| // Copyright 2019 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "content/browser/hid/hid_service.h" |
| |
| #include <memory> |
| #include <utility> |
| |
| #include "base/bind.h" |
| #include "base/callback.h" |
| #include "base/callback_helpers.h" |
| #include "base/containers/contains.h" |
| #include "base/containers/cxx20_erase.h" |
| #include "base/debug/stack_trace.h" |
| #include "content/browser/web_contents/web_contents_impl.h" |
| #include "content/public/browser/content_browser_client.h" |
| #include "content/public/browser/document_service.h" |
| #include "content/public/browser/hid_chooser.h" |
| #include "content/public/browser/hid_delegate.h" |
| #include "content/public/browser/render_frame_host.h" |
| #include "content/public/common/content_client.h" |
| #include "mojo/public/cpp/bindings/message.h" |
| #include "mojo/public/cpp/bindings/self_owned_receiver.h" |
| #include "third_party/blink/public/mojom/permissions_policy/permissions_policy.mojom.h" |
| |
| namespace content { |
| |
| namespace { |
| |
| // Removes reports from |device| if the report IDs match the IDs in the |
| // protected report ID lists. If all of the reports are removed from a |
| // collection, the collection is also removed. |
| void RemoveProtectedReports(device::mojom::HidDeviceInfo& device, |
| bool is_fido_allowed) { |
| std::vector<device::mojom::HidCollectionInfoPtr> collections; |
| for (auto& collection : device.collections) { |
| const bool is_fido = |
| collection->usage->usage_page == device::mojom::kPageFido; |
| std::vector<device::mojom::HidReportDescriptionPtr> input_reports; |
| for (auto& report : collection->input_reports) { |
| if ((is_fido && is_fido_allowed) || |
| !device.protected_input_report_ids.has_value() || |
| !base::Contains(*device.protected_input_report_ids, |
| report->report_id)) { |
| input_reports.push_back(std::move(report)); |
| } |
| } |
| std::vector<device::mojom::HidReportDescriptionPtr> output_reports; |
| for (auto& report : collection->output_reports) { |
| if ((is_fido && is_fido_allowed) || |
| !device.protected_output_report_ids.has_value() || |
| !base::Contains(*device.protected_output_report_ids, |
| report->report_id)) { |
| output_reports.push_back(std::move(report)); |
| } |
| } |
| std::vector<device::mojom::HidReportDescriptionPtr> feature_reports; |
| for (auto& report : collection->feature_reports) { |
| if ((is_fido && is_fido_allowed) || |
| !device.protected_feature_report_ids.has_value() || |
| !base::Contains(*device.protected_feature_report_ids, |
| report->report_id)) { |
| feature_reports.push_back(std::move(report)); |
| } |
| } |
| // Only keep the collection if it has at least one report. |
| if (!input_reports.empty() || !output_reports.empty() || |
| !feature_reports.empty()) { |
| collection->input_reports = std::move(input_reports); |
| collection->output_reports = std::move(output_reports); |
| collection->feature_reports = std::move(feature_reports); |
| collections.push_back(std::move(collection)); |
| } |
| } |
| device.collections = std::move(collections); |
| } |
| |
| } // namespace |
| |
| // Deletes the HidService when the connected document is destroyed. |
| class DocumentHelper |
| : public content::DocumentService<blink::mojom::HidService> { |
| public: |
| DocumentHelper(std::unique_ptr<HidService> parent, |
| RenderFrameHost& render_frame_host, |
| mojo::PendingReceiver<blink::mojom::HidService> receiver) |
| : DocumentService(render_frame_host, std::move(receiver)), |
| parent_(std::move(parent)) { |
| DCHECK(parent_); |
| } |
| ~DocumentHelper() override = default; |
| |
| // blink::mojom::HidService: |
| void RegisterClient( |
| mojo::PendingAssociatedRemote<device::mojom::HidManagerClient> client) |
| override { |
| parent_->RegisterClient(std::move(client)); |
| } |
| void GetDevices(GetDevicesCallback callback) override { |
| parent_->GetDevices(std::move(callback)); |
| } |
| void RequestDevice( |
