28ada6ea8b
* chore: bump chromium in DEPS to 99.0.4819.0
* chore: update patches
* chore: bump chromium in DEPS to 99.0.4824.0
* chore: update patches
* chore: bump chromium in DEPS to 99.0.4827.0
* chore: update patches
* 3352511: PiP: Add inkdrop and pointer cursor to PiP window buttons
https://chromium-review.googlesource.com/c/chromium/src/+/3352511
* 3309164: webhid: Show FIDO devices in the chooser if allowed
https://chromium-review.googlesource.com/c/chromium/src/+/3309164
* 3297868: hid: Add experimental HIDDevice.forget()
https://chromium-review.googlesource.com/c/chromium/src/+/3297868
* 3362491: [Extensions] Move i18n API to //extensions
https://chromium-review.googlesource.com/c/chromium/src/+/3362491
* MCC Refactor step0: Allow embedders to register associated_interface binders with RenderFrameHostImpl::associated_registry_.
https://chromium-review.googlesource.com/c/chromium/src/+/3281481
* 3352616: [Gtk] Remove libgtk from the link-line
https://chromium-review.googlesource.com/c/chromium/src/+/3352616
* 3249211: Clear-Site-Data support for partitioned cookies
https://chromium-review.googlesource.com/c/chromium/src/+/3249211
* [Extensions][COIL] Use [allow|block]list in //extensions/common
https://chromium-review.googlesource.com/c/chromium/src/+/3372668
* Begin ScopedUserPrefUpdate migration to modern base::Value
https://chromium-review.googlesource.com/c/chromium/src/+/3376154
* [Code Health] Refactor PrefService GetDict + GetList to use base::Value
https://chromium-review.googlesource.com/c/chromium/src/+/3343526
* 3354997: [CodeHealth] Remove deprecated SetDictionary method
https://chromium-review.googlesource.com/c/chromium/src/+/3354997
* 3287323: Add LacrosPrefStore for lacros settings
https://chromium-review.googlesource.com/c/chromium/src/+/3287323
* 3365916: [PA] Clean up remaining lazy commit code
https://chromium-review.googlesource.com/c/chromium/src/+/3365916
* [MPArch] Target the external protocol error at the responsible frame.
https://chromium-review.googlesource.com/c/chromium/src/+/3011560
* Pass origin to RegisterNonNetworkSubresourceURLLoaderFactories
https://chromium-review.googlesource.com/c/chromium/src/+/3350608
* Linux: Send OSCrypt raw encryption key to the Network Service
https://chromium-review.googlesource.com/c/chromium/src/+/3320484
* [PlzServiceWorker] Remove remaining references to PlzServiceWorker.
https://chromium-review.googlesource.com/c/chromium/src/+/3359441
* chore: fixup for lint
* 3327621: Fix tablet mode detection for Win 11.
https://chromium-review.googlesource.com/c/chromium/src/+/3327621
* 3342428: ax_mac: move AXTextMarker conversion utils under ui umbrella
https://chromium-review.googlesource.com/c/chromium/src/+/3342428
* 3353974: Mac: Use base::Feature for overlay features
https://chromium-review.googlesource.com/c/chromium/src/+/3353974
* chore: bump chromium in DEPS to 99.0.4828.0
* chore: update patches
* chore: bump chromium in DEPS to 99.0.4837.0
* chore: update patches
* chore: update patches
* 3379142: Drop FALLTHROUGH macro
Ref: https://chromium-review.googlesource.com/c/chromium/src/+/3379142
* 3381749: C++17: Allow use of std::map::try_emplace and std::map::insert_or_assign
Ref: https://chromium-review.googlesource.com/c/chromium/src/+/3381749
* chore: bump chromium in DEPS to 99.0.4839.0
* chore: update patches
* chore: bump chromium in DEPS to 99.0.4840.0
* chore: bump chromium in DEPS to 99.0.4844.0
* 3395881: [api] Deprecate Local<v8::Context> v8::Object::CreationContext()
Ref: https://chromium-review.googlesource.com/c/v8/v8/+/3395881
* chore: update patches
* chore: bump chromium in DEPS to 100.0.4845.0
* chore: update patches
* chore: bump chromium in DEPS to 100.0.4847.0
* chore: update patches
* chore: bump chromium in DEPS to 100.0.4849.0
* chore: update patches
* chore: bump chromium in DEPS to 100.0.4851.0
* chore: bump chromium in DEPS to 100.0.4853.0
* update patches
* chore: update patches
* update patches
* 3383599: Fonts Access: Remove prototype that uses a font picker.
