1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94
|
// Copyright 2020 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "content/browser/webauth/virtual_authenticator_manager_impl.h"
#include <utility>
#include <vector>
#include "base/observer_list.h"
#include "content/browser/webauth/virtual_authenticator.h"
#include "content/browser/webauth/virtual_fido_discovery_factory.h"
#include "device/fido/virtual_u2f_device.h"
#include "mojo/public/cpp/bindings/pending_remote.h"
namespace content {
VirtualAuthenticatorManagerImpl::VirtualAuthenticatorManagerImpl() = default;
VirtualAuthenticatorManagerImpl::~VirtualAuthenticatorManagerImpl() = default;
void VirtualAuthenticatorManagerImpl::AddObserver(Observer* observer) {
observers_.AddObserver(observer);
}
void VirtualAuthenticatorManagerImpl::RemoveObserver(Observer* observer) {
observers_.RemoveObserver(observer);
}
VirtualAuthenticator*
VirtualAuthenticatorManagerImpl::AddAuthenticatorAndReturnNonOwningPointer(
const VirtualAuthenticator::Options& options) {
const bool known_version =
options.protocol == device::ProtocolVersion::kU2f ||
options.protocol == device::ProtocolVersion::kCtap2;
if (!known_version ||
(options.protocol == device::ProtocolVersion::kU2f &&
!device::VirtualU2fDevice::IsTransportSupported(options.transport))) {
return nullptr;
}
return AddAuthenticator(std::make_unique<VirtualAuthenticator>(options));
}
VirtualAuthenticator* VirtualAuthenticatorManagerImpl::GetAuthenticator(
const std::string& id) {
auto authenticator = authenticators_.find(id);
if (authenticator == authenticators_.end())
return nullptr;
return authenticator->second.get();
}
VirtualAuthenticator* VirtualAuthenticatorManagerImpl::AddAuthenticator(
std::unique_ptr<VirtualAuthenticator> authenticator) {
VirtualAuthenticator* authenticator_ptr = authenticator.get();
bool was_inserted;
std::tie(std::ignore, was_inserted) = authenticators_.insert(
{authenticator_ptr->unique_id(), std::move(authenticator)});
if (!was_inserted) {
NOTREACHED() << "unique_id() must be unique";
}
for (Observer& observer : observers_) {
observer.AuthenticatorAdded(authenticator_ptr);
}
return authenticator_ptr;
}
std::vector<VirtualAuthenticator*>
VirtualAuthenticatorManagerImpl::GetAuthenticators() {
std::vector<VirtualAuthenticator*> authenticators;
for (auto& authenticator : authenticators_)
authenticators.push_back(authenticator.second.get());
return authenticators;
}
bool VirtualAuthenticatorManagerImpl::RemoveAuthenticator(
const std::string& id) {
const bool removed = authenticators_.erase(id);
if (removed) {
for (Observer& observer : observers_) {
observer.AuthenticatorRemoved(id);
}
}
return removed;
}
std::unique_ptr<VirtualFidoDiscoveryFactory>
VirtualAuthenticatorManagerImpl::MakeDiscoveryFactory() {
return std::make_unique<VirtualFidoDiscoveryFactory>(
weak_factory_.GetWeakPtr());
}
} // namespace content
|