blob: 99962eb16de8fdbdcf8a5da9582cd1e8fdfb1281 [file] [log] [blame]
[email protected]098fa7a2013-03-08 22:11:171// Copyright (c) 2013 The Chromium Authors. All rights reserved.
[email protected]6014d672008-12-05 00:38:252// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
[email protected]eaa7dd182010-12-14 11:09:005#include "chrome/browser/extensions/extension_service.h"
[email protected]6014d672008-12-05 00:38:256
[email protected]654512b2010-09-01 02:09:427#include <algorithm>
[email protected]695b5712012-12-06 23:55:288#include <iterator>
[email protected]97d2f1d2011-01-15 00:41:089#include <set>
[email protected]654512b2010-09-01 02:09:4210
[email protected]24b538a2010-02-27 01:22:4411#include "base/basictypes.h"
[email protected]05aad2da2011-10-28 10:12:3712#include "base/bind.h"
[email protected]e5af875f2011-10-10 21:09:1413#include "base/callback.h"
[email protected]62433d32011-10-12 22:33:1214#include "base/command_line.h"
[email protected]6014d672008-12-05 00:38:2515#include "base/file_util.h"
[email protected]14908b72011-04-20 06:54:3616#include "base/logging.h"
[email protected]835d7c82010-10-14 04:38:3817#include "base/metrics/histogram.h"
[email protected]3853a4c2013-02-11 17:15:5718#include "base/prefs/pref_service.h"
[email protected]7286e3fc2011-07-19 22:13:2419#include "base/stl_util.h"
[email protected]3ea1b182013-02-08 22:38:4120#include "base/strings/string_number_conversions.h"
[email protected]00e7bef2013-06-10 20:35:1721#include "base/strings/string_util.h"
22#include "base/strings/stringprintf.h"
[email protected]112158af2013-06-07 23:46:1823#include "base/strings/utf_string_conversions.h"
[email protected]7f8f24f2012-11-15 19:40:1424#include "base/threading/sequenced_worker_pool.h"
[email protected]34b99632011-01-01 01:01:0625#include "base/threading/thread_restrictions.h"
[email protected]41a17c52013-06-28 00:27:5326#include "base/time/time.h"
[email protected]aa142702010-03-26 01:26:3327#include "base/version.h"
[email protected]15730c42009-09-03 00:03:2028#include "chrome/browser/browser_process.h"
[email protected]9ea0cd32013-07-12 01:50:3629#include "chrome/browser/chrome_notification_types.h"
[email protected]ad445762013-01-23 00:47:4430#include "chrome/browser/extensions/api/extension_action/extension_action_api.h"
[email protected]d8c8f25f2011-11-02 18:18:0131#include "chrome/browser/extensions/component_loader.h"
[email protected]e0785902011-05-19 23:34:1732#include "chrome/browser/extensions/crx_installer.h"
[email protected]d9ede582012-08-14 19:21:3833#include "chrome/browser/extensions/data_deleter.h"
[email protected]62f051c2012-03-29 17:04:4434#include "chrome/browser/extensions/extension_disabled_ui.h"
[email protected]14a000d2010-04-29 21:44:2435#include "chrome/browser/extensions/extension_error_reporter.h"
[email protected]89226982012-07-16 20:09:1836#include "chrome/browser/extensions/extension_error_ui.h"
[email protected]00b38242012-07-18 18:43:2237#include "chrome/browser/extensions/extension_install_ui.h"
[email protected]19eb80152011-02-26 00:28:4338#include "chrome/browser/extensions/extension_special_storage_policy.h"
[email protected]f8aefb132013-10-30 09:29:5239#include "chrome/browser/extensions/extension_sync_service.h"
[email protected]617342a42013-12-18 23:34:0340#include "chrome/browser/extensions/extension_util.h"
[email protected]612a1cb12012-10-17 13:18:0341#include "chrome/browser/extensions/external_install_ui.h"
[email protected]5df038b2012-07-16 19:03:2742#include "chrome/browser/extensions/external_provider_impl.h"
[email protected]ffd2f79e2013-11-14 00:11:4643#include "chrome/browser/extensions/install_verifier.h"
[email protected]d8c8f25f2011-11-02 18:18:0144#include "chrome/browser/extensions/installed_loader.h"
[email protected]f3d3b382014-03-14 21:19:2845#include "chrome/browser/extensions/pending_extension_manager.h"
[email protected]c333e792012-01-06 16:57:3946#include "chrome/browser/extensions/permissions_updater.h"
[email protected]d8c8f25f2011-11-02 18:18:0147#include "chrome/browser/extensions/unpacked_installer.h"
