File: web_app_settings_policy_handler.cc

package info (click to toggle)
chromium 138.0.7204.157-1
  • links: PTS, VCS
  • area: main
  • in suites: trixie
  • size: 6,071,864 kB
  • sloc: cpp: 34,936,859; ansic: 7,176,967; javascript: 4,110,704; python: 1,419,953; asm: 946,768; xml: 739,967; pascal: 187,324; sh: 89,623; perl: 88,663; objc: 79,944; sql: 50,304; cs: 41,786; fortran: 24,137; makefile: 21,806; php: 13,980; tcl: 13,166; yacc: 8,925; ruby: 7,485; awk: 3,720; lisp: 3,096; lex: 1,327; ada: 727; jsp: 228; sed: 36
file content (74 lines) | stat: -rw-r--r-- 2,765 bytes parent folder | download | duplicates (4)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
// Copyright 2022 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.

#include "chrome/browser/web_applications/policy/web_app_settings_policy_handler.h"

#include <algorithm>

#include "base/check_deref.h"
#include "chrome/browser/web_applications/policy/web_app_policy_constants.h"
#include "chrome/common/pref_names.h"
#include "components/policy/core/browser/policy_error_map.h"
#include "components/policy/core/common/policy_map.h"
#include "components/policy/core/common/schema.h"
#include "components/policy/policy_constants.h"
#include "components/strings/grit/components_strings.h"

namespace web_app {

WebAppSettingsPolicyHandler::WebAppSettingsPolicyHandler(policy::Schema schema)
    : policy::SimpleSchemaValidatingPolicyHandler(
          policy::key::kWebAppSettings,
          prefs::kWebAppSettings,
          schema,
          policy::SchemaOnErrorStrategy::SCHEMA_ALLOW_UNKNOWN,
          SimpleSchemaValidatingPolicyHandler::RECOMMENDED_PROHIBITED,
          SimpleSchemaValidatingPolicyHandler::MANDATORY_ALLOWED) {}

WebAppSettingsPolicyHandler::~WebAppSettingsPolicyHandler() = default;

bool WebAppSettingsPolicyHandler::CheckPolicySettings(
    const policy::PolicyMap& policies,
    policy::PolicyErrorMap* errors) {
  if (!policy::SimpleSchemaValidatingPolicyHandler::CheckPolicySettings(
          policies, errors)) {
    return false;
  }

  const policy::PolicyMap::Entry* policy_entry = policies.Get(policy_name());
  if (!policy_entry)
    return true;

  const auto& web_apps_list =
      policy_entry->value(base::Value::Type::LIST)->GetList();
  const auto it =
      std::ranges::find(web_apps_list, kWildcard, [](const base::Value& entry) {
        return CHECK_DEREF(entry.GetDict().FindString(kManifestId));
      });

  if (it != web_apps_list.end()) {
    const std::string* run_on_os_login_str =
        it->GetDict().FindString(kRunOnOsLogin);
    if (run_on_os_login_str && *run_on_os_login_str != kAllowed &&
        *run_on_os_login_str != kBlocked) {
      errors->AddError(policy_name(), IDS_POLICY_INVALID_SELECTION_ERROR,
                       "run_on_os value", policy::PolicyErrorPath{kWildcard});
      return false;
    }

    // Show error during policy parsing if force_unregister_os_integration is
    // provided with a wildcard manifest id.
    std::optional<bool> force_unregistration_value =
        it->GetDict().FindBool(kForceUnregisterOsIntegration);
    if (force_unregistration_value.has_value()) {
      errors->AddError(policy_name(), IDS_POLICY_INVALID_SELECTION_ERROR,
                       "manifest_id", policy::PolicyErrorPath{kWildcard});
      return false;
    }
  }

  return true;
}

}  // namespace web_app