[MPArch Guest View] Support Media Access permissions
- Create Guest variants of the Media Access queries on the GuestPageHolder::Delegate. - Pass RenderFrameHost into SupportsStreamType. - Look up the RenderFrameHost from the request object. Bug: 40202416 Change-Id: Iac31b817892d7222c041b1a78a3e905de2a2f9b2 Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/6157121 Reviewed-by: Mark Foltz <mfoltz@chromium.org> Reviewed-by: Robbie McElrath <rmcelrath@chromium.org> Reviewed-by: Kevin McNee <mcnee@chromium.org> Commit-Queue: Dave Tapuska <dtapuska@chromium.org> Cr-Commit-Position: refs/heads/main@{#1405643}
This commit is contained in:

committed by
Chromium LUCI CQ

parent
6572dc4750
commit
ddcf18f3b0
chrome/browser
apps
guest_view
controlled_frame
media
chromeos_login_and_lock_media_access_handler.ccchromeos_login_and_lock_media_access_handler.hextension_media_access_handler.ccextension_media_access_handler.hmedia_access_handler.h
webrtc
desktop_capture_access_handler.ccdesktop_capture_access_handler.hdisplay_media_access_handler.ccdisplay_media_access_handler.hmedia_capture_devices_dispatcher.ccmedia_capture_devices_dispatcher_unittest.ccpermission_bubble_media_access_handler.ccpermission_bubble_media_access_handler.htab_capture_access_handler.cctab_capture_access_handler.h
components/guest_view/browser
content
browser
public
browser
extensions/browser/guest_view/web_view
@ -3340,16 +3340,12 @@ IN_PROC_BROWSER_TEST_P(WebViewTest,
|
||||
|
||||
IN_PROC_BROWSER_TEST_P(WebViewTest,
|
||||
PermissionsAPIEmbedderHasAccessAllowCamera) {
|
||||
SKIP_FOR_MPARCH(); // TODO(crbug.com/40202416): Enable test for MPArch.
|
||||
|
||||
TestHelper("testAllowCamera",
|
||||
"web_view/permissions_test/embedder_has_permission",
|
||||
NEEDS_TEST_SERVER);
|
||||
}
|
||||
|
||||
IN_PROC_BROWSER_TEST_P(WebViewTest, PermissionsAPIEmbedderHasAccessDenyCamera) {
|
||||
SKIP_FOR_MPARCH(); // TODO(crbug.com/40202416): Enable test for MPArch.
|
||||
|
||||
TestHelper("testDenyCamera",
|
||||
"web_view/permissions_test/embedder_has_permission",
|
||||
NEEDS_TEST_SERVER);
|
||||
@ -3357,8 +3353,6 @@ IN_PROC_BROWSER_TEST_P(WebViewTest, PermissionsAPIEmbedderHasAccessDenyCamera) {
|
||||
|
||||
IN_PROC_BROWSER_TEST_P(WebViewTest,
|
||||
PermissionsAPIEmbedderHasAccessAllowMicrophone) {
|
||||
SKIP_FOR_MPARCH(); // TODO(crbug.com/40202416): Enable test for MPArch.
|
||||
|
||||
TestHelper("testAllowMicrophone",
|
||||
"web_view/permissions_test/embedder_has_permission",
|
||||
NEEDS_TEST_SERVER);
|
||||
@ -3366,24 +3360,18 @@ IN_PROC_BROWSER_TEST_P(WebViewTest,
|
||||
|
||||
IN_PROC_BROWSER_TEST_P(WebViewTest,
|
||||
PermissionsAPIEmbedderHasAccessDenyMicrophone) {
|
||||
SKIP_FOR_MPARCH(); // TODO(crbug.com/40202416): Enable test for MPArch.
|
||||
|
||||
TestHelper("testDenyMicrophone",
|
||||
"web_view/permissions_test/embedder_has_permission",
|
||||
NEEDS_TEST_SERVER);
|
||||
}
|
||||
|
||||
IN_PROC_BROWSER_TEST_P(WebViewTest, PermissionsAPIEmbedderHasAccessAllowMedia) {
|
||||
SKIP_FOR_MPARCH(); // TODO(crbug.com/40202416): Enable test for MPArch.
|
||||
|
||||
TestHelper("testAllowMedia",
|
||||
"web_view/permissions_test/embedder_has_permission",
|
||||
NEEDS_TEST_SERVER);
|
||||
}
|
||||
|
||||
IN_PROC_BROWSER_TEST_P(WebViewTest, PermissionsAPIEmbedderHasAccessDenyMedia) {
|
||||
SKIP_FOR_MPARCH(); // TODO(crbug.com/40202416): Enable test for MPArch.
|
||||
|
||||
TestHelper("testDenyMedia",
|
||||
"web_view/permissions_test/embedder_has_permission",
|
||||
NEEDS_TEST_SERVER);
|
||||
@ -3556,8 +3544,6 @@ IN_PROC_BROWSER_TEST_P(WebViewTest,
|
||||
|
||||
IN_PROC_BROWSER_TEST_P(WebViewTest,
|
||||
PermissionsAPIEmbedderHasNoAccessAllowCamera) {
|
||||
SKIP_FOR_MPARCH(); // TODO(crbug.com/40202416): Enable test for MPArch.
