1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69
|
// Copyright 2024 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef CHROME_BROWSER_UI_WEBUI_CERTIFICATE_MANAGER_CLIENT_CERT_SOURCES_H_
#define CHROME_BROWSER_UI_WEBUI_CERTIFICATE_MANAGER_CLIENT_CERT_SOURCES_H_
#include <memory>
#include "build/build_config.h"
#include "chrome/browser/ui/webui/certificate_manager/certificate_manager_handler.h"
#include "chrome/browser/ui/webui/certificate_manager/certificate_manager_utils.h"
class Profile;
std::unique_ptr<CertificateManagerPageHandler::CertSource>
CreatePlatformClientCertSource(
mojo::Remote<certificate_manager_v2::mojom::CertificateManagerPage>*
remote_client,
Profile* profile);
#if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_LINUX)
std::unique_ptr<CertificateManagerPageHandler::CertSource>
CreateProvisionedClientCertSource(Profile* profile);
#endif
#if BUILDFLAG(IS_CHROMEOS)
std::unique_ptr<CertificateManagerPageHandler::CertSource>
CreateExtensionsClientCertSource(Profile* profile);
#endif
#if BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_LINUX)
class ClientCertManagementAccessControls {
public:
enum KeyStorage {
kSoftwareBacked,
kHardwareBacked,
};
enum CertLocation {
kUser,
kDeviceWide,
};
// Creates an object that can be used to check whether management functions
// should be allowed. Once created the object is immutable and can be
// accessed on any thread. The object should not be cached, as the policies
// can change during runtime, so a new object should be created before every
// operation to confirm that the operation is allowed with the current
// policies.
explicit ClientCertManagementAccessControls(Profile* profile);
// Calculates whether management, such as importing client certs, is allowed
// for the given key storage location.
bool IsManagementAllowed(KeyStorage key_storage) const;
// Calculates whether changing (such as deleting) a specific client cert with
// the given key and cert storage locations is allowed.
bool IsChangeAllowed(KeyStorage key_storage,
CertLocation cert_location) const;
private:
#if BUILDFLAG(IS_CHROMEOS)
const bool is_guest_;
const ClientCertificateManagementPermission client_cert_policy_;
#endif
};
#endif // BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_LINUX)
#endif // CHROME_BROWSER_UI_WEBUI_CERTIFICATE_MANAGER_CLIENT_CERT_SOURCES_H_
|