Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1619)

Side by Side Diff: chrome/browser/chromeos/extensions/public_session_permission_helper.cc

Issue 2552203007: Public Sessions - prompt the user for pageCapture requests (Closed)
Patch Set: Using a prompt id Created 3 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
(Empty)
1 // Copyright 2017 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include "chrome/browser/chromeos/extensions/public_session_permission_helper.h"
6
7 #include <map>
8 #include <utility>
9
10 #include "base/bind.h"
11 #include "base/bind_helpers.h"
12 #include "base/lazy_instance.h"
13 #include "base/macros.h"
14 #include "base/memory/ptr_util.h"
15 #include "content/public/browser/browser_thread.h"
16 #include "content/public/browser/web_contents.h"
17 #include "extensions/common/extension.h"
18 #include "extensions/common/permissions/api_permission_set.h"
19 #include "extensions/common/permissions/manifest_permission_set.h"
20 #include "extensions/common/permissions/permission_set.h"
21 #include "extensions/common/url_pattern_set.h"
22
23 namespace extensions {
24
25 namespace {
26
27 base::LazyInstance<std::map<ExtensionId, PublicSessionPermissionHelper>>::Leaky
28 g_helpers = LAZY_INSTANCE_INITIALIZER;
29
30 } // namespace
31
32 // static
33 void PublicSessionPermissionHelper::HandlePermissionRequest(
34 const Extension& extension,
35 PermissionHelperSet requested_permissions,
36 content::WebContents* web_contents,
37 const base::Closure& success_callback,
38 const base::Closure& failure_callback) {
39 DCHECK_CURRENTLY_ON(content::BrowserThread::UI);
40 return g_helpers.Get()[extension.id()].HandlePermissionRequestImpl(
41 extension, requested_permissions, web_contents, success_callback,
42 failure_callback);
43 }
44
45 // static
46 bool PublicSessionPermissionHelper::PermissionAllowed(
47 ExtensionId extension_id,
48 APIPermission::ID permission_id) {
49 DCHECK_CURRENTLY_ON(content::BrowserThread::UI);
50 return g_helpers.Get()[extension_id].PermissionAllowedImpl(permission_id);
51 }
52
53 PublicSessionPermissionHelper::PublicSessionPermissionHelper() {}
54
55 PublicSessionPermissionHelper::PublicSessionPermissionHelper(
56 PublicSessionPermissionHelper&& other) = default;
57
58 PublicSessionPermissionHelper::~PublicSessionPermissionHelper() {}
59
60 void PublicSessionPermissionHelper::HandlePermissionRequestImpl(
61 const Extension& extension,
62 PermissionHelperSet requested_permissions,
63 content::WebContents* web_contents,
64 const base::Closure& success_callback,
65 const base::Closure& failure_callback) {
66 CHECK(web_contents);
67
Andrew T Wilson (Slow) 2017/01/31 16:22:25 There's some subtle logic in this implementation -
Ivan Šandrk 2017/02/01 18:11:29 Currently none, I'll write one.
68 PermissionIDSet requested_permission_set;
69 for (auto permission : requested_permissions) {
70 requested_permission_set.insert(permission);
71 }
72
73 PermissionIDSet unresolved_permissions = PermissionIDSet::Difference(
74 requested_permission_set, allowed_permission_set_);
75 if (unresolved_permissions.empty()) {
76 success_callback.Run();
77 return;
78 }
79 unresolved_permissions = PermissionIDSet::Difference(
80 unresolved_permissions, denied_permission_set_);
81 if (unresolved_permissions.empty()) {
82 failure_callback.Run();
83 return;
84 }
85
86 // Since not all permissions are resolved yet, queue the callback to be called
87 // when all of them are resolved.
88 callbacks_.push_back(RequestCallback(
89 success_callback, failure_callback, requested_permissions));
90
91 PermissionIDSet unprompted_permissions = PermissionIDSet::Difference(
92 unresolved_permissions, prompted_permission_set_);
93 if (unprompted_permissions.empty())
94 return;
95
96 APIPermissionSet new_apis;
97 for (const auto& permission : unprompted_permissions) {
98 prompted_permission_set_.insert(permission.id());
99 new_apis.insert(permission.id());
100 }
101 auto permission_set = base::MakeUnique<PermissionSet>(
102 new_apis, ManifestPermissionSet(), URLPatternSet(), URLPatternSet());
103 auto prompt = base::MakeUnique<ExtensionInstallPrompt>(web_contents);
104 static int prompt_id = 0;
105 // This Unretained is safe because the lifetime of this object is until
106 // process exit.
107 prompt->ShowDialog(
108 base::Bind(&PublicSessionPermissionHelper::ResolvePermissionPrompt,
109 base::Unretained(this), prompt_id,
110 std::move(unprompted_permissions)),
111 &extension,
112 nullptr, // Use the extension icon.
113 base::MakeUnique<ExtensionInstallPrompt::Prompt>(
114 ExtensionInstallPrompt::PERMISSIONS_PROMPT),
115 std::move(permission_set),
116 ExtensionInstallPrompt::GetDefaultShowDialogCallback());
117 prompts_[prompt_id++] = std::move(prompt);
118 }
119
120 bool PublicSessionPermissionHelper::PermissionAllowedImpl(
121 APIPermission::ID permission_id) {
122 return allowed_permission_set_.ContainsID(permission_id);
123 }
124
125 void PublicSessionPermissionHelper::ResolvePermissionPrompt(
126 int prompt_id,
127 const PermissionIDSet& unprompted_permissions,
128 ExtensionInstallPrompt::Result prompt_result) {
129 // Dispose of the prompt as it's not needed anymore.
130 size_t erased = prompts_.erase(prompt_id);
131 DCHECK_EQ(1u, erased);
132
133 bool allowed = prompt_result == ExtensionInstallPrompt::Result::ACCEPTED;
134 for (const auto& permission : unprompted_permissions) {
135 prompted_permission_set_.erase(permission.id());
136 if (allowed)
137 allowed_permission_set_.insert(permission.id());
138 else
139 denied_permission_set_.insert(permission.id());
140 }
141
142 for (auto callback = callbacks_.begin(); callback != callbacks_.end(); ) {
143 if (prompted_permission_set_.ContainsAnyID(callback->permission_list)) {
144 // The request is still waiting on other permissions to be resolved - wait
145 // until all of them are resolved before calling the callback.
146 callback++;
147 continue;
148 }
149 if (denied_permission_set_.ContainsAnyID(callback->permission_list))
150 callback->failure_callback.Run();
151 else
152 callback->success_callback.Run();
153 callback = callbacks_.erase(callback);
Andrew T Wilson (Slow) 2017/01/31 16:22:25 What happens if in the callback, the callback invo
Ivan Šandrk 2017/02/01 18:11:29 Very good point, it can possibly result in a crash
Andrew T Wilson (Slow) 2017/02/03 07:38:38 BTW, the canonical way to do this is not to add do
154 }
155 }
156
157 PublicSessionPermissionHelper::RequestCallback::RequestCallback(
158 const base::Closure& success_callback,
159 const base::Closure& failure_callback,
160 const PermissionHelperSet& permission_list)
161 : success_callback(success_callback),
162 failure_callback(failure_callback),
163 permission_list(permission_list) {}
164
165 PublicSessionPermissionHelper::RequestCallback::RequestCallback(
166 const RequestCallback& other) = default;
167
168 PublicSessionPermissionHelper::RequestCallback::~RequestCallback() {}
169
170 } // namespace extensions
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698