|
||||
|
||||
TestHelper("testAllowCamera",
|
||||
"web_view/permissions_test/embedder_has_no_permission",
|
||||
NEEDS_TEST_SERVER);
|
||||
@ -3565,8 +3551,6 @@ IN_PROC_BROWSER_TEST_P(WebViewTest,
|
||||
|
||||
IN_PROC_BROWSER_TEST_P(WebViewTest,
|
||||
PermissionsAPIEmbedderHasNoAccessDenyCamera) {
|
||||
SKIP_FOR_MPARCH(); // TODO(crbug.com/40202416): Enable test for MPArch.
|
||||
|
||||
TestHelper("testDenyCamera",
|
||||
"web_view/permissions_test/embedder_has_no_permission",
|
||||
NEEDS_TEST_SERVER);
|
||||
@ -3574,8 +3558,6 @@ IN_PROC_BROWSER_TEST_P(WebViewTest,
|
||||
|
||||
IN_PROC_BROWSER_TEST_P(WebViewTest,
|
||||
PermissionsAPIEmbedderHasNoAccessAllowMicrophone) {
|
||||
SKIP_FOR_MPARCH(); // TODO(crbug.com/40202416): Enable test for MPArch.
|
||||
|
||||
TestHelper("testAllowMicrophone",
|
||||
"web_view/permissions_test/embedder_has_no_permission",
|
||||
NEEDS_TEST_SERVER);
|
||||
@ -3583,8 +3565,6 @@ IN_PROC_BROWSER_TEST_P(WebViewTest,
|
||||
|
||||
IN_PROC_BROWSER_TEST_P(WebViewTest,
|
||||
PermissionsAPIEmbedderHasNoAccessDenyMicrophone) {
|
||||
SKIP_FOR_MPARCH(); // TODO(crbug.com/40202416): Enable test for MPArch.
|
||||
|
||||
TestHelper("testDenyMicrophone",
|
||||
"web_view/permissions_test/embedder_has_no_permission",
|
||||
NEEDS_TEST_SERVER);
|
||||
@ -3592,8 +3572,6 @@ IN_PROC_BROWSER_TEST_P(WebViewTest,
|
||||
|
||||
IN_PROC_BROWSER_TEST_P(WebViewTest,
|
||||
PermissionsAPIEmbedderHasNoAccessAllowMedia) {
|
||||
SKIP_FOR_MPARCH(); // TODO(crbug.com/40202416): Enable test for MPArch.
|
||||
|
||||
TestHelper("testAllowMedia",
|
||||
"web_view/permissions_test/embedder_has_no_permission",
|
||||
NEEDS_TEST_SERVER);
|
||||
@ -3601,8 +3579,6 @@ IN_PROC_BROWSER_TEST_P(WebViewTest,
|
||||
|
||||
IN_PROC_BROWSER_TEST_P(WebViewTest,
|
||||
PermissionsAPIEmbedderHasNoAccessDenyMedia) {
|
||||
SKIP_FOR_MPARCH(); // TODO(crbug.com/40202416): Enable test for MPArch.
|
||||
|
||||
TestHelper("testDenyMedia",
|
||||
"web_view/permissions_test/embedder_has_no_permission",
|
||||
NEEDS_TEST_SERVER);
|
||||
|
@ -54,18 +54,14 @@ ControlledFrameMediaAccessHandler::~ControlledFrameMediaAccessHandler() =
|
||||
default;
|
||||
|
||||
bool ControlledFrameMediaAccessHandler::SupportsStreamType(
|
||||
content::WebContents* web_contents,
|
||||
content::RenderFrameHost* render_frame_host,
|
||||
const blink::mojom::MediaStreamType type,
|
||||
const extensions::Extension* extension) {
|
||||
if (!web_contents || extension) {
|
||||
if (!render_frame_host || extension) {
|
||||
return false;
|
||||
}
|
||||
|
||||
// TODO(b/40238394): |GuestView| should be looked up from |RenderFrameHost|
|
||||
// instead of |WebContents|. To fix this, |SupportsStreamType| could pass
|
||||
// |RenderFrameHost| instead of |WebContents|.
