| OLD | NEW |
| (Empty) |
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "chrome/browser/guest_view/web_view/web_view_permission_helper.h" | |
| 6 | |
| 7 #include "chrome/browser/guest_view/web_view/chrome_web_view_permission_helper_d
elegate.h" | |
| 8 #include "chrome/browser/guest_view/web_view/web_view_constants.h" | |
| 9 #include "chrome/browser/guest_view/web_view/web_view_guest.h" | |
| 10 #include "chrome/browser/guest_view/web_view/web_view_permission_types.h" | |
| 11 #include "content/public/browser/render_process_host.h" | |
| 12 #include "content/public/browser/render_view_host.h" | |
| 13 #include "content/public/browser/user_metrics.h" | |
| 14 #include "extensions/browser/guest_view/web_view/web_view_permission_helper_dele
gate.h" | |
| 15 | |
| 16 using content::BrowserPluginGuestDelegate; | |
| 17 using content::RenderViewHost; | |
| 18 | |
| 19 namespace extensions { | |
| 20 | |
| 21 namespace { | |
| 22 static std::string PermissionTypeToString(WebViewPermissionType type) { | |
| 23 switch (type) { | |
| 24 case WEB_VIEW_PERMISSION_TYPE_DOWNLOAD: | |
| 25 return webview::kPermissionTypeDownload; | |
| 26 case WEB_VIEW_PERMISSION_TYPE_FILESYSTEM: | |
| 27 return webview::kPermissionTypeFileSystem; | |
| 28 case WEB_VIEW_PERMISSION_TYPE_GEOLOCATION: | |
| 29 return webview::kPermissionTypeGeolocation; | |
| 30 case WEB_VIEW_PERMISSION_TYPE_JAVASCRIPT_DIALOG: | |
| 31 return webview::kPermissionTypeDialog; | |
| 32 case WEB_VIEW_PERMISSION_TYPE_LOAD_PLUGIN: | |
| 33 return webview::kPermissionTypeLoadPlugin; | |
| 34 case WEB_VIEW_PERMISSION_TYPE_MEDIA: | |
| 35 return webview::kPermissionTypeMedia; | |
| 36 case WEB_VIEW_PERMISSION_TYPE_NEW_WINDOW: | |
| 37 return webview::kPermissionTypeNewWindow; | |
| 38 case WEB_VIEW_PERMISSION_TYPE_POINTER_LOCK: | |
| 39 return webview::kPermissionTypePointerLock; | |
| 40 default: | |
| 41 NOTREACHED(); | |
| 42 return std::string(); | |
| 43 } | |
| 44 } | |
| 45 | |
| 46 // static | |
| 47 void RecordUserInitiatedUMA( | |
| 48 const WebViewPermissionHelper::PermissionResponseInfo& info, | |
| 49 bool allow) { | |
| 50 if (allow) { | |
| 51 // Note that |allow| == true means the embedder explicitly allowed the | |
| 52 // request. For some requests they might still fail. An example of such | |
| 53 // scenario would be: an embedder allows geolocation request but doesn't | |
| 54 // have geolocation access on its own. | |
| 55 switch (info.permission_type) { | |
| 56 case WEB_VIEW_PERMISSION_TYPE_DOWNLOAD: | |
| 57 content::RecordAction( | |
| 58 UserMetricsAction("WebView.PermissionAllow.Download")); | |
| 59 break; | |
| 60 case WEB_VIEW_PERMISSION_TYPE_FILESYSTEM: | |
| 61 content::RecordAction( | |
| 62 UserMetricsAction("WebView.PermissionAllow.FileSystem")); | |
| 63 break; | |
| 64 case WEB_VIEW_PERMISSION_TYPE_GEOLOCATION: | |
| 65 content::RecordAction( | |
| 66 UserMetricsAction("WebView.PermissionAllow.Geolocation")); | |
| 67 break; | |
| 68 case WEB_VIEW_PERMISSION_TYPE_JAVASCRIPT_DIALOG: | |
| 69 content::RecordAction( | |
| 70 UserMetricsAction("WebView.PermissionAllow.JSDialog")); | |
| 71 break; | |
| 72 case WEB_VIEW_PERMISSION_TYPE_LOAD_PLUGIN: | |
| 73 content::RecordAction( | |
| 74 UserMetricsAction("WebView.Guest.PermissionAllow.PluginLoad")); | |
| 75 case WEB_VIEW_PERMISSION_TYPE_MEDIA: | |
| 76 content::RecordAction( | |
| 77 UserMetricsAction("WebView.PermissionAllow.Media")); | |
| 78 break; | |
| 79 case WEB_VIEW_PERMISSION_TYPE_NEW_WINDOW: | |
| 80 content::RecordAction( | |
| 81 UserMetricsAction("BrowserPlugin.PermissionAllow.NewWindow")); | |
| 82 break; | |
