// Copyright 2022 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "chrome/browser/ui/ash/projector/projector_utils.h"
#include "ash/constants/ash_features.h"
#include "ash/constants/ash_pref_names.h"
#include "ash/webui/projector_app/public/cpp/projector_app_constants.h"
#include "ash/webui/projector_app/untrusted_projector_ui.h"
#include "ash/webui/system_apps/public/system_web_app_type.h"
#include "base/files/file_path.h"
#include "chrome/browser/ash/profiles/profile_helper.h"
#include "chrome/browser/policy/profile_policy_connector.h"
#include "chrome/browser/profiles/profile.h"
#include "chrome/browser/profiles/profile_manager.h"
#include "chrome/browser/ui/ash/system_web_apps/system_web_app_ui_utils.h"
#include "chrome/browser/ui/browser.h"
#include "chrome/browser/ui/tabs/tab_strip_model.h"
#include "chrome/browser/web_applications/web_app_launch_params.h"
#include "chrome/browser/web_applications/web_app_launch_queue.h"
#include "chrome/browser/web_applications/web_app_tab_helper.h"
#include "components/prefs/pref_service.h"
#include "components/user_manager/user.h"
#include "content/public/browser/navigation_controller.h"
#include "content/public/browser/web_contents.h"
#include "content/public/browser/web_ui.h"
namespace {
bool IsRealUserProfile(const Profile* profile) {
// Return false for signin, lock screen and incognito profiles.
return ash::ProfileHelper::IsUserProfile(profile) &&
!profile->IsOffTheRecord();
}
} // namespace
bool IsProjectorAllowedForProfile(const Profile* profile) {
DCHECK(profile);
if (!IsRealUserProfile(profile))
return false;
auto* user = ash::ProfileHelper::Get()->GetUserByProfile(profile);
if (!user)
return false;
return user->HasGaiaAccount();
}
bool IsProjectorAppEnabled(const Profile* profile) {
if (!IsProjectorAllowedForProfile(profile))
return false;
// Projector for regular consumer users.
if (!profile->GetProfilePolicyConnector()->IsManaged())
return true;
// Projector dogfood for supervised users is controlled by an enterprise
// policy. When the feature is out of dogfood phase the policy will be
// deprecated and the feature will be enabled by default.
if (profile->IsChild()) {
return profile->GetPrefs()->GetBoolean(
ash::prefs::kProjectorDogfoodForFamilyLinkEnabled);
}
// Projector for enterprise users is controlled by a combination of a feature
// flag and an enterprise policy.
return ash::features::IsProjectorManagedUserIgnorePolicyEnabled() ||
profile->GetPrefs()->GetBoolean(ash::prefs::kProjectorAllowByPolicy);
}
bool IsMediaFile(const base::FilePath& path) {
return path.MatchesExtension(ash::kProjectorMediaFileExtension);
}
bool IsMetadataFile(const base::FilePath& path) {
return path.MatchesExtension(ash::kProjectorMetadataFileExtension) ||
path.MatchesExtension(ash::kProjectorV2MetadataFileExtension);
}
void SendFilesToProjectorApp(std::vector<base::FilePath> files) {
Profile* profile = ProfileManager::GetActiveUserProfile();
Browser* browser =
ash::FindSystemWebAppBrowser(profile, ash::SystemWebAppType::PROJECTOR);
if (!browser) {
// Do not call SendFilesToProjectorApp() unless the Projector app is already
// open.
return;
}
content::WebContents* web_contents =
browser->tab_strip_model()->GetActiveWebContents();
auto* web_ui = web_contents->GetWebUI();
if (!web_ui)
return;
if (!web_ui->GetController()->GetAs<ash::UntrustedProjectorUI>()) {
// We only want to send files to the Projector SWA. Don't send files to the
// wrong trusted context if it navigates away.
// TODO(b/237089852): Consider using a navigation throttle to prevent the
// trusted contents from navigating away, but this check is still useful as
// an extra precaution.
return;
}
web_app::WebAppLaunchParams launch_params;
launch_params.started_new_navigation = false;
launch_params.app_id = ash::kChromeUIUntrustedProjectorSwaAppId;
// Sending files should not navigate the app. This argument is used for
// storage isolation, and won't impact navigation. It should be in scope of
// the current WebContent's origin.
launch_params.target_url = web_contents->GetVisibleURL();
launch_params.paths = std::move(files);
web_app::WebAppTabHelper::FromWebContents(web_contents)
->EnsureLaunchQueue()
.Enqueue(std::move(launch_params));
}