|
||||
extensions::WebViewGuest* web_view =
|
||||
extensions::WebViewGuest::FromWebContents(web_contents);
|
||||
extensions::WebViewGuest::FromRenderFrameHost(render_frame_host);
|
||||
|
||||
bool is_controlled_frame = web_view && web_view->attached() &&
|
||||
web_view->IsOwnedByControlledFrameEmbedder();
|
||||
|
@ -42,7 +42,7 @@ class ControlledFrameMediaAccessHandler : public MediaAccessHandler {
|
||||
~ControlledFrameMediaAccessHandler() override;
|
||||
|
||||
// MediaAccessHandler implementation:
|
||||
bool SupportsStreamType(content::WebContents* web_contents,
|
||||
bool SupportsStreamType(content::RenderFrameHost* render_frame_host,
|
||||
const blink::mojom::MediaStreamType type,
|
||||
const extensions::Extension* extension) override;
|
||||
bool CheckMediaAccessPermission(
|
||||
|
@ -13,7 +13,9 @@
|
||||
#include "chromeos/ash/components/settings/cros_settings.h"
|
||||
#include "chromeos/ash/components/settings/cros_settings_names.h"
|
||||
#include "components/content_settings/core/common/content_settings_pattern.h"
|
||||
#include "components/guest_view/browser/guest_view_base.h"
|
||||
#include "content/public/browser/render_frame_host.h"
|
||||
#include "content/public/browser/web_contents.h"
|
||||
#include "url/gurl.h"
|
||||
|
||||
ChromeOSLoginAndLockMediaAccessHandler::
|
||||
@ -23,9 +25,12 @@ ChromeOSLoginAndLockMediaAccessHandler::
|
||||
~ChromeOSLoginAndLockMediaAccessHandler() = default;
|
||||
|
||||
bool ChromeOSLoginAndLockMediaAccessHandler::SupportsStreamType(
|
||||
content::WebContents* web_contents,
|
||||
content::RenderFrameHost* render_frame_host,
|
||||
const blink::mojom::MediaStreamType type,
|
||||
const extensions::Extension* extension) {
|
||||
auto* web_contents = guest_view::GuestViewBase::GetTopLevelWebContents(
|
||||
content::WebContents::FromRenderFrameHost(render_frame_host));
|
||||
|
||||
if (!web_contents)
|
||||
return false;
|
||||
// Check if the `web_contents` corresponds to the login screen.
|
||||
|
@ -15,7 +15,7 @@ class ChromeOSLoginAndLockMediaAccessHandler : public MediaAccessHandler {
|
||||
~ChromeOSLoginAndLockMediaAccessHandler() override;
|
||||
|
||||
// MediaAccessHandler implementation.
|
||||
bool SupportsStreamType(content::WebContents* web_contents,
|
||||
bool SupportsStreamType(content::RenderFrameHost* render_frame_host,
|
||||
const blink::mojom::MediaStreamType type,
|
||||
const extensions::Extension* extension) override;
|
||||
bool CheckMediaAccessPermission(
|
||||
|
@ -47,7 +47,7 @@ ExtensionMediaAccessHandler::ExtensionMediaAccessHandler() = default;
|
||||
ExtensionMediaAccessHandler::~ExtensionMediaAccessHandler() = default;
|
||||
|
||||
bool ExtensionMediaAccessHandler::SupportsStreamType(
|
||||
content::WebContents* web_contents,
|
||||
content::RenderFrameHost* render_frame_host,
|
||||
const blink::mojom::MediaStreamType type,
|
||||
const extensions::Extension* extension) {
|
||||
return extension &&
|
||||
|
@ -14,7 +14,7 @@ class ExtensionMediaAccessHandler : public MediaAccessHandler {
|
||||
~ExtensionMediaAccessHandler() override;
|
||||
|
||||
// MediaAccessHandler implementation.
|
||||
bool SupportsStreamType(content::WebContents* web_contents,
|
||||
bool SupportsStreamType(content::RenderFrameHost* render_frame_host,
|
||||
const blink::mojom::MediaStreamType type,
|
||||
const extensions::Extension* extension) override;
|
||||
bool CheckMediaAccessPermission(
|
||||
|
@ -27,7 +27,7 @@ class MediaAccessHandler {
|
||||
virtual ~MediaAccessHandler() = default;
|
||||
|
||||
// Check if the media stream type is supported by MediaAccessHandler.
|
||||
virtual bool SupportsStreamType(content::WebContents* web_contents,
|
||||
virtual bool SupportsStreamType(content::RenderFrameHost* render_frame_host,
|
||||
const blink::mojom::MediaStreamType type,
|
||||
const extensions::Extension* extension) = 0;
|
||||
|
||||
|
@ -310,7 +310,7 @@ void DesktopCaptureAccessHandler::ProcessScreenCaptureAccessRequest(
|
||||
}
|
||||
|
||||
bool DesktopCaptureAccessHandler::SupportsStreamType(
|
||||
content::WebContents* web_contents,
|
||||
content::RenderFrameHost* render_frame_host,
|
||||
const blink::mojom::MediaStreamType type,
|
||||
const extensions::Extension* extension) {
|
||||
return type == blink::mojom::MediaStreamType::GUM_DESKTOP_VIDEO_CAPTURE ||
|
||||
|
@ -50,7 +50,7 @@ class DesktopCaptureAccessHandler : public CaptureAccessHandlerBase,
|
||||
~DesktopCaptureAccessHandler() override;
|
||||
|
||||
// MediaAccessHandler implementation.
