binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 1 | // Copyright 2014 The Chromium Authors. All rights reserved. |
| 2 | // Use of this source code is governed by a BSD-style license that can be |
| 3 | // found in the LICENSE file. |
| 4 | |
| 5 | #ifndef CHROME_BROWSER_EXTENSIONS_EXTENSION_MANAGEMENT_H_ |
| 6 | #define CHROME_BROWSER_EXTENSIONS_EXTENSION_MANAGEMENT_H_ |
| 7 | |
dcheng | c963c714 | 2016-04-08 03:55:22 | [diff] [blame] | 8 | #include <memory> |
binjin | 685ade8 | 2014-11-06 09:53:56 | [diff] [blame] | 9 | #include <string> |
avi | 3ec9c0d | 2016-12-27 22:38:06 | [diff] [blame] | 10 | #include <unordered_map> |
binjin | e6b58b5 | 2014-10-31 01:55:57 | [diff] [blame] | 11 | #include <vector> |
| 12 | |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 13 | #include "base/macros.h" |
binjin | e6b58b5 | 2014-10-31 01:55:57 | [diff] [blame] | 14 | #include "base/memory/ref_counted.h" |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 15 | #include "base/memory/singleton.h" |
| 16 | #include "base/observer_list.h" |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 17 | #include "base/values.h" |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 18 | #include "components/keyed_service/content/browser_context_keyed_service_factory.h" |
| 19 | #include "components/keyed_service/core/keyed_service.h" |
brettw | b1fc1b8 | 2016-02-02 00:19:08 | [diff] [blame] | 20 | #include "components/prefs/pref_change_registrar.h" |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 21 | #include "extensions/browser/management_policy.h" |
rdevlin.cronin | 0670b56 | 2016-07-02 02:05:43 | [diff] [blame] | 22 | #include "extensions/common/extension_id.h" |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 23 | #include "extensions/common/manifest.h" |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 24 | |
binjin | 311ecdf | 2014-09-12 22:56:52 | [diff] [blame] | 25 | class GURL; |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 26 | class PrefService; |
| 27 | |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 28 | namespace content { |
| 29 | class BrowserContext; |
| 30 | } // namespace content |
| 31 | |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 32 | namespace extensions { |
| 33 | |
binjin | 81d7c55 | 2014-10-02 11:47:12 | [diff] [blame] | 34 | namespace internal { |
| 35 | |
| 36 | struct IndividualSettings; |
| 37 | struct GlobalSettings; |
| 38 | |
| 39 | } // namespace internal |
| 40 | |
binjin | e6b58b5 | 2014-10-31 01:55:57 | [diff] [blame] | 41 | class APIPermissionSet; |
rdevlin.cronin | 0670b56 | 2016-07-02 02:05:43 | [diff] [blame] | 42 | class Extension; |
binjin | e6b58b5 | 2014-10-31 01:55:57 | [diff] [blame] | 43 | class PermissionSet; |
| 44 | |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 45 | // Tracks the management policies that affect extensions and provides interfaces |
| 46 | // for observing and obtaining the global settings for all extensions, as well |
| 47 | // as per-extension settings. |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 48 | class ExtensionManagement : public KeyedService { |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 49 | public: |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 50 | // Observer class for extension management settings changes. |
| 51 | class Observer { |
| 52 | public: |
| 53 | virtual ~Observer() {} |
| 54 | |
binjin | 81d7c55 | 2014-10-02 11:47:12 | [diff] [blame] | 55 | // Called when the extension management settings change. |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 56 | virtual void OnExtensionManagementSettingsChanged() = 0; |
