| 1 | /* |
| 2 | * Copyright (C) 2014 Igalia S.L. |
| 3 | * Copyright (C) 2016-2018 Apple Inc. All rights reserved. |
| 4 | * |
| 5 | * This library is free software; you can redistribute it and/or |
| 6 | * modify it under the terms of the GNU Lesser General Public |
| 7 | * License as published by the Free Software Foundation; either |
| 8 | * version 2 of the License, or (at your option) any later version. |
| 9 | * |
| 10 | * This library is distributed in the hope that it will be useful, |
| 11 | * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 12 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU |
| 13 | * Lesser General Public License for more details. |
| 14 | * |
| 15 | * You should have received a copy of the GNU Lesser General Public |
| 16 | * License along with this library; if not, write to the Free Software |
| 17 | * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA |
| 18 | */ |
| 19 | |
| 20 | #include "config.h" |
| 21 | #include "UserMediaPermissionRequestManagerProxy.h" |
| 22 | |
| 23 | #include "APISecurityOrigin.h" |
| 24 | #include "APIUIClient.h" |
| 25 | #include "DeviceIdHashSaltStorage.h" |
| 26 | #include "Logging.h" |
| 27 | #include "UserMediaPermissionRequestManager.h" |
| 28 | #include "UserMediaProcessManager.h" |
| 29 | #include "WebAutomationSession.h" |
| 30 | #include "WebPageMessages.h" |
| 31 | #include "WebPageProxy.h" |
| 32 | #include "WebProcess.h" |
| 33 | #include "WebProcessPool.h" |
| 34 | #include "WebProcessProxy.h" |
| 35 | #include "WebsiteDataStore.h" |
| 36 | #include <WebCore/MediaConstraints.h> |
| 37 | #include <WebCore/MockRealtimeMediaSourceCenter.h> |
| 38 | #include <WebCore/RealtimeMediaSource.h> |
| 39 | #include <WebCore/SecurityOriginData.h> |
| 40 | #include <WebCore/UserMediaRequest.h> |
| 41 | |
| 42 | namespace WebKit { |
| 43 | using namespace WebCore; |
| 44 | |
| 45 | #if ENABLE(MEDIA_STREAM) |
| 46 | static const MediaProducer::MediaStateFlags activeCaptureMask = MediaProducer::HasActiveAudioCaptureDevice | MediaProducer::HasActiveVideoCaptureDevice; |
| 47 | |
| 48 | static uint64_t generateRequestID() |
| 49 | { |
| 50 | static uint64_t uniqueRequestID = 1; |
| 51 | return uniqueRequestID++; |
| 52 | } |
| 53 | #endif |
| 54 | |
| 55 | #if ENABLE(MEDIA_STREAM) |
| 56 | static HashSet<UserMediaPermissionRequestManagerProxy*>& proxies() |
| 57 | { |
| 58 | static NeverDestroyed<HashSet<UserMediaPermissionRequestManagerProxy*>> set; |
| 59 | return set; |
| 60 | } |
| 61 | |
| 62 | void UserMediaPermissionRequestManagerProxy::forEach(const WTF::Function<void(UserMediaPermissionRequestManagerProxy&)>& function) |
| 63 | { |
| 64 | for (auto* proxy : proxies()) |
| 65 | function(*proxy); |
| 66 | } |
| 67 | #endif |
| 68 | |
| 69 | UserMediaPermissionRequestManagerProxy::UserMediaPermissionRequestManagerProxy(WebPageProxy& page) |
| 70 | : m_page(page) |
| 71 | , m_rejectionTimer(RunLoop::main(), this, &UserMediaPermissionRequestManagerProxy::rejectionTimerFired) |
| 72 | , m_watchdogTimer(RunLoop::main(), this, &UserMediaPermissionRequestManagerProxy::watchdogTimerFired) |
| 73 | #if !RELEASE_LOG_DISABLED |
| 74 | , m_logger(page.logger()) |
| 75 | , m_logIdentifier(uniqueLogIdentifier()) |
| 76 | #endif |
| 77 | { |
| 78 | #if ENABLE(MEDIA_STREAM) |
| 79 | proxies().add(this); |
| 80 | #endif |
| 81 | } |
| 82 | |
| 83 | UserMediaPermissionRequestManagerProxy::~UserMediaPermissionRequestManagerProxy() |
| 84 | { |
| 85 | #if ENABLE(MEDIA_STREAM) |
| 86 | UserMediaProcessManager::singleton().revokeSandboxExtensionsIfNeeded(page().process()); |
| 87 | proxies().remove(this); |
| 88 | #endif |
| 89 | invalidatePendingRequests(); |
| 90 | } |
| 91 | |
| 92 | void UserMediaPermissionRequestManagerProxy::invalidatePendingRequests() |
| 93 | { |
| 94 | if (m_currentUserMediaRequest) { |
| 95 | m_currentUserMediaRequest->invalidate(); |
| 96 | m_currentUserMediaRequest = nullptr; |
| 97 | } |
| 98 | |
| 99 | auto pendingUserMediaRequests = WTFMove(m_pendingUserMediaRequests); |
| 100 | for (auto& request : pendingUserMediaRequests) |
| 101 | request->invalidate(); |
| 102 | |
| 103 | auto pregrantedRequests = WTFMove(m_pregrantedRequests); |
| 104 | for (auto& request : pregrantedRequests) |
| 105 | request->invalidate(); |
| 106 | |
| 107 | m_pendingDeviceRequests.clear(); |
| 108 | } |
| 109 | |
| 110 | void UserMediaPermissionRequestManagerProxy::stopCapture() |
| 111 | { |
| 112 | ALWAYS_LOG(LOGIDENTIFIER); |