| std::vector<blink::mojom::HidDeviceFilterPtr> filters, |
| std::vector<blink::mojom::HidDeviceFilterPtr> exclusion_filters, |
| RequestDeviceCallback callback) override { |
| parent_->RequestDevice(std::move(filters), std::move(exclusion_filters), |
| std::move(callback)); |
| } |
| void Connect(const std::string& device_guid, |
| mojo::PendingRemote<device::mojom::HidConnectionClient> client, |
| ConnectCallback callback) override { |
| parent_->Connect(device_guid, std::move(client), std::move(callback)); |
| } |
| void Forget(device::mojom::HidDeviceInfoPtr device_info, |
| ForgetCallback callback) override { |
| parent_->Forget(std::move(device_info), std::move(callback)); |
| } |
| |
| private: |
| const std::unique_ptr<HidService> parent_; |
| }; |
| |
| HidService::HidService(BrowserContext* browser_context, |
| const url::Origin& origin, |
| RenderFrameHostImpl* render_frame_host) |
| : browser_context_(browser_context), |
| render_frame_host_(render_frame_host), |
| origin_(origin) { |
| watchers_.set_disconnect_handler( |
| base::BindRepeating(&HidService::OnWatcherRemoved, base::Unretained(this), |
| /* cleanup_watcher_ids=*/true)); |
| |
| HidDelegate* delegate = GetContentClient()->browser()->GetHidDelegate(); |
| if (delegate) |
| delegate->AddObserver(browser_context_, this); |
| } |
| |
| HidService::~HidService() { |
| HidDelegate* delegate = GetContentClient()->browser()->GetHidDelegate(); |
| if (delegate) |
| delegate->RemoveObserver(this); |
| |
| // The remaining watchers will be closed from this end. |
| if (!watchers_.empty()) |
| DecrementActiveFrameCount(); |
| } |
| |
| // static |
| void HidService::Create( |
| RenderFrameHostImpl* render_frame_host, |
| mojo::PendingReceiver<blink::mojom::HidService> receiver) { |
| CHECK(render_frame_host); |
| |
| if (!render_frame_host->IsFeatureEnabled( |
| blink::mojom::PermissionsPolicyFeature::kHid)) { |
| mojo::ReportBadMessage("Permissions policy blocks access to HID."); |
| return; |
| } |
| |
| // Avoid creating the HidService if there is no HID delegate to provide the |
| // implementation. |
| if (!GetContentClient()->browser()->GetHidDelegate()) |
| return; |
| |
| if (render_frame_host->IsNestedWithinFencedFrame()) { |
| // The renderer is supposed to disallow the use of hid services when inside |
| // a fenced frame. Anything getting past the renderer checks must be marked |
| // as a bad request. |
| mojo::ReportBadMessage("WebHID is not allowed in a fenced frame tree."); |
| return; |
| } |
| |
| // DocumentHelper observes the lifetime of the document connected to |
| // `render_frame_host` and destroys the HidService when the Mojo connection is |
| // disconnected, RenderFrameHost is deleted, or the RenderFrameHost commits a |
| // cross-document navigation. It forwards its Mojo interface to HidService. |
| new DocumentHelper( |
| std::make_unique<HidService>( |
| render_frame_host->GetBrowserContext(), |
| render_frame_host->GetMainFrame()->GetLastCommittedOrigin(), |
| render_frame_host), |
| *render_frame_host, std::move(receiver)); |
| } |
| |
| // static |
| void HidService::Create( |
| BrowserContext* browser_context, |
| const url::Origin& origin, |
| mojo::PendingReceiver<blink::mojom::HidService> receiver) { |
| DCHECK(browser_context); |
| |
| // Avoid creating the HidService if there is no HID delegate to provide |
| // the implementation. |
| if (!GetContentClient()->browser()->GetHidDelegate()) |
| return; |
| |
| // This makes HidService a self-owned receiver so it will self-destruct when a |
| // mojo interface error occurs. |
| mojo::MakeSelfOwnedReceiver<blink::mojom::HidService, HidService>( |
| std::make_unique<HidService>(browser_context, origin, |
| /*render_frame_host=*/nullptr), |
| std::move(receiver)); |
| } |
| |
| void HidService::RegisterClient( |
| mojo::PendingAssociatedRemote<device::mojom::HidManagerClient> client) { |
| clients_.Add(std::move(client)); |
| } |
| |
