File: tracking_protection_settings.h

package info (click to toggle)
chromium 138.0.7204.157-1
  • links: PTS, VCS
  • area: main
  • in suites: sid, trixie
  • size: 6,071,864 kB
  • sloc: cpp: 34,936,859; ansic: 7,176,967; javascript: 4,110,704; python: 1,419,953; asm: 946,768; xml: 739,967; pascal: 187,324; sh: 89,623; perl: 88,663; objc: 79,944; sql: 50,304; cs: 41,786; fortran: 24,137; makefile: 21,806; php: 13,980; tcl: 13,166; yacc: 8,925; ruby: 7,485; awk: 3,720; lisp: 3,096; lex: 1,327; ada: 727; jsp: 228; sed: 36
file content (110 lines) | stat: -rw-r--r-- 4,463 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
// Copyright 2023 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.

#ifndef COMPONENTS_PRIVACY_SANDBOX_TRACKING_PROTECTION_SETTINGS_H_
#define COMPONENTS_PRIVACY_SANDBOX_TRACKING_PROTECTION_SETTINGS_H_

#include "base/memory/raw_ptr.h"
#include "base/memory/scoped_refptr.h"
#include "components/content_settings/core/browser/host_content_settings_map.h"
#include "components/content_settings/core/common/content_settings_types.h"
#include "components/content_settings/core/common/cookie_controls_state.h"
#include "components/keyed_service/core/keyed_service.h"
#include "components/policy/core/common/management/management_service.h"
#include "components/privacy_sandbox/tracking_protection_prefs.h"

class HostContentSettingsMap;
class PrefService;

namespace privacy_sandbox {

class TrackingProtectionSettingsObserver;

inline bool IsTrackingProtectionsUi(CookieControlsState controls_state) {
  return controls_state == CookieControlsState::kActiveTp ||
         controls_state == CookieControlsState::kPausedTp;
}

// A service which provides an interface for observing and reading tracking
// protection settings.
class TrackingProtectionSettings : public KeyedService {
 public:
  explicit TrackingProtectionSettings(
      PrefService* pref_service,
      HostContentSettingsMap* host_content_settings_map,
      policy::ManagementService* management_service,
      bool is_incognito);
  ~TrackingProtectionSettings() override;

  // KeyedService:
  void Shutdown() override;

  virtual void AddObserver(TrackingProtectionSettingsObserver* observer);
  virtual void RemoveObserver(TrackingProtectionSettingsObserver* observer);

  // Returns whether "do not track" is enabled.
  bool IsDoNotTrackEnabled() const;

  // Returns whether tracking protection for 3PCD (prefs + UX) is enabled.
  bool IsTrackingProtection3pcdEnabled() const;

  // Returns whether tracking protection 3PCD is enabled and all 3PC are blocked
  // (i.e. without mitigations).
  bool AreAllThirdPartyCookiesBlocked() const;

  // Returns whether IP protection is enabled.
  bool IsIpProtectionEnabled() const;

  // Returns whether fingerprinting protection is enabled.
  bool IsFpProtectionEnabled() const;

  // Adds a site-scoped TRACKING_PROTECTION content setting equal to ALLOW for
  // `first_party_url`.
  void AddTrackingProtectionException(const GURL& first_party_url);

  // Resets the TRACKING_PROTECTION content setting for `first_party_url`.
  // Can reset both site-scoped (wildcarded) and origin-scoped exceptions.
  void RemoveTrackingProtectionException(const GURL& first_party_url);

  // Returns true if the user has a TRACKING_PROTECTION content setting equal to
  // ALLOW, indicating ACT features should be disabled on `first_party_url`.
  // NOTE: the default for TRACKING_PROTECTION is BLOCK and cannot be changed,
  // meaning this function will only return true for site-level content settings
  // (i.e. exceptions). To check whether individual ACT features are
  // enabled/disabled please use the functions specific to those features.
  bool HasTrackingProtectionException(
      const GURL& first_party_url,
      content_settings::SettingInfo* info = nullptr) const;

  // Returns whether IP protection is disabled, either because an enterprise
  // policy has been set that disables the feature or, when the
  // `kIpPrivacyDisableForEnterpriseByDefault` feature is enabled, because no
  // policy value has been set via enterprise policy and this is a managed
  // profile or client.
  bool IsIpProtectionDisabledForEnterprise();

 private:
  void OnEnterpriseControlForPrefsChanged();
  void MigrateUserBypassExceptions(ContentSettingsType from,
                                   ContentSettingsType to);

  // Callbacks for pref observation.
  void OnDoNotTrackEnabledPrefChanged();
  void OnBlockAllThirdPartyCookiesPrefChanged();
  void OnTrackingProtection3pcdPrefChanged();
  void OnIpProtectionPrefChanged();
  void OnFpProtectionPrefChanged();

  base::ObserverList<TrackingProtectionSettingsObserver>::Unchecked observers_;
  PrefChangeRegistrar pref_change_registrar_;
  raw_ptr<PrefService> pref_service_;
  raw_ptr<HostContentSettingsMap> host_content_settings_map_;
  raw_ptr<policy::ManagementService> management_service_;

  bool is_incognito_;
};

}  // namespace privacy_sandbox

#endif  // COMPONENTS_PRIVACY_SANDBOX_TRACKING_PROTECTION_SETTINGS_H_