d62097e067
* chore: bump chromium in DEPS to 130.0.6673.0 * chore: bump chromium in DEPS to 130.0.6675.0 * chore: bump chromium in DEPS to 130.0.6677.2 * chore: bump chromium in DEPS to 130.0.6679.1 * chore: bump chromium in DEPS to 130.0.6681.1 * chore: bump chromium in DEPS to 130.0.6683.2 * chore: bump chromium in DEPS to 130.0.6685.0 * chore: bump chromium in DEPS to 130.0.6687.0 * chore: bump chromium in DEPS to 130.0.6689.0 * chore: bump chromium in DEPS to 130.0.6691.1 * chore: bump chromium in DEPS to 130.0.6693.1 * chore: bump chromium in DEPS to 130.0.6695.1 * chore: bump chromium in DEPS to 130.0.6697.1 * chore: bump chromium in DEPS to 130.0.6699.1 * chore: bump chromium in DEPS to 130.0.6701.1 * chore: bump chromium in DEPS to 130.0.6703.1 * chore: bump chromium in DEPS to 130.0.6705.1 * chore: bump chromium in DEPS to 130.0.6707.1 * chore: bump chromium in DEPS to 130.0.6709.1 * chore: bump chromium in DEPS to 130.0.6711.1 * chore: bump chromium in DEPS to 130.0.6713.1 * chore: bump chromium in DEPS to 130.0.6715.2 * chore: bump chromium in DEPS to 130.0.6717.0 * chore: bump chromium in DEPS to 130.0.6719.1 * chore: bump chromium in DEPS to 130.0.6720.1 * chore: bump chromium in DEPS to 130.0.6723.1 * chore: bump chromium in DEPS to 130.0.6723.4 * chore: bump chromium in DEPS to 130.0.6723.6 * chore: bump chromium to 130.0.6695.0 (main) (#43454) * chore: bump chromium in DEPS to 130.0.6673.0 * chore: bump chromium in DEPS to 130.0.6675.0 * chore: bump chromium in DEPS to 130.0.6677.2 * chore: bump chromium in DEPS to 130.0.6679.0 * 5802981: [Partitioned Popins] UKM https://chromium-review.googlesource.com/c/chromium/src/+/5802981 * 5799275: ash: Create //chrome/browser/ui/ash/web_view https://chromium-review.googlesource.com/c/chromium/src/+/5799275 * 5791853: [PWA] Allow WebContentsImpl::CreateNewWindow() to use new web contents for loading url https://chromium-review.googlesource.com/c/chromium/src/+/5791853 * 5805208: Move third_party/jacoco to a cipd/ subdirectory. https://chromium-review.googlesource.com/c/chromium/src/+/5805208 * chore: fixup patch indices * 5771091: Introduce InputManager class for handling input in Viz. https://chromium-review.googlesource.com/c/chromium/src/+/5771091 * 5498921: [Permission] Remove SubscribeToPermissionStatusChange from PermissionManager https://chromium-review.googlesource.com/c/chromium/src/+/5498921 * 5791853: [PWA] Allow WebContentsImpl::CreateNewWindow() to use new web contents for loading url https://chromium-review.googlesource.com/c/chromium/src/+/5791853 * 5801311: Don't use int for bindings https://chromium-review.googlesource.com/c/chromium/src/+/5801311 * 5548827: [Web Install] Define the web-app-installation PermissionPolicy https://chromium-review.googlesource.com/c/chromium/src/+/5548827 * 5786325: Add Infrastructure for Hand tracking permission https://chromium-review.googlesource.com/c/chromium/src/+/5786325 * chore: fixup patch indices * chore: bump chromium in DEPS to 130.0.6681.0 * [Views AX] Move BrowserAccessibility* to //ui/accessibility/platform Xref: https://chromium-review.googlesource.com/c/chromium/src/+/5520052 * chore: e patches all * Don't have default arguments on virtual functions in render_frame_host.h https://chromium-review.googlesource.com/c/chromium/src/+/5809399 * test: log if loadURL fails in base url test * chore: bump chromium in DEPS to 130.0.6683.2 * chore: fix support_mixed_sandbox_with_zygote.patch content: restore old DisableJit behavior https://chromium-review.googlesource.com/c/chromium/src/+/5804255 * chore: update patch indices * chore: bump chromium in DEPS to 130.0.6685.0 * Parallel process launching Xref: https://chromium-review.googlesource.com/c/chromium/src/+/5015584 * chore: update feat_expose_documentloader_setdefersloading_on_webdocumentloader.patch No manual changes; patch applied with fuzz 1 * chore: e patches all * chore: bump chromium in DEPS to 130.0.6687.0 * chore: bump chromium in DEPS to 130.0.6689.0 * chore: bump chromium in DEPS to 130.0.6691.0 * chore: bump chromium in DEPS to 130.0.6693.0 * chore: update patches * chore: bump chromium in DEPS to 130.0.6695.0 * chore: free up macos disk space as soon as possible * 5824143: Use checked in source lists for third_party/boringssl https://chromium-review.googlesource.com/c/chromium/src/+/5824143 * chore: update patches * 5824122: Extensions: Add a new view type enum for developer tools contexts https://chromium-review.googlesource.com/c/chromium/src/+/5824122 * 5806109: Option for JavaScriptExecuteRequestForTests() to ignore content settings https://chromium-review.googlesource.com/c/chromium/src/+/5806109 * build: free up disk space on gn check too * 5799369: [Refactoring] Make allow_http1_for_streaming_upload flags false. https://chromium-review.googlesource.com/c/chromium/src/+/5799369 * fixup! 5015584: Parallel process launching | https://chromium-review.googlesource.com/c/chromium/src/+/5015584 * Disable failing test for short-term See: https://github.com/electron/electron/issues/43730 * oops --------- Co-authored-by: electron-roller[bot] <84116207+electron-roller[bot]@users.noreply.github.com> Co-authored-by: Shelley Vohr <shelley.vohr@gmail.com> Co-authored-by: Charles Kerr <charles@charleskerr.com> Co-authored-by: Keeley Hammond <khammond@slack-corp.com> Co-authored-by: John Kleinschmidt <jkleinsc@electronjs.org> Co-authored-by: clavin <clavin@electronjs.org> (cherry picked from commit4bcbc955dd
) * build: update appveyor image to latest version (#43772) Co-authored-by: electron-appveyor-updater[bot] <161660339+electron-appveyor-updater[bot]@users.noreply.github.com> (cherry picked from commit02fd8bbcc1
) * chore: fixup patches * chore: fixup patch * chore: bump chromium in DEPS to 130.0.6723.6 * chore: update filenames.libcxx.gni * test: re-enable disabled test * 5844369: controlledframe: Disable Web Bluetooth for <webview> & <controlledframe> https://chromium-review.googlesource.com/c/chromium/src/+/5844369 (cherry picked from commit 0ac4852763f0dce3468d30907620211f34c4104b) * (multiple CLs): Use an opaque type for FrameTreeNode IDs 5807683: Use an opaque type for FrameTreeNode IDs, part 1 | https://chromium-review.googlesource.com/c/chromium/src/+/5807683 5829746: Use an opaque type for FrameTreeNode IDs, part 2 | https://chromium-review.googlesource.com/c/chromium/src/+/5829746 5836903: Use an opaque type for FrameTreeNode IDs, part 7 | https://chromium-review.googlesource.com/c/chromium/src/+/5836903 5837249: Use an opaque type for FrameTreeNode IDs, part 8 | https://chromium-review.googlesource.com/c/chromium/src/+/5837249 5836564: Use an opaque type for FrameTreeNode IDs, part 12 | https://chromium-review.googlesource.com/c/chromium/src/+/5836564 5837180: Use an opaque type for FrameTreeNode IDs, part 15 | https://chromium-review.googlesource.com/c/chromium/src/+/5837180 (cherry picked from commit 1dd67f5241a3a24ea5a20f11efefdd2afc520a26) * 5822889: [task] Make GetForegroundTaskRunner non-virtual https://chromium-review.googlesource.com/c/v8/v8/+/5822889 (cherry picked from commit