| 113 | invalidatePendingRequests(); |
| 114 | m_page.stopMediaCapture(); |
| 115 | } |
| 116 | |
| 117 | void UserMediaPermissionRequestManagerProxy::captureDevicesChanged() |
| 118 | { |
| 119 | #if ENABLE(MEDIA_STREAM) |
| 120 | ALWAYS_LOG(LOGIDENTIFIER); |
| 121 | if (!m_page.hasRunningProcess() || !m_page.mainFrame()) |
| 122 | return; |
| 123 | |
| 124 | auto handler = [this](PermissionInfo permissionInfo) mutable { |
| 125 | switch (permissionInfo) { |
| 126 | case PermissionInfo::Error: |
| 127 | return; |
| 128 | case PermissionInfo::Unknown: |
| 129 | if (m_grantedRequests.isEmpty()) |
| 130 | return; |
| 131 | break; |
| 132 | case PermissionInfo::Granted: |
| 133 | break; |
| 134 | } |
| 135 | if (!m_page.hasRunningProcess()) |
| 136 | return; |
| 137 | |
| 138 | m_page.process().send(Messages::WebPage::CaptureDevicesChanged(), m_page.pageID()); |
| 139 | }; |
| 140 | |
| 141 | auto origin = WebCore::SecurityOrigin::create(m_page.mainFrame()->url()); |
| 142 | getUserMediaPermissionInfo(m_page.mainFrame()->frameID(), origin.get(), WTFMove(origin), WTFMove(handler)); |
| 143 | #endif |
| 144 | } |
| 145 | |
| 146 | void UserMediaPermissionRequestManagerProxy::clearCachedState() |
| 147 | { |
| 148 | ALWAYS_LOG(LOGIDENTIFIER); |
| 149 | invalidatePendingRequests(); |
| 150 | } |
| 151 | |
| 152 | #if ENABLE(MEDIA_STREAM) |
| 153 | static uint64_t toWebCore(UserMediaPermissionRequestProxy::UserMediaAccessDenialReason reason) |
| 154 | { |
| 155 | switch (reason) { |
| 156 | case UserMediaPermissionRequestProxy::UserMediaAccessDenialReason::NoConstraints: |
| 157 | return static_cast<uint64_t>(UserMediaRequest::MediaAccessDenialReason::NoConstraints); |
| 158 | case UserMediaPermissionRequestProxy::UserMediaAccessDenialReason::UserMediaDisabled: |
| 159 | return static_cast<uint64_t>(UserMediaRequest::MediaAccessDenialReason::UserMediaDisabled); |
| 160 | case UserMediaPermissionRequestProxy::UserMediaAccessDenialReason::NoCaptureDevices: |
| 161 | return static_cast<uint64_t>(UserMediaRequest::MediaAccessDenialReason::NoCaptureDevices); |
| 162 | case UserMediaPermissionRequestProxy::UserMediaAccessDenialReason::InvalidConstraint: |
| 163 | return static_cast<uint64_t>(UserMediaRequest::MediaAccessDenialReason::InvalidConstraint); |
| 164 | case UserMediaPermissionRequestProxy::UserMediaAccessDenialReason::HardwareError: |
| 165 | return static_cast<uint64_t>(UserMediaRequest::MediaAccessDenialReason::HardwareError); |
| 166 | case UserMediaPermissionRequestProxy::UserMediaAccessDenialReason::PermissionDenied: |
| 167 | return static_cast<uint64_t>(UserMediaRequest::MediaAccessDenialReason::PermissionDenied); |
| 168 | case UserMediaPermissionRequestProxy::UserMediaAccessDenialReason::OtherFailure: |
| 169 | return static_cast<uint64_t>(UserMediaRequest::MediaAccessDenialReason::OtherFailure); |
| 170 | } |
| 171 | |
| 172 | ASSERT_NOT_REACHED(); |
| 173 | return static_cast<uint64_t>(UserMediaRequest::MediaAccessDenialReason::OtherFailure); |
| 174 | } |
| 175 | #endif |
| 176 | |
| 177 | void UserMediaPermissionRequestManagerProxy::denyRequest(UserMediaPermissionRequestProxy& request, UserMediaPermissionRequestProxy::UserMediaAccessDenialReason reason, const String& invalidConstraint) |
| 178 | { |
| 179 | if (!m_page.hasRunningProcess()) |
| 180 | return; |
| 181 | |
| 182 | ALWAYS_LOG(LOGIDENTIFIER, request.userMediaID(), ", reason: " , reason); |
| 183 | |
| 184 | if (reason == UserMediaPermissionRequestProxy::UserMediaAccessDenialReason::PermissionDenied) |
| 185 | m_deniedRequests.append(DeniedRequest { request.mainFrameID(), request.userMediaDocumentSecurityOrigin(), request.topLevelDocumentSecurityOrigin(), request.requiresAudioCapture(), request.requiresVideoCapture(), request.requiresDisplayCapture() }); |
| 186 | |
| 187 | #if ENABLE(MEDIA_STREAM) |
| 188 | m_page.process().send(Messages::WebPage::UserMediaAccessWasDenied(request.userMediaID(), toWebCore(reason), invalidConstraint), m_page.pageID()); |
| 189 | #else |
| 190 | UNUSED_PARAM(reason); |
| 191 | UNUSED_PARAM(invalidConstraint); |
| 192 | #endif |
| 193 | |
| 194 | processNextUserMediaRequestIfNeeded(); |
| 195 | } |
| 196 | |
| 197 | void UserMediaPermissionRequestManagerProxy::grantRequest(UserMediaPermissionRequestProxy& request) |
| 198 | { |
| 199 | if (!m_page.hasRunningProcess()) |
| 200 | return; |
| 201 | |
| 202 | #if ENABLE(MEDIA_STREAM) |
| 203 | ALWAYS_LOG(LOGIDENTIFIER, request.userMediaID(), ", video: " , request.videoDevice().label(), ", audio: " , request.audioDevice().label()); |
