Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "extensions/browser/api/device_permissions_manager.h" | 5 #include "extensions/browser/api/device_permissions_manager.h" |
| 6 | 6 |
| 7 #include "base/bind.h" | |
| 7 #include "base/memory/singleton.h" | 8 #include "base/memory/singleton.h" |
| 8 #include "base/strings/string_number_conversions.h" | 9 #include "base/strings/string_number_conversions.h" |
| 9 #include "base/strings/stringprintf.h" | 10 #include "base/strings/stringprintf.h" |
| 10 #include "base/strings/utf_string_conversions.h" | 11 #include "base/strings/utf_string_conversions.h" |
| 11 #include "base/values.h" | 12 #include "base/values.h" |
| 12 #include "components/keyed_service/content/browser_context_dependency_manager.h" | 13 #include "components/keyed_service/content/browser_context_dependency_manager.h" |
| 14 #include "content/public/browser/browser_thread.h" | |
| 13 #include "device/core/device_client.h" | 15 #include "device/core/device_client.h" |
| 14 #include "device/usb/usb_device.h" | 16 #include "device/usb/usb_device.h" |
| 15 #include "device/usb/usb_ids.h" | 17 #include "device/usb/usb_ids.h" |
| 16 #include "extensions/browser/extension_host.h" | 18 #include "extensions/browser/extension_host.h" |
| 17 #include "extensions/browser/extension_prefs.h" | 19 #include "extensions/browser/extension_prefs.h" |
| 18 #include "extensions/browser/extensions_browser_client.h" | 20 #include "extensions/browser/extensions_browser_client.h" |
| 19 #include "extensions/browser/process_manager.h" | 21 #include "extensions/browser/process_manager.h" |
| 20 #include "extensions/browser/process_manager_factory.h" | 22 #include "extensions/browser/process_manager_factory.h" |
| 21 #include "extensions/strings/grit/extensions_strings.h" | 23 #include "extensions/strings/grit/extensions_strings.h" |
| 22 #include "ui/base/l10n/l10n_util.h" | 24 #include "ui/base/l10n/l10n_util.h" |
| 23 | 25 |
| 24 namespace extensions { | 26 namespace extensions { |
| 25 | 27 |
| 26 using content::BrowserContext; | 28 using content::BrowserContext; |
| 29 using content::BrowserThread; | |
| 27 using device::UsbDevice; | 30 using device::UsbDevice; |
| 31 using device::UsbService; | |
| 28 using extensions::APIPermission; | 32 using extensions::APIPermission; |
| 29 using extensions::Extension; | 33 using extensions::Extension; |
| 30 using extensions::ExtensionHost; | 34 using extensions::ExtensionHost; |
| 31 using extensions::ExtensionPrefs; | 35 using extensions::ExtensionPrefs; |
| 32 | 36 |
| 33 namespace { | 37 namespace { |
| 34 | 38 |
| 35 // Preference keys | 39 // Preference keys |
| 36 | 40 |
| 37 // The device that the app has permission to access. | 41 // The device that the app has permission to access. |
| (...skipping 332 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 370 const std::string& extension_id) { | 374 const std::string& extension_id) { |
| 371 ExtensionPrefs* prefs = ExtensionPrefs::Get(context); | 375 ExtensionPrefs* prefs = ExtensionPrefs::Get(context); |
| 372 entries_ = GetDevicePermissionEntries(prefs, extension_id); | 376 entries_ = GetDevicePermissionEntries(prefs, extension_id); |
| 373 } | 377 } |
| 374 | 378 |
| 375 DevicePermissions::DevicePermissions(const DevicePermissions* original) | 379 DevicePermissions::DevicePermissions(const DevicePermissions* original) |
| 376 : entries_(original->entries_), | 380 : entries_(original->entries_), |
