriptor.h" 13 #include "bindings/modules/v8/V8PushPermissionDescriptor.h"
14 #include "core/dom/DOMException.h" 14 #include "core/dom/DOMException.h"
15 #include "core/dom/Document.h" 15 #include "core/dom/Document.h"
16 #include "core/dom/ExceptionCode.h" 16 #include "core/dom/ExceptionCode.h"
17 #include "core/frame/LocalFrame.h" 17 #include "core/frame/LocalFrame.h"
18 #include "modules/permissions/PermissionDescriptor.h" 18 #include "modules/permissions/PermissionDescriptor.h"
19 #include "modules/permissions/PermissionStatus.h" 19 #include "modules/permissions/PermissionStatus.h"
20 #include "modules/permissions/PermissionUtils.h"
20 #include "platform/UserGestureIndicator.h" 21 #include "platform/UserGestureIndicator.h"
21 #include "public/platform/InterfaceProvider.h"
22 #include "public/platform/Platform.h" 22 #include "public/platform/Platform.h"
23 #include "wtf/Functional.h" 23 #include "wtf/Functional.h"
24 #include "wtf/NotFound.h" 24 #include "wtf/NotFound.h"
25 #include "wtf/PtrUtil.h" 25 #include "wtf/PtrUtil.h"
26 #include "wtf/Vector.h" 26 #include "wtf/Vector.h"
27 #include <memory> 27 #include <memory>
28 28
29 namespace blink { 29 namespace blink {
30 30
31 using mojom::blink::PermissionDescriptorPtr;
31 using mojom::blink::PermissionName; 32 using mojom::blink::PermissionName;
32 using mojom::blink::PermissionService; 33 using mojom::blink::PermissionService;
33 34
34 namespace { 35 namespace {
35 36
37 // Parses the raw permission dictionary and returns the Mojo
38 // PermissionDescriptor if parsing was successful. If an exception occurs, it
39 // will be stored in |exceptionState| and null will be returned. Therefore, the
40 // |exceptionState| should be checked before attempting to use the returned
41 // permission as the non-null assert will be fired otherwise.
42 //
36 // Websites will be able to run code when `name()` is called, changing the 43 // Websites will be able to run code when `name()` is called, changing the
37 // current context. The caller should make sure that no assumption is made 44 // current context. The caller should make sure that no assumption is made
38 // after this has been called. 45 // after this has been called.
39 PermissionName getPermissionName(ScriptState* scriptState, const Dictionary& raw Permission, const PermissionDescriptor& permission, ExceptionState& exceptionSta te) 46 PermissionDescriptorPtr parsePermission(ScriptState* scriptState, const Dictiona ry rawPermission, ExceptionState& exceptionState)
40 {
41 const String& name = permission.name();
42 if (name == "geolocation")
43 return PermissionName::GEOLOCATION;
44 if (name == "notifications")
45 return PermissionName::NOTIFICATIONS;
46 if (name == "push")
47 return PermissionName::PUSH_NOTIFICATIONS;
48 if (name == "midi") {
49 MidiPermissionDescriptor midiPermission = NativeValueTraits<MidiPermissi onDescriptor>::nativeValue(scriptState->isolate(), rawPermission.v8Value(), exce ptionState);
50 return midiPermission.sysex() ? PermissionName::MIDI_SYSEX : PermissionN ame::MIDI;
51 }
52 if (name == "background-sync")
53 return PermissionName::BACKGROUND_SYNC;
54
55 ASSERT_NOT_REACHED();
56 return PermissionName::GEOLOCATION;
57 }
58
59 // Parses the raw permission dictionary and returns the PermissionType if
60 // parsing was successful. If an exception occurs, it will be stored in
61 // |exceptionState| and null will be returned. Therefore, the |exceptionState|
62 // should be checked before attempting to use the returned permission as the
63 // non-null assert will be fired otherwise.