| 57 | }; |
| 58 | |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 59 | // Installation mode for extensions, default is INSTALLATION_ALLOWED. |
| 60 | // * INSTALLATION_ALLOWED: Extension can be installed. |
| 61 | // * INSTALLATION_BLOCKED: Extension cannot be installed. |
| 62 | // * INSTALLATION_FORCED: Extension will be installed automatically |
| 63 | // and cannot be disabled. |
| 64 | // * INSTALLATION_RECOMMENDED: Extension will be installed automatically but |
| 65 | // can be disabled. |
| 66 | enum InstallationMode { |
| 67 | INSTALLATION_ALLOWED = 0, |
| 68 | INSTALLATION_BLOCKED, |
| 69 | INSTALLATION_FORCED, |
| 70 | INSTALLATION_RECOMMENDED, |
| 71 | }; |
| 72 | |
achuith | 4607f07 | 2017-03-08 11:49:13 | [diff] [blame] | 73 | ExtensionManagement(PrefService* pref_service, bool is_signin_profile); |
dcheng | ae36a4a | 2014-10-21 12:36:36 | [diff] [blame] | 74 | ~ExtensionManagement() override; |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 75 | |
binjin | e6b58b5 | 2014-10-31 01:55:57 | [diff] [blame] | 76 | // KeyedService implementations: |
| 77 | void Shutdown() override; |
| 78 | |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 79 | void AddObserver(Observer* observer); |
| 80 | void RemoveObserver(Observer* observer); |
| 81 | |
binjin | e6b58b5 | 2014-10-31 01:55:57 | [diff] [blame] | 82 | // Get the list of ManagementPolicy::Provider controlled by extension |
| 83 | // management policy settings. |
lazyboy | 4aeef20 | 2016-09-07 21:28:59 | [diff] [blame] | 84 | const std::vector<std::unique_ptr<ManagementPolicy::Provider>>& GetProviders() |
| 85 | const; |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 86 | |
| 87 | // Checks if extensions are blacklisted by default, by policy. When true, |
| 88 | // this means that even extensions without an ID should be blacklisted (e.g. |
| 89 | // from the command line, or when loaded as an unpacked extension). |
binjin | 81d7c55 | 2014-10-02 11:47:12 | [diff] [blame] | 90 | bool BlacklistedByDefault() const; |
| 91 | |
| 92 | // Returns installation mode for an extension. |
binjin | 685ade8 | 2014-11-06 09:53:56 | [diff] [blame] | 93 | InstallationMode GetInstallationMode(const Extension* extension) const; |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 94 | |
binjin | 3030106 | 2014-09-08 20:27:34 | [diff] [blame] | 95 | // Returns the force install list, in format specified by |
| 96 | // ExternalPolicyLoader::AddExtension(). |
dcheng | c963c714 | 2016-04-08 03:55:22 | [diff] [blame] | 97 | std::unique_ptr<base::DictionaryValue> GetForceInstallList() const; |
binjin | 3030106 | 2014-09-08 20:27:34 | [diff] [blame] | 98 | |
binjin | cccacef | 2014-10-13 19:00:20 | [diff] [blame] | 99 | // Like GetForceInstallList(), but returns recommended install list instead. |
dcheng | c963c714 | 2016-04-08 03:55:22 | [diff] [blame] | 100 | std::unique_ptr<base::DictionaryValue> GetRecommendedInstallList() const; |
binjin | cccacef | 2014-10-13 19:00:20 | [diff] [blame] | 101 | |
binjin | c641add | 2014-10-15 16:20:45 | [diff] [blame] | 102 | // Returns if an extension with id |id| is explicitly allowed by enterprise |
| 103 | // policy or not. |
| 104 | bool IsInstallationExplicitlyAllowed(const ExtensionId& id) const; |
binjin | 3030106 | 2014-09-08 20:27:34 | [diff] [blame] | 105 | |
binjin | 311ecdf | 2014-09-12 22:56:52 | [diff] [blame] | 106 | // Returns true if an extension download should be allowed to proceed. |
binjin | 81d7c55 | 2014-10-02 11:47:12 | [diff] [blame] | 107 | bool IsOffstoreInstallAllowed(const GURL& url, |
| 108 | const GURL& referrer_url) const; |