| 377 ephemeral_devices_(original->ephemeral_devices_) { | 381 ephemeral_devices_(original->ephemeral_devices_) { |
| 378 } | 382 } |
| 379 | 383 |
| 384 class DevicePermissionsManager::FileThreadHelper : public UsbService::Observer { | |
| 385 public: | |
| 386 FileThreadHelper( | |
| 387 base::WeakPtr<DevicePermissionsManager> device_permissions_manager) | |
| 388 : device_permissions_manager_(device_permissions_manager), | |
| 389 observer_(this) {} | |
| 390 virtual ~FileThreadHelper() {} | |
| 391 | |
| 392 void Start() { | |
| 393 DCHECK_CURRENTLY_ON(BrowserThread::FILE); | |
| 394 UsbService* service = device::DeviceClient::Get()->GetUsbService(); | |
| 395 if (service) { | |
| 396 observer_.Add(service); | |
| 397 } | |
| 398 } | |
| 399 | |
| 400 private: | |
| 401 void OnDeviceRemoved(scoped_refptr<UsbDevice> device) override { | |
| 402 DCHECK_CURRENTLY_ON(BrowserThread::FILE); | |
| 403 // To avoid holding references to every ephemeral device until the browser | |
| 404 // is closed permissions should be cleared when the device is disconnected. | |
| 405 // There are however permissions checks that occur after the device is | |
| 406 // removed for delivering the device removal event and so a delay is | |
| 407 // required. | |
| 408 BrowserThread::PostDelayedTask( | |
| 409 BrowserThread::UI, FROM_HERE, | |
| 410 base::Bind(&DevicePermissionsManager::OnDeviceRemoved, | |
| 411 device_permissions_manager_, device), | |
| 412 base::TimeDelta::FromMinutes(5)); | |
|
scheib
2015/01/27 23:56:25
ಠ_ಠ
| |
| 413 } | |
| 414 | |
| 415 base::WeakPtr<DevicePermissionsManager> device_permissions_manager_; | |
| 416 ScopedObserver<UsbService, UsbService::Observer> observer_; | |
| 417 }; | |
| 418 | |
| 380 // static | 419 // static |
| 381 DevicePermissionsManager* DevicePermissionsManager::Get( | 420 DevicePermissionsManager* DevicePermissionsManager::Get( |
| 382 BrowserContext* context) { | 421 BrowserContext* context) { |
| 383 return DevicePermissionsManagerFactory::GetForBrowserContext(context); | 422 return DevicePermissionsManagerFactory::GetForBrowserContext(context); |
| 384 } | 423 } |
| 385 | 424 |
| 386 scoped_ptr<DevicePermissions> DevicePermissionsManager::GetForExtension( | 425 scoped_ptr<DevicePermissions> DevicePermissionsManager::GetForExtension( |
| 387 const std::string& extension_id) { | 426 const std::string& extension_id) { |
| 388 DCHECK(CalledOnValidThread()); | 427 DCHECK(CalledOnValidThread()); |
| 389 return make_scoped_ptr(new DevicePermissions(GetOrInsert(extension_id))); | 428 return make_scoped_ptr(new DevicePermissions(GetOrInsert(extension_id))); |
| (...skipping 44 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 434 } else if (!ContainsKey(device_permissions->ephemeral_devices_, device)) { | 473 } else if (!ContainsKey(device_permissions->ephemeral_devices_, device)) { |
| 435 // Non-persistent devices cannot be reliably identified when they are | 474 // Non-persistent devices cannot be reliably identified when they are |
| 436 // reconnected so such devices are only remembered until disconnect. | 475 // reconnected so such devices are only remembered until disconnect. |
| 437 // Register an observer here so that this set doesn't grow undefinitely. | 476 // Register an observer here so that this set doesn't grow undefinitely. |
| 438 device_permissions->entries_.insert(device_entry); | 477 device_permissions->entries_.insert(device_entry); |
| 439 device_permissions->ephemeral_devices_[device] = device_entry; | 478 device_permissions->ephemeral_devices_[device] = device_entry; |