ae1e7232a35260cce8c4303d5f9809aa166bf19b) * 5833297: Remove unused inner WebContents attach params https://chromium-review.googlesource.com/c/chromium/src/+/5833297 (cherry picked from commit 390bb42e39eba66cd86221461d2822bbd85012df) * 5806403: Shift PowerMonitor to non static https://chromium-review.googlesource.com/c/chromium/src/+/5806403 (cherry picked from commit 128e3826e13768e89c7f5117de451ebd2b3ec9a4) * 5666874: [3/N] Remove old OnPowerChange in PowerObserver https://chromium-review.googlesource.com/c/chromium/src/+/5666874 (cherry picked from commit 6ea6ea14ae23ced6465b94fd753f8c80ced4b13b) * 5829085: [v8] Differentiate between UserVisible and BestEffort task runners https://chromium-review.googlesource.com/c/chromium/src/+/5829085 (cherry picked from commit 1db28ee4a51fb2593e4c11bcaa538a6524abe48c) * 5791112: [webrtc] Use `c/b/permissions/system` for system permissions https://chromium-review.googlesource.com/c/chromium/src/+/5791112 (cherry picked from commit 50d4a71923ca99653bf5733145bdc6e21f783b2d) * fixup! (multiple CLs): Use an opaque type for FrameTreeNode IDs (cherry picked from commit 9271130e160d479b3d286d295045b9d4acd2005c) * fixup! 5791112: [webrtc] Use `c/b/permissions/system` for system permissions https://chromium-review.googlesource.com/c/chromium/src/+/5791112 (cherry picked from commit db2c8c69d0c7bdee881997847dfc3c8abf32197c) * 5825636: [Extensions] Create WebContentsObservers with ExtensionsBrowserClient https://chromium-review.googlesource.com/c/chromium/src/+/5825636 (cherry picked from commit f2c3d09ccd141dbe2f4b62957b72f98bf8a010ae) * 5854811: Use kNotAllowedError instead of kSecurityError for Web MIDI https://chromium-review.googlesource.com/c/chromium/src/+/5854811 * test: fix should support base url for data urls test Caused by https://chromium-review.googlesource.com/c/chromium/src/+/5802682 * test: fixup extensions can cancel http requests * chore: document custom protocol handling on Windows change due to Non-Special Scheme URLs shipping https://chromium-review.googlesource.com/c/chromium/src/+/5802682 --------- Co-authored-by: electron-roller[bot] <84116207+electron-roller[bot]@users.noreply.github.com> Co-authored-by: electron-appveyor-updater[bot] <161660339+electron-appveyor-updater[bot]@users.noreply.github.com> Co-authored-by: John Kleinschmidt <jkleinsc@electronjs.org> Co-authored-by: clavin <clavin@electronjs.org>
419 lines
15 KiB
C++
419 lines
15 KiB
C++
// Copyright (c) 2016 GitHub, Inc.
|
|
// Use of this source code is governed by the MIT license that can be
|
|
// found in the LICENSE file.
|
|
|
|
#include "shell/browser/electron_permission_manager.h"
|
|
|
|
#include <memory>
|
|
#include <utility>
|
|
#include <vector>
|
|
|
|
#include "base/values.h"
|
|
#include "content/browser/permissions/permission_util.h" // nogncheck
|
|
#include "content/public/browser/child_process_security_policy.h"
|
|
#include "content/public/browser/global_routing_id.h"
|
|
#include "content/public/browser/permission_controller.h"
|
|
#include "content/public/browser/render_frame_host.h"
|
|
#include "content/public/browser/render_process_host.h"
|
|
#include "content/public/browser/render_view_host.h"
|
|
#include "content/public/browser/web_contents.h"
|
|
#include "gin/data_object_builder.h"
|
|
#include "shell/browser/api/electron_api_web_contents.h"
|
|
#include "shell/browser/electron_browser_context.h"
|
|
#include "shell/browser/electron_browser_main_parts.h"
|
|
#include "shell/browser/web_contents_permission_helper.h"
|
|
#include "shell/browser/web_contents_preferences.h"