https://chromium-review.googlesource.com/c/chromium/src/+/3383599
* 3404768: Remove ALLOW_UNUSED macros
https://chromium-review.googlesource.com/c/chromium/src/+/3404768
* 3374762: Remove ignore_result.h
https://chromium-review.googlesource.com/c/chromium/src/+/3374762
* 3399305: [unseasoned-pdf] Apply proper frame offsets for touch selections
https://chromium-review.googlesource.com/c/chromium/src/+/3399305
* 3402210: [Extensions] Don't trigger unload event for already unloaded extension
https://chromium-review.googlesource.com/c/chromium/src/+/3402210
* 3410912: Combine URLLoaderClient OnReceiveResponse and OnStartLoadingResponseBody.
https://chromium-review.googlesource.com/c/chromium/src/+/3410912
* 3370428: Make the AuthSchemes policy support dynamic refresh
https://chromium-review.googlesource.com/c/chromium/src/+/3370428
* 3407603: Finish ScopedUserPrefUpdate migration to modern base::Value
https://chromium-review.googlesource.com/c/chromium/src/+/3407603
* 3378352: ozone/x11: move code from //ui/p/x11 to //ui/ozone/p/x11
https://chromium-review.googlesource.com/c/chromium/src/+/3378352
* 3370810: Delete chrome/service, AKA the Cloud Print service process.
https://chromium-review.googlesource.com/c/chromium/src/+/3370810
* chore: bump chromium in DEPS to 100.0.4855.0
* chore: update patches
* fixup! 3370810: Delete chrome/service, AKA the Cloud Print service process.
* revert 3348007 to fix windows build
* 3318572: [Code health] Fix gn check errors in //extensions/browser:*
https://chromium-review.googlesource.com/c/chromium/src/+/3318572
* fix printing.patch
* fix iwyu issue
* 3408515: win: Make ShorcutOperation an enum class and modernize names
https://chromium-review.googlesource.com/c/chromium/src/+/3408515
* 3388333: [UIA] Remove dead code accessibility_misc_utils.h/cc
https://chromium-review.googlesource.com/c/chromium/src/+/3388333
* fix windows build? i hope
* patch gn visibility of //ui/ozone/platform/x11
* missing include base/logging.h
* use BUILDFLAG for USE_NSS_CERTS
https://chromium-review.googlesource.com/c/chromium/src/+/3379123
* defined(OS_*) ==> BUILDFLAG(IS_*)
https://bugs.chromium.org/p/chromium/issues/detail?id=1234043
* fixup! 3404768: Remove ALLOW_UNUSED macros
* another attempt to fix windows build
* temporarily disable the custom scheme service worker test
https://github.com/electron/electron/issues/32664
* fix loading mv3 extensions
not sure what cl broke this unfort.
* fixup! 3404768: Remove ALLOW_UNUSED macros
* patch nan
https://chromium-review.googlesource.com/c/v8/v8/+/3395880
* fix node test
* fix nullptr in FindPdfFrame
* patch perfetto to fix build issue on win-ia32
bc44c3c753
* fix build for linux-x64-testing-no-run-as-node
* fix patch
* skip <webview>.capturePage() test
https://github.com/electron/electron/issues/32705
* test: fix failing tests of focus/blur events of WebContents (#32711)
* inherit stdio from app module test child processes
this prevents them from timing out due to full stdout buffers
* test to see if we can get better logs on windows ci
* try again for appveyor log things
* skip contentTracing tests on ia32
* ci: disable gpu compositing
* drop applied patch
* fix merge fail
* Revert "ci: disable gpu compositing"
This reverts commit 0344129fcb19ea3e87e06c1110d751f22eba3fec.
Co-authored-by: electron-roller[bot] <84116207+electron-roller[bot]@users.noreply.github.com>
Co-authored-by: John Kleinschmidt <jkleinsc@electronjs.org>
Co-authored-by: PatchUp <73610968+patchup[bot]@users.noreply.github.com>
Co-authored-by: John Kleinschmidt <jkleinsc@github.com>
Co-authored-by: VerteDinde <khammond@slack-corp.com>
Co-authored-by: VerteDinde <vertedinde@electronjs.org>
Co-authored-by: Jeremy Rose <jeremya@chromium.org>
Co-authored-by: Jeremy Rose <nornagon@nornagon.net>
Co-authored-by: Cheng Zhao <zcbenz@gmail.com>
Co-authored-by: deepak1556 <hop2deep@gmail.com>
401 lines
15 KiB
C++
401 lines
15 KiB
C++
// Copyright (c) 2016 GitHub, Inc.