| 83 case WEB_VIEW_PERMISSION_TYPE_POINTER_LOCK: | |
| 84 content::RecordAction( | |
| 85 UserMetricsAction("WebView.PermissionAllow.PointerLock")); | |
| 86 break; | |
| 87 default: | |
| 88 break; | |
| 89 } | |
| 90 } else { | |
| 91 switch (info.permission_type) { | |
| 92 case WEB_VIEW_PERMISSION_TYPE_DOWNLOAD: | |
| 93 content::RecordAction( | |
| 94 UserMetricsAction("WebView.PermissionDeny.Download")); | |
| 95 break; | |
| 96 case WEB_VIEW_PERMISSION_TYPE_FILESYSTEM: | |
| 97 content::RecordAction( | |
| 98 UserMetricsAction("WebView.PermissionDeny.FileSystem")); | |
| 99 break; | |
| 100 case WEB_VIEW_PERMISSION_TYPE_GEOLOCATION: | |
| 101 content::RecordAction( | |
| 102 UserMetricsAction("WebView.PermissionDeny.Geolocation")); | |
| 103 break; | |
| 104 case WEB_VIEW_PERMISSION_TYPE_JAVASCRIPT_DIALOG: | |
| 105 content::RecordAction( | |
| 106 UserMetricsAction("WebView.PermissionDeny.JSDialog")); | |
| 107 break; | |
| 108 case WEB_VIEW_PERMISSION_TYPE_LOAD_PLUGIN: | |
| 109 content::RecordAction( | |
| 110 UserMetricsAction("WebView.Guest.PermissionDeny.PluginLoad")); | |
| 111 break; | |
| 112 case WEB_VIEW_PERMISSION_TYPE_MEDIA: | |
| 113 content::RecordAction( | |
| 114 UserMetricsAction("WebView.PermissionDeny.Media")); | |
| 115 break; | |
| 116 case WEB_VIEW_PERMISSION_TYPE_NEW_WINDOW: | |
| 117 content::RecordAction( | |
| 118 UserMetricsAction("BrowserPlugin.PermissionDeny.NewWindow")); | |
| 119 break; | |
| 120 case WEB_VIEW_PERMISSION_TYPE_POINTER_LOCK: | |
| 121 content::RecordAction( | |
| 122 UserMetricsAction("WebView.PermissionDeny.PointerLock")); | |
| 123 break; | |
| 124 default: | |
| 125 break; | |
| 126 } | |
| 127 } | |
| 128 } | |
| 129 | |
| 130 } // namespace | |
| 131 | |
| 132 WebViewPermissionHelper::WebViewPermissionHelper(WebViewGuest* web_view_guest) | |
| 133 : content::WebContentsObserver(web_view_guest->guest_web_contents()), | |
| 134 next_permission_request_id_(guestview::kInstanceIDNone), | |
| 135 web_view_guest_(web_view_guest), | |
| 136 weak_factory_(this) { | |
| 137 // TODO(hanxi) : Create the delegate through ExtensionsAPIClient after | |
| 138 // moving WebViewPermissionHelper to extensions. | |
| 139 web_view_permission_helper_delegate_.reset( | |
| 140 new ChromeWebViewPermissionHelperDelegate(this)); | |
| 141 } | |
| 142 | |
| 143 WebViewPermissionHelper::~WebViewPermissionHelper() { | |
| 144 } | |
| 145 | |
| 146 // static | |
| 147 WebViewPermissionHelper* WebViewPermissionHelper::FromFrameID( | |
| 148 int render_process_id, | |
| 149 int render_frame_id) { | |
| 150 WebViewGuest* web_view_guest = WebViewGuest::FromFrameID( | |
| 151 render_process_id, render_frame_id); | |
| 152 if (!web_view_guest) { | |
| 153 return NULL; | |
| 154 } | |
| 155 return web_view_guest->web_view_permission_helper_.get(); | |
| 156 } | |
| 157 | |
| 158 // static | |
| 159 WebViewPermissionHelper* WebViewPermissionHelper::FromWebContents( | |
| 160 content::WebContents* web_contents) { | |
| 161 WebViewGuest* web_view_guest = WebViewGuest::FromWebContents(web_contents); | |
| 162 if (!web_view_guest) | |
| 163 return NULL; | |
| 164 return web_view_guest->web_view_permission_helper_.get(); | |
| 165 } | |
| 166 | |
| 167 #if defined(ENABLE_PLUGINS) | |
| 168 bool WebViewPermissionHelper::OnMessageReceived( | |
| 169 const IPC::Message& message, | |
| 170 content::RenderFrameHost* render_frame_host) { | |
| 171 return web_view_permission_helper_delegate_->OnMessageReceived( | |
| 172 message, render_frame_host); | |
| 173 } | |
| 174 | |
| 175 bool WebViewPermissionHelper::OnMessageReceived(const IPC::Message& message) { | |