|
||||
bool SupportsStreamType(content::WebContents* web_contents,
|
||||
bool SupportsStreamType(content::RenderFrameHost* render_frame_host,
|
||||
const blink::mojom::MediaStreamType type,
|
||||
const extensions::Extension* extension) override;
|
||||
bool CheckMediaAccessPermission(
|
||||
|
@ -99,7 +99,7 @@ DisplayMediaAccessHandler::DisplayMediaAccessHandler(
|
||||
DisplayMediaAccessHandler::~DisplayMediaAccessHandler() = default;
|
||||
|
||||
bool DisplayMediaAccessHandler::SupportsStreamType(
|
||||
content::WebContents* web_contents,
|
||||
content::RenderFrameHost* render_frame_host,
|
||||
const blink::mojom::MediaStreamType stream_type,
|
||||
const extensions::Extension* extension) {
|
||||
return stream_type == blink::mojom::MediaStreamType::DISPLAY_VIDEO_CAPTURE ||
|
||||
|
@ -41,7 +41,7 @@ class DisplayMediaAccessHandler : public CaptureAccessHandlerBase,
|
||||
~DisplayMediaAccessHandler() override;
|
||||
|
||||
// MediaAccessHandler implementation.
|
||||
bool SupportsStreamType(content::WebContents* web_contents,
|
||||
bool SupportsStreamType(content::RenderFrameHost* render_frame_host,
|
||||
const blink::mojom::MediaStreamType stream_type,
|
||||
const extensions::Extension* extension) override;
|
||||
bool CheckMediaAccessPermission(
|
||||
|
@ -68,18 +68,6 @@ using blink::MediaStreamDevices;
|
||||
using content::BrowserThread;
|
||||
using content::MediaCaptureDevices;
|
||||
|
||||
namespace {
|
||||
|
||||
content::WebContents* WebContentsFromIds(int render_process_id,
|
||||
int render_frame_id) {
|
||||
content::WebContents* web_contents =
|
||||
content::WebContents::FromRenderFrameHost(
|
||||
content::RenderFrameHost::FromID(render_process_id, render_frame_id));
|
||||
return web_contents;
|
||||
}
|
||||
|
||||
} // namespace
|
||||
|
||||
MediaCaptureDevicesDispatcher* MediaCaptureDevicesDispatcher::GetInstance() {
|
||||
return base::Singleton<MediaCaptureDevicesDispatcher>::get();
|
||||
}
|
||||
@ -158,10 +146,13 @@ void MediaCaptureDevicesDispatcher::ProcessMediaAccessRequest(
|
||||
}
|
||||
#endif
|
||||
|
||||
auto* render_frame_host = content::RenderFrameHost::FromID(
|
||||
request.render_process_id, request.render_frame_id);
|
||||
|
||||
for (const auto& handler : media_access_handlers_) {
|
||||
if (handler->SupportsStreamType(web_contents, request.video_type,
|
||||
if (handler->SupportsStreamType(render_frame_host, request.video_type,
|
||||
extension) ||
|
||||
handler->SupportsStreamType(web_contents, request.audio_type,
|
||||
handler->SupportsStreamType(render_frame_host, request.audio_type,
|
||||
extension)) {
|
||||
handler->HandleRequest(web_contents, request, std::move(callback),
|
||||
extension);
|
||||
@ -200,9 +191,7 @@ bool MediaCaptureDevicesDispatcher::CheckMediaAccessPermission(
|
||||
const extensions::Extension* extension) {
|
||||
DCHECK_CURRENTLY_ON(BrowserThread::UI);
|
||||
for (const auto& handler : media_access_handlers_) {
|
||||
if (handler->SupportsStreamType(
|
||||
content::WebContents::FromRenderFrameHost(render_frame_host), type,
|
||||
extension)) {
|
||||
if (handler->SupportsStreamType(render_frame_host, type, extension)) {
|
||||
return handler->CheckMediaAccessPermission(
|
||||
render_frame_host, security_origin, type, extension);
|
||||
}
|
||||
@ -349,9 +338,9 @@ void MediaCaptureDevicesDispatcher::UpdateMediaRequestStateOnUIThread(
|
||||
content::MediaRequestState state) {
|
||||
DCHECK_CURRENTLY_ON(BrowserThread::UI);
|
||||
for (const auto& handler : media_access_handlers_) {
|
||||
if (handler->SupportsStreamType(
|
||||
WebContentsFromIds(render_process_id, render_frame_id), stream_type,
|
||||
nullptr)) {
|
||||
if (handler->SupportsStreamType(content::RenderFrameHost::FromID(
|
||||
render_process_id, render_frame_id),
|
||||
stream_type, nullptr)) {
|
||||
handler->UpdateMediaRequestState(render_process_id, render_frame_id,
|
||||
page_request_id, stream_type, state);
|
||||
break;
|
||||
@ -424,9 +413,9 @@ void MediaCaptureDevicesDispatcher::UpdateVideoScreenCaptureStatus(
|
||||
DCHECK(blink::IsVideoScreenCaptureMediaType(stream_type));
|
||||
|
||||
for (const auto& handler : media_access_handlers_) {
|
||||
if (handler->SupportsStreamType(
|
||||
WebContentsFromIds(render_process_id, render_frame_id), stream_type,
|
||||
nullptr)) {
|
||||
if (handler->SupportsStreamType(content::RenderFrameHost::FromID(
|
||||
render_process_id, render_frame_id),
|
||||
stream_type, nullptr)) {
|
||||
handler->UpdateVideoScreenCaptureStatus(
|
||||
render_process_id, render_frame_id, page_request_id, is_secure);
|
||||
break;
|
||||
|
