binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 1 | // Copyright 2014 The Chromium Authors. All rights reserved. |
| 2 | // Use of this source code is governed by a BSD-style license that can be |
| 3 | // found in the LICENSE file. |
| 4 | |
| 5 | #ifndef CHROME_BROWSER_EXTENSIONS_EXTENSION_MANAGEMENT_H_ |
| 6 | #define CHROME_BROWSER_EXTENSIONS_EXTENSION_MANAGEMENT_H_ |
| 7 | |
dcheng | c963c714 | 2016-04-08 03:55:22 | [diff] [blame] | 8 | #include <memory> |
binjin | 685ade8 | 2014-11-06 09:53:56 | [diff] [blame] | 9 | #include <string> |
avi | 3ec9c0d | 2016-12-27 22:38:06 | [diff] [blame] | 10 | #include <unordered_map> |
binjin | e6b58b5 | 2014-10-31 01:55:57 | [diff] [blame] | 11 | #include <vector> |
| 12 | |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 13 | #include "base/macros.h" |
binjin | e6b58b5 | 2014-10-31 01:55:57 | [diff] [blame] | 14 | #include "base/memory/ref_counted.h" |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 15 | #include "base/memory/singleton.h" |
| 16 | #include "base/observer_list.h" |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 17 | #include "base/values.h" |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 18 | #include "components/keyed_service/content/browser_context_keyed_service_factory.h" |
| 19 | #include "components/keyed_service/core/keyed_service.h" |
brettw | b1fc1b8 | 2016-02-02 00:19:08 | [diff] [blame] | 20 | #include "components/prefs/pref_change_registrar.h" |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 21 | #include "extensions/browser/management_policy.h" |
rdevlin.cronin | 0670b56 | 2016-07-02 02:05:43 | [diff] [blame] | 22 | #include "extensions/common/extension_id.h" |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 23 | #include "extensions/common/manifest.h" |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 24 | |
binjin | 311ecdf | 2014-09-12 22:56:52 | [diff] [blame] | 25 | class GURL; |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 26 | class PrefService; |
Sergey Poromov | 741e7070 | 2018-10-11 20:11:54 | [diff] [blame] | 27 | class Profile; |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 28 | |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 29 | namespace content { |
| 30 | class BrowserContext; |
| 31 | } // namespace content |
| 32 | |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 33 | namespace extensions { |
| 34 | |
binjin | 81d7c55 | 2014-10-02 11:47:12 | [diff] [blame] | 35 | namespace internal { |
| 36 | |
| 37 | struct IndividualSettings; |
| 38 | struct GlobalSettings; |
| 39 | |
| 40 | } // namespace internal |
| 41 | |
binjin | e6b58b5 | 2014-10-31 01:55:57 | [diff] [blame] | 42 | class APIPermissionSet; |
rdevlin.cronin | 0670b56 | 2016-07-02 02:05:43 | [diff] [blame] | 43 | class Extension; |
binjin | e6b58b5 | 2014-10-31 01:55:57 | [diff] [blame] | 44 | class PermissionSet; |
| 45 | |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 46 | // Tracks the management policies that affect extensions and provides interfaces |
| 47 | // for observing and obtaining the global settings for all extensions, as well |
| 48 | // as per-extension settings. |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 49 | class ExtensionManagement : public KeyedService { |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 50 | public: |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 51 | // Observer class for extension management settings changes. |
| 52 | class Observer { |
| 53 | public: |
| 54 | virtual ~Observer() {} |
| 55 | |
binjin | 81d7c55 | 2014-10-02 11:47:12 | [diff] [blame] | 56 | // Called when the extension management settings change. |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 57 | virtual void OnExtensionManagementSettingsChanged() = 0; |
| 58 | }; |
| 59 | |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 60 | // Installation mode for extensions, default is INSTALLATION_ALLOWED. |
| 61 | // * INSTALLATION_ALLOWED: Extension can be installed. |
