OLD | NEW |
(Empty) | |
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. |
| 4 |
| 5 #include "chrome/browser/guest_view/web_view/web_view_permission_helper.h" |
| 6 |
| 7 #include "chrome/browser/guest_view/web_view/chrome_web_view_permission_helper_d
elegate.h" |
| 8 #include "chrome/browser/guest_view/web_view/web_view_constants.h" |
| 9 #include "chrome/browser/guest_view/web_view/web_view_guest.h" |
| 10 #include "chrome/browser/guest_view/web_view/web_view_permission_types.h" |
| 11 #include "content/public/browser/render_process_host.h" |
| 12 #include "content/public/browser/render_view_host.h" |
| 13 #include "content/public/browser/user_metrics.h" |
| 14 #include "extensions/browser/guest_view/web_view/web_view_permission_helper_dele
gate.h" |
| 15 |
| 16 using content::BrowserPluginGuestDelegate; |
| 17 using content::RenderViewHost; |
| 18 |
| 19 namespace extensions { |
| 20 |
| 21 namespace { |
| 22 static std::string PermissionTypeToString(WebViewPermissionType type) { |
| 23 switch (type) { |
| 24 case WEB_VIEW_PERMISSION_TYPE_DOWNLOAD: |
| 25 return webview::kPermissionTypeDownload; |
| 26 case WEB_VIEW_PERMISSION_TYPE_FILESYSTEM: |
| 27 return webview::kPermissionTypeFileSystem; |
| 28 case WEB_VIEW_PERMISSION_TYPE_GEOLOCATION: |
| 29 return webview::kPermissionTypeGeolocation; |
| 30 case WEB_VIEW_PERMISSION_TYPE_JAVASCRIPT_DIALOG: |
| 31 return webview::kPermissionTypeDialog; |
| 32 case WEB_VIEW_PERMISSION_TYPE_LOAD_PLUGIN: |
| 33 return webview::kPermissionTypeLoadPlugin; |
| 34 case WEB_VIEW_PERMISSION_TYPE_MEDIA: |
| 35 return webview::kPermissionTypeMedia; |
| 36 case WEB_VIEW_PERMISSION_TYPE_NEW_WINDOW: |
| 37 return webview::kPermissionTypeNewWindow; |
| 38 case WEB_VIEW_PERMISSION_TYPE_POINTER_LOCK: |
| 39 return webview::kPermissionTypePointerLock; |
| 40 default: |
| 41 NOTREACHED(); |
| 42 return std::string(); |
| 43 } |
| 44 } |
| 45 |
| 46 // static |
| 47 void RecordUserInitiatedUMA( |
| 48 const WebViewPermissionHelper::PermissionResponseInfo& info, |
| 49 bool allow) { |
| 50 if (allow) { |
| 51 // Note that |allow| == true means the embedder explicitly allowed the |
| 52 // request. For some requests they might still fail. An example of such |
| 53 // scenario would be: an embedder allows geolocation request but doesn't |
| 54 // have geolocation access on its own. |
| 55 switch (info.permission_type) { |
| 56 case WEB_VIEW_PERMISSION_TYPE_DOWNLOAD: |
| 57 content::RecordAction( |
| 58 UserMetricsAction("WebView.PermissionAllow.Download")); |
| 59 break; |
| 60 case WEB_VIEW_PERMISSION_TYPE_FILESYSTEM: |
| 61 content::RecordAction( |
| 62 UserMetricsAction("WebView.PermissionAllow.FileSystem")); |
| 63 break; |
| 64 case WEB_VIEW_PERMISSION_TYPE_GEOLOCATION: |
| 65 content::RecordAction( |
| 66 UserMetricsAction("WebView.PermissionAllow.Geolocation")); |
| 67 break; |
| 68 case WEB_VIEW_PERMISSION_TYPE_JAVASCRIPT_DIALOG: |
| 69 content::RecordAction( |
| 70 UserMetricsAction("WebView.PermissionAllow.JSDialog")); |
| 71 break; |
| 72 case WEB_VIEW_PERMISSION_TYPE_LOAD_PLUGIN: |
| 73 content::RecordAction( |
| 74 UserMetricsAction("WebView.Guest.PermissionAllow.PluginLoad")); |
| 75 case WEB_VIEW_PERMISSION_TYPE_MEDIA: |
| 76 content::RecordAction( |
| 77 UserMetricsAction("WebView.PermissionAllow.Media")); |
| 78 break; |
| 79 case WEB_VIEW_PERMISSION_TYPE_NEW_WINDOW: |
| 80 content::RecordAction( |
| 81 UserMetricsAction("BrowserPlugin.PermissionAllow.NewWindow")); |