[email protected]044e86992014-01-24 22:59:1148#include "chrome/browser/extensions/updater/extension_cache.h"
[email protected]42a08162012-03-16 18:09:1149#include "chrome/browser/extensions/updater/extension_updater.h"
[email protected]8ecad5e2010-12-02 21:18:3350#include "chrome/browser/profiles/profile.h"
[email protected]b5a507b22013-11-08 20:41:5751#include "chrome/browser/ui/webui/extensions/extension_icon_source.h"
[email protected]c8d407e2011-04-28 21:27:1752#include "chrome/browser/ui/webui/favicon_source.h"
[email protected]5eddc3e2011-10-26 04:33:3153#include "chrome/browser/ui/webui/ntp/thumbnail_source.h"
[email protected]b07e606e2012-09-15 20:16:1554#include "chrome/browser/ui/webui/theme_source.h"
[email protected]e2eb43112009-05-29 21:19:5455#include "chrome/common/chrome_switches.h"
[email protected]f6431be82013-09-07 02:53:4556#include "chrome/common/crash_keys.h"
[email protected]9f4e4f082013-06-21 07:11:1957#include "chrome/common/extensions/extension_constants.h"
[email protected]7c927b62010-02-24 09:54:1358#include "chrome/common/extensions/extension_file_util.h"
[email protected]15d4d2d2013-08-09 06:49:0359#include "chrome/common/extensions/features/feature_channel.h"
[email protected]561e33d52013-04-03 06:58:4360#include "chrome/common/extensions/manifest_handlers/app_isolation_info.h"
[email protected]65348062013-01-15 07:27:2261#include "chrome/common/extensions/manifest_url_handler.h"
[email protected]25b34332009-06-05 21:53:1962#include "chrome/common/pref_names.h"
[email protected]a57209872009-05-04 22:53:1463#include "chrome/common/url_constants.h"
[email protected]7a83dd072013-09-03 12:09:1764#include "components/startup_metric_utils/startup_metric_utils.h"
[email protected]c38831a12011-10-28 12:44:4965#include "content/public/browser/browser_thread.h"
[email protected]98f66112012-12-25 12:59:3666#include "content/public/browser/devtools_agent_host.h"
[email protected]05aad2da2011-10-28 10:12:3767#include "content/public/browser/notification_service.h"
[email protected]0d6e9bd2011-10-18 04:29:1668#include "content/public/browser/notification_types.h"
[email protected]f3b1a082011-11-18 00:34:3069#include "content/public/browser/render_process_host.h"
[email protected]399583b2012-12-11 09:33:4270#include "content/public/browser/storage_partition.h"
[email protected]24ea7a12013-01-27 23:54:5371#include "content/public/browser/url_data_source.h"
[email protected]74474042013-11-21 12:03:5472#include "extensions/browser/app_sorting.h"
[email protected]34423532013-11-21 18:13:1073#include "extensions/browser/event_router.h"
[email protected]22401dc2014-03-21 01:38:5774#include "extensions/browser/extension_host.h"
[email protected]bb1bc9b32013-12-21 03:09:1475#include "extensions/browser/extension_registry.h"
[email protected]59b0e602014-01-30 00:41:2476#include "extensions/browser/extension_system.h"
[email protected]45928b682013-11-28 08:20:2777#include "extensions/browser/extensions_browser_client.h"
[email protected]301116c62013-11-26 10:37:4578#include "extensions/browser/external_provider_interface.h"
79#include "extensions/browser/management_policy.h"
[email protected]234fc5ff2014-01-16 23:32:2880#include "extensions/browser/pref_names.h"
[email protected]98b6d942013-11-10 00:34:0781#include "extensions/browser/process_manager.h"
[email protected]fafdc842014-01-17 18:09:0882#include "extensions/browser/process_map.h"
[email protected]45f5b7d2014-01-22 23:47:1383#include "extensions/browser/runtime_data.h"
[email protected]a9aa62b312013-11-29 05:35:0684#include "extensions/browser/update_observer.h"
[email protected]836e2982013-05-16 08:07:4285#include "extensions/common/constants.h"
[email protected]e9f541a2012-11-19 21:52:3186#include "extensions/common/error_utils.h"
[email protected]e4452d32013-11-15 23:07:4187#include "extensions/common/extension.h"
[email protected]fb820c02014-03-13 15:07:0888#include "extensions/common/extension_messages.h"
[email protected]c81f5d32013-10-26 10:38:4289#include "extensions/common/extensions_client.h"
