blob: 89b00d9cc797e44d7c5d7057981646001dd936c0 [file] [log] [blame]
// Copyright 2022 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "chrome/browser/device_reauth/mac/device_authenticator_mac.h"
#include "base/functional/bind.h"
#include "base/metrics/histogram_functions.h"
#include "base/notreached.h"
#include "chrome/browser/browser_process.h"
#include "chrome/browser/device_reauth/mac/authenticator_mac.h"
#include "chrome/browser/password_manager/password_manager_util_mac.h"
#include "chrome/grit/chromium_strings.h"
#include "components/device_reauth/device_authenticator.h"
#include "components/password_manager/core/browser/reauth_purpose.h"
#include "components/password_manager/core/common/password_manager_features.h"
#include "components/password_manager/core/common/password_manager_pref_names.h"
#include "components/prefs/pref_service.h"
#include "device/fido/mac/touch_id_context.h"
#include "ui/base/l10n/l10n_util.h"
#if !defined(__has_feature) || !__has_feature(objc_arc)
#error "This file requires ARC support."
#endif
DeviceAuthenticatorMac::DeviceAuthenticatorMac(
std::unique_ptr<AuthenticatorMacInterface> authenticator)
: authenticator_(std::move(authenticator)) {}
DeviceAuthenticatorMac::~DeviceAuthenticatorMac() = default;
// static
scoped_refptr<DeviceAuthenticatorMac> DeviceAuthenticatorMac::CreateForTesting(
std::unique_ptr<AuthenticatorMacInterface> authenticator) {
return base::WrapRefCounted(
new DeviceAuthenticatorMac(std::move(authenticator)));
}
bool DeviceAuthenticatorMac::CanAuthenticateWithBiometrics() {
bool is_available = authenticator_->CheckIfBiometricsAvailable();
base::UmaHistogramBoolean("PasswordManager.CanUseBiometricsMac",
is_available);
if (is_available) {
// If biometrics is available, we should record that at one point in time
// biometrics was available on this device. This will never be set to false
// after setting to true here as we only record this when biometrics is
// available.
g_browser_process->local_state()->SetBoolean(
password_manager::prefs::kHadBiometricsAvailable, /*value=*/true);
}
return is_available;
}
bool DeviceAuthenticatorMac::CanAuthenticateWithBiometricOrScreenLock() {
// We check if we can authenticate strictly with biometrics first as this
// function has important side effects such as logging metrics related to how
// often users have biometrics available, and setting a pref that denotes that
// at one point biometrics was available on this device.
if (CanAuthenticateWithBiometrics()) {
return true;
}
// TODO(crbug.com/4555994): Add metrics logging for the only screen lock
// available case.
return authenticator_->CheckIfBiometricsOrScreenLockAvailable();
}
void DeviceAuthenticatorMac::Authenticate(
device_reauth::DeviceAuthRequester requester,
AuthenticateCallback callback,
bool use_last_valid_auth) {
NOTIMPLEMENTED();
}
void DeviceAuthenticatorMac::Cancel(device_reauth::DeviceAuthRequester) {
touch_id_auth_context_ = nullptr;
if (callback_) {
// No code should be run after the callback as the callback could already be
// destroying "this".
std::move(callback_).Run(/*success=*/false);
}
}
void DeviceAuthenticatorMac::AuthenticateWithMessage(
const std::u16string& message,
AuthenticateCallback callback) {
// Callers must ensure that previous authentication is canceled.
DCHECK(!callback_);
if (!NeedsToAuthenticate()) {
// No code should be run after the callback as the callback could already be
// destroying "this".
std::move(callback).Run(/*success=*/true);
return;
}
callback_ = std::move(callback);
// Always use CanAuthenticateWithBiometrics() before invoking the biometrics
// API, and if it fails use password_manager_util_mac::AuthenticateUser()
// instead, until crbug.com/1358442 is fixed.
if (!CanAuthenticateWithBiometrics() ||
!base::FeatureList::IsEnabled(
password_manager::features::kBiometricAuthenticationInSettings)) {
OnAuthenticationCompleted(authenticator_->AuthenticateUserWithNonBiometrics(
l10n_util::GetStringFUTF16(IDS_PASSWORDS_AUTHENTICATION_PROMPT_PREFIX,
message)));
return;
}
touch_id_auth_context_ = device::fido::mac::TouchIdContext::Create();
touch_id_auth_context_->PromptTouchId(
message,
base::BindOnce(&DeviceAuthenticatorMac::OnAuthenticationCompleted,
weak_ptr_factory_.GetWeakPtr()));
}
void DeviceAuthenticatorMac::OnAuthenticationCompleted(bool success) {
touch_id_auth_context_ = nullptr;
DCHECK_CALLED_ON_VALID_SEQUENCE(sequence_checker_);
if (!callback_) {
return;
}
RecordAuthenticationTimeIfSuccessful(success);
// No code should be run after the callback as the callback could already be
// destroying "this".
std::move(callback_).Run(success);
}