| 62 | // * INSTALLATION_BLOCKED: Extension cannot be installed. |
| 63 | // * INSTALLATION_FORCED: Extension will be installed automatically |
| 64 | // and cannot be disabled. |
| 65 | // * INSTALLATION_RECOMMENDED: Extension will be installed automatically but |
| 66 | // can be disabled. |
| 67 | enum InstallationMode { |
| 68 | INSTALLATION_ALLOWED = 0, |
| 69 | INSTALLATION_BLOCKED, |
| 70 | INSTALLATION_FORCED, |
| 71 | INSTALLATION_RECOMMENDED, |
| 72 | }; |
| 73 | |
Sergey Poromov | 741e7070 | 2018-10-11 20:11:54 | [diff] [blame] | 74 | explicit ExtensionManagement(Profile* profile); |
dcheng | ae36a4a | 2014-10-21 12:36:36 | [diff] [blame] | 75 | ~ExtensionManagement() override; |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 76 | |
binjin | e6b58b5 | 2014-10-31 01:55:57 | [diff] [blame] | 77 | // KeyedService implementations: |
| 78 | void Shutdown() override; |
| 79 | |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 80 | void AddObserver(Observer* observer); |
| 81 | void RemoveObserver(Observer* observer); |
| 82 | |
binjin | e6b58b5 | 2014-10-31 01:55:57 | [diff] [blame] | 83 | // Get the list of ManagementPolicy::Provider controlled by extension |
| 84 | // management policy settings. |
lazyboy | 4aeef20 | 2016-09-07 21:28:59 | [diff] [blame] | 85 | const std::vector<std::unique_ptr<ManagementPolicy::Provider>>& GetProviders() |
| 86 | const; |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 87 | |
| 88 | // Checks if extensions are blacklisted by default, by policy. When true, |
| 89 | // this means that even extensions without an ID should be blacklisted (e.g. |
| 90 | // from the command line, or when loaded as an unpacked extension). |
binjin | 81d7c55 | 2014-10-02 11:47:12 | [diff] [blame] | 91 | bool BlacklistedByDefault() const; |
| 92 | |
| 93 | // Returns installation mode for an extension. |
binjin | 685ade8 | 2014-11-06 09:53:56 | [diff] [blame] | 94 | InstallationMode GetInstallationMode(const Extension* extension) const; |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 95 | |
binjin | 3030106 | 2014-09-08 20:27:34 | [diff] [blame] | 96 | // Returns the force install list, in format specified by |
| 97 | // ExternalPolicyLoader::AddExtension(). |
dcheng | c963c714 | 2016-04-08 03:55:22 | [diff] [blame] | 98 | std::unique_ptr<base::DictionaryValue> GetForceInstallList() const; |
binjin | 3030106 | 2014-09-08 20:27:34 | [diff] [blame] | 99 | |
binjin | cccacef | 2014-10-13 19:00:20 | [diff] [blame] | 100 | // Like GetForceInstallList(), but returns recommended install list instead. |
dcheng | c963c714 | 2016-04-08 03:55:22 | [diff] [blame] | 101 | std::unique_ptr<base::DictionaryValue> GetRecommendedInstallList() const; |
binjin | cccacef | 2014-10-13 19:00:20 | [diff] [blame] | 102 | |
Yann Dago | 726278c6 | 2019-03-18 14:59:55 | [diff] [blame^] | 103 | // Returns |true| if there is at least one extension with |
| 104 | // |INSTALLATION_ALLOWED| as installation mode. This excludes force installed |
| 105 | // extensions. |
| 106 | bool HasWhitelistedExtension() const; |
| 107 | |
binjin | c641add | 2014-10-15 16:20:45 | [diff] [blame] | 108 | // Returns if an extension with id |id| is explicitly allowed by enterprise |
| 109 | // policy or not. |
| 110 | bool IsInstallationExplicitlyAllowed(const ExtensionId& id) const; |
binjin | 3030106 | 2014-09-08 20:27:34 | [diff] [blame] | 111 | |
binjin | 311ecdf | 2014-09-12 22:56:52 | [diff] [blame] | 112 | // Returns true if an extension download should be allowed to proceed. |
binjin | 81d7c55 | 2014-10-02 11:47:12 | [diff] [blame] | 113 | bool IsOffstoreInstallAllowed(const GURL& url, |
| 114 | const GURL& referrer_url) const; |
binjin | 311ecdf | 2014-09-12 22:56:52 | [diff] [blame] | 115 | |
Owen Min | a9a13e1 | 2018-11-01 20:43:52 | [diff] [blame] | 116 | // Returns true if an extension with manifest type |manifest_type| and |
| 117 | // id |extension_id| is allowed to be installed. |
| 118 | bool IsAllowedManifestType(Manifest::Type manifest_type, |