64 Nullable<PermissionName> parsePermission(ScriptState* scriptState, const Diction ary rawPermission, ExceptionState& exceptionState)
65 { 47 {
66 PermissionDescriptor permission = NativeValueTraits<PermissionDescriptor>::n ativeValue(scriptState->isolate(), rawPermission.v8Value(), exceptionState); 48 PermissionDescriptor permission = NativeValueTraits<PermissionDescriptor>::n ativeValue(scriptState->isolate(), rawPermission.v8Value(), exceptionState);
67 49
68 if (exceptionState.hadException()) { 50 if (exceptionState.hadException()) {
69 exceptionState.throwTypeError(exceptionState.message()); 51 exceptionState.throwTypeError(exceptionState.message());
70 return Nullable<PermissionName>(); 52 return nullptr;
71 } 53 }
72 54
73 PermissionName name = getPermissionName(scriptState, rawPermission, permissi on, exceptionState); 55 const String& name = permission.name();
74 if (exceptionState.hadException()) { 56 PermissionName permissionName;
75 exceptionState.throwTypeError(exceptionState.message()); 57 if (name == "geolocation") {
76 return Nullable<PermissionName>(); 58 permissionName = PermissionName::GEOLOCATION;
77 } 59 } else if (name == "notifications") {
78 60 permissionName = PermissionName::NOTIFICATIONS;
79 // Here we reject any permissions which are not yet supported by Blink. 61 } else if (name == "push") {
80 if (name == PermissionName::PUSH_NOTIFICATIONS) {
81 PushPermissionDescriptor pushPermission = NativeValueTraits<PushPermissi onDescriptor>::nativeValue(scriptState->isolate(), rawPermission.v8Value(), exce ptionState); 62 PushPermissionDescriptor pushPermission = NativeValueTraits<PushPermissi onDescriptor>::nativeValue(scriptState->isolate(), rawPermission.v8Value(), exce ptionState);
82 if (exceptionState.hadException()) { 63 if (exceptionState.hadException()) {
83 exceptionState.throwTypeError(exceptionState.message()); 64 exceptionState.throwTypeError(exceptionState.message());
84 return Nullable<PermissionName>(); 65 return nullptr;
85 } 66 }
86 67
87 // Only "userVisibleOnly" push is supported for now. 68 // Only "userVisibleOnly" push is supported for now.
88 if (!pushPermission.userVisibleOnly()) { 69 if (!pushPermission.userVisibleOnly()) {
89 exceptionState.throwDOMException(NotSupportedError, "Push Permission without userVisibleOnly:true isn't supported yet."); 70 exceptionState.throwDOMException(NotSupportedError, "Push Permission without userVisibleOnly:true isn't supported yet.");
90 return Nullable<PermissionName>(); 71 return nullptr;
91 } 72 }
73
74 permissionName = PermissionName::PUSH_NOTIFICATIONS;
75 } else if (name == "midi") {
76 MidiPermissionDescriptor midiPermission = NativeValueTraits<MidiPermissi onDescriptor>::nativeValue(scriptState->isolate(), rawPermission.v8Value(), exce ptionState);
77 return createMidiPermissionDescriptor(midiPermission.sysex());
78 } else if (name == "background-sync") {
79 permissionName = PermissionName::BACKGROUND_SYNC;
80 } else {
81 return nullptr;
92 } 82 }
93 83
94 return Nullable<PermissionName>(name); 84 return createPermissionDescriptor(permissionName);
mlamouri (slow - plz ping) 2016/09/13 09:57:50 I find it a bit confusing that some if statements
Reilly Grant (use Gerrit) 2016/09/27 10:34:28 Done. You're right, that's cleaner.
95 } 85 }
96 86
97 } // anonymous namespace 87 } // anonymous namespace
98 88
99 // static
100 bool Permissions::connectToService(ExecutionContext* executionContext, mojom::bl ink::PermissionServiceRequest request)
101 {
102 InterfaceProvider* interfaceProvider = nullptr;
103 if (executionContext->isDocument()) {
104 Document* document = toDocument(executionContext);
105 if (document->frame())
106 interfaceProvider = document->frame()->interfaceProvider();
107 } else {
108 interfaceProvider = Platform::current()->interfaceProvider();
109 }
110
111 if (interfaceProvider)
112 interfaceProvider->getInterface(std::move(request));
113 return interfaceProvider;
114 }
115
116 ScriptPromise Permissions::query(ScriptState* scriptState, const Dictionary& raw Permission) 89 ScriptPromise Permissions::query(ScriptState* scriptState, const Dictionary& raw Permission)
117 { 90 {
118 ExceptionState exceptionState(ExceptionState::GetterContext, "query", "Perm issions", scriptState->context()->Global(), scriptState->isolate()); 91 ExceptionState exceptionState(ExceptionState::GetterContext, "query", "Perm issions", scriptState->context()->Global(), scriptState->isolate());
119 Nullable<PermissionName> name = parsePermission(scriptState, rawPermission, exceptionState); 92 auto descriptor = parsePermission(scriptState, rawPermission, exceptionState );
mlamouri (slow - plz ping) 2016/09/13 09:57:50 can you explicitly put `PermissionDescriptor` inst
Reilly Grant (use Gerrit) 2016/09/27 10:34:28 Done.