| 204 | |
| 205 | auto& userMediaDocumentSecurityOrigin = request.userMediaDocumentSecurityOrigin(); |
| 206 | auto& topLevelDocumentSecurityOrigin = request.topLevelDocumentSecurityOrigin(); |
| 207 | m_page.websiteDataStore().deviceIdHashSaltStorage().deviceIdHashSaltForOrigin(userMediaDocumentSecurityOrigin, topLevelDocumentSecurityOrigin, [this, weakThis = makeWeakPtr(*this), request = makeRef(request)](String&&) mutable { |
| 208 | if (!weakThis) |
| 209 | return; |
| 210 | finishGrantingRequest(request); |
| 211 | }); |
| 212 | #else |
| 213 | UNUSED_PARAM(request); |
| 214 | #endif |
| 215 | } |
| 216 | |
| 217 | #if ENABLE(MEDIA_STREAM) |
| 218 | void UserMediaPermissionRequestManagerProxy::finishGrantingRequest(UserMediaPermissionRequestProxy& request) |
| 219 | { |
| 220 | ALWAYS_LOG(LOGIDENTIFIER, request.userMediaID()); |
| 221 | if (!UserMediaProcessManager::singleton().willCreateMediaStream(*this, request.hasAudioDevice(), request.hasVideoDevice())) { |
| 222 | denyRequest(request, UserMediaPermissionRequestProxy::UserMediaAccessDenialReason::OtherFailure, "Unable to extend sandbox." ); |
| 223 | return; |
| 224 | } |
| 225 | |
| 226 | if (request.requestType() == MediaStreamRequest::Type::UserMedia) |
| 227 | m_grantedRequests.append(makeRef(request)); |
| 228 | |
| 229 | if (m_hasFilteredDeviceList) |
| 230 | captureDevicesChanged(); |
| 231 | m_hasFilteredDeviceList = false; |
| 232 | |
| 233 | ++m_hasPendingCapture; |
| 234 | m_page.process().connection()->sendWithAsyncReply(Messages::WebPage::UserMediaAccessWasGranted { request.userMediaID(), request.audioDevice(), request.videoDevice(), request.deviceIdentifierHashSalt() }, [this, weakThis = makeWeakPtr(this)] { |
| 235 | if (!weakThis) |
| 236 | return; |
| 237 | --m_hasPendingCapture; |
| 238 | }, m_page.pageID()); |
| 239 | |
| 240 | processNextUserMediaRequestIfNeeded(); |
| 241 | } |
| 242 | |
| 243 | void UserMediaPermissionRequestManagerProxy::resetAccess(uint64_t frameID) |
| 244 | { |
| 245 | ALWAYS_LOG(LOGIDENTIFIER, frameID); |
| 246 | m_grantedRequests.removeAllMatching([frameID](const auto& grantedRequest) { |
| 247 | return grantedRequest->mainFrameID() == frameID; |
| 248 | }); |
| 249 | m_pregrantedRequests.clear(); |
| 250 | m_deniedRequests.clear(); |
| 251 | m_hasFilteredDeviceList = false; |
| 252 | } |
| 253 | |
| 254 | const UserMediaPermissionRequestProxy* UserMediaPermissionRequestManagerProxy::searchForGrantedRequest(uint64_t frameID, const SecurityOrigin& userMediaDocumentOrigin, const SecurityOrigin& topLevelDocumentOrigin, bool needsAudio, bool needsVideo) const |
| 255 | { |
| 256 | if (m_page.isMediaStreamCaptureMuted()) |
| 257 | return nullptr; |
| 258 | |
| 259 | bool checkForAudio = needsAudio; |
| 260 | bool checkForVideo = needsVideo; |
| 261 | for (const auto& grantedRequest : m_grantedRequests) { |
| 262 | if (grantedRequest->requiresDisplayCapture()) |
| 263 | continue; |
| 264 | if (!grantedRequest->userMediaDocumentSecurityOrigin().isSameSchemeHostPort(userMediaDocumentOrigin)) |
| 265 | continue; |
| 266 | if (!grantedRequest->topLevelDocumentSecurityOrigin().isSameSchemeHostPort(topLevelDocumentOrigin)) |
| 267 | continue; |
| 268 | if (grantedRequest->frameID() != frameID) |
| 269 | continue; |
| 270 | |
| 271 | if (grantedRequest->requiresVideoCapture()) |
| 272 | checkForVideo = false; |
| 273 | |
| 274 | if (grantedRequest->requiresAudioCapture()) |
| 275 | checkForAudio = false; |
| 276 | |
| 277 | if (checkForVideo || checkForAudio) |
| 278 | continue; |
| 279 | |
| 280 | return grantedRequest.ptr(); |
| 281 | } |
| 282 | return nullptr; |
| 283 | } |
| 284 | |
| 285 | bool UserMediaPermissionRequestManagerProxy::wasRequestDenied(uint64_t mainFrameID, const SecurityOrigin& userMediaDocumentOrigin, const SecurityOrigin& topLevelDocumentOrigin, bool needsAudio, bool needsVideo, bool needsScreenCapture) |
| 286 | { |
| 287 | for (const auto& deniedRequest : m_deniedRequests) { |
| 288 | if (!deniedRequest.userMediaDocumentOrigin->isSameSchemeHostPort(userMediaDocumentOrigin)) |
| 289 | continue; |
| 290 | if (!deniedRequest.topLevelDocumentOrigin->isSameSchemeHostPort(topLevelDocumentOrigin)) |
| 291 | continue; |
| 292 | if (deniedRequest.mainFrameID != mainFrameID) |
| 293 | continue; |
| 294 | if (deniedRequest.isAudioDenied && needsAudio) |
| 295 | return true; |
| 296 | if (deniedRequest.isVideoDenied && needsVideo) |
| 297 | return true; |
