// Copyright 2023 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "chrome/browser/chromeos/extensions/telemetry/api/common/util.h"
#include "chrome/browser/profiles/profile.h"
#include "chrome/browser/ui/browser.h"
#include "chrome/browser/ui/browser_list.h"
#include "chrome/browser/ui/tabs/tab_strip_model.h"
#include "chrome/common/url_constants.h"
#include "components/security_state/content/content_utils.h"
#include "components/security_state/core/security_state.h"
#include "content/public/browser/web_contents.h"
#include "extensions/common/manifest_handlers/externally_connectable.h"
#include "extensions/common/url_pattern_set.h"
#if BUILDFLAG(IS_CHROMEOS_ASH)
#include "ash/constants/ash_features.h"
#include "ash/webui/shimless_rma/backend/external_app_dialog.h"
#endif // BUILDFLAG(IS_CHROMEOS_ASH)
namespace content {
class BrowserContext;
}
namespace chromeos {
namespace {
bool IsWebContentsSecure(content::WebContents* contents) {
// TODO(b/290909386): Remove this line once we reach a conclusion on
// how we should perform security check on IWA.
if (contents->GetLastCommittedURL().SchemeIs(chrome::kIsolatedAppScheme)) {
return true;
}
// Ensure the URL connection is secure (e.g. valid certificate).
const auto visible_security_state =
security_state::GetVisibleSecurityState(contents);
return security_state::GetSecurityLevel(
*visible_security_state,
/*used_policy_installed_certificate=*/false) ==
security_state::SecurityLevel::SECURE;
}
bool IsWebContentsSecureAppUi(const extensions::URLPatternSet& pattern_set,
content::WebContents* contents) {
return pattern_set.MatchesURL(contents->GetLastCommittedURL()) &&
IsWebContentsSecure(contents);
}
} // namespace
content::WebContents* FindTelemetryExtensionOpenAndSecureAppUi(
content::BrowserContext* context,
const extensions::Extension* extension,
bool focused_ui_required) {
Profile* profile = Profile::FromBrowserContext(context);
const auto& pattern_set =
extensions::ExternallyConnectableInfo::Get(extension)->matches;
#if BUILDFLAG(IS_CHROMEOS_ASH)
if (ash::features::IsShimlessRMA3pDiagnosticsEnabled()) {
content::WebContents* contents =
ash::shimless_rma::ExternalAppDialog::GetWebContents();
if (contents && contents->GetBrowserContext() == context &&
IsWebContentsSecureAppUi(pattern_set, contents)) {
// In shimless, ExternalAppDialog is always on the top so we can assume it
// is always focused.
return contents;
}
}
#endif // BUILDFLAG(IS_CHROMEOS_ASH)
// A focused UI must be:
// 1. In a browser that is front-most;
// 2. In a tab that is active.
Browser* last_active_browser = BrowserList::GetInstance()->GetLastActive();
if (last_active_browser && last_active_browser->profile() == profile) {
content::WebContents* contents =
last_active_browser->tab_strip_model()->GetActiveWebContents();
if (contents && IsWebContentsSecureAppUi(pattern_set, contents)) {
return contents;
}
}
if (focused_ui_required) {
return nullptr;
}
for (Browser* target_browser : *BrowserList::GetInstance()) {
if (target_browser->profile() != profile) {
continue;
}
TabStripModel* target_tab_strip = target_browser->tab_strip_model();
for (int i = 0; i < target_tab_strip->count(); ++i) {
content::WebContents* contents = target_tab_strip->GetWebContentsAt(i);
if (IsWebContentsSecureAppUi(pattern_set, contents)) {
return contents;
}
}
}
return nullptr;
}
bool IsTelemetryExtensionAppUiOpenAndSecure(
content::BrowserContext* context,
const extensions::Extension* extension) {
return FindTelemetryExtensionOpenAndSecureAppUi(context, extension) !=
nullptr;
}
} // namespace chromeos