@ -25,7 +25,7 @@ class MockMediaAccessHandler : public MediaAccessHandler {
|
||||
const blink::mojom::MediaStreamType supported_type)
|
||||
: supported_type_(supported_type) {}
|
||||
|
||||
bool SupportsStreamType(content::WebContents* web_contents,
|
||||
bool SupportsStreamType(content::RenderFrameHost* render_frame_host,
|
||||
const blink::mojom::MediaStreamType type,
|
||||
const extensions::Extension* extension) override {
|
||||
return supported_type_ == type;
|
||||
|
@ -131,7 +131,7 @@ PermissionBubbleMediaAccessHandler::~PermissionBubbleMediaAccessHandler() =
|
||||
default;
|
||||
|
||||
bool PermissionBubbleMediaAccessHandler::SupportsStreamType(
|
||||
content::WebContents* web_contents,
|
||||
content::RenderFrameHost* render_frame_host,
|
||||
const blink::mojom::MediaStreamType type,
|
||||
const extensions::Extension* extension) {
|
||||
return type == blink::mojom::MediaStreamType::DEVICE_VIDEO_CAPTURE ||
|
||||
|
@ -29,7 +29,7 @@ class PermissionBubbleMediaAccessHandler
|
||||
~PermissionBubbleMediaAccessHandler() override;
|
||||
|
||||
// MediaAccessHandler implementation.
|
||||
bool SupportsStreamType(content::WebContents* web_contents,
|
||||
bool SupportsStreamType(content::RenderFrameHost* render_frame_host,
|
||||
const blink::mojom::MediaStreamType type,
|
||||
const extensions::Extension* extension) override;
|
||||
bool CheckMediaAccessPermission(
|
||||
|
@ -99,7 +99,7 @@ TabCaptureAccessHandler::TabCaptureAccessHandler() = default;
|
||||
TabCaptureAccessHandler::~TabCaptureAccessHandler() = default;
|
||||
|
||||
bool TabCaptureAccessHandler::SupportsStreamType(
|
||||
content::WebContents* web_contents,
|
||||
content::RenderFrameHost* render_frame_host,
|
||||
const blink::mojom::MediaStreamType type,
|
||||
const extensions::Extension* extension) {
|
||||
return type == blink::mojom::MediaStreamType::GUM_TAB_VIDEO_CAPTURE ||
|
||||
|
@ -20,7 +20,7 @@ class TabCaptureAccessHandler : public CaptureAccessHandlerBase {
|
||||
~TabCaptureAccessHandler() override;
|
||||
|
||||
// MediaAccessHandler implementation.
|
||||
bool SupportsStreamType(content::WebContents* web_contents,
|
||||
bool SupportsStreamType(content::RenderFrameHost* render_frame_host,
|
||||
const blink::mojom::MediaStreamType type,
|
||||
const extensions::Extension* extension) override;
|
||||
bool CheckMediaAccessPermission(
|
||||
|
@ -8,6 +8,7 @@ include_rules = [
|
||||
"+third_party/blink/public/common/page/page_zoom.h",
|
||||
"+third_party/blink/public/common/input/web_gesture_event.h",
|
||||
"+third_party/blink/public/common/input/web_input_event.h",
|
||||
"+third_party/blink/public/mojom/mediastream/media_stream.mojom.h",
|
||||
]
|
||||
|
||||
specific_include_rules = {
|
||||
|
@ -30,6 +30,7 @@
|
||||
#include "content/public/common/content_features.h"
|
||||
#include "third_party/blink/public/common/input/web_gesture_event.h"
|
||||
#include "third_party/blink/public/common/page/page_zoom.h"
|
||||
#include "third_party/blink/public/mojom/mediastream/media_stream.mojom.h"
|
||||
|
||||
using content::WebContents;
|
||||
|
||||
@ -720,6 +721,21 @@ void GuestViewBase::GuestOpenURL(
|
||||
|
||||
void GuestViewBase::GuestClose() {}
|
||||
|
||||
void GuestViewBase::GuestRequestMediaAccessPermission(
|
||||
const content::MediaStreamRequest& request,
|
||||
content::MediaResponseCallback callback) {
|
||||
std::move(callback).Run(blink::mojom::StreamDevicesSet(),
|
||||
blink::mojom::MediaStreamRequestResult::NOT_SUPPORTED,
|
||||
std::unique_ptr<content::MediaStreamUI>());
|
||||
}
|
||||
|
||||
bool GuestViewBase::GuestCheckMediaAccessPermission(
|
||||
content::RenderFrameHost* render_frame_host,
|
||||
const url::Origin& security_origin,
|
||||
blink::mojom::MediaStreamType type) {
|
||||
return false;
|
||||
}
|
||||
|
||||
void GuestViewBase::LoadProgressChanged(double progress) {
|
||||
if (base::FeatureList::IsEnabled(features::kGuestViewMPArch)) {
|
||||
// The load state of the embedder does not affect the load state of the
|
||||
|
@ -468,6 +468,13 @@ class GuestViewBase : public content::BrowserPluginGuestDelegate,
|
||||
base::OnceCallback<void(content::NavigationHandle&)>
|
||||
navigation_handle_callback) override;
|
||||
void GuestClose() override;
|
||||
void GuestRequestMediaAccessPermission(
|
||||
const content::MediaStreamRequest& request,
|
||||
content::MediaResponseCallback callback) override;
|
||||
bool GuestCheckMediaAccessPermission(
|
||||
content::RenderFrameHost* render_frame_host,
|
||||
const url::Origin& security_origin,
|
||||
blink::mojom::MediaStreamType type) override;
|
||||
|
||||
// WebContentsDelegate implementation.