| 176 return web_view_permission_helper_delegate_->OnMessageReceived(message); | |
| 177 } | |
| 178 #endif // defined(ENABLE_PLUGINS) | |
| 179 | |
| 180 void WebViewPermissionHelper::RequestMediaAccessPermission( | |
| 181 content::WebContents* source, | |
| 182 const content::MediaStreamRequest& request, | |
| 183 const content::MediaResponseCallback& callback) { | |
| 184 web_view_permission_helper_delegate_-> RequestMediaAccessPermission( | |
| 185 source, request, callback); | |
| 186 } | |
| 187 | |
| 188 void WebViewPermissionHelper::CanDownload( | |
| 189 content::RenderViewHost* render_view_host, | |
| 190 const GURL& url, | |
| 191 const std::string& request_method, | |
| 192 const base::Callback<void(bool)>& callback) { | |
| 193 web_view_permission_helper_delegate_->CanDownload( | |
| 194 render_view_host, url, request_method, callback); | |
| 195 } | |
| 196 | |
| 197 void WebViewPermissionHelper::RequestPointerLockPermission( | |
| 198 bool user_gesture, | |
| 199 bool last_unlocked_by_target, | |
| 200 const base::Callback<void(bool)>& callback) { | |
| 201 web_view_permission_helper_delegate_->RequestPointerLockPermission( | |
| 202 user_gesture, last_unlocked_by_target, callback); | |
| 203 } | |
| 204 | |
| 205 void WebViewPermissionHelper::RequestGeolocationPermission( | |
| 206 int bridge_id, | |
| 207 const GURL& requesting_frame, | |
| 208 bool user_gesture, | |
| 209 const base::Callback<void(bool)>& callback) { | |
| 210 web_view_permission_helper_delegate_->RequestGeolocationPermission( | |
| 211 bridge_id, requesting_frame, user_gesture, callback); | |
| 212 } | |
| 213 | |
| 214 void WebViewPermissionHelper::CancelGeolocationPermissionRequest( | |
| 215 int bridge_id) { | |
| 216 web_view_permission_helper_delegate_->CancelGeolocationPermissionRequest( | |
| 217 bridge_id); | |
| 218 } | |
| 219 | |
| 220 void WebViewPermissionHelper::RequestFileSystemPermission( | |
| 221 const GURL& url, | |
| 222 bool allowed_by_default, | |
| 223 const base::Callback<void(bool)>& callback) { | |
| 224 web_view_permission_helper_delegate_->RequestFileSystemPermission( | |
| 225 url, allowed_by_default, callback); | |
| 226 } | |
| 227 | |
| 228 void WebViewPermissionHelper::FileSystemAccessedAsync(int render_process_id, | |
| 229 int render_frame_id, | |
| 230 int request_id, | |
| 231 const GURL& url, | |
| 232 bool blocked_by_policy) { | |
| 233 web_view_permission_helper_delegate_->FileSystemAccessedAsync( | |
| 234 render_process_id, render_frame_id, request_id, url, blocked_by_policy); | |
| 235 } | |
| 236 | |
| 237 void WebViewPermissionHelper::FileSystemAccessedSync(int render_process_id, | |
| 238 int render_frame_id, | |
| 239 const GURL& url, | |
| 240 bool blocked_by_policy, | |
| 241 IPC::Message* reply_msg) { | |
| 242 web_view_permission_helper_delegate_->FileSystemAccessedSync( | |
| 243 render_process_id, render_frame_id, url, blocked_by_policy, reply_msg); | |
| 244 } | |
| 245 | |
| 246 int WebViewPermissionHelper::RequestPermission( | |
| 247 WebViewPermissionType permission_type, | |
| 248 const base::DictionaryValue& request_info, | |
| 249 const PermissionResponseCallback& callback, | |
| 250 bool allowed_by_default) { | |
| 251 // If there are too many pending permission requests then reject this request. | |
| 252 if (pending_permission_requests_.size() >= | |
| 253 webview::kMaxOutstandingPermissionRequests) { | |
| 254 // Let the stack unwind before we deny the permission request so that | |
| 255 // objects held by the permission request are not destroyed immediately | |
| 256 // after creation. This is to allow those same objects to be accessed again | |
