| // Copyright 2014 The Chromium Authors. All rights reserved. | 
 | // Use of this source code is governed by a BSD-style license that can be | 
 | // found in the LICENSE file. | 
 |  | 
 | #include "chrome/browser/media/media_stream_device_permissions.h" | 
 |  | 
 | #include <stddef.h> | 
 |  | 
 | #include "base/prefs/pref_service.h" | 
 | #include "base/values.h" | 
 | #include "chrome/browser/profiles/profile.h" | 
 | #include "components/content_settings/core/browser/host_content_settings_map.h" | 
 | #include "components/content_settings/core/common/content_settings_pattern.h" | 
 | #include "content/public/browser/browser_thread.h" | 
 | #include "content/public/common/origin_util.h" | 
 | #include "extensions/common/constants.h" | 
 | #include "url/gurl.h" | 
 |  | 
 | bool ShouldPersistContentSetting(ContentSetting setting, | 
 |                                  const GURL& origin, | 
 |                                  bool is_pepper_request) { | 
 |   // When the request is from an invalid scheme we don't persist it. | 
 |   if (!ContentSettingsPattern::FromURLNoWildcard(origin).IsValid()) | 
 |     return false; | 
 |  | 
 |   // It's safe to persist block settings all the time. | 
 |   if (setting == CONTENT_SETTING_BLOCK) | 
 |     return true; | 
 |  | 
 |   // Pepper requests should always be persisted to prevent annoying users of | 
 |   // plugins. | 
 |   if (is_pepper_request) | 
 |     return true; | 
 |  | 
 |   // We persist requests from secure origins. | 
 |   if (content::IsOriginSecure(origin)) | 
 |     return true; | 
 |  | 
 |   return false; | 
 | } | 
 |  | 
 | MediaStreamDevicePolicy GetDevicePolicy(const Profile* profile, | 
 |                                         const GURL& security_origin, | 
 |                                         const char* policy_name, | 
 |                                         const char* whitelist_policy_name) { | 
 |   DCHECK_CURRENTLY_ON(content::BrowserThread::UI); | 
 |  | 
 |   // If the security origin policy matches a value in the whitelist, allow it. | 
 |   // Otherwise, check the |policy_name| master switch for the default behavior. | 
 |  | 
 |   const PrefService* prefs = profile->GetPrefs(); | 
 |  | 
 |   const base::ListValue* list = prefs->GetList(whitelist_policy_name); | 
 |   std::string value; | 
 |   for (size_t i = 0; i < list->GetSize(); ++i) { | 
 |     if (list->GetString(i, &value)) { | 
 |       ContentSettingsPattern pattern = | 
 |           ContentSettingsPattern::FromString(value); | 
 |       if (pattern == ContentSettingsPattern::Wildcard()) { | 
 |         DLOG(WARNING) << "Ignoring wildcard URL pattern: " << value; | 
 |         continue; | 
 |       } | 
 |       DLOG_IF(ERROR, !pattern.IsValid()) << "Invalid URL pattern: " << value; | 
 |       if (pattern.IsValid() && pattern.Matches(security_origin)) | 
 |         return ALWAYS_ALLOW; | 
 |     } | 
 |   } | 
 |  | 
 |   // If a match was not found, check if audio capture is otherwise disallowed | 
 |   // or if the user should be prompted.  Setting the policy value to "true" | 
 |   // is equal to not setting it at all, so from hereon out, we will return | 
 |   // either POLICY_NOT_SET (prompt) or ALWAYS_DENY (no prompt, no access). | 
 |   if (!prefs->GetBoolean(policy_name)) | 
 |     return ALWAYS_DENY; | 
 |  | 
 |   return POLICY_NOT_SET; | 
 | } |