| Index: chrome/browser/guest_view/web_view/web_view_permission_helper.cc | 
| diff --git a/chrome/browser/guest_view/web_view/web_view_permission_helper.cc b/chrome/browser/guest_view/web_view/web_view_permission_helper.cc | 
| new file mode 100644 | 
| index 0000000000000000000000000000000000000000..d3fc3a95e25ee14bf9516f5dc9b8104eaa6fed91 | 
| --- /dev/null | 
| +++ b/chrome/browser/guest_view/web_view/web_view_permission_helper.cc | 
| @@ -0,0 +1,348 @@ | 
| +// Copyright 2014 The Chromium Authors. All rights reserved. | 
| +// Use of this source code is governed by a BSD-style license that can be | 
| +// found in the LICENSE file. | 
| + | 
| +#include "chrome/browser/guest_view/web_view/web_view_permission_helper.h" | 
| + | 
| +#include "chrome/browser/guest_view/web_view/chrome_web_view_permission_helper_delegate.h" | 
| +#include "chrome/browser/guest_view/web_view/web_view_constants.h" | 
| +#include "chrome/browser/guest_view/web_view/web_view_guest.h" | 
| +#include "chrome/browser/guest_view/web_view/web_view_permission_types.h" | 
| +#include "content/public/browser/render_process_host.h" | 
| +#include "content/public/browser/render_view_host.h" | 
| +#include "content/public/browser/user_metrics.h" | 
| +#include "extensions/browser/guest_view/web_view/web_view_permission_helper_delegate.h" | 
| + | 
| +using content::BrowserPluginGuestDelegate; | 
| +using content::RenderViewHost; | 
| + | 
| +namespace extensions { | 
| + | 
| +namespace { | 
| +static std::string PermissionTypeToString(WebViewPermissionType type) { | 
| +  switch (type) { | 
| +    case WEB_VIEW_PERMISSION_TYPE_DOWNLOAD: | 
| +      return webview::kPermissionTypeDownload; | 
| +    case WEB_VIEW_PERMISSION_TYPE_FILESYSTEM: | 
| +      return webview::kPermissionTypeFileSystem; | 
| +    case WEB_VIEW_PERMISSION_TYPE_GEOLOCATION: | 
| +      return webview::kPermissionTypeGeolocation; | 
| +    case WEB_VIEW_PERMISSION_TYPE_JAVASCRIPT_DIALOG: | 
| +      return webview::kPermissionTypeDialog; | 
| +    case WEB_VIEW_PERMISSION_TYPE_LOAD_PLUGIN: | 
| +      return webview::kPermissionTypeLoadPlugin; | 
| +    case WEB_VIEW_PERMISSION_TYPE_MEDIA: | 
| +      return webview::kPermissionTypeMedia; | 
| +    case WEB_VIEW_PERMISSION_TYPE_NEW_WINDOW: | 
| +      return webview::kPermissionTypeNewWindow; | 
| +    case WEB_VIEW_PERMISSION_TYPE_POINTER_LOCK: | 
| +      return webview::kPermissionTypePointerLock; | 
| +    default: | 
| +      NOTREACHED(); | 
| +      return std::string(); | 
| +  } | 
| +} | 
| + | 
| +// static | 
| +void RecordUserInitiatedUMA( | 
| +    const WebViewPermissionHelper::PermissionResponseInfo& info, | 
| +    bool allow) { | 
| +  if (allow) { | 
| +    // Note that |allow| == true means the embedder explicitly allowed the | 
| +    // request. For some requests they might still fail. An example of such | 
| +    // scenario would be: an embedder allows geolocation request but doesn't | 
| +    // have geolocation access on its own. | 
| +    switch (info.permission_type) { | 
| +      case WEB_VIEW_PERMISSION_TYPE_DOWNLOAD: | 
| +        content::RecordAction( | 
| +            UserMetricsAction("WebView.PermissionAllow.Download")); | 
| +        break; | 
| +      case WEB_VIEW_PERMISSION_TYPE_FILESYSTEM: | 
| +        content::RecordAction( | 
| +            UserMetricsAction("WebView.PermissionAllow.FileSystem")); | 
| +        break; | 
| +      case WEB_VIEW_PERMISSION_TYPE_GEOLOCATION: | 
| +        content::RecordAction( | 
| +            UserMetricsAction("WebView.PermissionAllow.Geolocation")); | 
| +        break; | 
| +      case WEB_VIEW_PERMISSION_TYPE_JAVASCRIPT_DIALOG: | 
| +        content::RecordAction( | 
| +            UserMetricsAction("WebView.PermissionAllow.JSDialog")); | 
| +        break; | 
| +      case WEB_VIEW_PERMISSION_TYPE_LOAD_PLUGIN: | 
| +        content::RecordAction( | 