|
||||
void ActivateContents(content::WebContents* contents) final;
|
||||
|
@ -159,8 +159,11 @@ void MediaStreamUIProxy::Core::RequestAccess(
|
||||
return;
|
||||
}
|
||||
|
||||
RenderFrameHostImpl* host = RenderFrameHostImpl::FromID(
|
||||
request->render_process_id, request->render_frame_id);
|
||||
|
||||
render_delegate->RequestMediaAccessPermission(
|
||||
*request,
|
||||
host, *request,
|
||||
base::BindOnce(&Core::ProcessAccessRequestResponse, weak_this_,
|
||||
request->render_process_id, request->render_frame_id));
|
||||
}
|
||||
|
@ -38,7 +38,8 @@ namespace content {
|
||||
namespace {
|
||||
class MockRenderFrameHostDelegate : public RenderFrameHostDelegate {
|
||||
public:
|
||||
void RequestMediaAccessPermission(const MediaStreamRequest& request,
|
||||
void RequestMediaAccessPermission(RenderFrameHostImpl* render_frame_host,
|
||||
const MediaStreamRequest& request,
|
||||
MediaResponseCallback callback) override {
|
||||
return RequestMediaAccessPermission(request, &callback);
|
||||
}
|
||||
@ -632,7 +633,8 @@ class MediaStreamUIProxyPermissionsPolicyTest
|
||||
private:
|
||||
class TestRFHDelegate : public RenderFrameHostDelegate {
|
||||
public:
|
||||
void RequestMediaAccessPermission(const MediaStreamRequest& request,
|
||||
void RequestMediaAccessPermission(RenderFrameHostImpl* render_frame_host,
|
||||
const MediaStreamRequest& request,
|
||||
MediaResponseCallback callback) override {
|
||||
blink::mojom::StreamDevicesSet stream_devices_set;
|
||||
stream_devices_set.stream_devices.emplace_back(
|
||||
|
@ -49,6 +49,7 @@ bool RenderFrameHostDelegate::DidAddMessageToConsole(
|
||||
}
|
||||
|
||||
void RenderFrameHostDelegate::RequestMediaAccessPermission(
|
||||
RenderFrameHostImpl* render_frame_host,
|
||||
const MediaStreamRequest& request,
|
||||
MediaResponseCallback callback) {
|
||||
LOG(ERROR) << "RenderFrameHostDelegate::RequestMediaAccessPermission: "
|
||||
|
@ -289,8 +289,10 @@ class CONTENT_EXPORT RenderFrameHostDelegate {
|
||||
// The render frame has requested access to media devices listed in
|
||||
// |request|, and the client should grant or deny that permission by
|
||||
// calling |callback|.
|
||||
virtual void RequestMediaAccessPermission(const MediaStreamRequest& request,
|
||||
MediaResponseCallback callback);
|
||||
virtual void RequestMediaAccessPermission(
|
||||
RenderFrameHostImpl* render_frame_host,
|
||||
const MediaStreamRequest& request,
|
||||
MediaResponseCallback callback);
|
||||
|
||||
// Called when a renderer requests to select an audio output device.
|
||||
// |request| contains parameters for audio output device selection.