| 119 | const std::string& extension_id) const; |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 120 | |
binjin | 685ade8 | 2014-11-06 09:53:56 | [diff] [blame] | 121 | // Returns the list of blocked API permissions for |extension|. |
| 122 | APIPermissionSet GetBlockedAPIPermissions(const Extension* extension) const; |
binjin | e6b58b5 | 2014-10-31 01:55:57 | [diff] [blame] | 123 | |
nrpeter | 40e1638 | 2017-04-13 17:34:58 | [diff] [blame] | 124 | // Returns the list of hosts blocked by policy for |extension|. |
Devlin Cronin | 7e0f41ff | 2018-05-16 17:19:36 | [diff] [blame] | 125 | const URLPatternSet& GetPolicyBlockedHosts(const Extension* extension) const; |
nrpeter | 40e1638 | 2017-04-13 17:34:58 | [diff] [blame] | 126 | |
Devlin Cronin | 7e0f41ff | 2018-05-16 17:19:36 | [diff] [blame] | 127 | // Returns the hosts exempted by policy from the PolicyBlockedHosts for |
nrpeter | e33d2a5b | 2017-04-25 00:12:31 | [diff] [blame] | 128 | // |extension|. |
Devlin Cronin | 7e0f41ff | 2018-05-16 17:19:36 | [diff] [blame] | 129 | const URLPatternSet& GetPolicyAllowedHosts(const Extension* extension) const; |
nrpeter | 40e1638 | 2017-04-13 17:34:58 | [diff] [blame] | 130 | |
nrpeter | e33d2a5b | 2017-04-25 00:12:31 | [diff] [blame] | 131 | // Returns the list of hosts blocked by policy for Default scope. This can be |
Devlin Cronin | 7e0f41ff | 2018-05-16 17:19:36 | [diff] [blame] | 132 | // overridden by an individual scope which is queried via |
| 133 | // GetPolicyBlockedHosts. |
| 134 | const URLPatternSet& GetDefaultPolicyBlockedHosts() const; |
nrpeter | e33d2a5b | 2017-04-25 00:12:31 | [diff] [blame] | 135 | |
Devlin Cronin | 7e0f41ff | 2018-05-16 17:19:36 | [diff] [blame] | 136 | // Returns the hosts exempted by policy from PolicyBlockedHosts for |
nrpeter | e33d2a5b | 2017-04-25 00:12:31 | [diff] [blame] | 137 | // the default scope. This can be overridden by an individual scope which is |
Devlin Cronin | 7e0f41ff | 2018-05-16 17:19:36 | [diff] [blame] | 138 | // queries via GetPolicyAllowedHosts. This should only be used to |
nrpeter | e33d2a5b | 2017-04-25 00:12:31 | [diff] [blame] | 139 | // initialize a new renderer. |
Devlin Cronin | 7e0f41ff | 2018-05-16 17:19:36 | [diff] [blame] | 140 | const URLPatternSet& GetDefaultPolicyAllowedHosts() const; |
nrpeter | e33d2a5b | 2017-04-25 00:12:31 | [diff] [blame] | 141 | |
| 142 | // Checks if an |extension| has its own runtime_blocked_hosts or |
| 143 | // runtime_allowed_hosts defined in the individual scope of the |
| 144 | // ExtensionSettings policy. |
| 145 | // Returns false if an individual scoped setting isn't defined. |
Devlin Cronin | 7e0f41ff | 2018-05-16 17:19:36 | [diff] [blame] | 146 | bool UsesDefaultPolicyHostRestrictions(const Extension* extension) const; |
nrpeter | e33d2a5b | 2017-04-25 00:12:31 | [diff] [blame] | 147 | |
nrpeter | 40e1638 | 2017-04-13 17:34:58 | [diff] [blame] | 148 | // Checks if a URL is on the blocked host permissions list for a specific |
| 149 | // extension. |
Devlin Cronin | 7e0f41ff | 2018-05-16 17:19:36 | [diff] [blame] | 150 | bool IsPolicyBlockedHost(const Extension* extension, const GURL& url) const; |
nrpeter | 40e1638 | 2017-04-13 17:34:58 | [diff] [blame] | 151 | |
binjin | 685ade8 | 2014-11-06 09:53:56 | [diff] [blame] | 152 | // Returns blocked permission set for |extension|. |
dcheng | c963c714 | 2016-04-08 03:55:22 | [diff] [blame] | 153 | std::unique_ptr<const PermissionSet> GetBlockedPermissions( |
binjin | 685ade8 | 2014-11-06 09:53:56 | [diff] [blame] | 154 | const Extension* extension) const; |
binjin | e6b58b5 | 2014-10-31 01:55:57 | [diff] [blame] | 155 | |
nrpeter | 2362e7e | 2017-05-10 17:21:26 | [diff] [blame] | 156 | // If the extension is blocked from install and a custom error message |
| 157 | // was defined returns it. Otherwise returns an empty string. The maximum |
| 158 | // string length is 1000 characters. |
| 159 | const std::string BlockedInstallMessage(const ExtensionId& id) const; |
| 160 | |