| +            UserMetricsAction("WebView.Guest.PermissionAllow.PluginLoad")); | 
| +      case WEB_VIEW_PERMISSION_TYPE_MEDIA: | 
| +        content::RecordAction( | 
| +            UserMetricsAction("WebView.PermissionAllow.Media")); | 
| +        break; | 
| +      case WEB_VIEW_PERMISSION_TYPE_NEW_WINDOW: | 
| +        content::RecordAction( | 
| +            UserMetricsAction("BrowserPlugin.PermissionAllow.NewWindow")); | 
| +        break; | 
| +      case WEB_VIEW_PERMISSION_TYPE_POINTER_LOCK: | 
| +        content::RecordAction( | 
| +            UserMetricsAction("WebView.PermissionAllow.PointerLock")); | 
| +        break; | 
| +      default: | 
| +        break; | 
| +    } | 
| +  } else { | 
| +    switch (info.permission_type) { | 
| +      case WEB_VIEW_PERMISSION_TYPE_DOWNLOAD: | 
| +        content::RecordAction( | 
| +            UserMetricsAction("WebView.PermissionDeny.Download")); | 
| +        break; | 
| +      case WEB_VIEW_PERMISSION_TYPE_FILESYSTEM: | 
| +        content::RecordAction( | 
| +            UserMetricsAction("WebView.PermissionDeny.FileSystem")); | 
| +        break; | 
| +      case WEB_VIEW_PERMISSION_TYPE_GEOLOCATION: | 
| +        content::RecordAction( | 
| +            UserMetricsAction("WebView.PermissionDeny.Geolocation")); | 
| +        break; | 
| +      case WEB_VIEW_PERMISSION_TYPE_JAVASCRIPT_DIALOG: | 
| +        content::RecordAction( | 
| +            UserMetricsAction("WebView.PermissionDeny.JSDialog")); | 
| +        break; | 
| +      case WEB_VIEW_PERMISSION_TYPE_LOAD_PLUGIN: | 
| +        content::RecordAction( | 
| +            UserMetricsAction("WebView.Guest.PermissionDeny.PluginLoad")); | 
| +        break; | 
| +      case WEB_VIEW_PERMISSION_TYPE_MEDIA: | 
| +        content::RecordAction( | 
| +            UserMetricsAction("WebView.PermissionDeny.Media")); | 
| +        break; | 
| +      case WEB_VIEW_PERMISSION_TYPE_NEW_WINDOW: | 
| +        content::RecordAction( | 
| +            UserMetricsAction("BrowserPlugin.PermissionDeny.NewWindow")); | 
| +        break; | 
| +      case WEB_VIEW_PERMISSION_TYPE_POINTER_LOCK: | 
| +        content::RecordAction( | 
| +            UserMetricsAction("WebView.PermissionDeny.PointerLock")); | 
| +        break; | 
| +      default: | 
| +        break; | 
| +    } | 
| +  } | 
| +} | 
| + | 
| +} // namespace | 
| + | 
| +WebViewPermissionHelper::WebViewPermissionHelper(WebViewGuest* web_view_guest) | 
| +  : content::WebContentsObserver(web_view_guest->guest_web_contents()), | 
| +    next_permission_request_id_(guestview::kInstanceIDNone), | 
| +    web_view_guest_(web_view_guest), | 
| +    weak_factory_(this) { | 
| +      // TODO(hanxi) : Create the delegate through ExtensionsAPIClient after | 
| +      // moving WebViewPermissionHelper to extensions. | 
| +      web_view_permission_helper_delegate_.reset( | 
| +          new ChromeWebViewPermissionHelperDelegate(this)); | 
| +} | 
| + | 
| +WebViewPermissionHelper::~WebViewPermissionHelper() { | 
| +} | 
| + | 
| +// static | 
| +WebViewPermissionHelper* WebViewPermissionHelper::FromFrameID( | 
| +    int render_process_id, | 
| +    int render_frame_id) { | 
| +  WebViewGuest* web_view_guest = WebViewGuest::FromFrameID( | 
| +      render_process_id, render_frame_id); | 
| +  if (!web_view_guest) { | 
| +    return NULL; | 
| +  } | 
| +  return web_view_guest->web_view_permission_helper_.get(); | 
| +} | 
| + | 
| +// static | 
| +WebViewPermissionHelper* WebViewPermissionHelper::FromWebContents( | 
| +      content::WebContents* web_contents) { | 
| +  WebViewGuest* web_view_guest = WebViewGuest::FromWebContents(web_contents); | 
| +  if (!web_view_guest) | 
| +      return NULL; | 
| +  return web_view_guest->web_view_permission_helper_.get(); | 
| +} | 
| + | 
| +#if defined(ENABLE_PLUGINS) | 
| +bool WebViewPermissionHelper::OnMessageReceived( | 
| +    const IPC::Message& message, | 
