2022-11-22 21:50:32 +00:00
|
|
|
// Copyright (c) 2022 Microsoft, Inc.
|
|
|
|
// Use of this source code is governed by the MIT license that can be
|
|
|
|
// found in the LICENSE file.
|
|
|
|
|
|
|
|
#include "shell/browser/usb/electron_usb_delegate.h"
|
|
|
|
|
2024-01-11 01:00:37 +00:00
|
|
|
#include <string_view>
|
2022-11-22 21:50:32 +00:00
|
|
|
#include <utility>
|
|
|
|
|
|
|
|
#include "base/containers/contains.h"
|
|
|
|
#include "base/containers/cxx20_erase.h"
|
|
|
|
#include "base/observer_list.h"
|
|
|
|
#include "base/observer_list_types.h"
|
|
|
|
#include "base/scoped_observation.h"
|
|
|
|
#include "content/public/browser/render_frame_host.h"
|
|
|
|
#include "content/public/browser/web_contents.h"
|
2023-10-04 08:40:01 +00:00
|
|
|
#include "electron/buildflags/buildflags.h"
|
2022-11-22 21:50:32 +00:00
|
|
|
#include "services/device/public/mojom/usb_enumeration_options.mojom.h"
|
|
|
|
#include "shell/browser/electron_permission_manager.h"
|
|
|
|
#include "shell/browser/usb/usb_chooser_context.h"
|
|
|
|
#include "shell/browser/usb/usb_chooser_context_factory.h"
|
|
|
|
#include "shell/browser/usb/usb_chooser_controller.h"
|
|
|
|
#include "shell/browser/web_contents_permission_helper.h"
|
|
|
|
|
2023-10-04 08:40:01 +00:00
|
|
|
#if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
|
2022-11-22 21:50:32 +00:00
|
|
|
#include "base/containers/fixed_flat_set.h"
|
|
|
|
#include "chrome/common/chrome_features.h"
|
|
|
|
#include "extensions/browser/extension_registry.h"
|
2023-08-15 15:49:41 +00:00
|
|
|
#include "extensions/browser/guest_view/web_view/web_view_guest.h"
|
2022-11-22 21:50:32 +00:00
|
|
|
#include "extensions/common/constants.h"
|
|
|
|
#include "extensions/common/extension.h"
|
|
|
|
#include "services/device/public/mojom/usb_device.mojom.h"
|
|
|
|
#endif
|
|
|
|
|
|
|
|
namespace {
|
|
|
|
|
|
|
|
using ::content::UsbChooser;
|
|
|
|
|
|
|
|
electron::UsbChooserContext* GetChooserContext(
|
|
|
|
content::BrowserContext* browser_context) {
|
|
|
|
return electron::UsbChooserContextFactory::GetForBrowserContext(
|
|
|
|
browser_context);
|
|
|
|
}
|
|
|
|
|
2023-10-04 08:40:01 +00:00
|
|
|
#if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
|
2022-11-22 21:50:32 +00:00
|
|
|
// These extensions can claim the smart card USB class and automatically gain
|
|
|
|
// permissions for devices that have an interface with this class.
|
|
|
|
constexpr auto kSmartCardPrivilegedExtensionIds =
|
2024-01-11 01:00:37 +00:00
|
|
|
base::MakeFixedFlatSet<std::string_view>({
|
2022-11-22 21:50:32 +00:00
|
|
|
// Smart Card Connector Extension and its Beta version, see
|
|
|
|
// crbug.com/1233881.