binjin | 311ecdf | 2014-09-12 22:56:52 | [diff] [blame] | 109 | |
binjin | 81d7c55 | 2014-10-02 11:47:12 | [diff] [blame] | 110 | // Returns true if an extension with manifest type |manifest_type| is |
| 111 | // allowed to be installed. |
| 112 | bool IsAllowedManifestType(Manifest::Type manifest_type) const; |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 113 | |
binjin | 685ade8 | 2014-11-06 09:53:56 | [diff] [blame] | 114 | // Returns the list of blocked API permissions for |extension|. |
| 115 | APIPermissionSet GetBlockedAPIPermissions(const Extension* extension) const; |
binjin | e6b58b5 | 2014-10-31 01:55:57 | [diff] [blame] | 116 | |
nrpeter | 40e1638 | 2017-04-13 17:34:58 | [diff] [blame] | 117 | // Returns the list of hosts blocked by policy for |extension|. |
| 118 | const URLPatternSet& GetRuntimeBlockedHosts(const Extension* extension) const; |
| 119 | |
nrpeter | e33d2a5b | 2017-04-25 00:12:31 | [diff] [blame] | 120 | // Returns the hosts exempted by policy from the RuntimeBlockedHosts for |
| 121 | // |extension|. |
nrpeter | 40e1638 | 2017-04-13 17:34:58 | [diff] [blame] | 122 | const URLPatternSet& GetRuntimeAllowedHosts(const Extension* extension) const; |
| 123 | |
nrpeter | e33d2a5b | 2017-04-25 00:12:31 | [diff] [blame] | 124 | // Returns the list of hosts blocked by policy for Default scope. This can be |
| 125 | // overridden by an invividual scope which is queried via |
| 126 | // GetRuntimeBlockedHosts. |
| 127 | const URLPatternSet& GetDefaultRuntimeBlockedHosts() const; |
| 128 | |
| 129 | // Returns the hosts exempted by policy from RuntimeBlockedHosts for |
| 130 | // the default scope. This can be overridden by an individual scope which is |
| 131 | // queries via GetRuntimeAllowedHosts. This should only be used to |
| 132 | // initialize a new renderer. |
| 133 | const URLPatternSet& GetDefaultRuntimeAllowedHosts() const; |
| 134 | |
| 135 | // Checks if an |extension| has its own runtime_blocked_hosts or |
| 136 | // runtime_allowed_hosts defined in the individual scope of the |
| 137 | // ExtensionSettings policy. |
| 138 | // Returns false if an individual scoped setting isn't defined. |
| 139 | bool UsesDefaultRuntimeHostRestrictions(const Extension* extension) const; |
| 140 | |
nrpeter | 40e1638 | 2017-04-13 17:34:58 | [diff] [blame] | 141 | // Checks if a URL is on the blocked host permissions list for a specific |
| 142 | // extension. |
nrpeter | e33d2a5b | 2017-04-25 00:12:31 | [diff] [blame] | 143 | bool IsRuntimeBlockedHost(const Extension* extension, const GURL& url) const; |
nrpeter | 40e1638 | 2017-04-13 17:34:58 | [diff] [blame] | 144 | |
binjin | 685ade8 | 2014-11-06 09:53:56 | [diff] [blame] | 145 | // Returns blocked permission set for |extension|. |
dcheng | c963c714 | 2016-04-08 03:55:22 | [diff] [blame] | 146 | std::unique_ptr<const PermissionSet> GetBlockedPermissions( |
binjin | 685ade8 | 2014-11-06 09:53:56 | [diff] [blame] | 147 | const Extension* extension) const; |
binjin | e6b58b5 | 2014-10-31 01:55:57 | [diff] [blame] | 148 | |
nrpeter | 2362e7e | 2017-05-10 17:21:26 | [diff] [blame^] | 149 | // If the extension is blocked from install and a custom error message |
| 150 | // was defined returns it. Otherwise returns an empty string. The maximum |
| 151 | // string length is 1000 characters. |
| 152 | const std::string BlockedInstallMessage(const ExtensionId& id) const; |
| 153 | |
binjin | 685ade8 | 2014-11-06 09:53:56 | [diff] [blame] | 154 | // Returns true if every permission in |perms| is allowed for |extension|. |
| 155 | bool IsPermissionSetAllowed(const Extension* extension, |