|
||||
|
@ -5385,6 +5385,7 @@ void WebContentsImpl::CreateMediaPlayerHostForRenderFrameHost(
|
||||
}
|
||||
|
||||
void WebContentsImpl::RequestMediaAccessPermission(
|
||||
RenderFrameHostImpl* render_frame_host,
|
||||
const MediaStreamRequest& request,
|
||||
MediaResponseCallback callback) {
|
||||
OPTIONAL_TRACE_EVENT2("content",
|
||||
@ -5392,14 +5393,22 @@ void WebContentsImpl::RequestMediaAccessPermission(
|
||||
"render_process_id", request.render_process_id,
|
||||
"render_frame_id", request.render_frame_id);
|
||||
|
||||
if (delegate_) {
|
||||
if (GuestPageHolderImpl* guest =
|
||||
render_frame_host
|
||||
? GuestPageHolderImpl::FromRenderFrameHost(*render_frame_host)
|
||||
: nullptr) {
|
||||
if (auto* delegate = guest->delegate()) {
|
||||
delegate->GuestRequestMediaAccessPermission(request, std::move(callback));
|
||||
return;
|
||||
}
|
||||
} else if (delegate_) {
|
||||
delegate_->RequestMediaAccessPermission(this, request, std::move(callback));
|
||||
} else {
|
||||
std::move(callback).Run(
|
||||
blink::mojom::StreamDevicesSet(),
|
||||
blink::mojom::MediaStreamRequestResult::FAILED_DUE_TO_SHUTDOWN,
|
||||
std::unique_ptr<MediaStreamUI>());
|
||||
return;
|
||||
}
|
||||
std::move(callback).Run(
|
||||
blink::mojom::StreamDevicesSet(),
|
||||
blink::mojom::MediaStreamRequestResult::FAILED_DUE_TO_SHUTDOWN,
|
||||
std::unique_ptr<MediaStreamUI>());
|
||||
}
|
||||
|
||||
void WebContentsImpl::ProcessSelectAudioOutput(
|
||||
@ -5426,6 +5435,15 @@ bool WebContentsImpl::CheckMediaAccessPermission(
|
||||
|
||||
DCHECK(type == blink::mojom::MediaStreamType::DEVICE_AUDIO_CAPTURE ||
|
||||
type == blink::mojom::MediaStreamType::DEVICE_VIDEO_CAPTURE);
|
||||
|
||||
if (auto* guest =
|
||||
GuestPageHolderImpl::FromRenderFrameHost(*render_frame_host)) {
|
||||
if (auto* delegate = guest->delegate()) {
|
||||
return delegate->GuestCheckMediaAccessPermission(render_frame_host,
|
||||
security_origin, type);
|
||||
}
|
||||
return false;
|
||||
}
|
||||
return delegate_ && delegate_->CheckMediaAccessPermission(
|
||||
render_frame_host, security_origin, type);
|
||||
}
|
||||
|
@ -959,7 +959,8 @@ class CONTENT_EXPORT WebContentsImpl
|
||||
RenderFrameHostImpl* frame_host,
|
||||
mojo::PendingAssociatedReceiver<media::mojom::MediaPlayerHost> receiver)
|
||||
override;
|
||||
void RequestMediaAccessPermission(const MediaStreamRequest& request,
|
||||
void RequestMediaAccessPermission(RenderFrameHostImpl* render_frame_host,
|
||||
const MediaStreamRequest& request,
|
||||
MediaResponseCallback callback) override;
|
||||
|
||||
void ProcessSelectAudioOutput(const SelectAudioOutputRequest& request,
|
||||
|
@ -3383,7 +3383,7 @@ TEST_F(WebContentsImplTest, RequestMediaAccessPermissionNoDelegate) {
|
||||
/*captured_surface_control_active=*/false);
|
||||
bool callback_run = false;
|
||||
contents()->RequestMediaAccessPermission(
|
||||
dummy_request,
|
||||
contents()->GetPrimaryMainFrame(), dummy_request,
|
||||
base::BindLambdaForTesting(
|
||||
[&callback_run](
|
||||
const blink::mojom::StreamDevicesSet& stream_devices_set,
|
||||
|
@ -12,6 +12,7 @@
|
||||
#include "base/process/kill.h"
|
||||
#include "base/supports_user_data.h"
|
||||
#include "content/common/content_export.h"
|
||||
#include "content/public/browser/media_stream_request.h"
|
||||
#include "ui/base/window_open_disposition.h"
|
||||
#include "url/gurl.h"
|
||||
|
||||
@ -101,6 +102,19 @@ class GuestPageHolder : public base::SupportsUserData {
|
||||
// Close the current window.
|
||||
virtual void GuestClose() = 0;
|
||||
|
||||
// Asks permission to use the camera and/or microphone.
|
||||
// See `WebContentsDelegate::RequestMediaAccessPermission`
|
||||
virtual void GuestRequestMediaAccessPermission(
|
||||
const MediaStreamRequest& request,
|
||||
MediaResponseCallback callback) = 0;
|
||||
|
||||
// Checks if we have permission to access the microphone or camera.
|
||||
// See `WebContentsDelegate::CheckMediaAccessPermission`
|
||||
virtual bool GuestCheckMediaAccessPermission(
|
||||
RenderFrameHost* render_frame_host,
|
||||
const url::Origin& security_origin,
|
||||
blink::mojom::MediaStreamType type) = 0;
|
||||
|
||||
// TODO(40202416): Guest implementations need to be informed of several
|
||||
// other events that they currently get through primary main frame specific
|
||||
// WebContentsObserver methods (e.g.