[email protected]5ef835a2013-11-08 20:42:5790#include "extensions/common/feature_switch.h"
[email protected]d42c11152013-08-22 19:36:3291#include "extensions/common/manifest.h"
[email protected]0c3c9732013-09-16 08:53:4192#include "extensions/common/manifest_constants.h"
[email protected]558878cc82013-11-09 01:25:5193#include "extensions/common/manifest_handlers/background_info.h"
[email protected]1f7de252013-11-06 22:02:0094#include "extensions/common/manifest_handlers/incognito_info.h"
[email protected]301116c62013-11-26 10:37:4595#include "extensions/common/manifest_handlers/shared_module_info.h"
[email protected]c41003472013-10-19 15:37:2596#include "extensions/common/permissions/permission_message_provider.h"
[email protected]e4452d32013-11-15 23:07:4197#include "extensions/common/permissions/permissions_data.h"
[email protected]65187152012-06-02 13:14:1498#include "grit/generated_resources.h"
[email protected]be28b5f42012-07-20 11:31:2599#include "net/base/registry_controlled_domains/registry_controlled_domain.h"
[email protected]cd67ed52013-10-15 01:22:13100#include "ui/base/webui/web_ui_util.h"
[email protected]a6483d22013-07-03 22:11:00101#include "url/gurl.h"
[email protected]08b1f75f2013-05-22 22:02:38102#include "webkit/browser/database/database_tracker.h"
103#include "webkit/browser/database/database_util.h"
[email protected]79a60642012-10-20 21:03:18104
[email protected]eed367e2011-04-12 03:43:31105#if defined(OS_CHROMEOS)
[email protected]88e8ec9152013-01-17 04:05:18106#include "chrome/browser/chromeos/extensions/install_limiter.h"
[email protected]f19bbf62013-07-09 01:22:32107#include "webkit/browser/fileapi/file_system_backend.h"
[email protected]c6f9203a2013-05-28 02:08:07108#include "webkit/browser/fileapi/file_system_context.h"
[email protected]eed367e2011-04-12 03:43:31109#endif
110
[email protected]55eb70e762012-02-20 17:38:39111using content::BrowserContext;
[email protected]631bb742011-11-02 11:29:39112using content::BrowserThread;
[email protected]98f66112012-12-25 12:59:36113using content::DevToolsAgentHost;
[email protected]bf3d9df2012-07-24 23:20:27114using extensions::CrxInstaller;
[email protected]1c321ee52012-05-21 03:02:34115using extensions::Extension;
116using extensions::ExtensionIdSet;
117using extensions::ExtensionInfo;
[email protected]599539802014-01-07 23:06:00118using extensions::ExtensionRegistry;
[email protected]289c44b2013-12-17 03:26:57119using extensions::ExtensionSet;
[email protected]215a7be2012-10-22 19:53:42120using extensions::FeatureSwitch;
[email protected]ffd2f79e2013-11-14 00:11:46121using extensions::InstallVerifier;
[email protected]0d54b682013-11-05 14:15:36122using extensions::ManagementPolicy;
[email protected]1d5e58b2013-01-31 08:41:40123using extensions::Manifest;
[email protected]c2e66e12012-06-27 06:27:06124using extensions::PermissionMessage;
125using extensions::PermissionMessages;
126using extensions::PermissionSet;
[email protected]9f4e4f082013-06-21 07:11:19127using extensions::SharedModuleInfo;
[email protected]e410b5f2012-12-14 14:02:24128using extensions::UnloadedExtensionInfo;
[email protected]5ef47ec2010-01-28 05:58:05129
[email protected]0c3c9732013-09-16 08:53:41130namespace errors = extensions::manifest_errors;
[email protected]c6d474f82009-12-16 21:11:06131
[email protected]b6ab96d2009-08-20 18:58:19132namespace {
133
[email protected]d96eb512012-11-01 23:44:08134// Histogram values for logging events related to externally installed
135// extensions.
136enum ExternalExtensionEvent {
137 EXTERNAL_EXTENSION_INSTALLED = 0,
138 EXTERNAL_EXTENSION_IGNORED,
139 EXTERNAL_EXTENSION_REENABLED,
140 EXTERNAL_EXTENSION_UNINSTALLED,
141 EXTERNAL_EXTENSION_BUCKET_BOUNDARY,
142};
143
[email protected]612a1cb12012-10-17 13:18:03144// Prompt the user this many times before considering an extension acknowledged.
145static const int kMaxExtensionAcknowledgePromptCount = 3;
146
[email protected]0db124b02012-11-07 04:55:05147// Wait this many seconds after an extensions becomes idle before updating it.