rdevlin.cronin | e2d0fd0 | 2015-09-24 22:35:49 | [diff] [blame] | 156 | const PermissionSet& perms) const; |
binjin | e6b58b5 | 2014-10-31 01:55:57 | [diff] [blame] | 157 | |
binjin | 8e3d018 | 2014-12-04 16:44:28 | [diff] [blame] | 158 | // Returns true if |extension| meets the minimum required version set for it. |
| 159 | // If there is no such requirement set for it, returns true as well. |
| 160 | // If false is returned and |required_version| is not null, the minimum |
| 161 | // required version is returned. |
| 162 | bool CheckMinimumVersion(const Extension* extension, |
| 163 | std::string* required_version) const; |
| 164 | |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 165 | private: |
avi | 3ec9c0d | 2016-12-27 22:38:06 | [diff] [blame] | 166 | using SettingsIdMap = |
| 167 | std::unordered_map<ExtensionId, |
| 168 | std::unique_ptr<internal::IndividualSettings>>; |
| 169 | using SettingsUpdateUrlMap = |
| 170 | std::unordered_map<std::string, |
| 171 | std::unique_ptr<internal::IndividualSettings>>; |
binjin | 81d7c55 | 2014-10-02 11:47:12 | [diff] [blame] | 172 | friend class ExtensionManagementServiceTest; |
| 173 | |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 174 | // Load all extension management preferences from |pref_service|, and |
| 175 | // refresh the settings. |
| 176 | void Refresh(); |
| 177 | |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 178 | // Load preference with name |pref_name| and expected type |expected_type|. |
| 179 | // If |force_managed| is true, only loading from the managed preference store |
| 180 | // is allowed. Returns NULL if the preference is not present, not allowed to |
| 181 | // be loaded from or has the wrong type. |
| 182 | const base::Value* LoadPreference(const char* pref_name, |
| 183 | bool force_managed, |
| 184 | base::Value::Type expected_type); |
| 185 | |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 186 | void OnExtensionPrefChanged(); |
| 187 | void NotifyExtensionManagementPrefChanged(); |
| 188 | |
achuith | 4607f07 | 2017-03-08 11:49:13 | [diff] [blame] | 189 | // Helper to return an extension install list, in format specified by |
| 190 | // ExternalPolicyLoader::AddExtension(). |
| 191 | std::unique_ptr<base::DictionaryValue> GetInstallListByMode( |
| 192 | InstallationMode installation_mode) const; |
| 193 | |
| 194 | // Helper to update |extension_dict| for forced installs. |
| 195 | void UpdateForcedExtensions(const base::DictionaryValue* extension_dict); |
| 196 | |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 197 | // Helper function to access |settings_by_id_| with |id| as key. |
| 198 | // Adds a new IndividualSettings entry to |settings_by_id_| if none exists for |
| 199 | // |id| yet. |
binjin | 81d7c55 | 2014-10-02 11:47:12 | [diff] [blame] | 200 | internal::IndividualSettings* AccessById(const ExtensionId& id); |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 201 | |
binjin | 685ade8 | 2014-11-06 09:53:56 | [diff] [blame] | 202 | // Similar to AccessById(), but access |settings_by_update_url_| instead. |
| 203 | internal::IndividualSettings* AccessByUpdateUrl( |
| 204 | const std::string& update_url); |
| 205 | |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 206 | // A map containing all IndividualSettings applied to an individual extension |
| 207 | // identified by extension ID. The extension ID is used as index key of the |
| 208 | // map. |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 209 | SettingsIdMap settings_by_id_; |
| 210 | |
binjin | 685ade8 | 2014-11-06 09:53:56 | [diff] [blame] | 211 | // Similar to |settings_by_id_|, but contains the settings for a group of |