| void HidService::GetDevices(GetDevicesCallback callback) { |
| GetContentClient() |
| ->browser() |
| ->GetHidDelegate() |
| ->GetHidManager(browser_context_) |
| ->GetDevices(base::BindOnce(&HidService::FinishGetDevices, |
| weak_factory_.GetWeakPtr(), |
| std::move(callback))); |
| } |
| |
| void HidService::RequestDevice( |
| std::vector<blink::mojom::HidDeviceFilterPtr> filters, |
| std::vector<blink::mojom::HidDeviceFilterPtr> exclusion_filters, |
| RequestDeviceCallback callback) { |
| HidDelegate* delegate = GetContentClient()->browser()->GetHidDelegate(); |
| if (!render_frame_host_ || |
| !delegate->CanRequestDevicePermission(browser_context_, origin_)) { |
| std::move(callback).Run(std::vector<device::mojom::HidDeviceInfoPtr>()); |
| return; |
| } |
| chooser_ = GetContentClient()->browser()->GetHidDelegate()->RunChooser( |
| render_frame_host_, std::move(filters), std::move(exclusion_filters), |
| base::BindOnce(&HidService::FinishRequestDevice, |
| weak_factory_.GetWeakPtr(), std::move(callback))); |
| } |
| |
| void HidService::Connect( |
| const std::string& device_guid, |
| mojo::PendingRemote<device::mojom::HidConnectionClient> client, |
| ConnectCallback callback) { |
| if (watchers_.empty()) { |
| IncrementActiveFrameCount(); |
| } |
| |
| mojo::PendingRemote<device::mojom::HidConnectionWatcher> watcher; |
| mojo::ReceiverId receiver_id = |
| watchers_.Add(this, watcher.InitWithNewPipeAndPassReceiver()); |
| watcher_ids_.insert({device_guid, receiver_id}); |
| |
| auto* delegate = GetContentClient()->browser()->GetHidDelegate(); |
| delegate->GetHidManager(browser_context_) |
| ->Connect( |
| device_guid, std::move(client), std::move(watcher), |
| /*allow_protected_reports=*/false, |
| delegate->IsFidoAllowedForOrigin(browser_context_, origin_), |
| base::BindOnce(&HidService::FinishConnect, weak_factory_.GetWeakPtr(), |
| std::move(callback))); |
| } |
| |
| void HidService::Forget(device::mojom::HidDeviceInfoPtr device_info, |
| ForgetCallback callback) { |
| GetContentClient()->browser()->GetHidDelegate()->RevokeDevicePermission( |
| browser_context_, origin_, *device_info); |
| std::move(callback).Run(); |
| } |
| |
| void HidService::OnWatcherRemoved(bool cleanup_watcher_ids) { |
| if (watchers_.empty()) |
| DecrementActiveFrameCount(); |
| |
| if (cleanup_watcher_ids) { |
| // Clean up any associated |watchers_ids_| entries. |
| base::EraseIf(watcher_ids_, [&](const auto& watcher_entry) { |
| return watcher_entry.second == watchers_.current_receiver(); |
| }); |
| } |
| } |
| |
| void HidService::IncrementActiveFrameCount() { |
| if (render_frame_host_) { |
| auto* web_contents_impl = |
| WebContentsImpl::FromRenderFrameHostImpl(render_frame_host_); |
| web_contents_impl->IncrementHidActiveFrameCount(); |
| } |
| } |
| |
| void HidService::DecrementActiveFrameCount() { |
| if (render_frame_host_) { |
| auto* web_contents_impl = |
| WebContentsImpl::FromRenderFrameHostImpl(render_frame_host_); |
| web_contents_impl->DecrementHidActiveFrameCount(); |
| } |
| } |
| |
| void HidService::OnDeviceAdded( |
| const device::mojom::HidDeviceInfo& device_info) { |
| auto* delegate = GetContentClient()->browser()->GetHidDelegate(); |
| if (!delegate->HasDevicePermission(browser_context_, origin_, device_info)) |
| return; |
| |
| auto filtered_device_info = device_info.Clone(); |
| RemoveProtectedReports( |
| *filtered_device_info, |
| delegate->IsFidoAllowedForOrigin(browser_context_, origin_)); |
| if (filtered_device_info->collections.empty()) |
| return; |
| |
| for (auto& client : clients_) |
| client->DeviceAdded(filtered_device_info->Clone()); |
| } |
| |
| void HidService::OnDeviceRemoved( |
| const device::mojom::HidDeviceInfo& device_info) { |
| size_t watchers_removed = |
| base::EraseIf(watcher_ids_, [&](const auto& watcher_entry) { |
| if (watcher_entry.first != device_info.guid) |
| return false; |
| |
| watchers_.Remove(watcher_entry.second); |
| return true; |
| }); |