148static const int kUpdateIdleDelay = 5;
149
[email protected]9bd9a6862012-11-29 09:24:22150// Wait this many seconds before trying to garbage collect extensions again.
151static const int kGarbageCollectRetryDelay = 30;
152
[email protected]36fc54f2013-06-14 02:49:34153// Wait this many seconds after startup to see if there are any extensions
154// which can be garbage collected.
155static const int kGarbageCollectStartupDelay = 30;
156
[email protected]9f4e4f082013-06-21 07:11:19157static bool IsSharedModule(const Extension* extension) {
158 return SharedModuleInfo::IsSharedModule(extension);
159}
160
[email protected]4c9201c42013-08-16 04:56:21161static bool IsCWSSharedModule(const Extension* extension) {
162 return extension->from_webstore() && IsSharedModule(extension);
163}
164
165class SharedModuleProvider : public extensions::ManagementPolicy::Provider {
166 public:
167 SharedModuleProvider() {}
168 virtual ~SharedModuleProvider() {}
169
170 virtual std::string GetDebugPolicyProviderName() const OVERRIDE {
171 return "SharedModuleProvider";
172 }
173
174 virtual bool UserMayModifySettings(const Extension* extension,
[email protected]439f1e32013-12-09 20:09:09175 base::string16* error) const OVERRIDE {
[email protected]4c9201c42013-08-16 04:56:21176 return !IsCWSSharedModule(extension);
177 }
178
179 virtual bool MustRemainEnabled(const Extension* extension,
[email protected]439f1e32013-12-09 20:09:09180 base::string16* error) const OVERRIDE {
[email protected]4c9201c42013-08-16 04:56:21181 return IsCWSSharedModule(extension);
182 }
183
184 private:
185 DISALLOW_COPY_AND_ASSIGN(SharedModuleProvider);
186};
187
[email protected]c6d474f82009-12-16 21:11:06188} // namespace
[email protected]b6ab96d2009-08-20 18:58:19189
[email protected]eaa7dd182010-12-14 11:09:00190// ExtensionService.
[email protected]6014d672008-12-05 00:38:25191
[email protected]8e4560b62011-01-14 10:09:14192void ExtensionService::CheckExternalUninstall(const std::string& id) {
[email protected]a29a517a2011-01-21 21:11:12193 CHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
[email protected]a8af9fdb2010-10-28 21:52:20194
[email protected]7a4c6852010-09-16 03:44:22195 // Check if the providers know about this extension.
[email protected]5df038b2012-07-16 19:03:27196 extensions::ProviderCollection::const_iterator i;
[email protected]0a60a2e2010-10-25 16:15:21197 for (i = external_extension_providers_.begin();
198 i != external_extension_providers_.end(); ++i) {
[email protected]8e4560b62011-01-14 10:09:14199 DCHECK(i->get()->IsReady());
[email protected]0a60a2e2010-10-25 16:15:21200 if (i->get()->HasExtension(id))
201 return; // Yup, known extension, don't uninstall.
[email protected]7a4c6852010-09-16 03:44:22202 }
203
[email protected]0f48fca2011-05-19 18:46:35204 // We get the list of external extensions to check from preferences.
205 // It is possible that an extension has preferences but is not loaded.
206 // For example, an extension that requires experimental permissions
207 // will not be loaded if the experimental command line flag is not used.
208 // In this case, do not uninstall.
[email protected]31bb5ee62012-09-12 22:58:40209 if (!GetInstalledExtension(id)) {
[email protected]0f48fca2011-05-19 18:46:35210 // We can't call UninstallExtension with an unloaded/invalid
211 // extension ID.