binjin | 685ade8 | 2014-11-06 09:53:56 | [diff] [blame] | 161 | // Returns true if every permission in |perms| is allowed for |extension|. |
| 162 | bool IsPermissionSetAllowed(const Extension* extension, |
rdevlin.cronin | e2d0fd0 | 2015-09-24 22:35:49 | [diff] [blame] | 163 | const PermissionSet& perms) const; |
binjin | e6b58b5 | 2014-10-31 01:55:57 | [diff] [blame] | 164 | |
binjin | 8e3d018 | 2014-12-04 16:44:28 | [diff] [blame] | 165 | // Returns true if |extension| meets the minimum required version set for it. |
| 166 | // If there is no such requirement set for it, returns true as well. |
| 167 | // If false is returned and |required_version| is not null, the minimum |
| 168 | // required version is returned. |
| 169 | bool CheckMinimumVersion(const Extension* extension, |
| 170 | std::string* required_version) const; |
| 171 | |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 172 | private: |
avi | 3ec9c0d | 2016-12-27 22:38:06 | [diff] [blame] | 173 | using SettingsIdMap = |
| 174 | std::unordered_map<ExtensionId, |
| 175 | std::unique_ptr<internal::IndividualSettings>>; |
| 176 | using SettingsUpdateUrlMap = |
| 177 | std::unordered_map<std::string, |
| 178 | std::unique_ptr<internal::IndividualSettings>>; |
binjin | 81d7c55 | 2014-10-02 11:47:12 | [diff] [blame] | 179 | friend class ExtensionManagementServiceTest; |
| 180 | |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 181 | // Load all extension management preferences from |pref_service|, and |
| 182 | // refresh the settings. |
| 183 | void Refresh(); |
| 184 | |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 185 | // Load preference with name |pref_name| and expected type |expected_type|. |
| 186 | // If |force_managed| is true, only loading from the managed preference store |
| 187 | // is allowed. Returns NULL if the preference is not present, not allowed to |
| 188 | // be loaded from or has the wrong type. |
| 189 | const base::Value* LoadPreference(const char* pref_name, |
| 190 | bool force_managed, |
Owen Min | a9a13e1 | 2018-11-01 20:43:52 | [diff] [blame] | 191 | base::Value::Type expected_type) const; |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 192 | |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 193 | void OnExtensionPrefChanged(); |
| 194 | void NotifyExtensionManagementPrefChanged(); |
| 195 | |
achuith | 4607f07 | 2017-03-08 11:49:13 | [diff] [blame] | 196 | // Helper to return an extension install list, in format specified by |
| 197 | // ExternalPolicyLoader::AddExtension(). |
| 198 | std::unique_ptr<base::DictionaryValue> GetInstallListByMode( |
| 199 | InstallationMode installation_mode) const; |
| 200 | |
| 201 | // Helper to update |extension_dict| for forced installs. |
| 202 | void UpdateForcedExtensions(const base::DictionaryValue* extension_dict); |
| 203 | |
Owen Min | a9a13e1 | 2018-11-01 20:43:52 | [diff] [blame] | 204 | // Helper to update |settings_by_id_| for forced cloud reporting extension. |
| 205 | void UpdateForcedCloudReportingExtension(); |
| 206 | |
| 207 | // Returns true if cloud reporting policy is enabled. |
| 208 | bool IsCloudReportingPolicyEnabled() const; |
| 209 | |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 210 | // Helper function to access |settings_by_id_| with |id| as key. |
| 211 | // Adds a new IndividualSettings entry to |settings_by_id_| if none exists for |
| 212 | // |id| yet. |
binjin | 81d7c55 | 2014-10-02 11:47:12 | [diff] [blame] | 213 | internal::IndividualSettings* AccessById(const ExtensionId& id); |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 214 | |
binjin | 685ade8 | 2014-11-06 09:53:56 | [diff] [blame] | 215 | // Similar to AccessById(), but access |settings_by_update_url_| instead. |
| 216 | internal::IndividualSettings* AccessByUpdateUrl( |
| 217 | const std::string& update_url); |
| 218 | |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 219 | // A map containing all IndividualSettings applied to an individual extension |
| 220 | // identified by extension ID. The extension ID is used as index key of the |