|
|
|
|
"khpfeaanjngmcnplbdlpegiifgpfgdco",
|
|
|
|
"mockcojkppdndnhgonljagclgpkjbkek",
|
|
|
|
});
|
|
|
|
|
|
|
|
bool DeviceHasInterfaceWithClass(
|
|
|
|
const device::mojom::UsbDeviceInfo& device_info,
|
|
|
|
uint8_t interface_class) {
|
|
|
|
for (const auto& configuration : device_info.configurations) {
|
|
|
|
for (const auto& interface : configuration->interfaces) {
|
|
|
|
for (const auto& alternate : interface->alternates) {
|
|
|
|
if (alternate->class_code == interface_class)
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
2023-10-04 08:40:01 +00:00
|
|
|
#endif // BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
|
2022-11-22 21:50:32 +00:00
|
|
|
|
|
|
|
bool IsDevicePermissionAutoGranted(
|
|
|
|
const url::Origin& origin,
|
|
|
|
const device::mojom::UsbDeviceInfo& device_info) {
|
2023-10-04 08:40:01 +00:00
|
|
|
#if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
|
2022-11-22 21:50:32 +00:00
|
|
|
// Note: The `DeviceHasInterfaceWithClass()` call is made after checking the
|
|
|
|
// origin, since that method call is expensive.
|
|
|
|
if (origin.scheme() == extensions::kExtensionScheme &&
|
|
|
|
base::Contains(kSmartCardPrivilegedExtensionIds, origin.host()) &&
|
|
|
|
DeviceHasInterfaceWithClass(device_info,
|
|
|
|
device::mojom::kUsbSmartCardClass)) {
|
|
|
|
return true;
|
|
|
|
}
|
2023-10-04 08:40:01 +00:00
|
|
|
#endif // BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
|
2022-11-22 21:50:32 +00:00
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
} // namespace
|
|
|
|
|
|
|
|
namespace electron {
|
|
|
|
|
|
|
|
// Manages the UsbDelegate observers for a single browser context.
|
|
|
|
class ElectronUsbDelegate::ContextObservation
|
|
|
|
: public UsbChooserContext::DeviceObserver {
|
|
|
|
public:
|
|
|
|
ContextObservation(ElectronUsbDelegate* parent,
|
|
|
|
content::BrowserContext* browser_context)
|
|
|
|
: parent_(parent), browser_context_(browser_context) {
|
|
|
|
auto* chooser_context = GetChooserContext(browser_context_);
|
|
|
|
device_observation_.Observe(chooser_context);
|
|
|
|
}
|
|
|
|
ContextObservation(ContextObservation&) = delete;
|
|
|
|
ContextObservation& operator=(ContextObservation&) = delete;
|
|
|
|
~ContextObservation() override = default;
|
|
|
|
|
|
|
|
// UsbChooserContext::DeviceObserver:
|
|
|
|
void OnDeviceAdded(const device::mojom::UsbDeviceInfo& device_info) override {
|
|
|
|
for (auto& observer : observer_list_)
|
|
|
|
observer.OnDeviceAdded(device_info);
|
|
|
|
}
|
|
|
|
|
|
|
|
void OnDeviceRemoved(
|
|
|
|
const device::mojom::UsbDeviceInfo& device_info) override {
|
|
|
|
for (auto& observer : observer_list_)
|
|
|
|
observer.OnDeviceRemoved(device_info);
|
|
|
|
}
|
|
|
|
|
|
|
|
void OnDeviceManagerConnectionError() override {
|
|
|
|
for (auto& observer : observer_list_)
|
|
|
|
observer.OnDeviceManagerConnectionError();
|
|
|
|
}
|
|
|
|
|
|
|
|
void OnBrowserContextShutdown() override {
|
|
|
|
parent_->observations_.erase(browser_context_);
|
|
|
|
// Return since `this` is now deleted.
|
|
|
|
}
|
|
|
|
|
|
|
|
void AddObserver(content::UsbDelegate::Observer* observer) {
|
|
|
|
observer_list_.AddObserver(observer);
|
|
|
|
}
|
|
|
|
|
|
|
|
void RemoveObserver(content::UsbDelegate::Observer* observer) {
|
|
|
|
observer_list_.RemoveObserver(observer);
|
|
|
|
}
|
|
|
|
|
|
|
|
private:
|
|
|
|
// Safe because `parent_` owns `this`.