212 LOG(WARNING) << "Attempted uninstallation of unloaded/invalid extension "
213 << "with id: " << id;
214 return;
215 }
[email protected]d6ebc9792011-04-07 18:18:33216 UninstallExtension(id, true, NULL);
[email protected]7a4c6852010-09-16 03:44:22217}
218
[email protected]7f8f24f2012-11-15 19:40:14219void ExtensionService::SetFileTaskRunnerForTesting(
220 base::SequencedTaskRunner* task_runner) {
221 file_task_runner_ = task_runner;
222}
223
[email protected]8e4560b62011-01-14 10:09:14224void ExtensionService::ClearProvidersForTesting() {
[email protected]7a4c6852010-09-16 03:44:22225 external_extension_providers_.clear();
226}
227
[email protected]8e4560b62011-01-14 10:09:14228void ExtensionService::AddProviderForTesting(
[email protected]5df038b2012-07-16 19:03:27229 extensions::ExternalProviderInterface* test_provider) {
[email protected]a29a517a2011-01-21 21:11:12230 CHECK(test_provider);
[email protected]0a60a2e2010-10-25 16:15:21231 external_extension_providers_.push_back(
[email protected]5df038b2012-07-16 19:03:27232 linked_ptr<extensions::ExternalProviderInterface>(test_provider));
[email protected]7a4c6852010-09-16 03:44:22233}
234
[email protected]9060d8b02012-01-13 02:14:30235bool ExtensionService::OnExternalExtensionUpdateUrlFound(
[email protected]7a4c6852010-09-16 03:44:22236 const std::string& id,
[email protected]d8fd0fd2014-03-24 13:16:06237 const std::string& install_parameter,
[email protected]21a5a672010-11-04 10:47:42238 const GURL& update_url,
[email protected]464213a2013-10-15 01:06:48239 Manifest::Location location,
240 int creation_flags,
241 bool mark_acknowledged) {
[email protected]ab22ba42011-01-14 16:36:38242 CHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
243 CHECK(Extension::IdIsValid(id));
[email protected]a8af9fdb2010-10-28 21:52:20244
[email protected]044e86992014-01-24 22:59:11245 if (Manifest::IsExternalLocation(location)) {
246 // All extensions that are not user specific can be cached.
247 extensions::ExtensionCache::GetInstance()->AllowCaching(id);
248 }
249
[email protected]8a87a5332011-08-11 17:54:59250 const Extension* extension = GetExtensionById(id, true);
251 if (extension) {
252 // Already installed. Skip this install if the current location has
253 // higher priority than |location|.
[email protected]1d5e58b2013-01-31 08:41:40254 Manifest::Location current = extension->location();
255 if (current == Manifest::GetHigherPriorityLocation(current, location))
[email protected]9060d8b02012-01-13 02:14:30256 return false;
[email protected]8a87a5332011-08-11 17:54:59257 // Otherwise, overwrite the current installation.
[email protected]7a4c6852010-09-16 03:44:22258 }
[email protected]9060d8b02012-01-13 02:14:30259
260 // Add |id| to the set of pending extensions. If it can not be added,
261 // then there is already a pending record from a higher-priority install
262 // source. In this case, signal that this extension will not be
263 // installed by returning false.
264 if (!pending_extension_manager()->AddFromExternalUpdateUrl(
[email protected]d8fd0fd2014-03-24 13:16:06265 id,
266 install_parameter,
267 update_url,
268 location,
269 creation_flags,
270 mark_acknowledged)) {
[email protected]9060d8b02012-01-13 02:14:30271 return false;
[email protected]31bb5ee62012-09-12 22:58:40272 }
[email protected]9060d8b02012-01-13 02:14:30273
[email protected]94fde232012-04-27 10:22:30274 update_once_all_providers_are_ready_ = true;
[email protected]9060d8b02012-01-13 02:14:30275 return true;
[email protected]7a4c6852010-09-16 03:44:22276}
277
[email protected]400c4392013-12-13 14:41:58278const Extension* ExtensionService::GetInstalledExtensionByUrl(
279 const GURL& url) const {
[email protected]bb1bc9b32013-12-21 03:09:14280 return registry_->enabled_extensions().GetExtensionOrAppByURL(url);
[email protected]400c4392013-12-13 14:41:58281}
282
[email protected]dc9a74f72012-08-17 18:07:21283const Extension* ExtensionService::GetInstalledApp(const GURL& url) const {
[email protected]400c4392013-12-13 14:41:58284 const Extension* extension = GetInstalledExtensionByUrl(url);
[email protected]dc9a74f72012-08-17 18:07:21285 return (extension && extension->is_app()) ? extension : NULL;
[email protected]d9696672011-03-15 22:45:09286}
287
[email protected]dc9a74f72012-08-17 18:07:21288bool ExtensionService::IsInstalledApp(const GURL& url) const {
[email protected]d9696672011-03-15 22:45:09289 return !!GetInstalledApp(url);
[email protected]ffb204f22010-12-05 23:20:27290}
291
[email protected]6aeac8342010-10-01 20:21:18292// static
[email protected]d6ebc9792011-04-07 18:18:33293// This function is used to implement the command-line switch
[email protected]3bdba0d2011-08-23 07:17:30294// --uninstall-extension, and to uninstall an extension via sync. The LOG
295// statements within this function are used to inform the user if the uninstall
296// cannot be done.
[email protected]eaa7dd182010-12-14 11:09:00297bool ExtensionService::UninstallExtensionHelper(
298 ExtensionService* extensions_service,
[email protected]6aeac8342010-10-01 20:21:18299 const std::string& extension_id) {
[email protected]d6ebc9792011-04-07 18:18:33300 // We can't call UninstallExtension with an invalid extension ID.
