// Copyright 2021 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef COMPONENTS_EXO_SECURITY_DELEGATE_H_
#define COMPONENTS_EXO_SECURITY_DELEGATE_H_
#include <memory>
#include <string>
#include <vector>
#include "base/files/file_path.h"
#include "base/functional/callback.h"
#include "base/memory/scoped_refptr.h"
namespace aura {
class Window;
}
namespace base {
class Pickle;
class RefCountedMemory;
} // namespace base
namespace ui {
struct FileInfo;
enum class EndpointType;
} // namespace ui
namespace exo {
// Each wayland server managed by exo, including the default server, will have a
// single delegate associated with it to control security-sensitive features of
// the server, e.g.:
// - Availability of privileged APIs used by trusted clients only.
// - Handling of certain mechanisms differently for different products (arc,
// crostini, etc)
// This allows exo to make strong guarantees about the relationship between the
// wl clients and the SecurityDelegate the server owns.
//
// See go/secure-exo-ids and go/securer-exo-ids for more details.
class SecurityDelegate {
public:
// See |CanSetBounds()|.
enum SetBoundsPolicy {
// By default, clients may not set window bounds. Requests are ignored.
IGNORE,
// Clients may set bounds, but Exo may DCHECK on requests for windows with
// server-side decoration.
DCHECK_IF_DECORATED,
// Clients may set bounds for any window. Exo will expand the requested
// bounds to account for server-side decorations, if any.
ADJUST_IF_DECORATED,
};
virtual ~SecurityDelegate() {}
// "Self-activation" is a security sensitive windowing operation that is a
// common paradigm in X11. The need to self-activate is controlled
// per-subsystem, i.e. a product like ARC++ knows that its windows should be
// able to self activate, whereas Crostini knows they usually shouldn't.
virtual bool CanSelfActivate(aura::Window* window) const = 0;
// Called when a client made pointer lock request, defined in
// pointer-constraints-unstable-v1.xml extension protocol. True if the client
// can lock the location of the pointer and disable movement, or return false
// to reject the pointer lock request.
virtual bool CanLockPointer(aura::Window* window) const = 0;
// Whether clients may set their own windows' bounds is a security-relevant
// policy decision.
//
// If server-side decoration is used, clients normally should not set their
// own window bounds, as they may not be able to compute them correctly
// (accounting for the size of the window decorations).
virtual SetBoundsPolicy CanSetBounds(aura::Window* window) const = 0;
// Read filenames from text/uri-list |data| which was provided by `source`
// endpoint. Translates paths from source to host format.
virtual std::vector<ui::FileInfo> GetFilenames(
ui::EndpointType source,
const std::vector<uint8_t>& data) const = 0;
// Sends the given list of `files` to `target` endpoint. Translates paths from
// host format to the target and performs any required file sharing for VMs.
using SendDataCallback =
base::OnceCallback<void(scoped_refptr<base::RefCountedMemory>)>;
virtual void SendFileInfo(ui::EndpointType target,
const std::vector<ui::FileInfo>& files,
SendDataCallback callback) const = 0;
// Takes in `pickle` constructed by the web contents view containing
// filesystem URLs. Provides translations for the specified `target` endpoint
// and performs any required file sharing for VMs.
virtual void SendPickle(ui::EndpointType target,
const base::Pickle& pickle,
SendDataCallback callback) = 0;
};
} // namespace exo
#endif // COMPONENTS_EXO_SECURITY_DELEGATE_H_