|
|
|
|
const raw_ptr<ElectronUsbDelegate> parent_;
|
|
|
|
|
|
|
|
// Safe because `this` is destroyed when the context is lost.
|
|
|
|
const raw_ptr<content::BrowserContext> browser_context_;
|
|
|
|
|
|
|
|
base::ScopedObservation<UsbChooserContext, UsbChooserContext::DeviceObserver>
|
|
|
|
device_observation_{this};
|
|
|
|
base::ObserverList<content::UsbDelegate::Observer> observer_list_;
|
|
|
|
};
|
|
|
|
|
|
|
|
ElectronUsbDelegate::ElectronUsbDelegate() = default;
|
|
|
|
|
|
|
|
ElectronUsbDelegate::~ElectronUsbDelegate() = default;
|
|
|
|
|
|
|
|
void ElectronUsbDelegate::AdjustProtectedInterfaceClasses(
|
|
|
|
content::BrowserContext* browser_context,
|
|
|
|
const url::Origin& origin,
|
|
|
|
content::RenderFrameHost* frame,
|
|
|
|
std::vector<uint8_t>& classes) {
|
2023-05-30 16:35:25 +00:00
|
|
|
auto* permission_manager = static_cast<ElectronPermissionManager*>(
|
|
|
|
browser_context->GetPermissionControllerDelegate());
|
|
|
|
classes = permission_manager->CheckProtectedUSBClasses(classes);
|
2022-11-22 21:50:32 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
std::unique_ptr<UsbChooser> ElectronUsbDelegate::RunChooser(
|
|
|
|
content::RenderFrameHost& frame,
|
2023-07-01 20:22:55 +00:00
|
|
|
blink::mojom::WebUsbRequestDeviceOptionsPtr options,
|
2022-11-22 21:50:32 +00:00
|
|
|
blink::mojom::WebUsbService::GetPermissionCallback callback) {
|
|
|
|
UsbChooserController* controller = ControllerForFrame(&frame);
|
|
|
|
if (controller) {
|
|
|
|
DeleteControllerForFrame(&frame);
|
|
|
|
}
|
2023-07-01 20:22:55 +00:00
|
|
|
AddControllerForFrame(&frame, std::move(options), std::move(callback));
|
2022-11-22 21:50:32 +00:00
|
|
|
// Return a nullptr because the return value isn't used for anything. The
|
|
|
|
// return value is simply used in Chromium to cleanup the chooser UI once the
|
|
|
|
// usb service is destroyed.
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool ElectronUsbDelegate::CanRequestDevicePermission(
|
|
|
|
content::BrowserContext* browser_context,
|
|
|
|
const url::Origin& origin) {
|
|
|
|
base::Value::Dict details;
|
|
|
|
details.Set("securityOrigin", origin.GetURL().spec());
|
|
|
|
auto* permission_manager = static_cast<ElectronPermissionManager*>(
|
|
|
|
browser_context->GetPermissionControllerDelegate());
|
|
|
|
return permission_manager->CheckPermissionWithDetails(
|
|
|
|
static_cast<blink::PermissionType>(
|
|
|
|
WebContentsPermissionHelper::PermissionType::USB),
|
|
|
|
nullptr, origin.GetURL(), std::move(details));
|
|
|
|
}
|
|
|
|
|
|
|
|
void ElectronUsbDelegate::RevokeDevicePermissionWebInitiated(
|
|
|
|
content::BrowserContext* browser_context,
|
|
|
|
const url::Origin& origin,
|
|
|
|
const device::mojom::UsbDeviceInfo& device) {
|
|
|
|
