Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(19)

Side by Side Diff: chrome/browser/media/media_permission.cc

Issue 2307083002: Cleanup: move WebRTC related files from chrome/browser/media to chrome/browser/media/webrtc/ (Closed)
Patch Set: Removed file wrongly resuscitated during rebase Created 4 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
(Empty)
1 // Copyright 2015 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include "chrome/browser/media/media_permission.h"
6
7 #include "chrome/browser/media/media_capture_devices_dispatcher.h"
8 #include "chrome/browser/media/media_stream_device_permission_context.h"
9 #include "chrome/browser/media/media_stream_device_permissions.h"
10 #include "chrome/browser/permissions/permission_context_base.h"
11 #include "chrome/browser/permissions/permission_manager.h"
12 #include "chrome/browser/profiles/profile.h"
13 #include "chrome/common/pref_names.h"
14 #include "content/public/browser/permission_manager.h"
15 #include "content/public/browser/permission_type.h"
16 #include "content/public/common/url_constants.h"
17 #include "extensions/common/constants.h"
18
19 namespace {
20
21 content::PermissionType ContentSettingsTypeToPermission(
22 ContentSettingsType content_setting) {
23 if (content_setting == CONTENT_SETTINGS_TYPE_MEDIASTREAM_MIC) {
24 return content::PermissionType::AUDIO_CAPTURE;
25 } else {
26 DCHECK_EQ(CONTENT_SETTINGS_TYPE_MEDIASTREAM_CAMERA, content_setting);
27 return content::PermissionType::VIDEO_CAPTURE;
28 }
29 }
30
31 } // namespace
32
33 MediaPermission::MediaPermission(ContentSettingsType content_type,
34 const GURL& requesting_origin,
35 const GURL& embedding_origin,
36 Profile* profile)
37 : content_type_(content_type),
38 requesting_origin_(requesting_origin),
39 embedding_origin_(embedding_origin),
40 profile_(profile) {}
41
42 ContentSetting MediaPermission::GetPermissionStatus(
43 content::MediaStreamRequestResult* denial_reason) const {
44 // Deny the request if the security origin is empty, this happens with
45 // file access without |--allow-file-access-from-files| flag.
46 if (requesting_origin_.is_empty()) {
47 *denial_reason = content::MEDIA_DEVICE_INVALID_SECURITY_ORIGIN;
48 return CONTENT_SETTING_BLOCK;
49 }
50
51 // Use the Permission Context to find out if the kill switch is on. Set the
52 // denial reason to kill switch.
53 content::PermissionType permission_type =
54 ContentSettingsTypeToPermission(content_type_);
55 // TODO(raymes): This calls into GetPermissionContext which is a private
56 // member of PermissionManager. Remove this call when this class is refactored
57 // into a PermissionContext. See crbug.com/596786.
58 PermissionContextBase* permission_context =
59 PermissionManager::Get(profile_)->GetPermissionContext(permission_type);
60
61 if (!permission_context) {
62 *denial_reason = content::MEDIA_DEVICE_PERMISSION_DENIED;
63 return CONTENT_SETTING_BLOCK;
64 }
65
66 MediaStreamDevicePermissionContext* media_device_permission_context =
67 static_cast<MediaStreamDevicePermissionContext*>(permission_context);
68
69 if (media_device_permission_context->IsPermissionKillSwitchOn()) {
70 *denial_reason = content::MEDIA_DEVICE_KILL_SWITCH_ON;
71 return CONTENT_SETTING_BLOCK;
72 }
73
74 // Check policy and content settings.
75 ContentSetting result =
76 GetStoredContentSetting(media_device_permission_context);
77 if (result == CONTENT_SETTING_BLOCK)
78 *denial_reason = content::MEDIA_DEVICE_PERMISSION_DENIED;
79
80 return result;
81 }
82
83 ContentSetting MediaPermission::GetPermissionStatusWithDeviceRequired(
84 const std::string& device_id,
85 content::MediaStreamRequestResult* denial_reason) const {
86 // Deny the request if there is no device attached to the OS of the requested
87 // type.
88 if (!HasAvailableDevices(device_id)) {
89 *denial_reason = content::MEDIA_DEVICE_NO_HARDWARE;
90 return CONTENT_SETTING_BLOCK;
91 }
92
93 return GetPermissionStatus(denial_reason);
94 }
95
96 ContentSetting MediaPermission::GetStoredContentSetting(
97 MediaStreamDevicePermissionContext* media_device_permission_context) const {
98 return media_device_permission_context->GetPermissionStatus(
99 requesting_origin_, embedding_origin_);
100 }
101
102 bool MediaPermission::HasAvailableDevices(const std::string& device_id) const {
103 const content::MediaStreamDevices* devices = nullptr;
104 if (content_type_ == CONTENT_SETTINGS_TYPE_MEDIASTREAM_MIC) {
105 devices =
106 &MediaCaptureDevicesDispatcher::GetInstance()->GetAudioCaptureDevices();
107 } else if (content_type_ == CONTENT_SETTINGS_TYPE_MEDIASTREAM_CAMERA) {
108 devices =
109 &MediaCaptureDevicesDispatcher::GetInstance()->GetVideoCaptureDevices();
110 } else {
111 NOTREACHED();
112 }
113
114 // TODO(tommi): It's kind of strange to have this here since if we fail this
115 // test, there'll be a UI shown that indicates to the user that access to
116 // non-existing audio/video devices has been denied. The user won't have
117 // any way to change that but there will be a UI shown which indicates that
118 // access is blocked.
119 if (devices->empty())
120 return false;
121
122 // Note: we check device_id before dereferencing devices. If the requested
123 // device id is non-empty, then the corresponding device list must not be
124 // NULL.
125 if (!device_id.empty() && !devices->FindById(device_id))
126 return false;
127
128 return true;
129 }
OLDNEW
« no previous file with comments | « chrome/browser/media/media_permission.h ('k') | chrome/browser/media/media_stream_capture_indicator.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698