|
|
// Use of this source code is governed by the MIT license that can be
|
|
// found in the LICENSE file.
|
|
|
|
#include "shell/browser/electron_permission_manager.h"
|
|
|
|
#include <memory>
|
|
#include <utility>
|
|
#include <vector>
|
|
|
|
#include "base/values.h"
|
|
#include "content/public/browser/child_process_security_policy.h"
|
|
#include "content/public/browser/global_routing_id.h"
|
|
#include "content/public/browser/permission_controller.h"
|
|
#include "content/public/browser/permission_type.h"
|
|
#include "content/public/browser/render_frame_host.h"
|
|
#include "content/public/browser/render_process_host.h"
|
|
#include "content/public/browser/render_view_host.h"
|
|
#include "content/public/browser/web_contents.h"
|
|
#include "gin/data_object_builder.h"
|
|
#include "shell/browser/api/electron_api_web_contents.h"
|
|
#include "shell/browser/electron_browser_client.h"
|
|
#include "shell/browser/electron_browser_main_parts.h"
|
|
#include "shell/browser/hid/hid_chooser_context.h"
|
|
#include "shell/browser/serial/serial_chooser_context.h"
|
|
#include "shell/browser/web_contents_permission_helper.h"
|
|
#include "shell/browser/web_contents_preferences.h"
|
|
#include "shell/common/gin_converters/content_converter.h"
|
|
#include "shell/common/gin_converters/frame_converter.h"
|
|
#include "shell/common/gin_converters/value_converter.h"
|
|
#include "shell/common/gin_helper/event_emitter_caller.h"
|
|
|
|
namespace electron {
|
|
|
|
namespace {
|
|
|
|
bool WebContentsDestroyed(content::RenderFrameHost* rfh) {
|
|
content::WebContents* web_contents =
|
|
content::WebContents::FromRenderFrameHost(rfh);
|
|
if (!web_contents)
|
|
return true;
|
|
return web_contents->IsBeingDestroyed();
|
|
}
|
|
|
|
void PermissionRequestResponseCallbackWrapper(
|
|
ElectronPermissionManager::StatusCallback callback,
|
|
const std::vector<blink::mojom::PermissionStatus>& vector) {
|
|
std::move(callback).Run(vector[0]);
|
|
}
|
|
|
|
} // namespace
|
|
|
|
class ElectronPermissionManager::PendingRequest {
|
|
public:
|
|
PendingRequest(content::RenderFrameHost* render_frame_host,
|
|
const std::vector<content::PermissionType>& permissions,
|
|
StatusesCallback callback)
|
|
: render_process_id_(render_frame_host->GetProcess()->GetID()),
|
|
render_frame_id_(render_frame_host->GetGlobalId()),
|
|
callback_(std::move(callback)),
|
|
permissions_(permissions),
|
|
results_(permissions.size(), blink::mojom::PermissionStatus::DENIED),
|
|
remaining_results_(permissions.size()) {}
|
|
|
|
void SetPermissionStatus(int permission_id,
|
|
blink::mojom::PermissionStatus status) {
|
|
DCHECK(!IsComplete());
|
|
|
|
if (status == blink::mojom::PermissionStatus::GRANTED) {
|
|
const auto permission = permissions_[permission_id];
|
|
if (permission == content::PermissionType::MIDI_SYSEX) {
|
|
content::ChildProcessSecurityPolicy::GetInstance()
|
|
->GrantSendMidiSysExMessage(render_process_id_);
|
|
} else if (permission == content::PermissionType::GEOLOCATION) {
|
|
ElectronBrowserMainParts::Get()
|
|
->GetGeolocationControl()
|
|
->UserDidOptIntoLocationServices();
|
|
}
|
|
}
|
|
|
|
results_[permission_id] = status;
|
|
--remaining_results_;
|
|
}
|
|
|
|
content::RenderFrameHost* GetRenderFrameHost() {
|
|
return content::RenderFrameHost::FromID(render_frame_id_);
|
|
}
|
|
|
|
bool IsComplete() const { return remaining_results_ == 0; }
|
|
|
|
void RunCallback() {
|
|
if (!callback_.is_null()) {
|
|
std::move(callback_).Run(results_);
|
|
}
|
|
}
|
|
|
|
private:
|
|
int render_process_id_;
|
|
content::GlobalRenderFrameHostId render_frame_id_;
|
|