120 if (exceptionState.hadException()) 93 if (exceptionState.hadException())
121 return exceptionState.reject(scriptState); 94 return exceptionState.reject(scriptState);
122 95
123 // This must be called after `parsePermission` because the website might 96 // This must be called after `parsePermission` because the website might
124 // be able to run code. 97 // be able to run code.
125 PermissionService* service = getService(scriptState->getExecutionContext()); 98 PermissionService* service = getService(scriptState->getExecutionContext());
126 if (!service) 99 if (!service)
127 return ScriptPromise::rejectWithDOMException(scriptState, DOMException:: create(InvalidStateError, "In its current state, the global scope can't query pe rmissions.")); 100 return ScriptPromise::rejectWithDOMException(scriptState, DOMException:: create(InvalidStateError, "In its current state, the global scope can't query pe rmissions."));
128 101
129 ScriptPromiseResolver* resolver = ScriptPromiseResolver::create(scriptState) ; 102 ScriptPromiseResolver* resolver = ScriptPromiseResolver::create(scriptState) ;
130 ScriptPromise promise = resolver->promise(); 103 ScriptPromise promise = resolver->promise();
131 104
132 // If the current origin is a file scheme, it will unlikely return a 105 // If the current origin is a file scheme, it will unlikely return a
133 // meaningful value because most APIs are broken on file scheme and no 106 // meaningful value because most APIs are broken on file scheme and no
134 // permission prompt will be shown even if the returned permission will most 107 // permission prompt will be shown even if the returned permission will most
135 // likely be "prompt". 108 // likely be "prompt".
136 service->HasPermission(name.get(), scriptState->getExecutionContext()->getSe curityOrigin(), convertToBaseCallback(WTF::bind(&Permissions::taskComplete, wrap Persistent(this), wrapPersistent(resolver), name.get()))); 109 auto descriptorCopy = descriptor->Clone();
mlamouri (slow - plz ping) 2016/09/13 09:57:50 ditto and all the instances below.
Reilly Grant (use Gerrit) 2016/09/27 10:34:28 Done.
110 service->HasPermission(std::move(descriptor), scriptState->getExecutionConte xt()->getSecurityOrigin(), convertToBaseCallback(WTF::bind(&Permissions::taskCom plete, wrapPersistent(this), wrapPersistent(resolver), passed(std::move(descript orCopy)))));
137 return promise; 111 return promise;
138 } 112 }
139 113
140 ScriptPromise Permissions::request(ScriptState* scriptState, const Dictionary& r awPermission) 114 ScriptPromise Permissions::request(ScriptState* scriptState, const Dictionary& r awPermission)
141 { 115 {
142 ExceptionState exceptionState(ExceptionState::GetterContext, "request", "Pe rmissions", scriptState->context()->Global(), scriptState->isolate()); 116 ExceptionState exceptionState(ExceptionState::GetterContext, "request", "Pe rmissions", scriptState->context()->Global(), scriptState->isolate());
143 Nullable<PermissionName> name = parsePermission(scriptState, rawPermission, exceptionState); 117 auto descriptor = parsePermission(scriptState, rawPermission, exceptionState );
144 if (exceptionState.hadException()) 118 if (exceptionState.hadException())
145 return exceptionState.reject(scriptState); 119 return exceptionState.reject(scriptState);
146 120
147 // This must be called after `parsePermission` because the website might 121 // This must be called after `parsePermission` because the website might
148 // be able to run code. 122 // be able to run code.
