1
    2
    3
    4
    5
    6
    7
    8
    9
   10
   11
   12
   13
   14
   15
   16
   17
   18
   19
   20
   21
   22
   23
   24
   25
   26
   27
   28
   29
   30
   31
   32
   33
   34
   35
   36
   37
   38
   39
   40
   41
   42
   43
   44
   45
   46
   47
   48
   49
   50
   51
   52
   53
   54
   55
   56
   57
   58
   59
   60
   61
   62
   63
   64
   65
   66
   67
   68
   69
   70
   71
   72
   73
   74
   75
   76
   77
   78
   79
   80
   81
   82
   83
   84
   85
   86
   87
   88
   89
   90
   91
   92
   93
   94
   95
   96
   97
   98
   99
  100
  101
  102
  103
  104
  105
  106
  107
  108
  109
  110
  111
  112
  113
  114
  115
  116
  117
  118
  119
  120
  121
  122
  123
  124
  125
  126
  127
  128
  129
  130
  131
  132
  133
  134
  135
  136
  137
  138
  139
  140
  141
  142
  143
  144
  145
  146
  147
  148
  149
  150
  151
  152
  153
  154
  155
  156
  157
  158
  159
  160
  161
  162
  163
  164

content / browser / attribution_reporting / attribution_suitable_context.cc [blame]

// Copyright 2024 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.

#include "content/browser/attribution_reporting/attribution_suitable_context.h"

#include <stdint.h>

#include <optional>
#include <tuple>
#include <utility>

#include "base/check.h"
#include "base/feature_list.h"
#include "base/memory/weak_ptr.h"
#include "components/attribution_reporting/features.h"
#include "components/attribution_reporting/suitable_origin.h"
#include "content/browser/attribution_reporting/attribution_data_host_manager.h"
#include "content/browser/attribution_reporting/attribution_host.h"
#include "content/browser/attribution_reporting/attribution_input_event.h"
#include "content/browser/attribution_reporting/attribution_manager.h"
#include "content/browser/attribution_reporting/attribution_os_level_manager.h"
#include "content/browser/renderer_host/policy_container_host.h"
#include "content/browser/renderer_host/render_frame_host_impl.h"
#include "content/browser/web_contents/web_contents_impl.h"
#include "content/public/browser/global_routing_id.h"
#include "third_party/blink/public/mojom/permissions_policy/permissions_policy_feature.mojom-shared.h"

namespace content {

namespace {

using attribution_reporting::SuitableOrigin;

}  // namespace

// static
std::optional<AttributionSuitableContext> AttributionSuitableContext::Create(
    GlobalRenderFrameHostId initiator_frame_id) {
  return Create(RenderFrameHostImpl::FromID(initiator_frame_id));
}

// static
std::optional<AttributionSuitableContext> AttributionSuitableContext::Create(
    RenderFrameHostImpl* initiator_frame) {
  if (!initiator_frame) {
    return std::nullopt;
  }

  if (!base::FeatureList::IsEnabled(
          attribution_reporting::features::kConversionMeasurement)) {
    return std::nullopt;
  }

  if (!initiator_frame->IsFeatureEnabled(
          blink::mojom::PermissionsPolicyFeature::kAttributionReporting)) {
    return std::nullopt;
  }
  RenderFrameHostImpl* initiator_root_frame =
      initiator_frame->GetOutermostMainFrame();
  CHECK(initiator_root_frame);