| 82 break; |
| 83 case WEB_VIEW_PERMISSION_TYPE_POINTER_LOCK: |
| 84 content::RecordAction( |
| 85 UserMetricsAction("WebView.PermissionAllow.PointerLock")); |
| 86 break; |
| 87 default: |
| 88 break; |
| 89 } |
| 90 } else { |
| 91 switch (info.permission_type) { |
| 92 case WEB_VIEW_PERMISSION_TYPE_DOWNLOAD: |
| 93 content::RecordAction( |
| 94 UserMetricsAction("WebView.PermissionDeny.Download")); |
| 95 break; |
| 96 case WEB_VIEW_PERMISSION_TYPE_FILESYSTEM: |
| 97 content::RecordAction( |
| 98 UserMetricsAction("WebView.PermissionDeny.FileSystem")); |
| 99 break; |
| 100 case WEB_VIEW_PERMISSION_TYPE_GEOLOCATION: |
| 101 content::RecordAction( |
| 102 UserMetricsAction("WebView.PermissionDeny.Geolocation")); |
| 103 break; |
| 104 case WEB_VIEW_PERMISSION_TYPE_JAVASCRIPT_DIALOG: |
| 105 content::RecordAction( |
| 106 UserMetricsAction("WebView.PermissionDeny.JSDialog")); |
| 107 break; |
| 108 case WEB_VIEW_PERMISSION_TYPE_LOAD_PLUGIN: |
| 109 content::RecordAction( |
| 110 UserMetricsAction("WebView.Guest.PermissionDeny.PluginLoad")); |
| 111 break; |
| 112 case WEB_VIEW_PERMISSION_TYPE_MEDIA: |
| 113 content::RecordAction( |
| 114 UserMetricsAction("WebView.PermissionDeny.Media")); |
| 115 break; |
| 116 case WEB_VIEW_PERMISSION_TYPE_NEW_WINDOW: |
| 117 content::RecordAction( |
| 118 UserMetricsAction("BrowserPlugin.PermissionDeny.NewWindow")); |
| 119 break; |
| 120 case WEB_VIEW_PERMISSION_TYPE_POINTER_LOCK: |
| 121 content::RecordAction( |
| 122 UserMetricsAction("WebView.PermissionDeny.PointerLock")); |
| 123 break; |
| 124 default: |
| 125 break; |
| 126 } |
| 127 } |
| 128 } |
| 129 |
| 130 } // namespace |
| 131 |
| 132 WebViewPermissionHelper::WebViewPermissionHelper(WebViewGuest* web_view_guest) |
| 133 : content::WebContentsObserver(web_view_guest->guest_web_contents()), |
| 134 next_permission_request_id_(guestview::kInstanceIDNone), |
| 135 web_view_guest_(web_view_guest), |
| 136 weak_factory_(this) { |
| 137 // TODO(hanxi) : Create the delegate through ExtensionsAPIClient after |
| 138 // moving WebViewPermissionHelper to extensions. |
| 139 web_view_permission_helper_delegate_.reset( |
| 140 new ChromeWebViewPermissionHelperDelegate(this)); |
| 141 } |
| 142 |
| 143 WebViewPermissionHelper::~WebViewPermissionHelper() { |
| 144 } |
| 145 |
| 146 // static |
| 147 WebViewPermissionHelper* WebViewPermissionHelper::FromFrameID( |
| 148 int render_process_id, |
| 149 int render_frame_id) { |
| 150 WebViewGuest* web_view_guest = WebViewGuest::FromFrameID( |
| 151 render_process_id, render_frame_id); |
| 152 if (!web_view_guest) { |
| 153 return NULL; |
| 154 } |
| 155 return web_view_guest->web_view_permission_helper_.get(); |
| 156 } |
| 157 |
| 158 // static |
| 159 WebViewPermissionHelper* WebViewPermissionHelper::FromWebContents( |
| 160 content::WebContents* web_contents) { |
| 161 WebViewGuest* web_view_guest = WebViewGuest::FromWebContents(web_contents); |
| 162 if (!web_view_guest) |
| 163 return NULL; |
| 164 return web_view_guest->web_view_permission_helper_.get(); |
| 165 } |
| 166 |
| 167 #if defined(ENABLE_PLUGINS) |
| 168 bool WebViewPermissionHelper::OnMessageReceived( |
| 169 const IPC::Message& message, |
| 170 content::RenderFrameHost* render_frame_host) { |
| 171 return web_view_permission_helper_delegate_->OnMessageReceived( |
| 172 message, render_frame_host); |
| 173 } |
| 174 |
| 175 bool WebViewPermissionHelper::OnMessageReceived(const IPC::Message& message) { |