|
|
#include "shell/common/gin_converters/content_converter.h"
|
|
#include "shell/common/gin_converters/frame_converter.h"
|
|
#include "shell/common/gin_converters/usb_protected_classes_converter.h"
|
|
#include "shell/common/gin_converters/value_converter.h"
|
|
#include "shell/common/gin_helper/dictionary.h"
|
|
#include "shell/common/gin_helper/event_emitter_caller.h"
|
|
#include "third_party/blink/public/common/permissions/permission_utils.h"
|
|
|
|
namespace electron {
|
|
|
|
namespace {
|
|
|
|
bool WebContentsDestroyed(content::RenderFrameHost* rfh) {
|
|
content::WebContents* web_contents =
|
|
content::WebContents::FromRenderFrameHost(rfh);
|
|
if (!web_contents)
|
|
return true;
|
|
return web_contents->IsBeingDestroyed();
|
|
}
|
|
|
|
void PermissionRequestResponseCallbackWrapper(
|
|
ElectronPermissionManager::StatusCallback callback,
|
|
const std::vector<blink::mojom::PermissionStatus>& vector) {
|
|
std::move(callback).Run(vector[0]);
|
|
}
|
|
|
|
} // namespace
|
|
|
|
class ElectronPermissionManager::PendingRequest {
|
|
public:
|
|
PendingRequest(content::RenderFrameHost* render_frame_host,
|
|
const std::vector<blink::PermissionType>& permissions,
|
|
StatusesCallback callback)
|
|
: render_frame_host_id_(render_frame_host->GetGlobalId()),
|
|
callback_(std::move(callback)),
|
|
permissions_(permissions),
|
|
results_(permissions.size(), blink::mojom::PermissionStatus::DENIED),
|
|
remaining_results_(permissions.size()) {}
|
|
|
|
void SetPermissionStatus(int permission_id,
|
|
blink::mojom::PermissionStatus status) {
|
|
DCHECK(!IsComplete());
|
|
|
|
if (status == blink::mojom::PermissionStatus::GRANTED) {
|
|
const auto permission = permissions_[permission_id];
|
|
if (permission == blink::PermissionType::MIDI_SYSEX) {
|
|
content::ChildProcessSecurityPolicy::GetInstance()
|
|
->GrantSendMidiSysExMessage(render_frame_host_id_.child_id);
|
|
} else if (permission == blink::PermissionType::GEOLOCATION) {
|
|
ElectronBrowserMainParts::Get()
|
|
->GetGeolocationControl()
|
|
->UserDidOptIntoLocationServices();
|
|
}
|
|
}
|
|
|
|
results_[permission_id] = status;
|
|
--remaining_results_;
|
|
}
|
|
|
|
content::RenderFrameHost* GetRenderFrameHost() {
|
|
return content::RenderFrameHost::FromID(render_frame_host_id_);
|
|
}
|
|
|
|
bool IsComplete() const { return remaining_results_ == 0; }
|
|
|
|
void RunCallback() {
|
|
if (!callback_.is_null()) {
|
|
std::move(callback_).Run(results_);
|
|
}
|
|
}
|
|
|
|
private:
|
|
content::GlobalRenderFrameHostId render_frame_host_id_;
|
|
StatusesCallback callback_;
|
|
std::vector<blink::PermissionType> permissions_;
|
|
std::vector<blink::mojom::PermissionStatus> results_;
|
|
size_t remaining_results_;
|
|
};
|
|
|
|
ElectronPermissionManager::ElectronPermissionManager() = default;
|
|
|
|
ElectronPermissionManager::~ElectronPermissionManager() = default;
|
|
|
|
void ElectronPermissionManager::SetPermissionRequestHandler(
|
|
const RequestHandler& handler) {
|
|
if (handler.is_null() && !pending_requests_.IsEmpty()) {
|
|
for (PendingRequestsMap::iterator iter(&pending_requests_); !iter.IsAtEnd();
|
|
iter.Advance()) {
|
|
auto* request = iter.GetCurrentValue();
|
|
if (!WebContentsDestroyed(request->GetRenderFrameHost()))
|
|
request->RunCallback();
|
|
}
|
|
pending_requests_.Clear();
|
|
}
|
|
request_handler_ = handler;
|
|
}
|
|
|
|
void ElectronPermissionManager::SetPermissionCheckHandler(
|
|
const CheckHandler& handler) {
|
|
check_handler_ = handler;
|
|
}
|
|
|
|
void ElectronPermissionManager::SetDevicePermissionHandler(