| 298 | if (deniedRequest.isScreenCaptureDenied && needsScreenCapture) |
| 299 | return true; |
| 300 | } |
| 301 | return false; |
| 302 | } |
| 303 | |
| 304 | #endif |
| 305 | |
| 306 | void UserMediaPermissionRequestManagerProxy::rejectionTimerFired() |
| 307 | { |
| 308 | denyRequest(m_pendingRejections.takeFirst(), UserMediaPermissionRequestProxy::UserMediaAccessDenialReason::PermissionDenied, emptyString()); |
| 309 | if (!m_pendingRejections.isEmpty()) |
| 310 | scheduleNextRejection(); |
| 311 | } |
| 312 | |
| 313 | void UserMediaPermissionRequestManagerProxy::scheduleNextRejection() |
| 314 | { |
| 315 | const double mimimumDelayBeforeReplying = .25; |
| 316 | if (!m_rejectionTimer.isActive()) |
| 317 | m_rejectionTimer.startOneShot(Seconds(mimimumDelayBeforeReplying + randomNumber())); |
| 318 | } |
| 319 | |
| 320 | #if ENABLE(MEDIA_STREAM) |
| 321 | UserMediaPermissionRequestManagerProxy::RequestAction UserMediaPermissionRequestManagerProxy::getRequestAction(const UserMediaPermissionRequestProxy& request) |
| 322 | { |
| 323 | bool requestingScreenCapture = request.requestType() == MediaStreamRequest::Type::DisplayMedia; |
| 324 | bool requestingCamera = !requestingScreenCapture && request.hasVideoDevice(); |
| 325 | bool requestingMicrophone = request.hasAudioDevice(); |
| 326 | |
| 327 | ASSERT(!(requestingScreenCapture && !request.hasVideoDevice())); |
| 328 | ASSERT(!(requestingScreenCapture && requestingMicrophone)); |
| 329 | |
| 330 | if (wasRequestDenied(request.frameID(), request.userMediaDocumentSecurityOrigin(), request.topLevelDocumentSecurityOrigin(), requestingMicrophone, requestingCamera, requestingScreenCapture)) |
| 331 | return RequestAction::Deny; |
| 332 | |
| 333 | if (request.requestType() == MediaStreamRequest::Type::DisplayMedia) |
| 334 | return RequestAction::Prompt; |
| 335 | |
| 336 | return searchForGrantedRequest(request.frameID(), request.userMediaDocumentSecurityOrigin(), request.topLevelDocumentSecurityOrigin(), requestingMicrophone, requestingCamera) ? RequestAction::Grant : RequestAction::Prompt; |
| 337 | } |
| 338 | #endif |
| 339 | |
| 340 | void UserMediaPermissionRequestManagerProxy::requestUserMediaPermissionForFrame(uint64_t userMediaID, uint64_t frameID, Ref<SecurityOrigin>&& userMediaDocumentOrigin, Ref<SecurityOrigin>&& topLevelDocumentOrigin, MediaStreamRequest&& userRequest) |
| 341 | { |
| 342 | #if ENABLE(MEDIA_STREAM) |
| 343 | if (!m_page.hasRunningProcess()) |
| 344 | return; |
| 345 | |
| 346 | ALWAYS_LOG(LOGIDENTIFIER, userMediaID); |
| 347 | |
| 348 | auto request = UserMediaPermissionRequestProxy::create(*this, userMediaID, m_page.mainFrame()->frameID(), frameID, WTFMove(userMediaDocumentOrigin), WTFMove(topLevelDocumentOrigin), { }, { }, WTFMove(userRequest)); |
| 349 | if (m_currentUserMediaRequest) { |
| 350 | m_pendingUserMediaRequests.append(WTFMove(request)); |
| 351 | return; |
| 352 | } |
| 353 | |
| 354 | if (!UserMediaProcessManager::singleton().captureEnabled()) { |
| 355 | ALWAYS_LOG(LOGIDENTIFIER, "capture disabled" ); |
| 356 | m_pendingRejections.append(WTFMove(request)); |
| 357 | scheduleNextRejection(); |
| 358 | return; |
| 359 | } |
| 360 | |
| 361 | startProcessingUserMediaPermissionRequest(WTFMove(request)); |
| 362 | #else |
| 363 | UNUSED_PARAM(userMediaID); |
| 364 | UNUSED_PARAM(frameID); |
| 365 | UNUSED_PARAM(userMediaDocumentOrigin); |
| 366 | UNUSED_PARAM(topLevelDocumentOrigin); |
| 367 | UNUSED_PARAM(userRequest); |
| 368 | #endif |
| 369 | } |
| 370 | |
| 371 | void UserMediaPermissionRequestManagerProxy::processNextUserMediaRequestIfNeeded() |
| 372 | { |
| 373 | #if ENABLE(MEDIA_STREAM) |
| 374 | if (m_pendingUserMediaRequests.isEmpty()) { |
| 375 | m_currentUserMediaRequest = nullptr; |
| 376 | return; |
| 377 | } |
| 378 | startProcessingUserMediaPermissionRequest(m_pendingUserMediaRequests.takeFirst()); |
| 379 | #endif |
| 380 | } |
| 381 | |
| 382 | #if ENABLE(MEDIA_STREAM) |
| 383 | void UserMediaPermissionRequestManagerProxy::startProcessingUserMediaPermissionRequest(Ref<UserMediaPermissionRequestProxy>&& request) |
| 384 | { |
| 385 | m_currentUserMediaRequest = WTFMove(request); |
| 386 | |
| 387 | auto& userMediaDocumentSecurityOrigin = m_currentUserMediaRequest->userMediaDocumentSecurityOrigin(); |
| 388 | auto& topLevelDocumentSecurityOrigin = m_currentUserMediaRequest->topLevelDocumentSecurityOrigin(); |