| |
| // If needed, decrement the active frame count. |
| if (watchers_removed > 0) |
| OnWatcherRemoved(/*cleanup_watcher_ids=*/false); |
| |
| auto* delegate = GetContentClient()->browser()->GetHidDelegate(); |
| if (!delegate->HasDevicePermission(browser_context_, origin_, device_info)) { |
| return; |
| } |
| |
| auto filtered_device_info = device_info.Clone(); |
| RemoveProtectedReports( |
| *filtered_device_info, |
| delegate->IsFidoAllowedForOrigin(browser_context_, origin_)); |
| if (filtered_device_info->collections.empty()) |
| return; |
| |
| for (auto& client : clients_) |
| client->DeviceRemoved(filtered_device_info->Clone()); |
| } |
| |
| void HidService::OnDeviceChanged( |
| const device::mojom::HidDeviceInfo& device_info) { |
| auto* delegate = GetContentClient()->browser()->GetHidDelegate(); |
| const bool has_device_permission = |
| delegate->HasDevicePermission(browser_context_, origin_, device_info); |
| |
| device::mojom::HidDeviceInfoPtr filtered_device_info; |
| if (has_device_permission) { |
| filtered_device_info = device_info.Clone(); |
| RemoveProtectedReports( |
| *filtered_device_info, |
| delegate->IsFidoAllowedForOrigin(browser_context_, origin_)); |
| } |
| |
| if (!has_device_permission || filtered_device_info->collections.empty()) { |
| // Changing the device information has caused permissions to be revoked. |
| size_t watchers_removed = |
| base::EraseIf(watcher_ids_, [&](const auto& watcher_entry) { |
| if (watcher_entry.first != device_info.guid) |
| return false; |
| |
| watchers_.Remove(watcher_entry.second); |
| return true; |
| }); |
| |
| // If needed, decrement the active frame count. |
| if (watchers_removed > 0) |
| OnWatcherRemoved(/*cleanup_watcher_ids=*/false); |
| |
| return; |
| } |
| |
| for (auto& client : clients_) |
| client->DeviceChanged(filtered_device_info->Clone()); |
| } |
| |
| void HidService::OnHidManagerConnectionError() { |
| // Close the connection with Blink. |
| clients_.Clear(); |
| } |
| |
| void HidService::OnPermissionRevoked(const url::Origin& origin) { |
| if (origin_ != origin) { |
| return; |
| } |
| |
| HidDelegate* delegate = GetContentClient()->browser()->GetHidDelegate(); |
| |
| size_t watchers_removed = |
| base::EraseIf(watcher_ids_, [&](const auto& watcher_entry) { |
| const auto* device_info = |
| delegate->GetDeviceInfo(browser_context_, watcher_entry.first); |
| if (!device_info) |
| return true; |
| |
| if (delegate->HasDevicePermission(browser_context_, origin_, |
| *device_info)) { |
| return false; |
| } |
| |
| watchers_.Remove(watcher_entry.second); |
| return true; |
| }); |
| |
| // If needed decrement the active frame count. |
| if (watchers_removed > 0) |
| OnWatcherRemoved(/*cleanup_watcher_ids=*/false); |
| } |
| |
| void HidService::FinishGetDevices( |
| GetDevicesCallback callback, |
| std::vector<device::mojom::HidDeviceInfoPtr> devices) { |
| auto* delegate = GetContentClient()->browser()->GetHidDelegate(); |
| |
| bool is_fido_allowed = |
| delegate->IsFidoAllowedForOrigin(browser_context_, origin_); |
| std::vector<device::mojom::HidDeviceInfoPtr> result; |
| for (auto& device : devices) { |
| RemoveProtectedReports(*device, is_fido_allowed); |
| if (device->collections.empty()) |
| continue; |
| |
| if (delegate->HasDevicePermission(browser_context_, origin_, *device)) |
| result.push_back(std::move(device)); |
| } |
| |
| std::move(callback).Run(std::move(result)); |
| } |
| |
| void HidService::FinishRequestDevice( |
| RequestDeviceCallback callback, |
| std::vector<device::mojom::HidDeviceInfoPtr> devices) { |
| std::move(callback).Run(std::move(devices)); |
| } |
| |
| void HidService::FinishConnect( |
| ConnectCallback callback, |
| mojo::PendingRemote<device::mojom::HidConnection> connection) { |
| if (!connection) { |
| std::move(callback).Run(mojo::NullRemote()); |
| return; |
| } |
| |
| std::move(callback).Run(std::move(connection)); |
| } |
| |
| } // namespace content |