StatusesCallback callback_;
|
|
std::vector<content::PermissionType> permissions_;
|
|
std::vector<blink::mojom::PermissionStatus> results_;
|
|
size_t remaining_results_;
|
|
};
|
|
|
|
ElectronPermissionManager::ElectronPermissionManager() = default;
|
|
|
|
ElectronPermissionManager::~ElectronPermissionManager() = default;
|
|
|
|
void ElectronPermissionManager::SetPermissionRequestHandler(
|
|
const RequestHandler& handler) {
|
|
if (handler.is_null() && !pending_requests_.IsEmpty()) {
|
|
for (PendingRequestsMap::iterator iter(&pending_requests_); !iter.IsAtEnd();
|
|
iter.Advance()) {
|
|
auto* request = iter.GetCurrentValue();
|
|
if (!WebContentsDestroyed(request->GetRenderFrameHost()))
|
|
request->RunCallback();
|
|
}
|
|
pending_requests_.Clear();
|
|
}
|
|
request_handler_ = handler;
|
|
}
|
|
|
|
void ElectronPermissionManager::SetPermissionCheckHandler(
|
|
const CheckHandler& handler) {
|
|
check_handler_ = handler;
|
|
}
|
|
|
|
void ElectronPermissionManager::SetDevicePermissionHandler(
|
|
const DeviceCheckHandler& handler) {
|
|
device_permission_handler_ = handler;
|
|
}
|
|
|
|
void ElectronPermissionManager::RequestPermission(
|
|
content::PermissionType permission,
|
|
content::RenderFrameHost* render_frame_host,
|
|
const GURL& requesting_origin,
|
|
bool user_gesture,
|
|
StatusCallback response_callback) {
|
|
RequestPermissionWithDetails(permission, render_frame_host, requesting_origin,
|
|
user_gesture, nullptr,
|
|
std::move(response_callback));
|
|
}
|
|
|
|
void ElectronPermissionManager::RequestPermissionWithDetails(
|
|
content::PermissionType permission,
|
|
content::RenderFrameHost* render_frame_host,
|
|
const GURL& requesting_origin,
|
|
bool user_gesture,
|
|
const base::DictionaryValue* details,
|
|
StatusCallback response_callback) {
|
|
RequestPermissionsWithDetails(
|
|
std::vector<content::PermissionType>(1, permission), render_frame_host,
|
|
requesting_origin, user_gesture, details,
|
|
base::BindOnce(PermissionRequestResponseCallbackWrapper,
|
|
std::move(response_callback)));
|
|
}
|
|
|
|
void ElectronPermissionManager::RequestPermissions(
|
|
const std::vector<content::PermissionType>& permissions,
|
|
content::RenderFrameHost* render_frame_host,
|
|
const GURL& requesting_origin,
|
|
bool user_gesture,
|
|
StatusesCallback response_callback) {
|
|
RequestPermissionsWithDetails(permissions, render_frame_host,
|
|
requesting_origin, user_gesture, nullptr,
|
|
std::move(response_callback));
|
|
}
|
|
|
|
void ElectronPermissionManager::RequestPermissionsWithDetails(
|
|
const std::vector<content::PermissionType>& permissions,
|
|
content::RenderFrameHost* render_frame_host,
|
|
const GURL& requesting_origin,
|
|
bool user_gesture,
|
|
const base::DictionaryValue* details,
|
|
StatusesCallback response_callback) {
|
|
if (permissions.empty()) {
|
|
std::move(response_callback).Run({});
|
|
return;
|
|
}
|
|
|
|
if (request_handler_.is_null()) {
|
|
std::vector<blink::mojom::PermissionStatus> statuses;
|
|
for (auto permission : permissions) {
|
|
if (permission == content::PermissionType::MIDI_SYSEX) {
|
|
content::ChildProcessSecurityPolicy::GetInstance()
|
|
->GrantSendMidiSysExMessage(
|
|
render_frame_host->GetProcess()->GetID());
|
|
} else if (permission == content::PermissionType::GEOLOCATION) {
|
|
ElectronBrowserMainParts::Get()
|
|
->GetGeolocationControl()
|
|
->UserDidOptIntoLocationServices();
|
|
}
|
|
statuses.push_back(blink::mojom::PermissionStatus::GRANTED);
|
|
}
|
|
std::move(response_callback).Run(statuses);
|
|
return;
|
|
}
|
|
|
|
auto* web_contents =
|
|