GetChooserContext(browser_context)
|
|
|
|
->RevokeDevicePermissionWebInitiated(origin, device);
|
|
|
|
}
|
|
|
|
|
|
|
|
const device::mojom::UsbDeviceInfo* ElectronUsbDelegate::GetDeviceInfo(
|
|
|
|
content::BrowserContext* browser_context,
|
|
|
|
const std::string& guid) {
|
|
|
|
return GetChooserContext(browser_context)->GetDeviceInfo(guid);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool ElectronUsbDelegate::HasDevicePermission(
|
|
|
|
content::BrowserContext* browser_context,
|
2023-12-11 20:58:26 +00:00
|
|
|
content::RenderFrameHost* frame,
|
2022-11-22 21:50:32 +00:00
|
|
|
const url::Origin& origin,
|
|
|
|
const device::mojom::UsbDeviceInfo& device) {
|
|
|
|
if (IsDevicePermissionAutoGranted(origin, device))
|
|
|
|
return true;
|
|
|
|
|
|
|
|
return GetChooserContext(browser_context)
|
|
|
|
->HasDevicePermission(origin, device);
|
|
|
|
}
|
|
|
|
|
|
|
|
void ElectronUsbDelegate::GetDevices(
|
|
|
|
content::BrowserContext* browser_context,
|
|
|
|
blink::mojom::WebUsbService::GetDevicesCallback callback) {
|
|
|
|
GetChooserContext(browser_context)->GetDevices(std::move(callback));
|
|
|
|
}
|
|
|
|
|
|
|
|
void ElectronUsbDelegate::GetDevice(
|
|
|
|
content::BrowserContext* browser_context,
|
|
|
|
const std::string& guid,
|
|
|
|
base::span<const uint8_t> blocked_interface_classes,
|
|
|
|
mojo::PendingReceiver<device::mojom::UsbDevice> device_receiver,
|
|
|
|
mojo::PendingRemote<device::mojom::UsbDeviceClient> device_client) {
|
|
|
|
GetChooserContext(browser_context)
|
|
|
|
->GetDevice(guid, blocked_interface_classes, std::move(device_receiver),
|
|
|
|
std::move(device_client));
|
|
|
|
}
|
|
|
|
|
|
|
|
void ElectronUsbDelegate::AddObserver(content::BrowserContext* browser_context,
|
|
|
|
Observer* observer) {
|
|
|
|
GetContextObserver(browser_context)->AddObserver(observer);
|
|
|
|
}
|
|
|
|
|
|
|
|
void ElectronUsbDelegate::RemoveObserver(
|
|
|
|
content::BrowserContext* browser_context,
|
|
|
|
Observer* observer) {
|
|
|
|
GetContextObserver(browser_context)->RemoveObserver(observer);
|
|
|
|
}
|
|
|
|
|
|
|
|
ElectronUsbDelegate::ContextObservation*
|
|
|
|
ElectronUsbDelegate::GetContextObserver(
|
|
|
|
content::BrowserContext* browser_context) {
|
|
|
|
if (!base::Contains(observations_, browser_context)) {
|
|
|
|
observations_.emplace(browser_context, std::make_unique<ContextObservation>(
|
|
|
|
this, browser_context));
|
|
|
|
}
|
|
|
|
return observations_[browser_context].get();
|
|
|
|
}
|
|
|
|
|
|
|
|
bool ElectronUsbDelegate::IsServiceWorkerAllowedForOrigin(
|
|
|
|
const url::Origin& origin) {
|
2023-10-04 08:40:01 +00:00
|
|
|
#if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
|
2022-11-22 21:50:32 +00:00
|
|
|
// WebUSB is only available on extension service workers for now.