| 389 | getUserMediaPermissionInfo(m_currentUserMediaRequest->frameID(), userMediaDocumentSecurityOrigin, topLevelDocumentSecurityOrigin, [this, request = m_currentUserMediaRequest](auto permissionInfo) mutable { |
| 390 | if (!request->isPending()) |
| 391 | return; |
| 392 | |
| 393 | switch (permissionInfo) { |
| 394 | case PermissionInfo::Error: |
| 395 | this->denyRequest(*m_currentUserMediaRequest, UserMediaPermissionRequestProxy::UserMediaAccessDenialReason::OtherFailure); |
| 396 | return; |
| 397 | case PermissionInfo::Unknown: |
| 398 | break; |
| 399 | case PermissionInfo::Granted: |
| 400 | m_currentUserMediaRequest->setHasPersistentAccess(); |
| 401 | break; |
| 402 | } |
| 403 | this->processUserMediaPermissionRequest(); |
| 404 | }); |
| 405 | } |
| 406 | |
| 407 | void UserMediaPermissionRequestManagerProxy::processUserMediaPermissionRequest() |
| 408 | { |
| 409 | ALWAYS_LOG(LOGIDENTIFIER, m_currentUserMediaRequest->userMediaID(), ", persistent access: " , m_currentUserMediaRequest->hasPersistentAccess()); |
| 410 | |
| 411 | auto& userMediaDocumentSecurityOrigin = m_currentUserMediaRequest->userMediaDocumentSecurityOrigin(); |
| 412 | auto& topLevelDocumentSecurityOrigin = m_currentUserMediaRequest->topLevelDocumentSecurityOrigin(); |
| 413 | m_page.websiteDataStore().deviceIdHashSaltStorage().deviceIdHashSaltForOrigin(userMediaDocumentSecurityOrigin, topLevelDocumentSecurityOrigin, [this, request = m_currentUserMediaRequest] (String&& deviceIDHashSalt) mutable { |
| 414 | if (!request->isPending()) |
| 415 | return; |
| 416 | |
| 417 | RealtimeMediaSourceCenter::InvalidConstraintsHandler invalidHandler = [this, request](const String& invalidConstraint) { |
| 418 | if (!request->isPending()) |
| 419 | return; |
| 420 | |
| 421 | if (!m_page.hasRunningProcess()) |
| 422 | return; |
| 423 | |
| 424 | processUserMediaPermissionInvalidRequest(invalidConstraint); |
| 425 | }; |
| 426 | |
| 427 | auto validHandler = [this, request](Vector<CaptureDevice>&& audioDevices, Vector<CaptureDevice>&& videoDevices, String&& deviceIdentifierHashSalt) mutable { |
| 428 | if (!request->isPending()) |
| 429 | return; |
| 430 | |
| 431 | if (!m_page.hasRunningProcess() || !m_page.mainFrame()) |
| 432 | return; |
| 433 | |
| 434 | processUserMediaPermissionValidRequest(WTFMove(audioDevices), WTFMove(videoDevices), WTFMove(deviceIdentifierHashSalt)); |
| 435 | }; |
| 436 | |
| 437 | syncWithWebCorePrefs(); |
| 438 | |
| 439 | RealtimeMediaSourceCenter::singleton().validateRequestConstraints(WTFMove(validHandler), WTFMove(invalidHandler), m_currentUserMediaRequest->userRequest(), WTFMove(deviceIDHashSalt)); |
| 440 | }); |
| 441 | } |
| 442 | #endif |
| 443 | |
| 444 | #if ENABLE(MEDIA_STREAM) |
| 445 | void UserMediaPermissionRequestManagerProxy::processUserMediaPermissionInvalidRequest(const String& invalidConstraint) |
| 446 | { |
| 447 | ALWAYS_LOG(LOGIDENTIFIER, m_currentUserMediaRequest->userMediaID()); |
| 448 | bool filterConstraint = !m_currentUserMediaRequest->hasPersistentAccess() && !wasGrantedVideoOrAudioAccess(m_currentUserMediaRequest->frameID(), m_currentUserMediaRequest->userMediaDocumentSecurityOrigin(), m_currentUserMediaRequest->topLevelDocumentSecurityOrigin()); |
| 449 | |
| 450 | denyRequest(*m_currentUserMediaRequest, UserMediaPermissionRequestProxy::UserMediaAccessDenialReason::InvalidConstraint, filterConstraint ? String { } : invalidConstraint); |
| 451 | } |
| 452 | |
| 453 | void UserMediaPermissionRequestManagerProxy::processUserMediaPermissionValidRequest(Vector<CaptureDevice>&& audioDevices, Vector<CaptureDevice>&& videoDevices, String&& deviceIdentifierHashSalt) |
| 454 | { |
| 455 | ALWAYS_LOG(LOGIDENTIFIER, m_currentUserMediaRequest->userMediaID(), ", video: " , videoDevices.size(), " audio: " , audioDevices.size()); |
| 456 | if (videoDevices.isEmpty() && audioDevices.isEmpty()) { |
| 457 | denyRequest(*m_currentUserMediaRequest, UserMediaPermissionRequestProxy::UserMediaAccessDenialReason::NoConstraints, emptyString()); |
| 458 | return; |
| 459 | } |
| 460 | |
| 461 | m_currentUserMediaRequest->setDeviceIdentifierHashSalt(WTFMove(deviceIdentifierHashSalt)); |
| 462 | m_currentUserMediaRequest->setEligibleVideoDeviceUIDs(WTFMove(videoDevices)); |
| 463 | m_currentUserMediaRequest->setEligibleAudioDeviceUIDs(WTFMove(audioDevices)); |
| 464 | |
| 465 | auto action = getRequestAction(*m_currentUserMediaRequest); |
| 466 | ALWAYS_LOG(LOGIDENTIFIER, m_currentUserMediaRequest->userMediaID(), ", action: " , action); |
| 467 | |
| 468 | if (action == RequestAction::Deny) { |