| +    content::RenderFrameHost* render_frame_host) { | 
| +  return web_view_permission_helper_delegate_->OnMessageReceived( | 
| +      message, render_frame_host); | 
| +} | 
| + | 
| +bool WebViewPermissionHelper::OnMessageReceived(const IPC::Message& message) { | 
| +  return web_view_permission_helper_delegate_->OnMessageReceived(message); | 
| +} | 
| +#endif  // defined(ENABLE_PLUGINS) | 
| + | 
| +void WebViewPermissionHelper::RequestMediaAccessPermission( | 
| +    content::WebContents* source, | 
| +    const content::MediaStreamRequest& request, | 
| +    const content::MediaResponseCallback& callback) { | 
| +  web_view_permission_helper_delegate_-> RequestMediaAccessPermission( | 
| +      source, request, callback); | 
| +} | 
| + | 
| +void WebViewPermissionHelper::CanDownload( | 
| +    content::RenderViewHost* render_view_host, | 
| +    const GURL& url, | 
| +    const std::string& request_method, | 
| +    const base::Callback<void(bool)>& callback) { | 
| +  web_view_permission_helper_delegate_->CanDownload( | 
| +      render_view_host, url, request_method, callback); | 
| +} | 
| + | 
| +void WebViewPermissionHelper::RequestPointerLockPermission( | 
| +    bool user_gesture, | 
| +    bool last_unlocked_by_target, | 
| +    const base::Callback<void(bool)>& callback) { | 
| +  web_view_permission_helper_delegate_->RequestPointerLockPermission( | 
| +      user_gesture, last_unlocked_by_target, callback); | 
| +} | 
| + | 
| +void WebViewPermissionHelper::RequestGeolocationPermission( | 
| +    int bridge_id, | 
| +    const GURL& requesting_frame, | 
| +    bool user_gesture, | 
| +    const base::Callback<void(bool)>& callback) { | 
| +  web_view_permission_helper_delegate_->RequestGeolocationPermission( | 
| +      bridge_id, requesting_frame, user_gesture, callback); | 
| +} | 
| + | 
| +void WebViewPermissionHelper::CancelGeolocationPermissionRequest( | 
| +    int bridge_id) { | 
| +  web_view_permission_helper_delegate_->CancelGeolocationPermissionRequest( | 
| +      bridge_id); | 
| +} | 
| + | 
| +void WebViewPermissionHelper::RequestFileSystemPermission( | 
| +    const GURL& url, | 
| +    bool allowed_by_default, | 
| +    const base::Callback<void(bool)>& callback) { | 
| +  web_view_permission_helper_delegate_->RequestFileSystemPermission( | 
| +      url, allowed_by_default, callback); | 
| +} | 
| + | 
| +void WebViewPermissionHelper::FileSystemAccessedAsync(int render_process_id, | 
| +                                                      int render_frame_id, | 
| +                                                      int request_id, | 
| +                                                      const GURL& url, | 
| +                                                      bool blocked_by_policy) { | 
| +  web_view_permission_helper_delegate_->FileSystemAccessedAsync( | 
| +      render_process_id, render_frame_id, request_id, url, blocked_by_policy); | 
| +} | 
| + | 
| +void WebViewPermissionHelper::FileSystemAccessedSync(int render_process_id, | 
| +                                                     int render_frame_id, | 
| +                                                     const GURL& url, | 
| +                                                     bool blocked_by_policy, | 
| +                                                     IPC::Message* reply_msg) { | 
| +  web_view_permission_helper_delegate_->FileSystemAccessedSync( | 
| +      render_process_id, render_frame_id, url, blocked_by_policy, reply_msg); | 
| +} | 
| + | 
| +int WebViewPermissionHelper::RequestPermission( | 
| +    WebViewPermissionType permission_type, | 
| +    const base::DictionaryValue& request_info, | 
| +    const PermissionResponseCallback& callback, | 
| +    bool allowed_by_default) { | 
| +  // If there are too many pending permission requests then reject this request. | 
| +  if (pending_permission_requests_.size() >= | 
