1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74
|
// Copyright 2022 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "chrome/browser/web_applications/policy/web_app_settings_policy_handler.h"
#include <algorithm>
#include "base/check_deref.h"
#include "chrome/browser/web_applications/policy/web_app_policy_constants.h"
#include "chrome/common/pref_names.h"
#include "components/policy/core/browser/policy_error_map.h"
#include "components/policy/core/common/policy_map.h"
#include "components/policy/core/common/schema.h"
#include "components/policy/policy_constants.h"
#include "components/strings/grit/components_strings.h"
namespace web_app {
WebAppSettingsPolicyHandler::WebAppSettingsPolicyHandler(policy::Schema schema)
: policy::SimpleSchemaValidatingPolicyHandler(
policy::key::kWebAppSettings,
prefs::kWebAppSettings,
schema,
policy::SchemaOnErrorStrategy::SCHEMA_ALLOW_UNKNOWN,
SimpleSchemaValidatingPolicyHandler::RECOMMENDED_PROHIBITED,
SimpleSchemaValidatingPolicyHandler::MANDATORY_ALLOWED) {}
WebAppSettingsPolicyHandler::~WebAppSettingsPolicyHandler() = default;
bool WebAppSettingsPolicyHandler::CheckPolicySettings(
const policy::PolicyMap& policies,
policy::PolicyErrorMap* errors) {
if (!policy::SimpleSchemaValidatingPolicyHandler::CheckPolicySettings(
policies, errors)) {
return false;
}
const policy::PolicyMap::Entry* policy_entry = policies.Get(policy_name());
if (!policy_entry)
return true;
const auto& web_apps_list =
policy_entry->value(base::Value::Type::LIST)->GetList();
const auto it =
std::ranges::find(web_apps_list, kWildcard, [](const base::Value& entry) {
return CHECK_DEREF(entry.GetDict().FindString(kManifestId));
});
if (it != web_apps_list.end()) {
const std::string* run_on_os_login_str =
it->GetDict().FindString(kRunOnOsLogin);
if (run_on_os_login_str && *run_on_os_login_str != kAllowed &&
*run_on_os_login_str != kBlocked) {
errors->AddError(policy_name(), IDS_POLICY_INVALID_SELECTION_ERROR,
"run_on_os value", policy::PolicyErrorPath{kWildcard});
return false;
}
// Show error during policy parsing if force_unregister_os_integration is
// provided with a wildcard manifest id.
std::optional<bool> force_unregistration_value =
it->GetDict().FindBool(kForceUnregisterOsIntegration);
if (force_unregistration_value.has_value()) {
errors->AddError(policy_name(), IDS_POLICY_INVALID_SELECTION_ERROR,
"manifest_id", policy::PolicyErrorPath{kWildcard});
return false;
}
}
return true;
}
} // namespace web_app
|