1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162
|
// Copyright 2013 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "chrome/browser/media/protected_media_identifier_permission_context.h"
#include "base/command_line.h"
#include "base/functional/bind.h"
#include "base/functional/callback_helpers.h"
#include "base/metrics/user_metrics.h"
#include "base/strings/string_split.h"
#include "build/build_config.h"
#include "chrome/browser/profiles/profile.h"
#include "chrome/common/chrome_switches.h"
#include "chrome/common/pref_names.h"
#include "components/content_settings/browser/page_specific_content_settings.h"
#include "components/permissions/permission_util.h"
#include "components/prefs/pref_service.h"
#include "content/public/browser/browser_thread.h"
#include "content/public/browser/render_frame_host.h"
#include "content/public/browser/web_contents.h"
#include "media/base/media_switches.h"
#include "net/base/url_util.h"
#include "services/network/public/mojom/permissions_policy/permissions_policy_feature.mojom.h"
#if BUILDFLAG(IS_CHROMEOS)
#include <utility>
#include "ash/constants/ash_switches.h"
#include "base/metrics/histogram_macros.h"
#include "chromeos/ash/components/settings/cros_settings.h"
#include "chromeos/ash/components/settings/cros_settings_names.h"
#include "chromeos/dbus/constants/dbus_switches.h"
#include "components/permissions/permission_request.h"
#include "components/permissions/permission_uma_util.h"
#include "components/permissions/request_type.h"
#include "components/pref_registry/pref_registry_syncable.h"
#include "components/user_prefs/user_prefs.h"
#endif
#if !(BUILDFLAG(IS_ANDROID) || BUILDFLAG(IS_WIN) || BUILDFLAG(IS_CHROMEOS))
#error This file currently only supports Chrome OS, Android and Windows.
#endif
ProtectedMediaIdentifierPermissionContext::
ProtectedMediaIdentifierPermissionContext(
content::BrowserContext* browser_context)
: permissions::ContentSettingPermissionContextBase(
browser_context,
ContentSettingsType::PROTECTED_MEDIA_IDENTIFIER,
network::mojom::PermissionsPolicyFeature::kEncryptedMedia) {}
ProtectedMediaIdentifierPermissionContext::
~ProtectedMediaIdentifierPermissionContext() = default;
ContentSetting
ProtectedMediaIdentifierPermissionContext::GetContentSettingStatusInternal(
content::RenderFrameHost* render_frame_host,
const GURL& requesting_origin,
const GURL& embedding_origin) const {
DVLOG(1) << __func__ << ": (" << requesting_origin.spec() << ", "
<< embedding_origin.spec() << ")";
if (!requesting_origin.is_valid() || !embedding_origin.is_valid() ||
!IsProtectedMediaIdentifierEnabled(
Profile::FromBrowserContext(browser_context()))) {
return CONTENT_SETTING_BLOCK;
}
ContentSetting content_setting = permissions::
ContentSettingPermissionContextBase::GetContentSettingStatusInternal(
render_frame_host, requesting_origin, embedding_origin);
DCHECK(content_setting == CONTENT_SETTING_ALLOW ||
#if BUILDFLAG(IS_ANDROID)
content_setting == CONTENT_SETTING_ASK ||
#endif
content_setting == CONTENT_SETTING_BLOCK);
// For automated testing of protected content - having a prompt that
// requires user intervention is problematic. If the domain has been
// allowlisted as safe - suppress the request and allow.
if (content_setting != CONTENT_SETTING_ALLOW &&
IsOriginAllowed(requesting_origin)) {
content_setting = CONTENT_SETTING_ALLOW;
}
return content_setting;
}
bool ProtectedMediaIdentifierPermissionContext::IsOriginAllowed(
const GURL& origin) {
const base::CommandLine& command_line =
*base::CommandLine::ForCurrentProcess();
const std::string allowlist = command_line.GetSwitchValueASCII(
switches::kUnsafelyAllowProtectedMediaIdentifierForDomain);
for (const std::string& domain : base::SplitString(
allowlist, ",", base::TRIM_WHITESPACE, base::SPLIT_WANT_NONEMPTY)) {
if (origin.DomainIs(domain)) {
return true;
}
}
return false;
}
void ProtectedMediaIdentifierPermissionContext::UpdateTabContext(
const permissions::PermissionRequestID& id,
const GURL& requesting_frame,
bool allowed) {
DCHECK_CURRENTLY_ON(content::BrowserThread::UI);
// WebContents may have gone away.
content_settings::PageSpecificContentSettings* content_settings =
content_settings::PageSpecificContentSettings::GetForFrame(
id.global_render_frame_host_id());
if (content_settings) {
content_settings->OnProtectedMediaIdentifierPermissionSet(
requesting_frame.DeprecatedGetOriginAsURL(), allowed);
}
}
// TODO(xhwang): We should consolidate the "protected content" related pref
// across platforms.
// static
bool ProtectedMediaIdentifierPermissionContext::
IsProtectedMediaIdentifierEnabled(Profile* profile) {
#if BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_WIN)
// Identifier is not allowed in incognito or guest mode.
if (profile != nullptr &&
(profile->IsOffTheRecord() || profile->IsGuestSession())) {
DVLOG(1) << "Protected media identifier disabled in incognito or guest "
"mode.";
return false;
}
#if BUILDFLAG(IS_CHROMEOS)
base::CommandLine* command_line = base::CommandLine::ForCurrentProcess();
if (command_line->HasSwitch(chromeos::switches::kSystemDevMode) &&
!command_line->HasSwitch(switches::kAllowRAInDevMode)) {
DVLOG(1) << "Protected media identifier disabled in dev mode.";
return false;
}
// This could be disabled by the device policy or by a switch in content
// settings.
bool attestation_enabled = true;
if (!ash::CrosSettings::Get()->GetBoolean(
ash::kAttestationForContentProtectionEnabled, &attestation_enabled)) {
attestation_enabled = false;
}
if (!attestation_enabled) {
DVLOG(1) << "Protected media identifier disabled by the user or by device "
"policy.";
return false;
}
#endif // BUILDFLAG(IS_CHROMEOS)
#endif // BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_WIN)
return true;
}
|