OLD | NEW |
| (Empty) |
1 // Copyright 2014 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "extensions/browser/guest_view/web_view/web_view_permission_helper.h" | |
6 | |
7 #include "content/public/browser/render_process_host.h" | |
8 #include "content/public/browser/render_view_host.h" | |
9 #include "content/public/browser/user_metrics.h" | |
10 #include "extensions/browser/api/extensions_api_client.h" | |
11 #include "extensions/browser/guest_view/web_view/web_view_constants.h" | |
12 #include "extensions/browser/guest_view/web_view/web_view_guest.h" | |
13 #include "extensions/browser/guest_view/web_view/web_view_permission_helper_dele
gate.h" | |
14 #include "extensions/browser/guest_view/web_view/web_view_permission_types.h" | |
15 | |
16 using content::BrowserPluginGuestDelegate; | |
17 using content::RenderViewHost; | |
18 | |
19 namespace extensions { | |
20 | |
21 namespace { | |
22 static std::string PermissionTypeToString(WebViewPermissionType type) { | |
23 switch (type) { | |
24 case WEB_VIEW_PERMISSION_TYPE_DOWNLOAD: | |
25 return webview::kPermissionTypeDownload; | |
26 case WEB_VIEW_PERMISSION_TYPE_FILESYSTEM: | |
27 return webview::kPermissionTypeFileSystem; | |
28 case WEB_VIEW_PERMISSION_TYPE_GEOLOCATION: | |
29 return webview::kPermissionTypeGeolocation; | |
30 case WEB_VIEW_PERMISSION_TYPE_JAVASCRIPT_DIALOG: | |
31 return webview::kPermissionTypeDialog; | |
32 case WEB_VIEW_PERMISSION_TYPE_LOAD_PLUGIN: | |
33 return webview::kPermissionTypeLoadPlugin; | |
34 case WEB_VIEW_PERMISSION_TYPE_MEDIA: | |
35 return webview::kPermissionTypeMedia; | |
36 case WEB_VIEW_PERMISSION_TYPE_NEW_WINDOW: | |
37 return webview::kPermissionTypeNewWindow; | |
38 case WEB_VIEW_PERMISSION_TYPE_POINTER_LOCK: | |
39 return webview::kPermissionTypePointerLock; | |
40 default: | |
41 NOTREACHED(); | |
42 return std::string(); | |
43 } | |
44 } | |
45 | |
46 // static | |
47 void RecordUserInitiatedUMA( | |
48 const WebViewPermissionHelper::PermissionResponseInfo& info, | |
49 bool allow) { | |
50 if (allow) { | |
51 // Note that |allow| == true means the embedder explicitly allowed the | |
52 // request. For some requests they might still fail. An example of such | |
53 // scenario would be: an embedder allows geolocation request but doesn't | |
54 // have geolocation access on its own. | |
55 switch (info.permission_type) { | |
56 case WEB_VIEW_PERMISSION_TYPE_DOWNLOAD: | |
57 content::RecordAction( | |
58 UserMetricsAction("WebView.PermissionAllow.Download")); | |
59 break; | |
60 case WEB_VIEW_PERMISSION_TYPE_FILESYSTEM: | |
61 content::RecordAction( | |
62 UserMetricsAction("WebView.PermissionAllow.FileSystem")); | |
63 break; | |
64 case WEB_VIEW_PERMISSION_TYPE_GEOLOCATION: | |
65 content::RecordAction( | |
66 UserMetricsAction("WebView.PermissionAllow.Geolocation")); | |
67 break; | |
68 case WEB_VIEW_PERMISSION_TYPE_JAVASCRIPT_DIALOG: | |
69 content::RecordAction( | |
70 UserMetricsAction("WebView.PermissionAllow.JSDialog")); | |
71 break; | |
72 case WEB_VIEW_PERMISSION_TYPE_LOAD_PLUGIN: | |
73 content::RecordAction( | |
74 UserMetricsAction("WebView.Guest.PermissionAllow.PluginLoad")); | |
75 case WEB_VIEW_PERMISSION_TYPE_MEDIA: | |
76 content::RecordAction( | |
77 UserMetricsAction("WebView.PermissionAllow.Media")); | |
78 break; | |
79 case WEB_VIEW_PERMISSION_TYPE_NEW_WINDOW: | |
80 content::RecordAction( | |
81 UserMetricsAction("BrowserPlugin.PermissionAllow.NewWindow")); | |