| 176 return web_view_permission_helper_delegate_->OnMessageReceived(message); |
| 177 } |
| 178 #endif // defined(ENABLE_PLUGINS) |
| 179 |
| 180 void WebViewPermissionHelper::RequestMediaAccessPermission( |
| 181 content::WebContents* source, |
| 182 const content::MediaStreamRequest& request, |
| 183 const content::MediaResponseCallback& callback) { |
| 184 web_view_permission_helper_delegate_-> RequestMediaAccessPermission( |
| 185 source, request, callback); |
| 186 } |
| 187 |
| 188 void WebViewPermissionHelper::CanDownload( |
| 189 content::RenderViewHost* render_view_host, |
| 190 const GURL& url, |
| 191 const std::string& request_method, |
| 192 const base::Callback<void(bool)>& callback) { |
| 193 web_view_permission_helper_delegate_->CanDownload( |
| 194 render_view_host, url, request_method, callback); |
| 195 } |
| 196 |
| 197 void WebViewPermissionHelper::RequestPointerLockPermission( |
| 198 bool user_gesture, |
| 199 bool last_unlocked_by_target, |
| 200 const base::Callback<void(bool)>& callback) { |
| 201 web_view_permission_helper_delegate_->RequestPointerLockPermission( |
| 202 user_gesture, last_unlocked_by_target, callback); |
| 203 } |
| 204 |
| 205 void WebViewPermissionHelper::RequestGeolocationPermission( |
| 206 int bridge_id, |
| 207 const GURL& requesting_frame, |
| 208 bool user_gesture, |
| 209 const base::Callback<void(bool)>& callback) { |
| 210 web_view_permission_helper_delegate_->RequestGeolocationPermission( |
| 211 bridge_id, requesting_frame, user_gesture, callback); |
| 212 } |
| 213 |
| 214 void WebViewPermissionHelper::CancelGeolocationPermissionRequest( |
| 215 int bridge_id) { |
| 216 web_view_permission_helper_delegate_->CancelGeolocationPermissionRequest( |
| 217 bridge_id); |
| 218 } |
| 219 |
| 220 void WebViewPermissionHelper::RequestFileSystemPermission( |
| 221 const GURL& url, |
| 222 bool allowed_by_default, |
| 223 const base::Callback<void(bool)>& callback) { |
| 224 web_view_permission_helper_delegate_->RequestFileSystemPermission( |
| 225 url, allowed_by_default, callback); |
| 226 } |
| 227 |
| 228 void WebViewPermissionHelper::FileSystemAccessedAsync(int render_process_id, |
| 229 int render_frame_id, |
| 230 int request_id, |
| 231 const GURL& url, |
| 232 bool blocked_by_policy) { |
| 233 web_view_permission_helper_delegate_->FileSystemAccessedAsync( |
| 234 render_process_id, render_frame_id, request_id, url, blocked_by_policy); |
| 235 } |
| 236 |
| 237 void WebViewPermissionHelper::FileSystemAccessedSync(int render_process_id, |
| 238 int render_frame_id, |
| 239 const GURL& url, |
| 240 bool blocked_by_policy, |
| 241 IPC::Message* reply_msg) { |
| 242 web_view_permission_helper_delegate_->FileSystemAccessedSync( |
| 243 render_process_id, render_frame_id, url, blocked_by_policy, reply_msg); |
| 244 } |
| 245 |
| 246 int WebViewPermissionHelper::RequestPermission( |
| 247 WebViewPermissionType permission_type, |
| 248 const base::DictionaryValue& request_info, |
| 249 const PermissionResponseCallback& callback, |
| 250 bool allowed_by_default) { |
| 251 // If there are too many pending permission requests then reject this request. |
| 252 if (pending_permission_requests_.size() >= |
| 253 webview::kMaxOutstandingPermissionRequests) { |
| 254 // Let the stack unwind before we deny the permission request so that |
| 255 // objects held by the permission request are not destroyed immediately |
| 256 // after creation. This is to allow those same objects to be accessed again |
