use std::rc::Rc;
use dom_struct::dom_struct;
use embedder_traits::{self, AllowOrDeny, EmbedderMsg, PermissionFeature};
use ipc_channel::ipc;
use js::conversions::ConversionResult;
use js::jsapi::JSObject;
use js::jsval::{ObjectValue, UndefinedValue};
use script_bindings::inheritance::Castable;
use servo_config::pref;
use super::window::Window;
use crate::conversions::Convert;
use crate::dom::bindings::codegen::Bindings::PermissionStatusBinding::{
PermissionDescriptor, PermissionName, PermissionState, PermissionStatusMethods,
};
use crate::dom::bindings::codegen::Bindings::PermissionsBinding::PermissionsMethods;
use crate::dom::bindings::codegen::Bindings::WindowBinding::Window_Binding::WindowMethods;
use crate::dom::bindings::error::Error;
use crate::dom::bindings::reflector::{DomGlobal, Reflector, reflect_dom_object};
use crate::dom::bindings::root::DomRoot;
#[cfg(feature = "bluetooth")]
use crate::dom::bluetooth::Bluetooth;
#[cfg(feature = "bluetooth")]
use crate::dom::bluetoothpermissionresult::BluetoothPermissionResult;
use crate::dom::globalscope::GlobalScope;
use crate::dom::permissionstatus::PermissionStatus;
use crate::dom::promise::Promise;
use crate::realms::{AlreadyInRealm, InRealm};
use crate::script_runtime::{CanGc, JSContext};
pub(crate) trait PermissionAlgorithm {
type Descriptor;
#[cfg_attr(crown, crown::unrooted_must_root_lint::must_root)]
type Status;
fn create_descriptor(
cx: JSContext,
permission_descriptor_obj: *mut JSObject,
) -> Result<Self::Descriptor, Error>;
fn permission_query(
cx: JSContext,
promise: &Rc<Promise>,
descriptor: &Self::Descriptor,
status: &Self::Status,
);
fn permission_request(
cx: JSContext,
promise: &Rc<Promise>,
descriptor: &Self::Descriptor,
status: &Self::Status,
);
fn permission_revoke(descriptor: &Self::Descriptor, status: &Self::Status, can_gc: CanGc);
}
enum Operation {
Query,
Request,
Revoke,
}
#[dom_struct]
pub(crate) struct Permissions {
reflector_: Reflector,
}
impl Permissions {
pub(crate) fn new_inherited() -> Permissions {
Permissions {
reflector_: Reflector::new(),
}
}
pub(crate) fn new(global: &GlobalScope, can_gc: CanGc) -> DomRoot<Permissions> {
reflect_dom_object(Box::new(Permissions::new_inherited()), global, can_gc)
}
#[allow(non_snake_case)]
fn manipulate(
&self,
op: Operation,
cx: JSContext,
permissionDesc: *mut JSObject,
promise: Option<Rc<Promise>>,
can_gc: CanGc,
) -> Rc<Promise> {
let p = match promise {
Some(promise) => promise,
None => {
let in_realm_proof = AlreadyInRealm::assert();
Promise::new_in_current_realm(InRealm::Already(&in_realm_proof), can_gc)
},
};
let root_desc = match Permissions::create_descriptor(cx, permissionDesc) {
Ok(descriptor) => descriptor,
Err(error) => {
p.reject_error(error, can_gc);
return p;
},
};
let status = PermissionStatus::new(&self.global(), &root_desc, can_gc);
match root_desc.name {
#[cfg(feature = "bluetooth")]
PermissionName::Bluetooth => {
let bluetooth_desc = match Bluetooth::create_descriptor(cx, permissionDesc) {
Ok(descriptor) => descriptor,
Err(error) => {
p.reject_error(error, can_gc);
return p;
},
};
let result = BluetoothPermissionResult::new(&self.global(), &status, can_gc);
match op {
Operation::Request => {
Bluetooth::permission_request(cx, &p, &bluetooth_desc, &result)
},
Operation::Query => {
Bluetooth::permission_query(cx, &p, &bluetooth_desc, &result)
},
Operation::Revoke => {
let globalscope = self.global();
globalscope
.permission_state_invocation_results()
.borrow_mut()
.remove(&root_desc.name);
Bluetooth::permission_revoke(&bluetooth_desc, &result, can_gc)
},
}
},
_ => {
match op {
Operation::Request => {
Permissions::permission_request(cx, &p, &root_desc, &status);
p.resolve_native(&status, can_gc);
},
Operation::Query => {
Permissions::permission_query(cx, &p, &root_desc, &status);
p.resolve_native(&status, can_gc);
},
Operation::Revoke => {
let globalscope = self.global();
globalscope
.permission_state_invocation_results()
.borrow_mut()
.remove(&root_desc.name);
Permissions::permission_revoke(&root_desc, &status, can_gc);
},
}
},
};
match op {
Operation::Revoke => {
self.manipulate(Operation::Query, cx, permissionDesc, Some(p), can_gc)
},
_ => p,
}
}
}
#[allow(non_snake_case)]
impl PermissionsMethods<crate::DomTypeHolder> for Permissions {