[email protected]31bb5ee62012-09-12 22:58:40301 if (!extensions_service->GetInstalledExtension(extension_id)) {
[email protected]6aeac8342010-10-01 20:21:18302 LOG(WARNING) << "Attempted uninstallation of non-existent extension with "
[email protected]95da88c42011-03-31 10:07:33303 << "id: " << extension_id;
304 return false;
[email protected]6aeac8342010-10-01 20:21:18305 }
306
[email protected]d6ebc9792011-04-07 18:18:33307 // The following call to UninstallExtension will not allow an uninstall of a
308 // policy-controlled extension.
[email protected]439f1e32013-12-09 20:09:09309 base::string16 error;
[email protected]d6ebc9792011-04-07 18:18:33310 if (!extensions_service->UninstallExtension(extension_id, false, &error)) {
311 LOG(WARNING) << "Cannot uninstall extension with id " << extension_id
312 << ": " << error;
313 return false;
314 }
[email protected]95da88c42011-03-31 10:07:33315
[email protected]6aeac8342010-10-01 20:21:18316 return true;
317}
318
[email protected]eaa7dd182010-12-14 11:09:00319ExtensionService::ExtensionService(Profile* profile,
[email protected]f0841cd2011-01-19 15:07:24320 const CommandLine* command_line,
[email protected]650b2d52013-02-10 03:41:45321 const base::FilePath& install_directory,
[email protected]45759612012-07-10 17:21:23322 extensions::ExtensionPrefs* extension_prefs,
[email protected]fdd679b2012-11-15 20:49:39323 extensions::Blacklist* blacklist,
[email protected]0436b102011-04-15 18:30:03324 bool autoupdate_enabled,
[email protected]4a10006a2013-05-17 23:18:35325 bool extensions_enabled,
326 extensions::OneShotEvent* ready)
[email protected]fdd679b2012-11-15 20:49:39327 : extensions::Blacklist::Observer(blacklist),
328 profile_(profile),
[email protected]bd306722012-07-11 20:43:59329 system_(extensions::ExtensionSystem::Get(profile)),
[email protected]73c47932010-12-06 18:13:43330 extension_prefs_(extension_prefs),
[email protected]695b5712012-12-06 23:55:28331 blacklist_(blacklist),
[email protected]f8aefb132013-10-30 09:29:52332 extension_sync_service_(NULL),
[email protected]5fdfa562013-12-27 17:43:59333 registry_(extensions::ExtensionRegistry::Get(profile)),
[email protected]46f3e102014-03-25 01:22:45334 pending_extension_manager_(*this, profile),
[email protected]a9b00ac2009-06-25 21:03:23335 install_directory_(install_directory),
[email protected]0436b102011-04-15 18:30:03336 extensions_enabled_(extensions_enabled),
[email protected]e81dba32009-06-19 20:19:13337 show_extensions_prompts_(true),
[email protected]fc332ae2012-11-14 20:17:33338 install_updates_when_idle_(true),
[email protected]4a10006a2013-05-17 23:18:35339 ready_(ready),
[email protected]dff1e042012-04-27 10:59:18340 update_once_all_providers_are_ready_(false),
[email protected]3c4abc82012-10-22 22:25:54341 browser_terminating_(false),
[email protected]9f4e4f082013-06-21 07:11:19342 installs_delayed_for_gc_(false),
[email protected]f8aefb132013-10-30 09:29:52343 is_first_run_(false) {
[email protected]c04fd3dd2013-09-05 08:20:10344#if defined(OS_CHROMEOS)
345 disable_garbage_collection_ = false;
346#endif
[email protected]a29a517a2011-01-21 21:11:12347 CHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
[email protected]a8af9fdb2010-10-28 21:52:20348
[email protected]36a784c2009-06-23 06:21:08349 // Figure out if extension installation should be enabled.