82 break; | |
83 case WEB_VIEW_PERMISSION_TYPE_POINTER_LOCK: | |
84 content::RecordAction( | |
85 UserMetricsAction("WebView.PermissionAllow.PointerLock")); | |
86 break; | |
87 default: | |
88 break; | |
89 } | |
90 } else { | |
91 switch (info.permission_type) { | |
92 case WEB_VIEW_PERMISSION_TYPE_DOWNLOAD: | |
93 content::RecordAction( | |
94 UserMetricsAction("WebView.PermissionDeny.Download")); | |
95 break; | |
96 case WEB_VIEW_PERMISSION_TYPE_FILESYSTEM: | |
97 content::RecordAction( | |
98 UserMetricsAction("WebView.PermissionDeny.FileSystem")); | |
99 break; | |
100 case WEB_VIEW_PERMISSION_TYPE_GEOLOCATION: | |
101 content::RecordAction( | |
102 UserMetricsAction("WebView.PermissionDeny.Geolocation")); | |
103 break; | |
104 case WEB_VIEW_PERMISSION_TYPE_JAVASCRIPT_DIALOG: | |
105 content::RecordAction( | |
106 UserMetricsAction("WebView.PermissionDeny.JSDialog")); | |
107 break; | |
108 case WEB_VIEW_PERMISSION_TYPE_LOAD_PLUGIN: | |
109 content::RecordAction( | |
110 UserMetricsAction("WebView.Guest.PermissionDeny.PluginLoad")); | |
111 break; | |
112 case WEB_VIEW_PERMISSION_TYPE_MEDIA: | |
113 content::RecordAction( | |
114 UserMetricsAction("WebView.PermissionDeny.Media")); | |
115 break; | |
116 case WEB_VIEW_PERMISSION_TYPE_NEW_WINDOW: | |
117 content::RecordAction( | |
118 UserMetricsAction("BrowserPlugin.PermissionDeny.NewWindow")); | |
119 break; | |
120 case WEB_VIEW_PERMISSION_TYPE_POINTER_LOCK: | |
121 content::RecordAction( | |
122 UserMetricsAction("WebView.PermissionDeny.PointerLock")); | |
123 break; | |
124 default: | |
125 break; | |
126 } | |
127 } | |
128 } | |
129 | |
130 } // namespace | |
131 | |
132 WebViewPermissionHelper::WebViewPermissionHelper(WebViewGuest* web_view_guest) | |
133 : content::WebContentsObserver(web_view_guest->guest_web_contents()), | |
134 next_permission_request_id_(guestview::kInstanceIDNone), | |
135 web_view_guest_(web_view_guest), | |
136 weak_factory_(this) { | |
137 web_view_permission_helper_delegate_.reset( | |
138 ExtensionsAPIClient::Get()->CreateWebViewPermissionHelperDelegate( | |
139 this)); | |
140 } | |
141 | |
142 WebViewPermissionHelper::~WebViewPermissionHelper() { | |
143 } | |
144 | |
145 // static | |
146 WebViewPermissionHelper* WebViewPermissionHelper::FromFrameID( | |
147 int render_process_id, | |
148 int render_frame_id) { | |
149 WebViewGuest* web_view_guest = WebViewGuest::FromFrameID( | |
150 render_process_id, render_frame_id); | |
151 if (!web_view_guest) { | |
152 return NULL; | |
153 } | |
154 return web_view_guest->web_view_permission_helper_.get(); | |
155 } | |
156 | |
157 // static | |
158 WebViewPermissionHelper* WebViewPermissionHelper::FromWebContents( | |
159 content::WebContents* web_contents) { | |
160 WebViewGuest* web_view_guest = WebViewGuest::FromWebContents(web_contents); | |
161 if (!web_view_guest) | |
162 return NULL; | |
163 return web_view_guest->web_view_permission_helper_.get(); | |
164 } | |
165 | |
166 #if defined(ENABLE_PLUGINS) | |
167 bool WebViewPermissionHelper::OnMessageReceived( | |
168 const IPC::Message& message, | |
169 content::RenderFrameHost* render_frame_host) { | |
170 return web_view_permission_helper_delegate_->OnMessageReceived( | |
171 message, render_frame_host); | |
172 } | |
173 | |
174 bool WebViewPermissionHelper::OnMessageReceived(const IPC::Message& message) { | |
175 return web_view_permission_helper_delegate_->OnMessageReceived(message); | |
