OLD | NEW |
1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "extensions/browser/api/device_permissions_manager.h" | 5 #include "extensions/browser/api/device_permissions_manager.h" |
6 | 6 |
| 7 #include "base/bind.h" |
7 #include "base/memory/singleton.h" | 8 #include "base/memory/singleton.h" |
8 #include "base/strings/string_number_conversions.h" | 9 #include "base/strings/string_number_conversions.h" |
9 #include "base/strings/stringprintf.h" | 10 #include "base/strings/stringprintf.h" |
10 #include "base/strings/utf_string_conversions.h" | 11 #include "base/strings/utf_string_conversions.h" |
11 #include "base/values.h" | 12 #include "base/values.h" |
12 #include "components/keyed_service/content/browser_context_dependency_manager.h" | 13 #include "components/keyed_service/content/browser_context_dependency_manager.h" |
| 14 #include "content/public/browser/browser_thread.h" |
13 #include "device/core/device_client.h" | 15 #include "device/core/device_client.h" |
14 #include "device/usb/usb_device.h" | 16 #include "device/usb/usb_device.h" |
15 #include "device/usb/usb_ids.h" | 17 #include "device/usb/usb_ids.h" |
16 #include "extensions/browser/extension_host.h" | 18 #include "extensions/browser/extension_host.h" |
17 #include "extensions/browser/extension_prefs.h" | 19 #include "extensions/browser/extension_prefs.h" |
18 #include "extensions/browser/extensions_browser_client.h" | 20 #include "extensions/browser/extensions_browser_client.h" |
19 #include "extensions/browser/process_manager.h" | 21 #include "extensions/browser/process_manager.h" |
20 #include "extensions/browser/process_manager_factory.h" | 22 #include "extensions/browser/process_manager_factory.h" |
21 #include "extensions/strings/grit/extensions_strings.h" | 23 #include "extensions/strings/grit/extensions_strings.h" |
22 #include "ui/base/l10n/l10n_util.h" | 24 #include "ui/base/l10n/l10n_util.h" |
23 | 25 |
24 namespace extensions { | 26 namespace extensions { |
25 | 27 |
26 using content::BrowserContext; | 28 using content::BrowserContext; |
| 29 using content::BrowserThread; |
27 using device::UsbDevice; | 30 using device::UsbDevice; |
| 31 using device::UsbService; |
28 using extensions::APIPermission; | 32 using extensions::APIPermission; |
29 using extensions::Extension; | 33 using extensions::Extension; |
30 using extensions::ExtensionHost; | 34 using extensions::ExtensionHost; |
31 using extensions::ExtensionPrefs; | 35 using extensions::ExtensionPrefs; |
32 | 36 |
33 namespace { | 37 namespace { |
34 | 38 |
35 // Preference keys | 39 // Preference keys |
36 | 40 |
37 // The device that the app has permission to access. | 41 // The device that the app has permission to access. |
(...skipping 332 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
370 const std::string& extension_id) { | 374 const std::string& extension_id) { |
371 ExtensionPrefs* prefs = ExtensionPrefs::Get(context); | 375 ExtensionPrefs* prefs = ExtensionPrefs::Get(context); |
372 entries_ = GetDevicePermissionEntries(prefs, extension_id); | 376 entries_ = GetDevicePermissionEntries(prefs, extension_id); |
373 } | 377 } |
374 | 378 |
375 DevicePermissions::DevicePermissions(const DevicePermissions* original) | 379 DevicePermissions::DevicePermissions(const DevicePermissions* original) |
376 : entries_(original->entries_), | 380 : entries_(original->entries_), |
377 ephemeral_devices_(original->ephemeral_devices_) { | 381 ephemeral_devices_(original->ephemeral_devices_) { |
378 } | 382 } |
379 | 383 |
| 384 class DevicePermissionsManager::FileThreadHelper : public UsbService::Observer { |
| 385 public: |
| 386 FileThreadHelper( |
| 387 base::WeakPtr<DevicePermissionsManager> device_permissions_manager) |
| 388 : device_permissions_manager_(device_permissions_manager), |
| 389 observer_(this) {} |
| 390 virtual ~FileThreadHelper() {} |
| 391 |
| 392 void Start() { |
| 393 DCHECK_CURRENTLY_ON(BrowserThread::FILE); |
| 394 UsbService* service = device::DeviceClient::Get()->GetUsbService(); |
| 395 if (service) { |
| 396 observer_.Add(service); |
| 397 } |
| 398 } |
| 399 |
| 400 private: |
| 401 void OnDeviceRemoved(scoped_refptr<UsbDevice> device) override { |
| 402 DCHECK_CURRENTLY_ON(BrowserThread::FILE); |
| 403 BrowserThread::PostTask( |
| 404 BrowserThread::UI, FROM_HERE, |
| 405 base::Bind(&DevicePermissionsManager::OnDeviceRemoved, |