| 212 | // extensions with same update URL. The update url itself is used as index |
| 213 | // key for the map. |
| 214 | SettingsUpdateUrlMap settings_by_update_url_; |
| 215 | |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 216 | // The default IndividualSettings. |
| 217 | // For extension settings applied to an individual extension (identified by |
| 218 | // extension ID) or a group of extension (with specified extension update |
| 219 | // URL), all unspecified part will take value from |default_settings_|. |
| 220 | // For all other extensions, all settings from |default_settings_| will be |
| 221 | // enforced. |
dcheng | c963c714 | 2016-04-08 03:55:22 | [diff] [blame] | 222 | std::unique_ptr<internal::IndividualSettings> default_settings_; |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 223 | |
| 224 | // Extension settings applicable to all extensions. |
dcheng | c963c714 | 2016-04-08 03:55:22 | [diff] [blame] | 225 | std::unique_ptr<internal::GlobalSettings> global_settings_; |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 226 | |
achuith | 4607f07 | 2017-03-08 11:49:13 | [diff] [blame] | 227 | PrefService* pref_service_ = nullptr; |
| 228 | bool is_signin_profile_ = false; |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 229 | |
brettw | d195c95 | 2015-06-02 17:31:12 | [diff] [blame] | 230 | base::ObserverList<Observer, true> observer_list_; |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 231 | PrefChangeRegistrar pref_change_registrar_; |
lazyboy | 4aeef20 | 2016-09-07 21:28:59 | [diff] [blame] | 232 | std::vector<std::unique_ptr<ManagementPolicy::Provider>> providers_; |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 233 | |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 234 | DISALLOW_COPY_AND_ASSIGN(ExtensionManagement); |
| 235 | }; |
| 236 | |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 237 | class ExtensionManagementFactory : public BrowserContextKeyedServiceFactory { |
| 238 | public: |
| 239 | static ExtensionManagement* GetForBrowserContext( |
| 240 | content::BrowserContext* context); |
| 241 | static ExtensionManagementFactory* GetInstance(); |
| 242 | |
| 243 | private: |
olli.raula | 36aa8be | 2015-09-10 11:14:22 | [diff] [blame] | 244 | friend struct base::DefaultSingletonTraits<ExtensionManagementFactory>; |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 245 | |
| 246 | ExtensionManagementFactory(); |
dcheng | ae36a4a | 2014-10-21 12:36:36 | [diff] [blame] | 247 | ~ExtensionManagementFactory() override; |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 248 | |
| 249 | // BrowserContextKeyedServiceExtensionManagementFactory: |
dcheng | ae36a4a | 2014-10-21 12:36:36 | [diff] [blame] | 250 | KeyedService* BuildServiceInstanceFor( |
mostynb | a15bee1 | 2014-10-04 00:40:32 | [diff] [blame] | 251 | content::BrowserContext* context) const override; |
dcheng | ae36a4a | 2014-10-21 12:36:36 | [diff] [blame] | 252 | content::BrowserContext* GetBrowserContextToUse( |
mostynb | a15bee1 | 2014-10-04 00:40:32 | [diff] [blame] | 253 | content::BrowserContext* context) const override; |
dcheng | ae36a4a | 2014-10-21 12:36:36 | [diff] [blame] | 254 | void RegisterProfilePrefs( |
mostynb | a15bee1 | 2014-10-04 00:40:32 | [diff] [blame] | 255 | user_prefs::PrefRegistrySyncable* registry) override; |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 256 | |
| 257 | DISALLOW_COPY_AND_ASSIGN(ExtensionManagementFactory); |
| 258 | }; |
| 259 | |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 260 | } // namespace extensions |
| 261 | |
| 262 | #endif // CHROME_BROWSER_EXTENSIONS_EXTENSION_MANAGEMENT_H_ |