| 440 | 479 |
| 441 // Only start observing when an ephemeral device has been added so that | 480 // Only start observing when an ephemeral device has been added so that |
| 442 // UsbService is not automatically initialized on profile creation (which it | 481 // UsbService is not automatically initialized on profile creation (which it |
| 443 // would be if this call were in the constructor). | 482 // would be if this call were in the constructor). |
| 444 device::UsbService* usb_service = | 483 if (!helper_) { |
| 445 device::DeviceClient::Get()->GetUsbService(); | 484 helper_ = new FileThreadHelper(weak_factory_.GetWeakPtr()); |
| 446 DCHECK(usb_service); | 485 // base::Unretained is safe because any task to delete helper_ will be |
| 447 if (!usb_service_observer_.IsObserving(usb_service)) { | 486 // executed after this call. |
| 448 usb_service_observer_.Add(usb_service); | 487 BrowserThread::PostTask( |
| 488 BrowserThread::FILE, FROM_HERE, | |
| 489 base::Bind(&FileThreadHelper::Start, base::Unretained(helper_))); | |
| 449 } | 490 } |
| 450 } | 491 } |
| 451 } | 492 } |
| 452 | 493 |
| 453 void DevicePermissionsManager::UpdateLastUsed( | 494 void DevicePermissionsManager::UpdateLastUsed( |
| 454 const std::string& extension_id, | 495 const std::string& extension_id, |
| 455 scoped_refptr<DevicePermissionEntry> entry) { | 496 scoped_refptr<DevicePermissionEntry> entry) { |
| 456 DCHECK(CalledOnValidThread()); | 497 DCHECK(CalledOnValidThread()); |
| 457 entry->set_last_used(base::Time::Now()); | 498 entry->set_last_used(base::Time::Now()); |
| 458 if (entry->IsPersistent()) { | 499 if (entry->IsPersistent()) { |
| (...skipping 24 matching lines...) Expand all Loading... | |
| 483 if (device_permissions) { | 524 if (device_permissions) { |
| 484 extension_id_to_device_permissions_.erase(extension_id); | 525 extension_id_to_device_permissions_.erase(extension_id); |
| 485 delete device_permissions; | 526 delete device_permissions; |
| 486 } | 527 } |
| 487 } | 528 } |
| 488 | 529 |
| 489 DevicePermissionsManager::DevicePermissionsManager( | 530 DevicePermissionsManager::DevicePermissionsManager( |
| 490 content::BrowserContext* context) | 531 content::BrowserContext* context) |
| 491 : context_(context), | 532 : context_(context), |
| 492 process_manager_observer_(this), | 533 process_manager_observer_(this), |
| 493 usb_service_observer_(this) { | 534 helper_(nullptr), |
| 535 weak_factory_(this) { | |
| 494 process_manager_observer_.Add(ProcessManager::Get(context)); | 536 process_manager_observer_.Add(ProcessManager::Get(context)); |
| 495 } | 537 } |
| 496 | 538 |
| 497 DevicePermissionsManager::~DevicePermissionsManager() { | 539 DevicePermissionsManager::~DevicePermissionsManager() { |
| 498 for (const auto& map_entry : extension_id_to_device_permissions_) { | 540 for (const auto& map_entry : extension_id_to_device_permissions_) { |
| 499 DevicePermissions* device_permissions = map_entry.second; | 541 DevicePermissions* device_permissions = map_entry.second; |
| 500 delete device_permissions; | 542 delete device_permissions; |
| 501 } | 543 } |
| 544 if (helper_) { | |
| 545 BrowserThread::DeleteSoon(BrowserThread::FILE, FROM_HERE, helper_); | |
| 546 helper_ = nullptr; | |
| 547 } | |
| 502 } | 548 } |
| 503 | 549 |
| 504 DevicePermissions* DevicePermissionsManager::Get( | 550 DevicePermissions* DevicePermissionsManager::Get( |
| 505 const std::string& extension_id) const { | 551 const std::string& extension_id) const { |