| 406 device_permissions_manager_, device)); |
| 407 } |
| 408 |
| 409 base::WeakPtr<DevicePermissionsManager> device_permissions_manager_; |
| 410 ScopedObserver<UsbService, UsbService::Observer> observer_; |
| 411 }; |
| 412 |
380 // static | 413 // static |
381 DevicePermissionsManager* DevicePermissionsManager::Get( | 414 DevicePermissionsManager* DevicePermissionsManager::Get( |
382 BrowserContext* context) { | 415 BrowserContext* context) { |
383 return DevicePermissionsManagerFactory::GetForBrowserContext(context); | 416 return DevicePermissionsManagerFactory::GetForBrowserContext(context); |
384 } | 417 } |
385 | 418 |
386 scoped_ptr<DevicePermissions> DevicePermissionsManager::GetForExtension( | 419 scoped_ptr<DevicePermissions> DevicePermissionsManager::GetForExtension( |
387 const std::string& extension_id) { | 420 const std::string& extension_id) { |
388 DCHECK(CalledOnValidThread()); | 421 DCHECK(CalledOnValidThread()); |
389 return make_scoped_ptr(new DevicePermissions(GetOrInsert(extension_id))); | 422 return make_scoped_ptr(new DevicePermissions(GetOrInsert(extension_id))); |
(...skipping 44 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
434 } else if (!ContainsKey(device_permissions->ephemeral_devices_, device)) { | 467 } else if (!ContainsKey(device_permissions->ephemeral_devices_, device)) { |
435 // Non-persistent devices cannot be reliably identified when they are | 468 // Non-persistent devices cannot be reliably identified when they are |
436 // reconnected so such devices are only remembered until disconnect. | 469 // reconnected so such devices are only remembered until disconnect. |
437 // Register an observer here so that this set doesn't grow undefinitely. | 470 // Register an observer here so that this set doesn't grow undefinitely. |
438 device_permissions->entries_.insert(device_entry); | 471 device_permissions->entries_.insert(device_entry); |
439 device_permissions->ephemeral_devices_[device] = device_entry; | 472 device_permissions->ephemeral_devices_[device] = device_entry; |
440 | 473 |
441 // Only start observing when an ephemeral device has been added so that | 474 // Only start observing when an ephemeral device has been added so that |
442 // UsbService is not automatically initialized on profile creation (which it | 475 // UsbService is not automatically initialized on profile creation (which it |
443 // would be if this call were in the constructor). | 476 // would be if this call were in the constructor). |
444 device::UsbService* usb_service = | 477 if (!helper_) { |
445 device::DeviceClient::Get()->GetUsbService(); | 478 helper_ = new FileThreadHelper(weak_factory_.GetWeakPtr()); |
446 DCHECK(usb_service); | 479 // base::Unretained is safe because any task to delete helper_ will be |
447 if (!usb_service_observer_.IsObserving(usb_service)) { | 480 // executed after this call. |
448 usb_service_observer_.Add(usb_service); | 481 BrowserThread::PostTask( |
| 482 BrowserThread::FILE, FROM_HERE, |
| 483 base::Bind(&FileThreadHelper::Start, base::Unretained(helper_))); |
449 } | 484 } |
450 } | 485 } |
451 } | 486 } |
452 | 487 |
453 void DevicePermissionsManager::UpdateLastUsed( | 488 void DevicePermissionsManager::UpdateLastUsed( |
454 const std::string& extension_id, | 489 const std::string& extension_id, |
455 scoped_refptr<DevicePermissionEntry> entry) { | 490 scoped_refptr<DevicePermissionEntry> entry) { |
456 DCHECK(CalledOnValidThread()); | 491 DCHECK(CalledOnValidThread()); |
457 entry->set_last_used(base::Time::Now()); | 492 entry->set_last_used(base::Time::Now()); |
458 if (entry->IsPersistent()) { | 493 if (entry->IsPersistent()) { |
(...skipping 24 matching lines...) Expand all Loading... |
483 if (device_permissions) { | 518 if (device_permissions) { |
484 extension_id_to_device_permissions_.erase(extension_id); | 519 extension_id_to_device_permissions_.erase(extension_id); |
485 delete device_permissions; | 520 delete device_permissions; |
486 } | 521 } |
487 } | 522 } |
488 | 523 |
489 DevicePermissionsManager::DevicePermissionsManager( | 524 DevicePermissionsManager::DevicePermissionsManager( |
490 content::BrowserContext* context) | 525 content::BrowserContext* context) |
491 : context_(context), | 526 : context_(context), |
492 process_manager_observer_(this), | 527 process_manager_observer_(this), |
493 usb_service_observer_(this) { | 528 helper_(nullptr), |