content::WebContents::FromRenderFrameHost(render_frame_host);
|
|
int request_id = pending_requests_.Add(std::make_unique<PendingRequest>(
|
|
render_frame_host, permissions, std::move(response_callback)));
|
|
|
|
for (size_t i = 0; i < permissions.size(); ++i) {
|
|
auto permission = permissions[i];
|
|
const auto callback =
|
|
base::BindRepeating(&ElectronPermissionManager::OnPermissionResponse,
|
|
base::Unretained(this), request_id, i);
|
|
auto mutable_details =
|
|
details == nullptr ? base::DictionaryValue() : details->Clone();
|
|
mutable_details.SetStringKey(
|
|
"requestingUrl", render_frame_host->GetLastCommittedURL().spec());
|
|
mutable_details.SetBoolKey("isMainFrame",
|
|
render_frame_host->GetParent() == nullptr);
|
|
request_handler_.Run(web_contents, permission, callback, mutable_details);
|
|
}
|
|
}
|
|
|
|
void ElectronPermissionManager::OnPermissionResponse(
|
|
int request_id,
|
|
int permission_id,
|
|
blink::mojom::PermissionStatus status) {
|
|
auto* pending_request = pending_requests_.Lookup(request_id);
|
|
if (!pending_request)
|
|
return;
|
|
|
|
pending_request->SetPermissionStatus(permission_id, status);
|
|
if (pending_request->IsComplete()) {
|
|
pending_request->RunCallback();
|
|
pending_requests_.Remove(request_id);
|
|
}
|
|
}
|
|
|
|
void ElectronPermissionManager::ResetPermission(
|
|
content::PermissionType permission,
|
|
const GURL& requesting_origin,
|
|
const GURL& embedding_origin) {}
|
|
|
|
blink::mojom::PermissionStatus ElectronPermissionManager::GetPermissionStatus(
|
|
content::PermissionType permission,
|
|
const GURL& requesting_origin,
|
|
const GURL& embedding_origin) {
|
|
base::DictionaryValue details;
|
|
details.SetString("embeddingOrigin", embedding_origin.spec());
|
|
bool granted = CheckPermissionWithDetails(permission, nullptr,
|
|
requesting_origin, &details);
|
|
return granted ? blink::mojom::PermissionStatus::GRANTED
|
|
: blink::mojom::PermissionStatus::DENIED;
|
|
}
|
|
|
|
ElectronPermissionManager::SubscriptionId
|
|
ElectronPermissionManager::SubscribePermissionStatusChange(
|
|
content::PermissionType permission,
|
|
content::RenderFrameHost* render_frame_host,
|
|
const GURL& requesting_origin,
|
|
base::RepeatingCallback<void(blink::mojom::PermissionStatus)> callback) {
|
|
return SubscriptionId(-1);
|
|
}
|
|
|
|
void ElectronPermissionManager::UnsubscribePermissionStatusChange(
|
|
SubscriptionId id) {}
|
|
|
|
bool ElectronPermissionManager::CheckPermissionWithDetails(
|
|
content::PermissionType permission,
|
|
content::RenderFrameHost* render_frame_host,
|
|
const GURL& requesting_origin,
|
|
const base::DictionaryValue* details) const {
|
|
if (check_handler_.is_null()) {
|
|
return true;
|
|
}
|
|
auto* web_contents =
|
|
render_frame_host
|
|
? content::WebContents::FromRenderFrameHost(render_frame_host)
|
|
: nullptr;
|
|
auto mutable_details =
|
|
details == nullptr ? base::DictionaryValue() : details->Clone();
|
|
if (render_frame_host) {
|
|
mutable_details.SetStringKey(
|
|
"requestingUrl", render_frame_host->GetLastCommittedURL().spec());
|
|
}
|
|
mutable_details.SetBoolKey(
|
|
"isMainFrame",
|
|
render_frame_host && render_frame_host->GetParent() == nullptr);
|
|
switch (permission) {
|
|
case content::PermissionType::AUDIO_CAPTURE:
|
|
mutable_details.SetStringKey("mediaType", "audio");
|
|
break;
|
|
case content::PermissionType::VIDEO_CAPTURE:
|
|
mutable_details.SetStringKey("mediaType", "video");
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
return check_handler_.Run(web_contents, permission, requesting_origin,
|
|
mutable_details);
|
|
}
|
|
|
|