| 469 | denyRequest(*m_currentUserMediaRequest, UserMediaPermissionRequestProxy::UserMediaAccessDenialReason::PermissionDenied, emptyString()); |
| 470 | return; |
| 471 | } |
| 472 | |
| 473 | if (action == RequestAction::Grant) { |
| 474 | ASSERT(m_currentUserMediaRequest->requestType() != MediaStreamRequest::Type::DisplayMedia); |
| 475 | |
| 476 | if (m_page.isViewVisible()) |
| 477 | grantRequest(*m_currentUserMediaRequest); |
| 478 | else |
| 479 | m_pregrantedRequests.append(m_currentUserMediaRequest.releaseNonNull()); |
| 480 | |
| 481 | return; |
| 482 | } |
| 483 | |
| 484 | if (m_page.isControlledByAutomation()) { |
| 485 | if (WebAutomationSession* automationSession = m_page.process().processPool().automationSession()) { |
| 486 | ALWAYS_LOG(LOGIDENTIFIER, m_currentUserMediaRequest->userMediaID(), ", page controlled by automation" ); |
| 487 | if (automationSession->shouldAllowGetUserMediaForPage(m_page)) |
| 488 | grantRequest(*m_currentUserMediaRequest); |
| 489 | else |
| 490 | denyRequest(*m_currentUserMediaRequest, UserMediaPermissionRequestProxy::UserMediaAccessDenialReason::PermissionDenied); |
| 491 | return; |
| 492 | } |
| 493 | } |
| 494 | |
| 495 | if (m_page.preferences().mockCaptureDevicesEnabled() && !m_page.preferences().mockCaptureDevicesPromptEnabled()) { |
| 496 | ALWAYS_LOG(LOGIDENTIFIER, m_currentUserMediaRequest->userMediaID(), ", mock devices don't require prompt" ); |
| 497 | grantRequest(*m_currentUserMediaRequest); |
| 498 | return; |
| 499 | } |
| 500 | |
| 501 | // If page navigated, there is no need to call the page client for authorization. |
| 502 | auto* webFrame = m_page.process().webFrame(m_currentUserMediaRequest->frameID()); |
| 503 | |
| 504 | if (!webFrame || !SecurityOrigin::createFromString(m_page.pageLoadState().activeURL())->isSameSchemeHostPort(m_currentUserMediaRequest->topLevelDocumentSecurityOrigin())) { |
| 505 | denyRequest(*m_currentUserMediaRequest, UserMediaPermissionRequestProxy::UserMediaAccessDenialReason::NoConstraints, emptyString()); |
| 506 | return; |
| 507 | } |
| 508 | |
| 509 | // FIXME: Remove webFrame, userMediaOrigin and topLevelOrigin from this uiClient API call. |
| 510 | auto userMediaOrigin = API::SecurityOrigin::create(m_currentUserMediaRequest->userMediaDocumentSecurityOrigin()); |
| 511 | auto topLevelOrigin = API::SecurityOrigin::create(m_currentUserMediaRequest->topLevelDocumentSecurityOrigin()); |
| 512 | m_page.uiClient().decidePolicyForUserMediaPermissionRequest(m_page, *webFrame, WTFMove(userMediaOrigin), WTFMove(topLevelOrigin), *m_currentUserMediaRequest); |
| 513 | } |
| 514 | |
| 515 | void UserMediaPermissionRequestManagerProxy::getUserMediaPermissionInfo(uint64_t frameID, Ref<SecurityOrigin>&& userMediaDocumentOrigin, Ref<SecurityOrigin>&& topLevelDocumentOrigin, CompletionHandler<void(PermissionInfo)>&& handler) |
| 516 | { |
| 517 | auto* webFrame = m_page.process().webFrame(frameID); |
| 518 | if (!webFrame || !SecurityOrigin::createFromString(m_page.pageLoadState().activeURL())->isSameSchemeHostPort(topLevelDocumentOrigin.get())) { |
| 519 | handler({ }); |
| 520 | return; |
| 521 | } |
| 522 | |
| 523 | auto userMediaOrigin = API::SecurityOrigin::create(userMediaDocumentOrigin.get()); |
| 524 | auto topLevelOrigin = API::SecurityOrigin::create(topLevelDocumentOrigin.get()); |
| 525 | |
| 526 | auto requestID = generateRequestID(); |
| 527 | m_pendingDeviceRequests.add(requestID); |
| 528 | |
| 529 | auto request = UserMediaPermissionCheckProxy::create(frameID, [this, weakThis = makeWeakPtr(*this), requestID, handler = WTFMove(handler)](auto permissionInfo) mutable { |
| 530 | if (!weakThis || !m_pendingDeviceRequests.remove(requestID)) |
| 531 | permissionInfo = PermissionInfo::Error; |
| 532 | handler(permissionInfo); |
| 533 | }, WTFMove(userMediaDocumentOrigin), WTFMove(topLevelDocumentOrigin)); |
| 534 | |
| 535 | // FIXME: Remove webFrame, userMediaOrigin and topLevelOrigin from this uiClient API call. |
| 536 | m_page.uiClient().checkUserMediaPermissionForOrigin(m_page, *webFrame, userMediaOrigin.get(), topLevelOrigin.get(), request.get()); |
| 537 | } |
| 538 | |
| 539 | bool UserMediaPermissionRequestManagerProxy::wasGrantedVideoOrAudioAccess(uint64_t frameID, const SecurityOrigin& userMediaDocumentOrigin, const SecurityOrigin& topLevelDocumentOrigin) |
| 540 | { |
| 541 | for (const auto& grantedRequest : m_grantedRequests) { |
| 542 | if (grantedRequest->requiresDisplayCapture()) |
| 543 | continue; |
