1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120
|
// Copyright 2022 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "chrome/browser/ui/ash/projector/projector_utils.h"
#include "ash/constants/ash_features.h"
#include "ash/constants/ash_pref_names.h"
#include "ash/webui/projector_app/public/cpp/projector_app_constants.h"
#include "ash/webui/projector_app/untrusted_projector_ui.h"
#include "ash/webui/system_apps/public/system_web_app_type.h"
#include "base/files/file_path.h"
#include "chrome/browser/ash/browser_delegate/browser_delegate.h"
#include "chrome/browser/ash/profiles/profile_helper.h"
#include "chrome/browser/policy/profile_policy_connector.h"
#include "chrome/browser/profiles/profile.h"
#include "chrome/browser/profiles/profile_manager.h"
#include "chrome/browser/ui/ash/system_web_apps/system_web_app_ui_utils.h"
#include "chrome/browser/ui/tabs/tab_strip_model.h"
#include "chrome/browser/web_applications/web_app_tab_helper.h"
#include "components/prefs/pref_service.h"
#include "components/user_manager/user.h"
#include "components/webapps/browser/launch_queue/launch_params.h"
#include "components/webapps/browser/launch_queue/launch_queue.h"
#include "content/public/browser/navigation_controller.h"
#include "content/public/browser/web_contents.h"
#include "content/public/browser/web_ui.h"
namespace {
bool IsRealUserProfile(const Profile* profile) {
// Return false for signin, lock screen and incognito profiles.
return ash::ProfileHelper::IsUserProfile(profile) &&
!profile->IsOffTheRecord();
}
} // namespace
bool IsProjectorAllowedForProfile(const Profile* profile) {
DCHECK(profile);
if (!IsRealUserProfile(profile)) {
return false;
}
auto* user = ash::ProfileHelper::Get()->GetUserByProfile(profile);
if (!user) {
return false;
}
return user->HasGaiaAccount();
}
bool IsProjectorAppEnabled(const Profile* profile) {
if (!IsProjectorAllowedForProfile(profile)) {
return false;
}
// Projector for regular consumer users.
if (!profile->GetProfilePolicyConnector()->IsManaged()) {
return true;
}
// Projector dogfood for supervised users is controlled by an enterprise
// policy. When the feature is out of dogfood phase the policy will be
// deprecated and the feature will be enabled by default.
if (profile->IsChild()) {
return profile->GetPrefs()->GetBoolean(
ash::prefs::kProjectorDogfoodForFamilyLinkEnabled);
}
// Projector for enterprise users is controlled by a combination of a feature
// flag and an enterprise policy.
return ash::features::IsProjectorManagedUserIgnorePolicyEnabled() ||
profile->GetPrefs()->GetBoolean(ash::prefs::kProjectorAllowByPolicy);
}
bool IsMediaFile(const base::FilePath& path) {
return path.MatchesExtension(ash::kProjectorMediaFileExtension);
}
bool IsMetadataFile(const base::FilePath& path) {
return path.MatchesExtension(ash::kProjectorMetadataFileExtension) ||
path.MatchesExtension(ash::kProjectorV2MetadataFileExtension);
}
void SendFilesToProjectorApp(std::vector<base::FilePath> files) {
Profile* profile = ProfileManager::GetActiveUserProfile();
ash::BrowserDelegate* browser = ash::FindSystemWebAppBrowser(
profile, ash::SystemWebAppType::PROJECTOR, ash::BrowserType::kApp);
if (!browser) {
// Do not call SendFilesToProjectorApp() unless the Projector app is already
// open.
return;
}
content::WebContents* web_contents = browser->GetActiveWebContents();
auto* web_ui = web_contents->GetWebUI();
if (!web_ui) {
return;
}
if (!web_ui->GetController()->GetAs<ash::UntrustedProjectorUI>()) {
// We only want to send files to the Projector SWA. Don't send files to the
// wrong trusted context if it navigates away.
// TODO(b/237089852): Consider using a navigation throttle to prevent the
// trusted contents from navigating away, but this check is still useful as
// an extra precaution.
return;
}
webapps::LaunchParams launch_params;
launch_params.started_new_navigation = false;
launch_params.app_id = ash::kChromeUIUntrustedProjectorSwaAppId;
// Sending files should not navigate the app. This argument is used for
// storage isolation, and won't impact navigation. It should be in scope of
// the current WebContent's origin.
launch_params.target_url = web_contents->GetVisibleURL();
launch_params.paths = std::move(files);
web_app::WebAppTabHelper::FromWebContents(web_contents)
->EnsureLaunchQueue()
.Enqueue(std::move(launch_params));
}
|