File: browser_utils.cc

package info (click to toggle)
chromium 138.0.7204.183-1~deb12u1
  • links: PTS, VCS
  • area: main
  • in suites: bookworm-proposed-updates
  • size: 6,080,960 kB
  • sloc: cpp: 34,937,079; ansic: 7,176,967; javascript: 4,110,704; python: 1,419,954; asm: 946,768; xml: 739,971; pascal: 187,324; sh: 89,623; perl: 88,663; objc: 79,944; sql: 50,304; cs: 41,786; fortran: 24,137; makefile: 21,811; php: 13,980; tcl: 13,166; yacc: 8,925; ruby: 7,485; awk: 3,720; lisp: 3,096; lex: 1,327; ada: 727; jsp: 228; sed: 36
file content (89 lines) | stat: -rw-r--r-- 2,852 bytes parent folder | download | duplicates (5)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
// Copyright 2025 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.

#include "components/device_signals/core/browser/browser_utils.h"

#include "base/check.h"
#include "build/build_config.h"
#include "components/policy/content/policy_blocklist_service.h"
#include "components/policy/core/common/cloud/cloud_policy_manager.h"
#include "components/policy/core/common/cloud/cloud_policy_store.h"
#include "components/prefs/pref_service.h"
#include "content/public/browser/site_isolation_policy.h"

namespace {

bool IsURLBlocked(const GURL& url, PolicyBlocklistService* service) {
  if (!service) {
    return false;
  }

  policy::URLBlocklist::URLBlocklistState state =
      service->GetURLBlocklistState(url);

  return state == policy::URLBlocklist::URLBlocklistState::URL_IN_BLOCKLIST;
}

}  // namespace

namespace device_signals {

safe_browsing::SafeBrowsingState GetSafeBrowsingProtectionLevel(
    PrefService* profile_prefs) {
  DCHECK(profile_prefs);
  bool safe_browsing_enabled =
      profile_prefs->GetBoolean(prefs::kSafeBrowsingEnabled);
  bool safe_browsing_enhanced_enabled =
      profile_prefs->GetBoolean(prefs::kSafeBrowsingEnhanced);

  if (safe_browsing_enabled) {
    if (safe_browsing_enhanced_enabled) {
      return safe_browsing::SafeBrowsingState::ENHANCED_PROTECTION;
    } else {
      return safe_browsing::SafeBrowsingState::STANDARD_PROTECTION;
    }
  } else {
    return safe_browsing::SafeBrowsingState::NO_SAFE_BROWSING;
  }
}

std::optional<safe_browsing::PasswordProtectionTrigger>
GetPasswordProtectionWarningTrigger(PrefService* profile_prefs) {
  DCHECK(profile_prefs);
  if (!profile_prefs->HasPrefPath(prefs::kPasswordProtectionWarningTrigger)) {
    return std::nullopt;
  }
  return static_cast<safe_browsing::PasswordProtectionTrigger>(
      profile_prefs->GetInteger(prefs::kPasswordProtectionWarningTrigger));
}

bool GetChromeRemoteDesktopAppBlocked(PolicyBlocklistService* service) {
  DCHECK(service);
  return IsURLBlocked(GURL("https://remotedesktop.google.com"), service) ||
         IsURLBlocked(GURL("https://remotedesktop.corp.google.com"), service);
}

std::optional<std::string> TryGetEnrollmentDomain(
    policy::CloudPolicyManager* manager) {
  policy::CloudPolicyStore* store = nullptr;
  if (manager && manager->core() && manager->core()->store()) {
    store = manager->core()->store();
  }

  if (store && store->has_policy()) {
    const auto* policy = store->policy();
    if (policy->has_managed_by()) {
      return policy->managed_by();
    } else if (policy->has_display_domain()) {
      return policy->display_domain();
    }
  }
  return std::nullopt;
}

bool GetSiteIsolationEnabled() {
  return content::SiteIsolationPolicy::UseDedicatedProcessesForAllSites();
}

}  // namespace device_signals