149 PermissionService* service = getService(scriptState->getExecutionContext()); 123 PermissionService* service = getService(scriptState->getExecutionContext());
150 if (!service) 124 if (!service)
151 return ScriptPromise::rejectWithDOMException(scriptState, DOMException:: create(InvalidStateError, "In its current state, the global scope can't request permissions.")); 125 return ScriptPromise::rejectWithDOMException(scriptState, DOMException:: create(InvalidStateError, "In its current state, the global scope can't request permissions."));
152 126
153 ScriptPromiseResolver* resolver = ScriptPromiseResolver::create(scriptState) ; 127 ScriptPromiseResolver* resolver = ScriptPromiseResolver::create(scriptState) ;
154 ScriptPromise promise = resolver->promise(); 128 ScriptPromise promise = resolver->promise();
155 129
156 service->RequestPermission(name.get(), scriptState->getExecutionContext()->g etSecurityOrigin(), UserGestureIndicator::processingUserGesture(), convertToBase Callback(WTF::bind(&Permissions::taskComplete, wrapPersistent(this), wrapPersist ent(resolver), name.get()))); 130 auto descriptorCopy = descriptor->Clone();
131 service->RequestPermission(std::move(descriptor), scriptState->getExecutionC ontext()->getSecurityOrigin(), UserGestureIndicator::processingUserGesture(), co nvertToBaseCallback(WTF::bind(&Permissions::taskComplete, wrapPersistent(this), wrapPersistent(resolver), passed(std::move(descriptorCopy)))));
157 return promise; 132 return promise;
158 } 133 }
159 134
160 ScriptPromise Permissions::revoke(ScriptState* scriptState, const Dictionary& ra wPermission) 135 ScriptPromise Permissions::revoke(ScriptState* scriptState, const Dictionary& ra wPermission)
161 { 136 {
162 ExceptionState exceptionState(ExceptionState::GetterContext, "revoke", "Per missions", scriptState->context()->Global(), scriptState->isolate()); 137 ExceptionState exceptionState(ExceptionState::GetterContext, "revoke", "Per missions", scriptState->context()->Global(), scriptState->isolate());
163 Nullable<PermissionName> name = parsePermission(scriptState, rawPermission, exceptionState); 138 auto descriptor = parsePermission(scriptState, rawPermission, exceptionState );
164 if (exceptionState.hadException()) 139 if (exceptionState.hadException())
165 return exceptionState.reject(scriptState); 140 return exceptionState.reject(scriptState);
166 141
167 // This must be called after `parsePermission` because the website might 142 // This must be called after `parsePermission` because the website might
168 // be able to run code. 143 // be able to run code.
169 PermissionService* service = getService(scriptState->getExecutionContext()); 144 PermissionService* service = getService(scriptState->getExecutionContext());
170 if (!service) 145 if (!service)
171 return ScriptPromise::rejectWithDOMException(scriptState, DOMException:: create(InvalidStateError, "In its current state, the global scope can't revoke p ermissions.")); 146 return ScriptPromise::rejectWithDOMException(scriptState, DOMException:: create(InvalidStateError, "In its current state, the global scope can't revoke p ermissions."));
172 147
173 ScriptPromiseResolver* resolver = ScriptPromiseResolver::create(scriptState) ; 148 ScriptPromiseResolver* resolver = ScriptPromiseResolver::create(scriptState) ;
174 ScriptPromise promise = resolver->promise(); 149 ScriptPromise promise = resolver->promise();
175 150
176 service->RevokePermission(name.get(), scriptState->getExecutionContext()->ge tSecurityOrigin(), convertToBaseCallback(WTF::bind(&Permissions::taskComplete, w rapPersistent(this), wrapPersistent(resolver), name.get()))); 151 auto descriptorCopy = descriptor->Clone();
152 service->RevokePermission(std::move(descriptor), scriptState->getExecutionCo ntext()->getSecurityOrigin(), convertToBaseCallback(WTF::bind(&Permissions::task Complete, wrapPersistent(this), wrapPersistent(resolver), passed(std::move(descr iptorCopy)))));
177 return promise; 153 return promise;
178 } 154 }
179 155
