blob: 87b7b1df776c0a349c11e5016ee233524dcfa17d [file] [log] [blame]
// Copyright 2013 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef CONTENT_BROWSER_MEDIA_MIDI_DISPATCHER_HOST_H_
#define CONTENT_BROWSER_MEDIA_MIDI_DISPATCHER_HOST_H_
#include <vector>
#include "base/callback_forward.h"
#include "base/memory/weak_ptr.h"
#include "content/public/browser/web_contents_observer.h"
namespace content {
class BrowserContext;
// MidiDispatcherHost handles permissions for using system exclusive messages.
class MidiDispatcherHost : public WebContentsObserver {
public:
explicit MidiDispatcherHost(WebContents* web_contents);
virtual ~MidiDispatcherHost();
// WebContentsObserver implementation.
virtual bool OnMessageReceived(const IPC::Message& message,
RenderFrameHost* render_frame_host) OVERRIDE;
private:
void OnRequestSysExPermission(RenderFrameHost* render_frame_host,
int bridge_id,
const GURL& origin,
bool user_gesture);
void OnCancelSysExPermissionRequest(RenderFrameHost* render_frame_host,
int bridge_id,
const GURL& requesting_frame);
void WasSysExPermissionGranted(int render_process_id,
int render_frame_id,
int bridge_id,
bool is_allowed);
struct PendingPermission {
PendingPermission(int render_process_id,
int render_frame_id,
int bridge_id);
~PendingPermission();
int render_process_id;
int render_frame_id;
int bridge_id;
base::Closure cancel;
};
std::vector<PendingPermission> pending_permissions_;
base::WeakPtrFactory<MidiDispatcherHost> weak_factory_;
DISALLOW_COPY_AND_ASSIGN(MidiDispatcherHost);
};
} // namespace content
#endif // CONTENT_BROWSER_MEDIA_MIDI_DISPATCHER_HOST_H_