| 221 | // map. |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 222 | SettingsIdMap settings_by_id_; |
| 223 | |
binjin | 685ade8 | 2014-11-06 09:53:56 | [diff] [blame] | 224 | // Similar to |settings_by_id_|, but contains the settings for a group of |
| 225 | // extensions with same update URL. The update url itself is used as index |
| 226 | // key for the map. |
| 227 | SettingsUpdateUrlMap settings_by_update_url_; |
| 228 | |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 229 | // The default IndividualSettings. |
| 230 | // For extension settings applied to an individual extension (identified by |
| 231 | // extension ID) or a group of extension (with specified extension update |
| 232 | // URL), all unspecified part will take value from |default_settings_|. |
| 233 | // For all other extensions, all settings from |default_settings_| will be |
| 234 | // enforced. |
dcheng | c963c714 | 2016-04-08 03:55:22 | [diff] [blame] | 235 | std::unique_ptr<internal::IndividualSettings> default_settings_; |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 236 | |
| 237 | // Extension settings applicable to all extensions. |
dcheng | c963c714 | 2016-04-08 03:55:22 | [diff] [blame] | 238 | std::unique_ptr<internal::GlobalSettings> global_settings_; |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 239 | |
Sergey Poromov | 741e7070 | 2018-10-11 20:11:54 | [diff] [blame] | 240 | Profile* const profile_ = nullptr; |
achuith | 4607f07 | 2017-03-08 11:49:13 | [diff] [blame] | 241 | PrefService* pref_service_ = nullptr; |
| 242 | bool is_signin_profile_ = false; |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 243 | |
Trent Apted | a250ec3ab | 2018-08-19 08:52:19 | [diff] [blame] | 244 | base::ObserverList<Observer, true>::Unchecked observer_list_; |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 245 | PrefChangeRegistrar pref_change_registrar_; |
lazyboy | 4aeef20 | 2016-09-07 21:28:59 | [diff] [blame] | 246 | std::vector<std::unique_ptr<ManagementPolicy::Provider>> providers_; |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 247 | |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 248 | DISALLOW_COPY_AND_ASSIGN(ExtensionManagement); |
| 249 | }; |
| 250 | |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 251 | class ExtensionManagementFactory : public BrowserContextKeyedServiceFactory { |
| 252 | public: |
| 253 | static ExtensionManagement* GetForBrowserContext( |
| 254 | content::BrowserContext* context); |
| 255 | static ExtensionManagementFactory* GetInstance(); |
| 256 | |
| 257 | private: |
olli.raula | 36aa8be | 2015-09-10 11:14:22 | [diff] [blame] | 258 | friend struct base::DefaultSingletonTraits<ExtensionManagementFactory>; |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 259 | |
| 260 | ExtensionManagementFactory(); |
dcheng | ae36a4a | 2014-10-21 12:36:36 | [diff] [blame] | 261 | ~ExtensionManagementFactory() override; |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 262 | |
| 263 | // BrowserContextKeyedServiceExtensionManagementFactory: |
dcheng | ae36a4a | 2014-10-21 12:36:36 | [diff] [blame] | 264 | KeyedService* BuildServiceInstanceFor( |
mostynb | a15bee1 | 2014-10-04 00:40:32 | [diff] [blame] | 265 | content::BrowserContext* context) const override; |
dcheng | ae36a4a | 2014-10-21 12:36:36 | [diff] [blame] | 266 | content::BrowserContext* GetBrowserContextToUse( |
mostynb | a15bee1 | 2014-10-04 00:40:32 | [diff] [blame] | 267 | content::BrowserContext* context) const override; |
dcheng | ae36a4a | 2014-10-21 12:36:36 | [diff] [blame] | 268 | void RegisterProfilePrefs( |
mostynb | a15bee1 | 2014-10-04 00:40:32 | [diff] [blame] | 269 | user_prefs::PrefRegistrySyncable* registry) override; |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 270 | |
| 271 | DISALLOW_COPY_AND_ASSIGN(ExtensionManagementFactory); |
| 272 | }; |
| 273 | |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 274 | } // namespace extensions |
| 275 | |
| 276 | #endif // CHROME_BROWSER_EXTENSIONS_EXTENSION_MANAGEMENT_H_ |