| 506 std::map<std::string, DevicePermissions*>::const_iterator it = | 552 std::map<std::string, DevicePermissions*>::const_iterator it = |
| 507 extension_id_to_device_permissions_.find(extension_id); | 553 extension_id_to_device_permissions_.find(extension_id); |
| 508 if (it != extension_id_to_device_permissions_.end()) { | 554 if (it != extension_id_to_device_permissions_.end()) { |
| 509 return it->second; | 555 return it->second; |
| 510 } | 556 } |
| 511 | 557 |
| (...skipping 21 matching lines...) Expand all Loading... | |
| 533 // suspended all ephemeral device permissions are cleared. | 579 // suspended all ephemeral device permissions are cleared. |
| 534 for (const auto& map_entry : device_permissions->ephemeral_devices_) { | 580 for (const auto& map_entry : device_permissions->ephemeral_devices_) { |
| 535 device_permissions->entries_.erase(map_entry.second); | 581 device_permissions->entries_.erase(map_entry.second); |
| 536 } | 582 } |
| 537 device_permissions->ephemeral_devices_.clear(); | 583 device_permissions->ephemeral_devices_.clear(); |
| 538 } | 584 } |
| 539 } | 585 } |
| 540 | 586 |
| 541 void DevicePermissionsManager::OnDeviceRemoved( | 587 void DevicePermissionsManager::OnDeviceRemoved( |
| 542 scoped_refptr<UsbDevice> device) { | 588 scoped_refptr<UsbDevice> device) { |
| 589 DCHECK(CalledOnValidThread()); | |
| 543 for (const auto& map_entry : extension_id_to_device_permissions_) { | 590 for (const auto& map_entry : extension_id_to_device_permissions_) { |
| 544 // An ephemeral device cannot be identified if it is reconnected and so | 591 // An ephemeral device cannot be identified if it is reconnected and so |
| 545 // permission to access it is cleared on disconnect. | 592 // permission to access it is cleared on disconnect. |
| 546 DevicePermissions* device_permissions = map_entry.second; | 593 DevicePermissions* device_permissions = map_entry.second; |
| 547 const auto& device_entry = | 594 const auto& device_entry = |
| 548 device_permissions->ephemeral_devices_.find(device); | 595 device_permissions->ephemeral_devices_.find(device); |
| 549 if (device_entry != device_permissions->ephemeral_devices_.end()) { | 596 if (device_entry != device_permissions->ephemeral_devices_.end()) { |
| 550 device_permissions->entries_.erase(device_entry->second); | 597 device_permissions->entries_.erase(device_entry->second); |
| 551 device_permissions->ephemeral_devices_.erase(device); | 598 device_permissions->ephemeral_devices_.erase(device); |
| 552 } | 599 } |
| (...skipping 30 matching lines...) Expand all Loading... | |
| 583 | 630 |
| 584 BrowserContext* DevicePermissionsManagerFactory::GetBrowserContextToUse( | 631 BrowserContext* DevicePermissionsManagerFactory::GetBrowserContextToUse( |
| 585 BrowserContext* context) const { | 632 BrowserContext* context) const { |
| 586 // Return the original (possibly off-the-record) browser context so that a | 633 // Return the original (possibly off-the-record) browser context so that a |
| 587 // separate instance of the DevicePermissionsManager is used in incognito | 634 // separate instance of the DevicePermissionsManager is used in incognito |
| 588 // mode. The parent class's implemenation returns NULL. | 635 // mode. The parent class's implemenation returns NULL. |
| 589 return context; | 636 return context; |
| 590 } | 637 } |
| 591 | 638 |
| 592 } // namespace extensions | 639 } // namespace extensions |
| OLD | NEW |