fn Query(&self, cx: JSContext, permissionDesc: *mut JSObject, can_gc: CanGc) -> Rc<Promise> {
self.manipulate(Operation::Query, cx, permissionDesc, None, can_gc)
}
fn Request(&self, cx: JSContext, permissionDesc: *mut JSObject, can_gc: CanGc) -> Rc<Promise> {
self.manipulate(Operation::Request, cx, permissionDesc, None, can_gc)
}
fn Revoke(&self, cx: JSContext, permissionDesc: *mut JSObject, can_gc: CanGc) -> Rc<Promise> {
self.manipulate(Operation::Revoke, cx, permissionDesc, None, can_gc)
}
}
impl PermissionAlgorithm for Permissions {
type Descriptor = PermissionDescriptor;
type Status = PermissionStatus;
fn create_descriptor(
cx: JSContext,
permission_descriptor_obj: *mut JSObject,
) -> Result<PermissionDescriptor, Error> {
rooted!(in(*cx) let mut property = UndefinedValue());
property
.handle_mut()
.set(ObjectValue(permission_descriptor_obj));
match PermissionDescriptor::new(cx, property.handle()) {
Ok(ConversionResult::Success(descriptor)) => Ok(descriptor),
Ok(ConversionResult::Failure(error)) => Err(Error::Type(error.into_owned())),
Err(_) => Err(Error::JSFailed),
}
}
fn permission_query(
_cx: JSContext,
_promise: &Rc<Promise>,
_descriptor: &PermissionDescriptor,
status: &PermissionStatus,
) {
status.set_state(descriptor_permission_state(status.get_query(), None));
}
fn permission_request(
cx: JSContext,
promise: &Rc<Promise>,
descriptor: &PermissionDescriptor,
status: &PermissionStatus,
) {
Permissions::permission_query(cx, promise, descriptor, status);
match status.State() {
PermissionState::Prompt => {
let permission_name = status.get_query();
let globalscope = GlobalScope::current().expect("No current global object");
let state = prompt_user_from_embedder(permission_name, &globalscope);
globalscope
.permission_state_invocation_results()
.borrow_mut()
.insert(permission_name, state);
},
_ => return,
}
Permissions::permission_query(cx, promise, descriptor, status);
}
fn permission_revoke(
_descriptor: &PermissionDescriptor,
_status: &PermissionStatus,
_can_gc: CanGc,
) {
}
}
pub(crate) fn descriptor_permission_state(
feature: PermissionName,
env_settings_obj: Option<&GlobalScope>,
) -> PermissionState {
let global_scope = match env_settings_obj {
Some(env_settings_obj) => DomRoot::from_ref(env_settings_obj),
None => GlobalScope::current().expect("No current global object"),
};
if !global_scope.is_secure_context() {
if pref!(dom_permissions_testing_allowed_in_nonsecure_contexts) {
return PermissionState::Granted;
}
return PermissionState::Denied;
}
if let Some(window) = global_scope.downcast::<Window>() {
if !window.Document().allowed_to_use_feature(feature) {
return PermissionState::Denied;
}
}
if let Some(entry) = global_scope
.permission_state_invocation_results()
.borrow()
.get(&feature)
{
return *entry;
}
PermissionState::Prompt
}
fn prompt_user_from_embedder(name: PermissionName, global_scope: &GlobalScope) -> PermissionState {
let Some(webview_id) = global_scope.webview_id() else {
warn!("Requesting permissions from non-webview-associated global scope");
return PermissionState::Denied;
};
let (sender, receiver) = ipc::channel().expect("Failed to create IPC channel!");
global_scope.send_to_embedder(EmbedderMsg::PromptPermission(
webview_id,
name.convert(),
sender,
));
match receiver.recv() {
Ok(AllowOrDeny::Allow) => PermissionState::Granted,
Ok(AllowOrDeny::Deny) => PermissionState::Denied,
Err(e) => {
warn!(
"Failed to receive permission state from embedder ({:?}).",
e
);
PermissionState::Denied
},
}
}
impl Convert<PermissionFeature> for PermissionName {
fn convert(self) -> PermissionFeature {
match self {
PermissionName::Geolocation => PermissionFeature::Geolocation,
PermissionName::Notifications => PermissionFeature::Notifications,
PermissionName::Push => PermissionFeature::Push,
PermissionName::Midi => PermissionFeature::Midi,
PermissionName::Camera => PermissionFeature::Camera,
PermissionName::Microphone => PermissionFeature::Microphone,
PermissionName::Speaker => PermissionFeature::Speaker,
PermissionName::Device_info => PermissionFeature::DeviceInfo,
PermissionName::Background_sync => PermissionFeature::BackgroundSync,
PermissionName::Bluetooth => PermissionFeature::Bluetooth,
PermissionName::Persistent_storage => PermissionFeature::PersistentStorage,
}
}
}