[email protected]367d9b172013-12-03 00:31:02350 if (extensions::ExtensionsBrowserClient::Get()->AreExtensionsDisabled(
351 *command_line, profile))
[email protected]6d60703b2009-08-29 01:29:23352 extensions_enabled_ = false;
[email protected]36a784c2009-06-23 06:21:08353
[email protected]3c4abc82012-10-22 22:25:54354 registrar_.Add(this, chrome::NOTIFICATION_APP_TERMINATING,
355 content::NotificationService::AllBrowserContextsAndSources());
[email protected]432115822011-07-10 15:52:27356 registrar_.Add(this, chrome::NOTIFICATION_EXTENSION_PROCESS_TERMINATED,
[email protected]ad50def52011-10-19 23:17:07357 content::NotificationService::AllBrowserContextsAndSources());
[email protected]432115822011-07-10 15:52:27358 registrar_.Add(this, content::NOTIFICATION_RENDERER_PROCESS_TERMINATED,
[email protected]ad50def52011-10-19 23:17:07359 content::NotificationService::AllBrowserContextsAndSources());
[email protected]92dd8d92013-02-26 00:41:08360 registrar_.Add(this, chrome::NOTIFICATION_UPGRADE_RECOMMENDED,
361 content::NotificationService::AllBrowserContextsAndSources());
[email protected]2fb7dc982010-09-29 12:24:28362 pref_change_registrar_.Init(profile->GetPrefs());
[email protected]90bb38d2012-11-14 18:36:03363 base::Closure callback =
364 base::Bind(&ExtensionService::OnExtensionInstallPrefChanged,
365 base::Unretained(this));
[email protected]234fc5ff2014-01-16 23:32:28366 pref_change_registrar_.Add(extensions::pref_names::kInstallAllowList,
367 callback);
368 pref_change_registrar_.Add(extensions::pref_names::kInstallDenyList,
369 callback);
370 pref_change_registrar_.Add(extensions::pref_names::kAllowedTypes, callback);
[email protected]4814b512009-11-07 00:12:29371
[email protected]93fd78f42009-07-10 16:43:17372 // Set up the ExtensionUpdater
373 if (autoupdate_enabled) {
[email protected]501105b2013-09-26 05:42:02374 int update_frequency = extensions::kDefaultUpdateFrequencySeconds;
[email protected]93fd78f42009-07-10 16:43:17375 if (command_line->HasSwitch(switches::kExtensionsUpdateFrequency)) {
[email protected]e83326f2010-07-31 17:29:25376 base::StringToInt(command_line->GetSwitchValueASCII(
377 switches::kExtensionsUpdateFrequency),
378 &update_frequency);
[email protected]93fd78f42009-07-10 16:43:17379 }
[email protected]044e86992014-01-24 22:59:11380 updater_.reset(new extensions::ExtensionUpdater(
381 this,
382 extension_prefs,
383 profile->GetPrefs(),
384 profile,
385 update_frequency,
386 extensions::ExtensionCache::GetInstance()));
[email protected]93fd78f42009-07-10 16:43:17387 }
388
[email protected]25ae0152011-11-18 14:40:02389 component_loader_.reset(
390 new extensions::ComponentLoader(this,
391 profile->GetPrefs(),
[email protected]55e16cd2013-12-18 04:36:08392 g_browser_process->local_state(),
393 profile));
[email protected]8e4560b62011-01-14 10:09:14394
[email protected]0436b102011-04-15 18:30:03395 if (extensions_enabled_) {
[email protected]ae4c37e2012-12-21 01:16:25396 extensions::ExternalProviderImpl::CreateExternalProviders(
397 this, profile_, &external_extension_providers_);
[email protected]873531342011-03-09 12:16:05398 }
[email protected]b671760b2010-07-15 21:13:47399
[email protected]74474042013-11-21 12:03:54400 // Set this as the ExtensionService for app sorting to ensure it causes syncs
401 // if required.
[email protected]b3aa7182013-04-25 04:45:23402 is_first_run_ = !extension_prefs_->SetAlertSystemFirstRun();
403
[email protected]9ce11d22012-08-08 23:20:13404#if defined(ENABLE_EXTENSIONS)
[email protected]c77f2352012-08-08 22:07:58405 extension_action_storage_manager_.reset(
406 new extensions::ExtensionActionStorageManager(profile_));
[email protected]9ce11d22012-08-08 23:20:13407#endif
[email protected]c77f2352012-08-08 22:07:58408
[email protected]4c9201c42013-08-16 04:56:21409 shared_module_policy_provider_.reset(new SharedModuleProvider);
410
[email protected]cb0e50312011-05-09 15:03:07411 // How long is the path to the Extensions directory?