|
|
const DeviceCheckHandler& handler) {
|
|
device_permission_handler_ = handler;
|
|
}
|
|
|
|
void ElectronPermissionManager::SetProtectedUSBHandler(
|
|
const ProtectedUSBHandler& handler) {
|
|
protected_usb_handler_ = handler;
|
|
}
|
|
|
|
void ElectronPermissionManager::SetBluetoothPairingHandler(
|
|
const BluetoothPairingHandler& handler) {
|
|
bluetooth_pairing_handler_ = handler;
|
|
}
|
|
|
|
void ElectronPermissionManager::RequestPermissionWithDetails(
|
|
blink::PermissionType permission,
|
|
content::RenderFrameHost* render_frame_host,
|
|
const GURL& requesting_origin,
|
|
bool user_gesture,
|
|
base::Value::Dict details,
|
|
StatusCallback response_callback) {
|
|
if (render_frame_host->IsNestedWithinFencedFrame()) {
|
|
std::move(response_callback).Run(blink::mojom::PermissionStatus::DENIED);
|
|
return;
|
|
}
|
|
|
|
RequestPermissionsWithDetails(
|
|
render_frame_host,
|
|
content::PermissionRequestDescription(permission, user_gesture,
|
|
requesting_origin),
|
|
std::move(details),
|
|
base::BindOnce(PermissionRequestResponseCallbackWrapper,
|
|
std::move(response_callback)));
|
|
}
|
|
|
|
void ElectronPermissionManager::RequestPermissions(
|
|
content::RenderFrameHost* render_frame_host,
|
|
const content::PermissionRequestDescription& request_description,
|
|
StatusesCallback callback) {
|
|
if (render_frame_host->IsNestedWithinFencedFrame()) {
|
|
std::move(callback).Run(std::vector<blink::mojom::PermissionStatus>(
|
|
request_description.permissions.size(),
|
|
blink::mojom::PermissionStatus::DENIED));
|
|
return;
|
|
}
|
|
|
|
RequestPermissionsWithDetails(render_frame_host, request_description, {},
|
|
std::move(callback));
|
|
}
|
|
|
|
void ElectronPermissionManager::RequestPermissionsWithDetails(
|
|
content::RenderFrameHost* render_frame_host,
|
|
const content::PermissionRequestDescription& request_description,
|
|
base::Value::Dict details,
|
|
StatusesCallback response_callback) {
|
|
auto& permissions = request_description.permissions;
|
|
if (permissions.empty()) {
|
|
std::move(response_callback).Run({});
|
|
return;
|
|
}
|
|
|
|
if (request_handler_.is_null()) {
|
|
std::vector<blink::mojom::PermissionStatus> statuses;
|
|
for (auto& permission : permissions) {
|
|
if (permission == blink::PermissionType::MIDI_SYSEX) {
|
|
content::ChildProcessSecurityPolicy::GetInstance()
|
|
->GrantSendMidiSysExMessage(
|
|
render_frame_host->GetProcess()->GetID());
|
|
} else if (permission == blink::PermissionType::GEOLOCATION) {
|
|
ElectronBrowserMainParts::Get()
|
|
->GetGeolocationControl()
|
|
->UserDidOptIntoLocationServices();
|
|
}
|
|
statuses.push_back(blink::mojom::PermissionStatus::GRANTED);
|
|
}
|
|
std::move(response_callback).Run(statuses);
|
|
return;
|
|
}
|
|
|
|
auto* web_contents =
|
|
content::WebContents::FromRenderFrameHost(render_frame_host);
|
|
int request_id = pending_requests_.Add(std::make_unique<PendingRequest>(
|
|
render_frame_host, permissions, std::move(response_callback)));
|
|
|
|
details.Set("requestingUrl", render_frame_host->GetLastCommittedURL().spec());
|
|
details.Set("isMainFrame", render_frame_host->GetParent() == nullptr);
|
|
base::Value dict_value(std::move(details));
|
|
|
|
for (size_t i = 0; i < permissions.size(); ++i) {
|
|
auto permission = permissions[i];
|
|
const auto callback =
|
|
base::BindRepeating(&ElectronPermissionManager::OnPermissionResponse,
|
|
base::Unretained(this), request_id, i);
|
|
request_handler_.Run(web_contents, permission, callback, dict_value);
|
|
}
|
|
}
|
|
|
|