|
||||
|
@ -878,6 +878,31 @@ void WebViewGuest::GuestClose() {
|
||||
std::make_unique<GuestViewEvent>(webview::kEventClose, std::move(args)));
|
||||
}
|
||||
|
||||
void WebViewGuest::GuestRequestMediaAccessPermission(
|
||||
const content::MediaStreamRequest& request,
|
||||
content::MediaResponseCallback callback) {
|
||||
if (IsOwnedByControlledFrameEmbedder()) {
|
||||
web_view_permission_helper_->RequestMediaAccessPermissionForControlledFrame(
|
||||
web_contents(), request, std::move(callback));
|
||||
return;
|
||||
}
|
||||
web_view_permission_helper_->RequestMediaAccessPermission(
|
||||
request, std::move(callback));
|
||||
}
|
||||
|
||||
bool WebViewGuest::GuestCheckMediaAccessPermission(
|
||||
content::RenderFrameHost* render_frame_host,
|
||||
const url::Origin& security_origin,
|
||||
blink::mojom::MediaStreamType type) {
|
||||
if (IsOwnedByControlledFrameEmbedder()) {
|
||||
return web_view_permission_helper_
|
||||
->CheckMediaAccessPermissionForControlledFrame(render_frame_host,
|
||||
security_origin, type);
|
||||
}
|
||||
return web_view_permission_helper_->CheckMediaAccessPermission(
|
||||
render_frame_host, security_origin, type);
|
||||
}
|
||||
|
||||
void WebViewGuest::CreateNewGuestWebViewWindow(
|
||||
const content::OpenURLParams& params) {
|
||||
GuestViewManager* guest_manager =
|
||||
@ -1493,13 +1518,7 @@ void WebViewGuest::RequestMediaAccessPermission(
|
||||
content::MediaResponseCallback callback) {
|
||||
CHECK(!base::FeatureList::IsEnabled(features::kGuestViewMPArch));
|
||||
|
||||
if (IsOwnedByControlledFrameEmbedder()) {
|
||||
web_view_permission_helper_->RequestMediaAccessPermissionForControlledFrame(
|
||||
source, request, std::move(callback));
|
||||
return;
|
||||
}
|
||||
web_view_permission_helper_->RequestMediaAccessPermission(
|
||||
source, request, std::move(callback));
|
||||
GuestRequestMediaAccessPermission(request, std::move(callback));
|
||||
}
|
||||
|
||||
bool WebViewGuest::CheckMediaAccessPermission(
|
||||
@ -1508,13 +1527,8 @@ bool WebViewGuest::CheckMediaAccessPermission(
|
||||
blink::mojom::MediaStreamType type) {
|
||||
CHECK(!base::FeatureList::IsEnabled(features::kGuestViewMPArch));
|
||||
|
||||
if (IsOwnedByControlledFrameEmbedder()) {
|
||||
return web_view_permission_helper_
|
||||
->CheckMediaAccessPermissionForControlledFrame(render_frame_host,
|
||||
security_origin, type);
|
||||
}
|
||||
return web_view_permission_helper_->CheckMediaAccessPermission(
|
||||
render_frame_host, security_origin, type);
|
||||
return GuestCheckMediaAccessPermission(render_frame_host, security_origin,
|
||||
type);
|
||||
}
|
||||
|
||||
void WebViewGuest::CanDownload(const GURL& url,
|
||||
|
@ -236,6 +236,13 @@ class WebViewGuest : public guest_view::GuestView<WebViewGuest> {
|
||||
base::OnceCallback<void(content::NavigationHandle&)>
|
||||
navigation_handle_callback) final;
|
||||
void GuestClose() final;
|
||||
void GuestRequestMediaAccessPermission(
|
||||
const content::MediaStreamRequest& request,
|
||||
content::MediaResponseCallback callback) final;
|
||||
bool GuestCheckMediaAccessPermission(
|
||||
content::RenderFrameHost* render_frame_host,
|
||||
const url::Origin& security_origin,
|
||||
blink::mojom::MediaStreamType type) final;
|
||||
|
||||
// GuestpageHolder::Delegate implementation.
|
||||
bool GuestHandleContextMenu(content::RenderFrameHost& render_frame_host,
|
||||
|
@ -189,7 +189,6 @@ WebViewPermissionHelper* WebViewPermissionHelper::FromRenderFrameHostId(
|
||||
}
|
||||
|
||||
void WebViewPermissionHelper::RequestMediaAccessPermission(
|
||||
content::WebContents* source,
|
||||
const content::MediaStreamRequest& request,
|
||||
content::MediaResponseCallback callback) {
|
||||
base::Value::Dict request_info;
|
||||
|
@ -68,8 +68,7 @@ class WebViewPermissionHelper {
|
||||
static WebViewPermissionHelper* FromRenderFrameHostId(
|
||||
const content::GlobalRenderFrameHostId& render_frame_host_id);
|
||||
|
||||
void RequestMediaAccessPermission(content::WebContents* source,
|
||||
const content::MediaStreamRequest& request,
|
||||
void RequestMediaAccessPermission(const content::MediaStreamRequest& request,
|
||||
content::MediaResponseCallback callback);
|
||||
|
||||
void RequestMediaAccessPermissionForControlledFrame(
|
||||
|
Reference in New Issue
Block a user