180 ScriptPromise Permissions::requestAll(ScriptState* scriptState, const Vector<Dic tionary>& rawPermissions) 156 ScriptPromise Permissions::requestAll(ScriptState* scriptState, const Vector<Dic tionary>& rawPermissions)
181 { 157 {
182 ExceptionState exceptionState(ExceptionState::GetterContext, "request", "Pe rmissions", scriptState->context()->Global(), scriptState->isolate()); 158 ExceptionState exceptionState(ExceptionState::GetterContext, "request", "Pe rmissions", scriptState->context()->Global(), scriptState->isolate());
183 Vector<PermissionName> internalPermissions; 159 Vector<PermissionDescriptorPtr> internalPermissions;
184 Vector<int> callerIndexToInternalIndex; 160 Vector<int> callerIndexToInternalIndex;
185 callerIndexToInternalIndex.resize(rawPermissions.size()); 161 callerIndexToInternalIndex.resize(rawPermissions.size());
186 for (size_t i = 0; i < rawPermissions.size(); ++i) { 162 for (size_t i = 0; i < rawPermissions.size(); ++i) {
187 const Dictionary& rawPermission = rawPermissions[i]; 163 const Dictionary& rawPermission = rawPermissions[i];
188 164
189 Nullable<PermissionName> name = parsePermission(scriptState, rawPermissi on, exceptionState); 165 auto descriptor = parsePermission(scriptState, rawPermission, exceptionS tate);
190 if (exceptionState.hadException()) 166 if (exceptionState.hadException())
191 return exceptionState.reject(scriptState); 167 return exceptionState.reject(scriptState);
192 168
193 // Only append permissions to the vector that is passed to the client if it is not already 169 // Only append permissions types that are not already present in the vec tor.
194 // in the vector (i.e. do not duplicate permisison types). 170 int internalIndex = -1;
mlamouri (slow - plz ping) 2016/09/13 09:57:50 What about using `kNotFound`?
Reilly Grant (use Gerrit) 2016/09/27 10:34:28 I didn't know kNotFound was a common type. Neat.
195 int internalIndex; 171 for (size_t j = 0; j < internalPermissions.size(); ++j) {
196 auto it = internalPermissions.find(name.get()); 172 if (internalPermissions[j]->name == descriptor->name) {
197 if (it == kNotFound) { 173 internalIndex = j;
174 break;
175 }
176 }
177 if (internalIndex == -1) {
mlamouri (slow - plz ping) 2016/09/13 09:57:50 ... and here you can do `if (internalIndex == kNot
Reilly Grant (use Gerrit) 2016/09/27 10:34:28 Done.
198 internalIndex = internalPermissions.size(); 178 internalIndex = internalPermissions.size();
199 internalPermissions.append(name.get()); 179 internalPermissions.append(std::move(descriptor));
200 } else {
201 internalIndex = it;
202 } 180 }
203 callerIndexToInternalIndex[i] = internalIndex; 181 callerIndexToInternalIndex[i] = internalIndex;
204 } 182 }
205 183
206 // This must be called after `parsePermission` because the website might 184 // This must be called after `parsePermission` because the website might
207 // be able to run code. 185 // be able to run code.
208 PermissionService* service = getService(scriptState->getExecutionContext()); 186 PermissionService* service = getService(scriptState->getExecutionContext());
209 if (!service) 187 if (!service)
210 return ScriptPromise::rejectWithDOMException(scriptState, DOMException:: create(InvalidStateError, "In its current state, the global scope can't request permissions.")); 188 return ScriptPromise::rejectWithDOMException(scriptState, DOMException:: create(InvalidStateError, "In its current state, the global scope can't request permissions."));
211 189
212 ScriptPromiseResolver* resolver = ScriptPromiseResolver::create(scriptState) ; 190 ScriptPromiseResolver* resolver = ScriptPromiseResolver::create(scriptState) ;
213 ScriptPromise promise = resolver->promise(); 191 ScriptPromise promise = resolver->promise();
214 192
215 service->RequestPermissions(internalPermissions, scriptState->getExecutionCo ntext()->getSecurityOrigin(), UserGestureIndicator::processingUserGesture(), 193 Vector<PermissionDescriptorPtr> internalPermissionsCopy;
216 convertToBaseCallback(WTF::bind(&Permissions::batchTaskComplete, wrapPer sistent(this), wrapPersistent(resolver), internalPermissions, callerIndexToInter nalIndex))); 194 internalPermissionsCopy.reserveCapacity(internalPermissions.size());