bool ElectronPermissionManager::CheckDevicePermission(
|
|
content::PermissionType permission,
|
|
const url::Origin& origin,
|
|
const base::Value* device,
|
|
content::RenderFrameHost* render_frame_host) const {
|
|
auto* web_contents =
|
|
content::WebContents::FromRenderFrameHost(render_frame_host);
|
|
api::WebContents* api_web_contents = api::WebContents::From(web_contents);
|
|
if (device_permission_handler_.is_null()) {
|
|
if (api_web_contents) {
|
|
std::vector<base::Value> granted_devices =
|
|
api_web_contents->GetGrantedDevices(origin, permission,
|
|
render_frame_host);
|
|
|
|
for (const auto& granted_device : granted_devices) {
|
|
if (permission ==
|
|
static_cast<content::PermissionType>(
|
|
WebContentsPermissionHelper::PermissionType::HID)) {
|
|
if (device->FindIntKey(kHidVendorIdKey) !=
|
|
granted_device.FindIntKey(kHidVendorIdKey) ||
|
|
device->FindIntKey(kHidProductIdKey) !=
|
|
granted_device.FindIntKey(kHidProductIdKey)) {
|
|
continue;
|
|
}
|
|
|
|
const auto* serial_number =
|
|
granted_device.FindStringKey(kHidSerialNumberKey);
|
|
const auto* device_serial_number =
|
|
device->FindStringKey(kHidSerialNumberKey);
|
|
|
|
if (serial_number && device_serial_number &&
|
|
*device_serial_number == *serial_number)
|
|
return true;
|
|
} else if (permission ==
|
|
static_cast<content::PermissionType>(
|
|
WebContentsPermissionHelper::PermissionType::SERIAL)) {
|
|
#if BUILDFLAG(IS_WIN)
|
|
if (device->FindStringKey(kDeviceInstanceIdKey) ==
|
|
granted_device.FindStringKey(kDeviceInstanceIdKey))
|
|
return true;
|
|
#else
|
|
if (device->FindIntKey(kVendorIdKey) !=
|
|
granted_device.FindIntKey(kVendorIdKey) ||
|
|
device->FindIntKey(kProductIdKey) !=
|
|
granted_device.FindIntKey(kProductIdKey) ||
|
|
*device->FindStringKey(kSerialNumberKey) !=
|
|
*granted_device.FindStringKey(kSerialNumberKey)) {
|
|
continue;
|
|
}
|
|
|
|
#if BUILDFLAG(IS_MAC)
|
|
if (*device->FindStringKey(kUsbDriverKey) !=
|
|
*granted_device.FindStringKey(kUsbDriverKey)) {
|
|
continue;
|
|
}
|
|
#endif // BUILDFLAG(IS_MAC)
|
|
return true;
|
|
#endif // BUILDFLAG(IS_WIN)
|
|
}
|
|
}
|
|
}
|
|
return false;
|
|
} else {
|
|
v8::Isolate* isolate = JavascriptEnvironment::GetIsolate();
|
|
v8::HandleScope scope(isolate);
|
|
v8::Local<v8::Object> details = gin::DataObjectBuilder(isolate)
|
|
.Set("deviceType", permission)
|
|
.Set("origin", origin.Serialize())
|
|
.Set("device", device->Clone())
|
|
.Set("frame", render_frame_host)
|
|
.Build();
|
|
return device_permission_handler_.Run(details);
|
|
}
|
|
}
|
|
|
|
void ElectronPermissionManager::GrantDevicePermission(
|
|
content::PermissionType permission,
|
|
const url::Origin& origin,
|
|
const base::Value* device,
|
|
content::RenderFrameHost* render_frame_host) const {
|
|
if (device_permission_handler_.is_null()) {
|
|
auto* web_contents =
|
|
content::WebContents::FromRenderFrameHost(render_frame_host);
|
|
api::WebContents* api_web_contents = api::WebContents::From(web_contents);
|
|
if (api_web_contents)
|
|
api_web_contents->GrantDevicePermission(origin, device, permission,
|
|
render_frame_host);
|
|
}
|
|
}
|
|
|
|
blink::mojom::PermissionStatus
|
|
ElectronPermissionManager::GetPermissionStatusForFrame(
|
|
content::PermissionType permission,
|
|
content::RenderFrameHost* render_frame_host,
|
|
const GURL& requesting_origin) {
|
|
base::DictionaryValue details;
|
|
bool granted = CheckPermissionWithDetails(permission, render_frame_host,
|
|
requesting_origin, &details);
|
|
return granted ? blink::mojom::PermissionStatus::GRANTED
|
|
: blink::mojom::PermissionStatus::DENIED;
|
|
}
|
|
|
|
} // namespace electron
|