176 } | |
177 #endif // defined(ENABLE_PLUGINS) | |
178 | |
179 void WebViewPermissionHelper::RequestMediaAccessPermission( | |
180 content::WebContents* source, | |
181 const content::MediaStreamRequest& request, | |
182 const content::MediaResponseCallback& callback) { | |
183 web_view_permission_helper_delegate_-> RequestMediaAccessPermission( | |
184 source, request, callback); | |
185 } | |
186 | |
187 void WebViewPermissionHelper::CanDownload( | |
188 content::RenderViewHost* render_view_host, | |
189 const GURL& url, | |
190 const std::string& request_method, | |
191 const base::Callback<void(bool)>& callback) { | |
192 web_view_permission_helper_delegate_->CanDownload( | |
193 render_view_host, url, request_method, callback); | |
194 } | |
195 | |
196 void WebViewPermissionHelper::RequestPointerLockPermission( | |
197 bool user_gesture, | |
198 bool last_unlocked_by_target, | |
199 const base::Callback<void(bool)>& callback) { | |
200 web_view_permission_helper_delegate_->RequestPointerLockPermission( | |
201 user_gesture, last_unlocked_by_target, callback); | |
202 } | |
203 | |
204 void WebViewPermissionHelper::RequestGeolocationPermission( | |
205 int bridge_id, | |
206 const GURL& requesting_frame, | |
207 bool user_gesture, | |
208 const base::Callback<void(bool)>& callback) { | |
209 web_view_permission_helper_delegate_->RequestGeolocationPermission( | |
210 bridge_id, requesting_frame, user_gesture, callback); | |
211 } | |
212 | |
213 void WebViewPermissionHelper::CancelGeolocationPermissionRequest( | |
214 int bridge_id) { | |
215 web_view_permission_helper_delegate_->CancelGeolocationPermissionRequest( | |
216 bridge_id); | |
217 } | |
218 | |
219 void WebViewPermissionHelper::RequestFileSystemPermission( | |
220 const GURL& url, | |
221 bool allowed_by_default, | |
222 const base::Callback<void(bool)>& callback) { | |
223 web_view_permission_helper_delegate_->RequestFileSystemPermission( | |
224 url, allowed_by_default, callback); | |
225 } | |
226 | |
227 void WebViewPermissionHelper::FileSystemAccessedAsync(int render_process_id, | |
228 int render_frame_id, | |
229 int request_id, | |
230 const GURL& url, | |
231 bool blocked_by_policy) { | |
232 web_view_permission_helper_delegate_->FileSystemAccessedAsync( | |
233 render_process_id, render_frame_id, request_id, url, blocked_by_policy); | |
234 } | |
235 | |
236 void WebViewPermissionHelper::FileSystemAccessedSync(int render_process_id, | |
237 int render_frame_id, | |
238 const GURL& url, | |
239 bool blocked_by_policy, | |
240 IPC::Message* reply_msg) { | |
241 web_view_permission_helper_delegate_->FileSystemAccessedSync( | |
242 render_process_id, render_frame_id, url, blocked_by_policy, reply_msg); | |
243 } | |
244 | |
245 int WebViewPermissionHelper::RequestPermission( | |
246 WebViewPermissionType permission_type, | |
247 const base::DictionaryValue& request_info, | |
248 const PermissionResponseCallback& callback, | |
249 bool allowed_by_default) { | |
250 // If there are too many pending permission requests then reject this request. | |
251 if (pending_permission_requests_.size() >= | |
252 webview::kMaxOutstandingPermissionRequests) { | |
253 // Let the stack unwind before we deny the permission request so that | |
254 // objects held by the permission request are not destroyed immediately | |
255 // after creation. This is to allow those same objects to be accessed again | |