  // We need a suitable origin here because we need to be able to eventually
  // store it as either the source or destination origin. Using
  // `is_web_secure_context` only would allow opaque origins to pass through,
  // but they cannot be handled by the storage layer.
  std::optional<attribution_reporting::SuitableOrigin>
      initiator_root_frame_origin = SuitableOrigin::Create(
          initiator_root_frame->GetLastCommittedOrigin());
  if (!initiator_root_frame_origin.has_value()) {
    return std::nullopt;
  }
  // If the `initiator_frame` is a subframe, it's origin's security isn't
  // covered by the SuitableOrigin check above, we therefore validate that it's
  // origin is secure using `is_web_secure_context`.
  if (initiator_frame != initiator_root_frame &&
      !initiator_frame->policy_container_host()
           ->policies()
           .is_web_secure_context) {
    return std::nullopt;
  }

  auto* web_contents = WebContents::FromRenderFrameHost(initiator_frame);
  if (!web_contents) {
    return std::nullopt;
  }
  auto* manager = AttributionManager::FromWebContents(web_contents);
  CHECK(manager);

  auto* attribution_host = AttributionHost::FromWebContents(web_contents);
  CHECK(attribution_host);

  AttributionDataHostManager* data_host_manager = manager->GetDataHostManager();
  CHECK(data_host_manager);

  return AttributionSuitableContext(
      /*context_origin=*/std::move(initiator_root_frame_origin.value()),
      initiator_frame->IsNestedWithinFencedFrame(),
      initiator_root_frame->GetGlobalId(), initiator_frame->navigation_id(),
      attribution_host->GetMostRecentNavigationInputEvent(),
      AttributionOsLevelManager::GetAttributionReportingOsRegistrars(
          web_contents),
      data_host_manager->AsWeakPtr());
}

// static
AttributionSuitableContext AttributionSuitableContext::CreateForTesting(
    attribution_reporting::SuitableOrigin context_origin,
    bool is_nested_within_fenced_frame,
    GlobalRenderFrameHostId root_render_frame_id,
    int64_t last_navigation_id,
    AttributionInputEvent last_input_event,
    ContentBrowserClient::AttributionReportingOsRegistrars os_registrars,
    AttributionDataHostManager* attribution_data_host_manager) {
  return AttributionSuitableContext(
      std::move(context_origin), is_nested_within_fenced_frame,
      root_render_frame_id, last_navigation_id, last_input_event, os_registrars,
      attribution_data_host_manager ? attribution_data_host_manager->AsWeakPtr()
                                    : nullptr);
}

bool AttributionSuitableContext::operator==(
    const AttributionSuitableContext& other) const {
  const auto tie = [](const AttributionSuitableContext& c) {
    // We don't check the `attribution_data_host_manager_` property since we'd
    // consider two contexts equal even if the manager is no longer available.
    return std::make_tuple(c.context_origin(), c.last_input_event(),
                           c.is_nested_within_fenced_frame(),
                           c.last_navigation_id(), c.root_render_frame_id());
  };
  return tie(*this) == tie(other);
}

AttributionSuitableContext::AttributionSuitableContext(
    attribution_reporting::SuitableOrigin context_origin,
    bool is_nested_within_fenced_frame,
    GlobalRenderFrameHostId root_render_frame_id,
    int64_t last_navigation_id,
    AttributionInputEvent last_input_event,
    ContentBrowserClient::AttributionReportingOsRegistrars os_registrars,
    base::WeakPtr<AttributionDataHostManager> attribution_data_host_manager)
    : context_origin_(std::move(context_origin)),
      is_nested_within_fenced_frame_(is_nested_within_fenced_frame),
      root_render_frame_id_(root_render_frame_id),
      last_navigation_id_(last_navigation_id),
      last_input_event_(std::move(last_input_event)),
      os_registrars_(os_registrars),
      attribution_data_host_manager_(attribution_data_host_manager) {}

AttributionSuitableContext::AttributionSuitableContext(
    const AttributionSuitableContext&) = default;

AttributionSuitableContext& AttributionSuitableContext::operator=(
    const AttributionSuitableContext&) = default;

AttributionSuitableContext::AttributionSuitableContext(
    AttributionSuitableContext&&) = default;

AttributionSuitableContext& AttributionSuitableContext::operator=(
    AttributionSuitableContext&&) = default;

AttributionSuitableContext::~AttributionSuitableContext() = default;

}  // namespace content