| 257 // in the same scope without fear of use after freeing. |
| 258 base::MessageLoop::current()->PostTask( |
| 259 FROM_HERE, |
| 260 base::Bind(&PermissionResponseCallback::Run, |
| 261 base::Owned(new PermissionResponseCallback(callback)), |
| 262 allowed_by_default, |
| 263 std::string())); |
| 264 return webview::kInvalidPermissionRequestID; |
| 265 } |
| 266 |
| 267 int request_id = next_permission_request_id_++; |
| 268 pending_permission_requests_[request_id] = |
| 269 PermissionResponseInfo(callback, permission_type, allowed_by_default); |
| 270 scoped_ptr<base::DictionaryValue> args(request_info.DeepCopy()); |
| 271 args->SetInteger(webview::kRequestId, request_id); |
| 272 switch (permission_type) { |
| 273 case WEB_VIEW_PERMISSION_TYPE_NEW_WINDOW: { |
| 274 web_view_guest_->DispatchEventToEmbedder( |
| 275 new GuestViewBase::Event(webview::kEventNewWindow, args.Pass())); |
| 276 break; |
| 277 } |
| 278 case WEB_VIEW_PERMISSION_TYPE_JAVASCRIPT_DIALOG: { |
| 279 web_view_guest_->DispatchEventToEmbedder( |
| 280 new GuestViewBase::Event(webview::kEventDialog, args.Pass())); |
| 281 break; |
| 282 } |
| 283 default: { |
| 284 args->SetString(webview::kPermission, |
| 285 PermissionTypeToString(permission_type)); |
| 286 web_view_guest_->DispatchEventToEmbedder(new GuestViewBase::Event( |
| 287 webview::kEventPermissionRequest, |
| 288 args.Pass())); |
| 289 break; |
| 290 } |
| 291 } |
| 292 return request_id; |
| 293 } |
| 294 |
| 295 WebViewPermissionHelper::SetPermissionResult |
| 296 WebViewPermissionHelper::SetPermission( |
| 297 int request_id, |
| 298 PermissionResponseAction action, |
| 299 const std::string& user_input) { |
| 300 RequestMap::iterator request_itr = |
| 301 pending_permission_requests_.find(request_id); |
| 302 |
| 303 if (request_itr == pending_permission_requests_.end()) |
| 304 return SET_PERMISSION_INVALID; |
| 305 |
| 306 const PermissionResponseInfo& info = request_itr->second; |
| 307 bool allow = (action == ALLOW) || |
| 308 ((action == DEFAULT) && info.allowed_by_default); |
| 309 |
| 310 info.callback.Run(allow, user_input); |
| 311 |
| 312 // Only record user initiated (i.e. non-default) actions. |
| 313 if (action != DEFAULT) |
| 314 RecordUserInitiatedUMA(info, allow); |
| 315 |
| 316 pending_permission_requests_.erase(request_itr); |
| 317 |
| 318 return allow ? SET_PERMISSION_ALLOWED : SET_PERMISSION_DENIED; |
| 319 } |
| 320 |
| 321 void WebViewPermissionHelper::CancelPendingPermissionRequest(int request_id) { |
| 322 RequestMap::iterator request_itr = |
| 323 pending_permission_requests_.find(request_id); |
| 324 |
| 325 if (request_itr == pending_permission_requests_.end()) |
| 326 return; |
| 327 |
| 328 pending_permission_requests_.erase(request_itr); |
| 329 } |
| 330 |
| 331 WebViewPermissionHelper::PermissionResponseInfo::PermissionResponseInfo() |
| 332 : permission_type(WEB_VIEW_PERMISSION_TYPE_UNKNOWN), |
| 333 allowed_by_default(false) { |
| 334 } |
| 335 |
| 336 WebViewPermissionHelper::PermissionResponseInfo::PermissionResponseInfo( |
| 337 const PermissionResponseCallback& callback, |
| 338 WebViewPermissionType permission_type, |
| 339 bool allowed_by_default) |
| 340 : callback(callback), |
| 341 permission_type(permission_type), |
| 342 allowed_by_default(allowed_by_default) { |
| 343 } |
| 344 |
| 345 WebViewPermissionHelper::PermissionResponseInfo::~PermissionResponseInfo() { |
| 346 } |
| 347 |
| 348 } // namespace extensions |
OLD | NEW |