256 // in the same scope without fear of use after freeing. | |
257 base::MessageLoop::current()->PostTask( | |
258 FROM_HERE, | |
259 base::Bind(&PermissionResponseCallback::Run, | |
260 base::Owned(new PermissionResponseCallback(callback)), | |
261 allowed_by_default, | |
262 std::string())); | |
263 return webview::kInvalidPermissionRequestID; | |
264 } | |
265 | |
266 int request_id = next_permission_request_id_++; | |
267 pending_permission_requests_[request_id] = | |
268 PermissionResponseInfo(callback, permission_type, allowed_by_default); | |
269 scoped_ptr<base::DictionaryValue> args(request_info.DeepCopy()); | |
270 args->SetInteger(webview::kRequestId, request_id); | |
271 switch (permission_type) { | |
272 case WEB_VIEW_PERMISSION_TYPE_NEW_WINDOW: { | |
273 web_view_guest_->DispatchEventToEmbedder( | |
274 new GuestViewBase::Event(webview::kEventNewWindow, args.Pass())); | |
275 break; | |
276 } | |
277 case WEB_VIEW_PERMISSION_TYPE_JAVASCRIPT_DIALOG: { | |
278 web_view_guest_->DispatchEventToEmbedder( | |
279 new GuestViewBase::Event(webview::kEventDialog, args.Pass())); | |
280 break; | |
281 } | |
282 default: { | |
283 args->SetString(webview::kPermission, | |
284 PermissionTypeToString(permission_type)); | |
285 web_view_guest_->DispatchEventToEmbedder(new GuestViewBase::Event( | |
286 webview::kEventPermissionRequest, | |
287 args.Pass())); | |
288 break; | |
289 } | |
290 } | |
291 return request_id; | |
292 } | |
293 | |
294 WebViewPermissionHelper::SetPermissionResult | |
295 WebViewPermissionHelper::SetPermission( | |
296 int request_id, | |
297 PermissionResponseAction action, | |
298 const std::string& user_input) { | |
299 RequestMap::iterator request_itr = | |
300 pending_permission_requests_.find(request_id); | |
301 | |
302 if (request_itr == pending_permission_requests_.end()) | |
303 return SET_PERMISSION_INVALID; | |
304 | |
305 const PermissionResponseInfo& info = request_itr->second; | |
306 bool allow = (action == ALLOW) || | |
307 ((action == DEFAULT) && info.allowed_by_default); | |
308 | |
309 info.callback.Run(allow, user_input); | |
310 | |
311 // Only record user initiated (i.e. non-default) actions. | |
312 if (action != DEFAULT) | |
313 RecordUserInitiatedUMA(info, allow); | |
314 | |
315 pending_permission_requests_.erase(request_itr); | |
316 | |
317 return allow ? SET_PERMISSION_ALLOWED : SET_PERMISSION_DENIED; | |
318 } | |
319 | |
320 void WebViewPermissionHelper::CancelPendingPermissionRequest(int request_id) { | |
321 RequestMap::iterator request_itr = | |
322 pending_permission_requests_.find(request_id); | |
323 | |
324 if (request_itr == pending_permission_requests_.end()) | |
325 return; | |
326 | |
327 pending_permission_requests_.erase(request_itr); | |
328 } | |
329 | |
330 WebViewPermissionHelper::PermissionResponseInfo::PermissionResponseInfo() | |
331 : permission_type(WEB_VIEW_PERMISSION_TYPE_UNKNOWN), | |
332 allowed_by_default(false) { | |
333 } | |
334 | |
335 WebViewPermissionHelper::PermissionResponseInfo::PermissionResponseInfo( | |
336 const PermissionResponseCallback& callback, | |
337 WebViewPermissionType permission_type, | |
338 bool allowed_by_default) | |
339 : callback(callback), | |
340 permission_type(permission_type), | |
341 allowed_by_default(allowed_by_default) { | |
342 } | |
343 | |
344 WebViewPermissionHelper::PermissionResponseInfo::~PermissionResponseInfo() { | |
345 } | |
346 | |
347 } // namespace extensions | |
OLD | NEW |