void ElectronPermissionManager::OnPermissionResponse(
|
|
int request_id,
|
|
int permission_id,
|
|
blink::mojom::PermissionStatus status) {
|
|
auto* pending_request = pending_requests_.Lookup(request_id);
|
|
if (!pending_request)
|
|
return;
|
|
|
|
pending_request->SetPermissionStatus(permission_id, status);
|
|
if (pending_request->IsComplete()) {
|
|
pending_request->RunCallback();
|
|
pending_requests_.Remove(request_id);
|
|
}
|
|
}
|
|
|
|
void ElectronPermissionManager::ResetPermission(
|
|
blink::PermissionType permission,
|
|
const GURL& requesting_origin,
|
|
const GURL& embedding_origin) {}
|
|
|
|
void ElectronPermissionManager::RequestPermissionsFromCurrentDocument(
|
|
content::RenderFrameHost* render_frame_host,
|
|
const content::PermissionRequestDescription& request_description,
|
|
base::OnceCallback<void(const std::vector<blink::mojom::PermissionStatus>&)>
|
|
callback) {
|
|
if (render_frame_host->IsNestedWithinFencedFrame()) {
|
|
std::move(callback).Run(std::vector<blink::mojom::PermissionStatus>(
|
|
request_description.permissions.size(),
|
|
blink::mojom::PermissionStatus::DENIED));
|
|
return;
|
|
}
|
|
|
|
RequestPermissionsWithDetails(render_frame_host, request_description, {},
|
|
std::move(callback));
|
|
}
|
|
|
|
blink::mojom::PermissionStatus ElectronPermissionManager::GetPermissionStatus(
|
|
blink::PermissionType permission,
|
|
const GURL& requesting_origin,
|
|
const GURL& embedding_origin) {
|
|
base::Value::Dict details;
|
|
details.Set("embeddingOrigin", embedding_origin.spec());
|
|
bool granted = CheckPermissionWithDetails(permission, {}, requesting_origin,
|
|
std::move(details));
|
|
return granted ? blink::mojom::PermissionStatus::GRANTED
|
|
: blink::mojom::PermissionStatus::DENIED;
|
|
}
|
|
|
|
content::PermissionResult
|
|
ElectronPermissionManager::GetPermissionResultForOriginWithoutContext(
|
|
blink::PermissionType permission,
|
|
const url::Origin& requesting_origin,
|
|
const url::Origin& embedding_origin) {
|
|
blink::mojom::PermissionStatus status = GetPermissionStatus(
|
|
permission, requesting_origin.GetURL(), embedding_origin.GetURL());
|
|
return content::PermissionResult(
|
|
status, content::PermissionStatusSource::UNSPECIFIED);
|
|
}
|
|
|
|
void ElectronPermissionManager::CheckBluetoothDevicePair(
|
|
gin_helper::Dictionary details,
|
|
PairCallback pair_callback) const {
|
|
if (bluetooth_pairing_handler_.is_null()) {
|
|
base::Value::Dict response;
|
|
response.Set("confirmed", false);
|
|
std::move(pair_callback).Run(std::move(response));
|
|
} else {
|
|
bluetooth_pairing_handler_.Run(details, std::move(pair_callback));
|
|
}
|
|
}
|
|
|
|
bool ElectronPermissionManager::CheckPermissionWithDetails(
|
|
blink::PermissionType permission,
|
|
content::RenderFrameHost* render_frame_host,
|
|
const GURL& requesting_origin,
|
|
base::Value::Dict details) const {
|
|
if (check_handler_.is_null())
|
|
return true;
|
|
|
|
auto* web_contents =
|
|
render_frame_host
|
|
? content::WebContents::FromRenderFrameHost(render_frame_host)
|
|
: nullptr;
|
|
if (render_frame_host) {
|
|
details.Set("requestingUrl",
|
|
render_frame_host->GetLastCommittedURL().spec());
|
|
}
|
|
details.Set("isMainFrame",
|
|
render_frame_host && render_frame_host->GetParent() == nullptr);
|
|
switch (permission) {
|
|
case blink::PermissionType::AUDIO_CAPTURE:
|
|
details.Set("mediaType", "audio");
|
|
break;
|
|
case blink::PermissionType::VIDEO_CAPTURE:
|
|
details.Set("mediaType", "video");
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