| 544 | if (!grantedRequest->userMediaDocumentSecurityOrigin().isSameSchemeHostPort(userMediaDocumentOrigin)) |
| 545 | continue; |
| 546 | if (!grantedRequest->topLevelDocumentSecurityOrigin().isSameSchemeHostPort(topLevelDocumentOrigin)) |
| 547 | continue; |
| 548 | if (grantedRequest->frameID() != frameID) |
| 549 | continue; |
| 550 | |
| 551 | if (grantedRequest->requiresVideoCapture() || grantedRequest->requiresAudioCapture()) |
| 552 | return true; |
| 553 | } |
| 554 | |
| 555 | return false; |
| 556 | } |
| 557 | |
| 558 | Vector<CaptureDevice> UserMediaPermissionRequestManagerProxy::computeFilteredDeviceList(bool revealIdsAndLabels, const String& deviceIDHashSalt) |
| 559 | { |
| 560 | static const int defaultMaximumCameraCount = 1; |
| 561 | static const int defaultMaximumMicrophoneCount = 1; |
| 562 | |
| 563 | auto devices = RealtimeMediaSourceCenter::singleton().getMediaStreamDevices(); |
| 564 | int cameraCount = 0; |
| 565 | int microphoneCount = 0; |
| 566 | |
| 567 | Vector<CaptureDevice> filteredDevices; |
| 568 | for (const auto& device : devices) { |
| 569 | if (!device.enabled() || (device.type() != WebCore::CaptureDevice::DeviceType::Camera && device.type() != WebCore::CaptureDevice::DeviceType::Microphone)) |
| 570 | continue; |
| 571 | |
| 572 | if (!revealIdsAndLabels) { |
| 573 | if (device.type() == WebCore::CaptureDevice::DeviceType::Camera && ++cameraCount > defaultMaximumCameraCount) |
| 574 | continue; |
| 575 | if (device.type() == WebCore::CaptureDevice::DeviceType::Microphone && ++microphoneCount > defaultMaximumMicrophoneCount) |
| 576 | continue; |
| 577 | } |
| 578 | |
| 579 | auto label = emptyString(); |
| 580 | auto id = emptyString(); |
| 581 | auto groupId = emptyString(); |
| 582 | if (revealIdsAndLabels) { |
| 583 | label = device.label(); |
| 584 | id = RealtimeMediaSourceCenter::singleton().hashStringWithSalt(device.persistentId(), deviceIDHashSalt); |
| 585 | groupId = RealtimeMediaSourceCenter::singleton().hashStringWithSalt(device.groupId(), deviceIDHashSalt); |
| 586 | } |
| 587 | |
| 588 | filteredDevices.append(CaptureDevice(id, device.type(), label, groupId)); |
| 589 | } |
| 590 | |
| 591 | m_hasFilteredDeviceList = !revealIdsAndLabels; |
| 592 | |
| 593 | ALWAYS_LOG(LOGIDENTIFIER, filteredDevices.size(), " devices revealed" ); |
| 594 | return filteredDevices; |
| 595 | } |
| 596 | #endif |
| 597 | |
| 598 | void UserMediaPermissionRequestManagerProxy::enumerateMediaDevicesForFrame(uint64_t userMediaID, uint64_t frameID, Ref<SecurityOrigin>&& userMediaDocumentOrigin, Ref<SecurityOrigin>&& topLevelDocumentOrigin) |
| 599 | { |
| 600 | #if ENABLE(MEDIA_STREAM) |
| 601 | ALWAYS_LOG(LOGIDENTIFIER, userMediaID); |
| 602 | |
| 603 | auto completionHandler = [this, userMediaID, frameID, userMediaDocumentOrigin = userMediaDocumentOrigin.copyRef(), topLevelDocumentOrigin = topLevelDocumentOrigin.copyRef()](PermissionInfo permissionInfo) mutable { |
| 604 | |
| 605 | bool originHasPersistentAccess; |
| 606 | switch (permissionInfo) { |
| 607 | case PermissionInfo::Error: |
| 608 | return; |
| 609 | case PermissionInfo::Unknown: |
| 610 | originHasPersistentAccess = false; |
| 611 | break; |
| 612 | case PermissionInfo::Granted: |
| 613 | originHasPersistentAccess = true; |
| 614 | break; |
| 615 | } |
| 616 | |
| 617 | if (!m_page.hasRunningProcess()) |
| 618 | return; |
| 619 | |
| 620 | auto requestID = generateRequestID(); |
| 621 | m_pendingDeviceRequests.add(requestID); |
| 622 | |
| 623 | auto& requestOrigin = userMediaDocumentOrigin.get(); |
| 624 | auto& topOrigin = topLevelDocumentOrigin.get(); |
| 625 | m_page.websiteDataStore().deviceIdHashSaltStorage().deviceIdHashSaltForOrigin(requestOrigin, topOrigin, [this, weakThis = makeWeakPtr(*this), requestID, frameID, userMediaID, userMediaDocumentOrigin = WTFMove(userMediaDocumentOrigin), topLevelDocumentOrigin = WTFMove(topLevelDocumentOrigin), originHasPersistentAccess] (String&& deviceIDHashSalt) { |
| 626 | if (!weakThis || !m_pendingDeviceRequests.remove(requestID)) |
| 627 | return; |
| 628 | |
| 629 | if (!m_page.hasRunningProcess()) |
| 630 | return; |
| 631 | |
| 632 | syncWithWebCorePrefs(); |
| 633 | |
| 634 | bool revealIdsAndLabels = originHasPersistentAccess || wasGrantedVideoOrAudioAccess(frameID, userMediaDocumentOrigin.get(), topLevelDocumentOrigin.get()); |
| 635 | |
| 636 | m_page.process().send(Messages::WebPage::DidCompleteMediaDeviceEnumeration { userMediaID, computeFilteredDeviceList(revealIdsAndLabels, deviceIDHashSalt), deviceIDHashSalt, originHasPersistentAccess }, m_page.pageID()); |