195 for (const auto& descriptor : internalPermissions)
196 internalPermissionsCopy.append(descriptor->Clone());
197
198 service->RequestPermissions(std::move(internalPermissions), scriptState->get ExecutionContext()->getSecurityOrigin(), UserGestureIndicator::processingUserGes ture(),
199 convertToBaseCallback(WTF::bind(&Permissions::batchTaskComplete, wrapPer sistent(this), wrapPersistent(resolver), passed(std::move(internalPermissionsCop y)), passed(std::move(callerIndexToInternalIndex)))));
217 return promise; 200 return promise;
218 } 201 }
219 202
220 PermissionService* Permissions::getService(ExecutionContext* executionContext) 203 PermissionService* Permissions::getService(ExecutionContext* executionContext)
221 { 204 {
222 if (!m_service && connectToService(executionContext, mojo::GetProxy(&m_servi ce))) 205 if (!m_service && connectToPermissionService(executionContext, mojo::GetProx y(&m_service)))
223 m_service.set_connection_error_handler(convertToBaseCallback(WTF::bind(& Permissions::serviceConnectionError, wrapWeakPersistent(this)))); 206 m_service.set_connection_error_handler(convertToBaseCallback(WTF::bind(& Permissions::serviceConnectionError, wrapWeakPersistent(this))));
224 return m_service.get(); 207 return m_service.get();
225 } 208 }
226 209
227 void Permissions::serviceConnectionError() 210 void Permissions::serviceConnectionError()
228 { 211 {
229 m_service.reset(); 212 m_service.reset();
230 } 213 }
231 214
232 void Permissions::taskComplete(ScriptPromiseResolver* resolver, PermissionName n ame, mojom::blink::PermissionStatus result) 215 void Permissions::taskComplete(ScriptPromiseResolver* resolver, mojom::blink::Pe rmissionDescriptorPtr descriptor, mojom::blink::PermissionStatus result)
233 { 216 {
234 if (!resolver->getExecutionContext() || resolver->getExecutionContext()->act iveDOMObjectsAreStopped()) 217 if (!resolver->getExecutionContext() || resolver->getExecutionContext()->act iveDOMObjectsAreStopped())
235 return; 218 return;
236 resolver->resolve(PermissionStatus::take(resolver, result, name)); 219 resolver->resolve(PermissionStatus::take(resolver, result, std::move(descrip tor)));
237 } 220 }
238 221
239 void Permissions::batchTaskComplete(ScriptPromiseResolver* resolver, Vector<Perm issionName> names, Vector<int> callerIndexToInternalIndex, const Vector<mojom::b link::PermissionStatus>& results) 222 void Permissions::batchTaskComplete(ScriptPromiseResolver* resolver, Vector<mojo m::blink::PermissionDescriptorPtr> descriptors, Vector<int> callerIndexToInterna lIndex, const Vector<mojom::blink::PermissionStatus>& results)
240 { 223 {
241 if (!resolver->getExecutionContext() || resolver->getExecutionContext()->act iveDOMObjectsAreStopped()) 224 if (!resolver->getExecutionContext() || resolver->getExecutionContext()->act iveDOMObjectsAreStopped())
242 return; 225 return;
243 226
244 // Create the response vector by finding the status for each index by 227 // Create the response vector by finding the status for each index by
245 // using the caller to internal index mapping and looking up the status 228 // using the caller to internal index mapping and looking up the status
246 // using the internal index obtained. 229 // using the internal index obtained.
247 HeapVector<Member<PermissionStatus>> result; 230 HeapVector<Member<PermissionStatus>> result;
248 result.reserveInitialCapacity(callerIndexToInternalIndex.size()); 231 result.reserveInitialCapacity(callerIndexToInternalIndex.size());
249 for (int internalIndex : callerIndexToInternalIndex) 232 for (int internalIndex : callerIndexToInternalIndex)
250 result.append(PermissionStatus::createAndListen(resolver->getExecutionCo ntext(), results[internalIndex], names[internalIndex])); 233 result.append(PermissionStatus::createAndListen(resolver->getExecutionCo ntext(), results[internalIndex], descriptors[internalIndex]->Clone()));
251 resolver->resolve(result); 234 resolver->resolve(result);
252 } 235 }
253 236
254 } // namespace blink 237 } // namespace blink
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698