| 529 weak_factory_(this) { |
494 process_manager_observer_.Add(ProcessManager::Get(context)); | 530 process_manager_observer_.Add(ProcessManager::Get(context)); |
495 } | 531 } |
496 | 532 |
497 DevicePermissionsManager::~DevicePermissionsManager() { | 533 DevicePermissionsManager::~DevicePermissionsManager() { |
498 for (const auto& map_entry : extension_id_to_device_permissions_) { | 534 for (const auto& map_entry : extension_id_to_device_permissions_) { |
499 DevicePermissions* device_permissions = map_entry.second; | 535 DevicePermissions* device_permissions = map_entry.second; |
500 delete device_permissions; | 536 delete device_permissions; |
501 } | 537 } |
| 538 if (helper_) { |
| 539 BrowserThread::DeleteSoon(BrowserThread::FILE, FROM_HERE, helper_); |
| 540 helper_ = nullptr; |
| 541 } |
502 } | 542 } |
503 | 543 |
504 DevicePermissions* DevicePermissionsManager::Get( | 544 DevicePermissions* DevicePermissionsManager::Get( |
505 const std::string& extension_id) const { | 545 const std::string& extension_id) const { |
506 std::map<std::string, DevicePermissions*>::const_iterator it = | 546 std::map<std::string, DevicePermissions*>::const_iterator it = |
507 extension_id_to_device_permissions_.find(extension_id); | 547 extension_id_to_device_permissions_.find(extension_id); |
508 if (it != extension_id_to_device_permissions_.end()) { | 548 if (it != extension_id_to_device_permissions_.end()) { |
509 return it->second; | 549 return it->second; |
510 } | 550 } |
511 | 551 |
(...skipping 21 matching lines...) Expand all Loading... |
533 // suspended all ephemeral device permissions are cleared. | 573 // suspended all ephemeral device permissions are cleared. |
534 for (const auto& map_entry : device_permissions->ephemeral_devices_) { | 574 for (const auto& map_entry : device_permissions->ephemeral_devices_) { |
535 device_permissions->entries_.erase(map_entry.second); | 575 device_permissions->entries_.erase(map_entry.second); |
536 } | 576 } |
537 device_permissions->ephemeral_devices_.clear(); | 577 device_permissions->ephemeral_devices_.clear(); |
538 } | 578 } |
539 } | 579 } |
540 | 580 |
541 void DevicePermissionsManager::OnDeviceRemoved( | 581 void DevicePermissionsManager::OnDeviceRemoved( |
542 scoped_refptr<UsbDevice> device) { | 582 scoped_refptr<UsbDevice> device) { |
| 583 DCHECK(CalledOnValidThread()); |
543 for (const auto& map_entry : extension_id_to_device_permissions_) { | 584 for (const auto& map_entry : extension_id_to_device_permissions_) { |
544 // An ephemeral device cannot be identified if it is reconnected and so | 585 // An ephemeral device cannot be identified if it is reconnected and so |
545 // permission to access it is cleared on disconnect. | 586 // permission to access it is cleared on disconnect. |
546 DevicePermissions* device_permissions = map_entry.second; | 587 DevicePermissions* device_permissions = map_entry.second; |
547 const auto& device_entry = | 588 const auto& device_entry = |
548 device_permissions->ephemeral_devices_.find(device); | 589 device_permissions->ephemeral_devices_.find(device); |
549 if (device_entry != device_permissions->ephemeral_devices_.end()) { | 590 if (device_entry != device_permissions->ephemeral_devices_.end()) { |
550 device_permissions->entries_.erase(device_entry->second); | 591 device_permissions->entries_.erase(device_entry->second); |
551 device_permissions->ephemeral_devices_.erase(device); | 592 device_permissions->ephemeral_devices_.erase(device); |
552 } | 593 } |
(...skipping 30 matching lines...) Expand all Loading... |
583 | 624 |
584 BrowserContext* DevicePermissionsManagerFactory::GetBrowserContextToUse( | 625 BrowserContext* DevicePermissionsManagerFactory::GetBrowserContextToUse( |
585 BrowserContext* context) const { | 626 BrowserContext* context) const { |
586 // Return the original (possibly off-the-record) browser context so that a | 627 // Return the original (possibly off-the-record) browser context so that a |
587 // separate instance of the DevicePermissionsManager is used in incognito | 628 // separate instance of the DevicePermissionsManager is used in incognito |
588 // mode. The parent class's implemenation returns NULL. | 629 // mode. The parent class's implemenation returns NULL. |
589 return context; | 630 return context; |
590 } | 631 } |
591 | 632 |
592 } // namespace extensions | 633 } // namespace extensions |
OLD | NEW |