| 637 | }); |
| 638 | }; |
| 639 | |
| 640 | getUserMediaPermissionInfo(frameID, WTFMove(userMediaDocumentOrigin), WTFMove(topLevelDocumentOrigin), WTFMove(completionHandler)); |
| 641 | #else |
| 642 | UNUSED_PARAM(userMediaID); |
| 643 | UNUSED_PARAM(frameID); |
| 644 | UNUSED_PARAM(userMediaDocumentOrigin); |
| 645 | UNUSED_PARAM(topLevelDocumentOrigin); |
| 646 | #endif |
| 647 | } |
| 648 | |
| 649 | void UserMediaPermissionRequestManagerProxy::syncWithWebCorePrefs() const |
| 650 | { |
| 651 | #if ENABLE(MEDIA_STREAM) |
| 652 | // Enable/disable the mock capture devices for the UI process as per the WebCore preferences. Note that |
| 653 | // this is a noop if the preference hasn't changed since the last time this was called. |
| 654 | bool mockDevicesEnabled = m_page.preferences().mockCaptureDevicesEnabled(); |
| 655 | MockRealtimeMediaSourceCenter::setMockRealtimeMediaSourceCenterEnabled(mockDevicesEnabled); |
| 656 | #endif |
| 657 | } |
| 658 | |
| 659 | void UserMediaPermissionRequestManagerProxy::captureStateChanged(MediaProducer::MediaStateFlags oldState, MediaProducer::MediaStateFlags newState) |
| 660 | { |
| 661 | if (!m_page.hasRunningProcess()) |
| 662 | return; |
| 663 | |
| 664 | #if ENABLE(MEDIA_STREAM) |
| 665 | if (!m_hasPendingCapture) |
| 666 | UserMediaProcessManager::singleton().revokeSandboxExtensionsIfNeeded(page().process()); |
| 667 | |
| 668 | if (m_captureState == (newState & activeCaptureMask)) |
| 669 | return; |
| 670 | |
| 671 | ALWAYS_LOG(LOGIDENTIFIER, "state was: " , m_captureState, ", is now: " , newState & activeCaptureMask); |
| 672 | m_captureState = newState & activeCaptureMask; |
| 673 | |
| 674 | Seconds interval; |
| 675 | if (m_captureState & activeCaptureMask) |
| 676 | interval = Seconds::fromHours(m_page.preferences().longRunningMediaCaptureStreamRepromptIntervalInHours()); |
| 677 | else |
| 678 | interval = Seconds::fromMinutes(m_page.preferences().inactiveMediaCaptureSteamRepromptIntervalInMinutes()); |
| 679 | |
| 680 | if (interval == m_currentWatchdogInterval) |
| 681 | return; |
| 682 | |
| 683 | ALWAYS_LOG(LOGIDENTIFIER, "watchdog set to " , interval.value()); |
| 684 | m_currentWatchdogInterval = interval; |
| 685 | m_watchdogTimer.startOneShot(m_currentWatchdogInterval); |
| 686 | #endif |
| 687 | } |
| 688 | |
| 689 | void UserMediaPermissionRequestManagerProxy::viewIsBecomingVisible() |
| 690 | { |
| 691 | auto pregrantedRequests = WTFMove(m_pregrantedRequests); |
| 692 | for (auto& request : pregrantedRequests) |
| 693 | grantRequest(request); |
| 694 | } |
| 695 | |
| 696 | void UserMediaPermissionRequestManagerProxy::watchdogTimerFired() |
| 697 | { |
| 698 | ALWAYS_LOG(LOGIDENTIFIER); |
| 699 | m_grantedRequests.clear(); |
| 700 | m_pregrantedRequests.clear(); |
| 701 | m_currentWatchdogInterval = 0_s; |
| 702 | m_hasFilteredDeviceList = false; |
| 703 | } |
| 704 | |
| 705 | #if !RELEASE_LOG_DISABLED |
| 706 | WTFLogChannel& UserMediaPermissionRequestManagerProxy::logChannel() const |
| 707 | { |
| 708 | return WebKit2LogWebRTC; |
| 709 | } |
| 710 | |
| 711 | const Logger& UserMediaPermissionRequestManagerProxy::logger() const |
| 712 | { |
| 713 | return m_page.logger(); |
| 714 | } |
| 715 | #endif |
| 716 | |
| 717 | String convertEnumerationToString(UserMediaPermissionRequestManagerProxy::RequestAction enumerationValue) |
| 718 | { |
| 719 | static const NeverDestroyed<String> values[] = { |
| 720 | MAKE_STATIC_STRING_IMPL("Deny" ), |
| 721 | MAKE_STATIC_STRING_IMPL("Grant" ), |
| 722 | MAKE_STATIC_STRING_IMPL("Prompt" ), |
| 723 | }; |
| 724 | static_assert(static_cast<size_t>(UserMediaPermissionRequestManagerProxy::RequestAction::Deny) == 0, "UserMediaPermissionRequestManagerProxy::RequestAction::Deny is not 0 as expected" ); |
| 725 | static_assert(static_cast<size_t>(UserMediaPermissionRequestManagerProxy::RequestAction::Grant) == 1, "UserMediaPermissionRequestManagerProxy::RequestAction::Grant is not 1 as expected" ); |
| 726 | static_assert(static_cast<size_t>(UserMediaPermissionRequestManagerProxy::RequestAction::Prompt) == 2, "UserMediaPermissionRequestManagerProxy::RequestAction::Prompt is not 2 as expected" ); |
| 727 | ASSERT(static_cast<size_t>(enumerationValue) < WTF_ARRAY_LENGTH(values)); |
| 728 | return values[static_cast<size_t>(enumerationValue)]; |
| 729 | } |
| 730 | |
| 731 | } // namespace WebKit |
| 732 | |