|
|
|
|
if (base::FeatureList::IsEnabled(
|
|
|
|
features::kEnableWebUsbOnExtensionServiceWorker) &&
|
|
|
|
origin.scheme() == extensions::kExtensionScheme) {
|
|
|
|
return true;
|
|
|
|
}
|
2023-10-04 08:40:01 +00:00
|
|
|
#endif // BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
|
2022-11-22 21:50:32 +00:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
UsbChooserController* ElectronUsbDelegate::ControllerForFrame(
|
|
|
|
content::RenderFrameHost* render_frame_host) {
|
|
|
|
auto mapping = controller_map_.find(render_frame_host);
|
|
|
|
return mapping == controller_map_.end() ? nullptr : mapping->second.get();
|
|
|
|
}
|
|
|
|
|
|
|
|
UsbChooserController* ElectronUsbDelegate::AddControllerForFrame(
|
|
|
|
content::RenderFrameHost* render_frame_host,
|
2023-07-01 20:22:55 +00:00
|
|
|
blink::mojom::WebUsbRequestDeviceOptionsPtr options,
|
2022-11-22 21:50:32 +00:00
|
|
|
blink::mojom::WebUsbService::GetPermissionCallback callback) {
|
|
|
|
auto* web_contents =
|
|
|
|
content::WebContents::FromRenderFrameHost(render_frame_host);
|
|
|
|
auto controller = std::make_unique<UsbChooserController>(
|
2023-07-01 20:22:55 +00:00
|
|
|
render_frame_host, std::move(options), std::move(callback), web_contents,
|
2022-11-22 21:50:32 +00:00
|
|
|
weak_factory_.GetWeakPtr());
|
|
|
|
controller_map_.insert(
|
|
|
|
std::make_pair(render_frame_host, std::move(controller)));
|
|
|
|
return ControllerForFrame(render_frame_host);
|
|
|
|
}
|
|
|
|
|
|
|
|
void ElectronUsbDelegate::DeleteControllerForFrame(
|
|
|
|
content::RenderFrameHost* render_frame_host) {
|
|
|
|
controller_map_.erase(render_frame_host);
|
|
|
|
}
|
|
|
|
|
2023-08-15 15:49:41 +00:00
|
|
|
bool ElectronUsbDelegate::PageMayUseUsb(content::Page& page) {
|
|
|
|
content::RenderFrameHost& main_rfh = page.GetMainDocument();
|
2023-10-04 08:40:01 +00:00
|
|
|
#if BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
|
2023-08-15 15:49:41 +00:00
|
|
|
// WebViewGuests have no mechanism to show permission prompts and their
|
|
|
|
// embedder can't grant USB access through its permissionrequest API. Also
|
|
|
|
// since webviews use a separate StoragePartition, they must not gain access
|
|
|
|
// through permissions granted in non-webview contexts.
|
|
|
|
if (extensions::WebViewGuest::FromRenderFrameHost(&main_rfh)) {
|
|
|
|
return false;
|
|
|
|
}
|
2023-10-04 08:40:01 +00:00
|
|
|
#endif // BUILDFLAG(ENABLE_ELECTRON_EXTENSIONS)
|
2023-08-15 15:49:41 +00:00
|
|
|
|
|
|
|
// USB permissions are scoped to a BrowserContext instead of a
|
|
|
|
// StoragePartition, so we need to be careful about usage across
|
|
|
|
// StoragePartitions. Until this is scoped correctly, we'll try to avoid
|
|
|
|
// inappropriate sharing by restricting access to the API. We can't be as
|
|
|
|
// strict as we'd like, as cases like extensions and Isolated Web Apps still
|
|
|
|
// need USB access in non-default partitions, so we'll just guard against
|
|
|
|
// HTTP(S) as that presents a clear risk for inappropriate sharing.
|
|
|
|
// TODO(crbug.com/1469672): USB permissions should be explicitly scoped to
|
|
|
|
// StoragePartitions.
|
|
|
|
if (main_rfh.GetStoragePartition() !=
|
|
|
|
main_rfh.GetBrowserContext()->GetDefaultStoragePartition()) {
|
|
|
|
return !main_rfh.GetLastCommittedURL().SchemeIsHTTPOrHTTPS();
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2022-11-22 21:50:32 +00:00
|
|
|
} // namespace electron
|