1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106
|
// Copyright 2023 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "chrome/browser/chromeos/extensions/telemetry/api/common/util.h"
#include "ash/constants/ash_features.h"
#include "ash/webui/shimless_rma/backend/external_app_dialog.h"
#include "chrome/browser/profiles/profile.h"
#include "chrome/browser/ui/browser.h"
#include "chrome/browser/ui/browser_list.h"
#include "chrome/browser/ui/tabs/tab_strip_model.h"
#include "chrome/common/url_constants.h"
#include "components/security_state/content/content_utils.h"
#include "components/security_state/core/security_state.h"
#include "content/public/browser/web_contents.h"
#include "extensions/common/manifest_handlers/externally_connectable.h"
#include "extensions/common/url_pattern_set.h"
namespace content {
class BrowserContext;
}
namespace chromeos {
namespace {
bool IsWebContentsSecure(content::WebContents* contents) {
// TODO(b/290909386): Remove this line once we reach a conclusion on
// how we should perform security check on IWA.
if (contents->GetLastCommittedURL().SchemeIs(chrome::kIsolatedAppScheme)) {
return true;
}
// Ensure the URL connection is secure (e.g. valid certificate).
const auto visible_security_state =
security_state::GetVisibleSecurityState(contents);
return security_state::GetSecurityLevel(*visible_security_state) ==
security_state::SecurityLevel::SECURE;
}
bool IsWebContentsSecureAppUi(const extensions::URLPatternSet& pattern_set,
content::WebContents* contents) {
return pattern_set.MatchesURL(contents->GetLastCommittedURL()) &&
IsWebContentsSecure(contents);
}
} // namespace
content::WebContents* FindTelemetryExtensionOpenAndSecureAppUi(
content::BrowserContext* context,
const extensions::Extension* extension,
bool focused_ui_required) {
Profile* profile = Profile::FromBrowserContext(context);
const auto& pattern_set =
extensions::ExternallyConnectableInfo::Get(extension)->matches;
if (ash::features::IsShimlessRMA3pDiagnosticsEnabled()) {
content::WebContents* contents =
ash::shimless_rma::ExternalAppDialog::GetWebContents();
if (contents && contents->GetBrowserContext() == context &&
IsWebContentsSecureAppUi(pattern_set, contents)) {
// In shimless, ExternalAppDialog is always on the top so we can assume it
// is always focused.
return contents;
}
}
// A focused UI must be:
// 1. In a browser that is front-most;
// 2. In a tab that is active.
Browser* last_active_browser = BrowserList::GetInstance()->GetLastActive();
if (last_active_browser && last_active_browser->profile() == profile) {
content::WebContents* contents =
last_active_browser->tab_strip_model()->GetActiveWebContents();
if (contents && IsWebContentsSecureAppUi(pattern_set, contents)) {
return contents;
}
}
if (focused_ui_required) {
return nullptr;
}
for (Browser* target_browser : *BrowserList::GetInstance()) {
if (target_browser->profile() != profile) {
continue;
}
TabStripModel* target_tab_strip = target_browser->tab_strip_model();
for (int i = 0; i < target_tab_strip->count(); ++i) {
content::WebContents* contents = target_tab_strip->GetWebContentsAt(i);
if (IsWebContentsSecureAppUi(pattern_set, contents)) {
return contents;
}
}
}
return nullptr;
}
bool IsTelemetryExtensionAppUiOpenAndSecure(
content::BrowserContext* context,
const extensions::Extension* extension) {
return FindTelemetryExtensionOpenAndSecureAppUi(context, extension) !=
nullptr;
}
} // namespace chromeos
|