| +      webview::kMaxOutstandingPermissionRequests) { | 
| +    // Let the stack unwind before we deny the permission request so that | 
| +    // objects held by the permission request are not destroyed immediately | 
| +    // after creation. This is to allow those same objects to be accessed again | 
| +    // in the same scope without fear of use after freeing. | 
| +    base::MessageLoop::current()->PostTask( | 
| +        FROM_HERE, | 
| +        base::Bind(&PermissionResponseCallback::Run, | 
| +                   base::Owned(new PermissionResponseCallback(callback)), | 
| +                   allowed_by_default, | 
| +                   std::string())); | 
| +    return webview::kInvalidPermissionRequestID; | 
| +  } | 
| + | 
| +  int request_id = next_permission_request_id_++; | 
| +  pending_permission_requests_[request_id] = | 
| +      PermissionResponseInfo(callback, permission_type, allowed_by_default); | 
| +  scoped_ptr<base::DictionaryValue> args(request_info.DeepCopy()); | 
| +  args->SetInteger(webview::kRequestId, request_id); | 
| +  switch (permission_type) { | 
| +    case WEB_VIEW_PERMISSION_TYPE_NEW_WINDOW: { | 
| +      web_view_guest_->DispatchEventToEmbedder( | 
| +          new GuestViewBase::Event(webview::kEventNewWindow, args.Pass())); | 
| +      break; | 
| +    } | 
| +    case WEB_VIEW_PERMISSION_TYPE_JAVASCRIPT_DIALOG: { | 
| +      web_view_guest_->DispatchEventToEmbedder( | 
| +          new GuestViewBase::Event(webview::kEventDialog, args.Pass())); | 
| +      break; | 
| +    } | 
| +    default: { | 
| +      args->SetString(webview::kPermission, | 
| +                      PermissionTypeToString(permission_type)); | 
| +      web_view_guest_->DispatchEventToEmbedder(new GuestViewBase::Event( | 
| +          webview::kEventPermissionRequest, | 
| +          args.Pass())); | 
| +      break; | 
| +    } | 
| +  } | 
| +  return request_id; | 
| +} | 
| + | 
| +WebViewPermissionHelper::SetPermissionResult | 
| +WebViewPermissionHelper::SetPermission( | 
| +    int request_id, | 
| +    PermissionResponseAction action, | 
| +    const std::string& user_input) { | 
| +  RequestMap::iterator request_itr = | 
| +      pending_permission_requests_.find(request_id); | 
| + | 
| +  if (request_itr == pending_permission_requests_.end()) | 
| +    return SET_PERMISSION_INVALID; | 
| + | 
| +  const PermissionResponseInfo& info = request_itr->second; | 
| +  bool allow = (action == ALLOW) || | 
| +      ((action == DEFAULT) && info.allowed_by_default); | 
| + | 
| +  info.callback.Run(allow, user_input); | 
| + | 
| +  // Only record user initiated (i.e. non-default) actions. | 
| +  if (action != DEFAULT) | 
| +    RecordUserInitiatedUMA(info, allow); | 
| + | 
| +  pending_permission_requests_.erase(request_itr); | 
| + | 
| +  return allow ? SET_PERMISSION_ALLOWED : SET_PERMISSION_DENIED; | 
| +} | 
| + | 
| +void WebViewPermissionHelper::CancelPendingPermissionRequest(int request_id) { | 
| +  RequestMap::iterator request_itr = | 
| +      pending_permission_requests_.find(request_id); | 
| + | 
| +  if (request_itr == pending_permission_requests_.end()) | 
| +    return; | 
| + | 
| +  pending_permission_requests_.erase(request_itr); | 
| +} | 
| + | 
| +WebViewPermissionHelper::PermissionResponseInfo::PermissionResponseInfo() | 
| +    : permission_type(WEB_VIEW_PERMISSION_TYPE_UNKNOWN), | 
| +      allowed_by_default(false) { | 
| +} | 
| + | 
| +WebViewPermissionHelper::PermissionResponseInfo::PermissionResponseInfo( | 
| +    const PermissionResponseCallback& callback, | 
| +    WebViewPermissionType permission_type, | 
| +    bool allowed_by_default) | 
| +    : callback(callback), | 
| +      permission_type(permission_type), | 
| +      allowed_by_default(allowed_by_default) { | 
| +} | 
| + | 
| +WebViewPermissionHelper::PermissionResponseInfo::~PermissionResponseInfo() { | 
| +} | 
| + | 
| +}  // namespace extensions | 
|  |