| 257 // in the same scope without fear of use after freeing. | |
| 258 base::MessageLoop::current()->PostTask( | |
| 259 FROM_HERE, | |
| 260 base::Bind(&PermissionResponseCallback::Run, | |
| 261 base::Owned(new PermissionResponseCallback(callback)), | |
| 262 allowed_by_default, | |
| 263 std::string())); | |
| 264 return webview::kInvalidPermissionRequestID; | |
| 265 } | |
| 266 | |
| 267 int request_id = next_permission_request_id_++; | |
| 268 pending_permission_requests_[request_id] = | |
| 269 PermissionResponseInfo(callback, permission_type, allowed_by_default); | |
| 270 scoped_ptr<base::DictionaryValue> args(request_info.DeepCopy()); | |
| 271 args->SetInteger(webview::kRequestId, request_id); | |
| 272 switch (permission_type) { | |
| 273 case WEB_VIEW_PERMISSION_TYPE_NEW_WINDOW: { | |
| 274 web_view_guest_->DispatchEventToEmbedder( | |
| 275 new GuestViewBase::Event(webview::kEventNewWindow, args.Pass())); | |
| 276 break; | |
| 277 } | |
| 278 case WEB_VIEW_PERMISSION_TYPE_JAVASCRIPT_DIALOG: { | |
| 279 web_view_guest_->DispatchEventToEmbedder( | |
| 280 new GuestViewBase::Event(webview::kEventDialog, args.Pass())); | |
| 281 break; | |
| 282 } | |
| 283 default: { | |
| 284 args->SetString(webview::kPermission, | |
| 285 PermissionTypeToString(permission_type)); | |
| 286 web_view_guest_->DispatchEventToEmbedder(new GuestViewBase::Event( | |
| 287 webview::kEventPermissionRequest, | |
| 288 args.Pass())); | |
| 289 break; | |
| 290 } | |
| 291 } | |
| 292 return request_id; | |
| 293 } | |
| 294 | |
| 295 WebViewPermissionHelper::SetPermissionResult | |
| 296 WebViewPermissionHelper::SetPermission( | |
| 297 int request_id, | |
| 298 PermissionResponseAction action, | |
| 299 const std::string& user_input) { | |
| 300 RequestMap::iterator request_itr = | |
| 301 pending_permission_requests_.find(request_id); | |
| 302 | |
| 303 if (request_itr == pending_permission_requests_.end()) | |
| 304 return SET_PERMISSION_INVALID; | |
| 305 | |
| 306 const PermissionResponseInfo& info = request_itr->second; | |
| 307 bool allow = (action == ALLOW) || | |
| 308 ((action == DEFAULT) && info.allowed_by_default); | |
| 309 | |
| 310 info.callback.Run(allow, user_input); | |
| 311 | |
| 312 // Only record user initiated (i.e. non-default) actions. | |
| 313 if (action != DEFAULT) | |
| 314 RecordUserInitiatedUMA(info, allow); | |
| 315 | |
| 316 pending_permission_requests_.erase(request_itr); | |
| 317 | |
| 318 return allow ? SET_PERMISSION_ALLOWED : SET_PERMISSION_DENIED; | |
| 319 } | |
| 320 | |
| 321 void WebViewPermissionHelper::CancelPendingPermissionRequest(int request_id) { | |
| 322 RequestMap::iterator request_itr = | |
| 323 pending_permission_requests_.find(request_id); | |
| 324 | |
| 325 if (request_itr == pending_permission_requests_.end()) | |
| 326 return; | |
| 327 | |
| 328 pending_permission_requests_.erase(request_itr); | |
| 329 } | |
| 330 | |
| 331 WebViewPermissionHelper::PermissionResponseInfo::PermissionResponseInfo() | |
| 332 : permission_type(WEB_VIEW_PERMISSION_TYPE_UNKNOWN), | |
| 333 allowed_by_default(false) { | |
| 334 } | |
| 335 | |
| 336 WebViewPermissionHelper::PermissionResponseInfo::PermissionResponseInfo( | |
| 337 const PermissionResponseCallback& callback, | |
| 338 WebViewPermissionType permission_type, | |
| 339 bool allowed_by_default) | |
| 340 : callback(callback), | |
| 341 permission_type(permission_type), | |
| 342 allowed_by_default(allowed_by_default) { | |
| 343 } | |
| 344 | |
| 345 WebViewPermissionHelper::PermissionResponseInfo::~PermissionResponseInfo() { | |
| 346 } | |
| 347 | |
| 348 } // namespace extensions | |
| OLD | NEW |