return check_handler_.Run(web_contents, permission, requesting_origin,
|
|
base::Value(std::move(details)));
|
|
}
|
|
|
|
bool ElectronPermissionManager::CheckDevicePermission(
|
|
blink::PermissionType permission,
|
|
const url::Origin& origin,
|
|
const base::Value& device,
|
|
ElectronBrowserContext* browser_context) const {
|
|
if (device_permission_handler_.is_null())
|
|
return browser_context->CheckDevicePermission(origin, device, permission);
|
|
|
|
v8::Isolate* isolate = JavascriptEnvironment::GetIsolate();
|
|
v8::HandleScope scope(isolate);
|
|
v8::Local<v8::Object> details = gin::DataObjectBuilder(isolate)
|
|
.Set("deviceType", permission)
|
|
.Set("origin", origin.Serialize())
|
|
.Set("device", device.Clone())
|
|
.Build();
|
|
return device_permission_handler_.Run(details);
|
|
}
|
|
|
|
void ElectronPermissionManager::GrantDevicePermission(
|
|
blink::PermissionType permission,
|
|
const url::Origin& origin,
|
|
const base::Value& device,
|
|
ElectronBrowserContext* browser_context) const {
|
|
if (device_permission_handler_.is_null()) {
|
|
browser_context->GrantDevicePermission(origin, device, permission);
|
|
}
|
|
}
|
|
|
|
void ElectronPermissionManager::RevokeDevicePermission(
|
|
blink::PermissionType permission,
|
|
const url::Origin& origin,
|
|
const base::Value& device,
|
|
ElectronBrowserContext* browser_context) const {
|
|
browser_context->RevokeDevicePermission(origin, device, permission);
|
|
}
|
|
|
|
ElectronPermissionManager::USBProtectedClasses
|
|
ElectronPermissionManager::CheckProtectedUSBClasses(
|
|
const USBProtectedClasses& classes) const {
|
|
if (protected_usb_handler_.is_null())
|
|
return classes;
|
|
|
|
v8::Isolate* isolate = JavascriptEnvironment::GetIsolate();
|
|
v8::HandleScope scope(isolate);
|
|
v8::Local<v8::Object> details =
|
|
gin::DataObjectBuilder(isolate).Set("protectedClasses", classes).Build();
|
|
return protected_usb_handler_.Run(details);
|
|
}
|
|
|
|
blink::mojom::PermissionStatus
|
|
ElectronPermissionManager::GetPermissionStatusForCurrentDocument(
|
|
blink::PermissionType permission,
|
|
content::RenderFrameHost* render_frame_host,
|
|
bool /*should_include_device_status*/) {
|
|
if (render_frame_host->IsNestedWithinFencedFrame())
|
|
return blink::mojom::PermissionStatus::DENIED;
|
|
|
|
base::Value::Dict details;
|
|
details.Set("embeddingOrigin",
|
|
content::PermissionUtil::GetLastCommittedOriginAsURL(
|
|
render_frame_host->GetMainFrame())
|
|
.spec());
|
|
bool granted = CheckPermissionWithDetails(
|
|
permission, render_frame_host,
|
|
render_frame_host->GetLastCommittedOrigin().GetURL(), std::move(details));
|
|
return granted ? blink::mojom::PermissionStatus::GRANTED
|
|
: blink::mojom::PermissionStatus::DENIED;
|
|
}
|
|
|
|
blink::mojom::PermissionStatus
|
|
ElectronPermissionManager::GetPermissionStatusForWorker(
|
|
blink::PermissionType permission,
|
|
content::RenderProcessHost* render_process_host,
|
|
const GURL& worker_origin) {
|
|
return GetPermissionStatus(permission, worker_origin, worker_origin);
|
|
}
|
|
|
|
blink::mojom::PermissionStatus
|
|
ElectronPermissionManager::GetPermissionStatusForEmbeddedRequester(
|
|
blink::PermissionType permission,
|
|
content::RenderFrameHost* render_frame_host,
|
|
const url::Origin& overridden_origin) {
|
|
if (render_frame_host->IsNestedWithinFencedFrame())
|
|
return blink::mojom::PermissionStatus::DENIED;
|
|
|
|
return GetPermissionStatus(
|
|
permission, overridden_origin.GetURL(),
|
|
render_frame_host->GetLastCommittedOrigin().GetURL());
|
|
}
|
|
|
|
} // namespace electron
|