Index: content/renderer/media/midi_dispatcher.cc |
diff --git a/content/renderer/media/midi_dispatcher.cc b/content/renderer/media/midi_dispatcher.cc |
index b281389ee5427719f0a7ce08b9119db570efdd24..c833d9bbf51f0a9ab73bf090b343d21d545600a1 100644 |
--- a/content/renderer/media/midi_dispatcher.cc |
+++ b/content/renderer/media/midi_dispatcher.cc |
@@ -5,12 +5,11 @@ |
#include "content/renderer/media/midi_dispatcher.h" |
#include "base/bind.h" |
-#include "base/message_loop/message_loop.h" |
-#include "content/common/media/midi_messages.h" |
+#include "content/public/common/service_registry.h" |
+#include "content/public/renderer/render_frame.h" |
#include "third_party/WebKit/public/platform/WebString.h" |
#include "third_party/WebKit/public/web/WebMIDIPermissionRequest.h" |
#include "third_party/WebKit/public/web/WebSecurityOrigin.h" |
-#include "third_party/WebKit/public/web/WebUserGestureIndicator.h" |
using blink::WebMIDIPermissionRequest; |
using blink::WebSecurityOrigin; |
@@ -23,23 +22,22 @@ MidiDispatcher::MidiDispatcher(RenderFrame* render_frame) |
MidiDispatcher::~MidiDispatcher() {} |
-bool MidiDispatcher::OnMessageReceived(const IPC::Message& message) { |
- bool handled = true; |
- IPC_BEGIN_MESSAGE_MAP(MidiDispatcher, message) |
- IPC_MESSAGE_HANDLER(MidiMsg_SysExPermissionApproved, |
- OnSysExPermissionApproved) |
- IPC_MESSAGE_UNHANDLED(handled = false) |
- IPC_END_MESSAGE_MAP() |
- return handled; |
-} |
- |
void MidiDispatcher::requestSysexPermission( |
const WebMIDIPermissionRequest& request) { |
- int bridge_id = requests_.Add(new WebMIDIPermissionRequest(request)); |
- WebSecurityOrigin security_origin = request.securityOrigin(); |
- GURL url(security_origin.toString()); |
- Send(new MidiHostMsg_RequestSysExPermission(routing_id(), bridge_id, url, |
- blink::WebUserGestureIndicator::isProcessingUserGesture())); |
+ if (!permission_service_.get()) { |
+ render_frame()->GetServiceRegistry()->ConnectToRemoteService( |
+ &permission_service_); |
+ } |
+ |
Tom Sepez
2014/11/24 18:10:02
Can the connect fail? Do we need to handle that ca
mlamouri (slow - plz ping)
2014/11/24 18:20:17
My understanding is that permission_service_ can't
Tom Sepez
2014/11/24 18:27:09
OK, can we add a debug assert?
mlamouri (slow - plz ping)
2014/11/24 18:29:40
qsr@, do you have some insights about this? It see
nasko
2014/11/25 00:30:59
I'm biased towards adding a (D)CHECK if we never e
qsr
2014/11/25 09:38:00
The DCHECK is not useful. The service cannot be nu
mlamouri (slow - plz ping)
2014/11/25 09:48:21
Thanks for the quick reply Benjamin! :)
|
+ int permission_request_id = |
+ requests_.Add(new WebMIDIPermissionRequest(request)); |
+ |
+ permission_service_->RequestPermission( |
+ PERMISSION_NAME_MIDI_SYSEX, |
+ request.securityOrigin().toString().utf8(), |
+ base::Bind(&MidiDispatcher::OnSysExPermissionSet, |
+ base::Unretained(this), |
+ permission_request_id)); |
} |
void MidiDispatcher::cancelSysexPermissionRequest( |
@@ -53,14 +51,14 @@ void MidiDispatcher::cancelSysexPermissionRequest( |
} |
} |
-void MidiDispatcher::OnSysExPermissionApproved(int bridge_id, |
- bool is_allowed) { |
+void MidiDispatcher::OnSysExPermissionSet(int request_id, |
+ PermissionStatus status) { |
// |request| can be NULL when the request is canceled. |
- WebMIDIPermissionRequest* request = requests_.Lookup(bridge_id); |
+ WebMIDIPermissionRequest* request = requests_.Lookup(request_id); |
if (!request) |
return; |
- request->setIsAllowed(is_allowed); |
- requests_.Remove(bridge_id); |
+ request->setIsAllowed(status == PERMISSION_STATUS_GRANTED); |
+ requests_.Remove(request_id); |
} |
} // namespace content |