412 UMA_HISTOGRAM_CUSTOM_COUNTS("Extensions.ExtensionRootPathLength",
413 install_directory_.value().length(), 0, 500, 100);
[email protected]6014d672008-12-05 00:38:25414}
415
[email protected]84df8332011-12-06 18:22:46416const ExtensionSet* ExtensionService::extensions() const {
[email protected]bb1bc9b32013-12-21 03:09:14417 return &registry_->enabled_extensions();
[email protected]ddb1e5a2010-12-13 20:10:45418}
419
[email protected]9e9c1d12013-07-31 01:58:12420const ExtensionSet* ExtensionService::delayed_installs() const {
421 return &delayed_installs_;
422}
423
[email protected]3f213ad2012-07-26 23:39:41424extensions::PendingExtensionManager*
425 ExtensionService::pending_extension_manager() {
[email protected]b2907fd2011-03-25 16:43:37426 return &pending_extension_manager_;
[email protected]ddb1e5a2010-12-13 20:10:45427}
428
[email protected]eaa7dd182010-12-14 11:09:00429ExtensionService::~ExtensionService() {
[email protected]c8d407e2011-04-28 21:27:17430 // No need to unload extensions here because they are profile-scoped, and the
431 // profile is in the process of being deleted.
[email protected]94b4ffc2011-02-04 05:55:17432
[email protected]5df038b2012-07-16 19:03:27433 extensions::ProviderCollection::const_iterator i;
[email protected]8e4560b62011-01-14 10:09:14434 for (i = external_extension_providers_.begin();
435 i != external_extension_providers_.end(); ++i) {
[email protected]5df038b2012-07-16 19:03:27436 extensions::ExternalProviderInterface* provider = i->get();
[email protected]8e4560b62011-01-14 10:09:14437 provider->ServiceShutdown();
438 }
[email protected]6014d672008-12-05 00:38:25439}
440
[email protected]037228a2012-10-05 01:36:16441void ExtensionService::Shutdown() {
[email protected]4c9201c42013-08-16 04:56:21442 system_->management_policy()->UnregisterProvider(
443 shared_module_policy_provider_.get());
[email protected]037228a2012-10-05 01:36:16444}
445
[email protected]b2907fd2011-03-25 16:43:37446const Extension* ExtensionService::GetExtensionById(
447 const std::string& id, bool include_disabled) const {
[email protected]599539802014-01-07 23:06:00448 int include_mask = ExtensionRegistry::ENABLED;
[email protected]695b5712012-12-06 23:55:28449 if (include_disabled) {
450 // Include blacklisted extensions here because there are hundreds of
451 // callers of this function, and many might assume that this includes those
452 // that have been disabled due to blacklisting.
[email protected]599539802014-01-07 23:06:00453 include_mask |= ExtensionRegistry::DISABLED |
454 ExtensionRegistry::BLACKLISTED;
[email protected]695b5712012-12-06 23:55:28455 }
[email protected]599539802014-01-07 23:06:00456 return registry_->GetExtensionById(id, include_mask);
[email protected]695b5712012-12-06 23:55:28457}
458
[email protected]eaa7dd182010-12-14 11:09:00459void ExtensionService::Init() {
[email protected]a29a517a2011-01-21 21:11:12460 CHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
[email protected]a8af9fdb2010-10-28 21:52:20461
[email protected]3350d712013-11-18 09:32:24462 base::Time begin_time = base::Time::Now();
463
[email protected]4a10006a2013-05-17 23:18:35464 DCHECK(!is_ready()); // Can't redo init.
[email protected]bb1bc9b32013-12-21 03:09:14465 DCHECK_EQ(registry_->enabled_extensions().size(), 0u);
[email protected]9f1087e2009-06-15 17:29:32466
[email protected]820d9bd2013-04-03 03:46:03467 const CommandLine* cmd_line = CommandLine::ForCurrentProcess();
[email protected]820d9bd2013-04-03 03:46:03468 if (cmd_line->HasSwitch(switches::kInstallFromWebstore) ||
469 cmd_line->HasSwitch(switches::kLimitedInstallFromWebstore)) {
470 // The sole purpose of this launch is to install a new extension from CWS
471 // and immediately terminate: loading already installed extensions is
472 // unnecessary and may interfere with the inline install dialog (e.g. if an
473 // extension listens to onStartup and opens a window).
474 SetReadyAndNotifyListeners();
[email protected]ae4c37e2012-12-21 01:16:25475 } else {
[email protected]47b60072013-06-20 10:35:56476 // LoadAllExtensions() calls OnLoadedInstalledExtensions().
477 component_loader_->LoadAll();
478 extensions::InstalledLoader(this).LoadAllExtensions();
[email protected]9f4e4f082013-06-21 07:11:19479
[email protected]59ee99d2013-10-11 15:46:16480 ReconcileKnownDisabled();
481
[email protected]2edd57852013-08-14 22:07:40482 // Attempt to re-enable extensions whose only disable reason is reloading.
483 std::vector<std::string> extensions_to_enable;
[email protected]bb1bc9b32013-12-21 03:09:14484 const ExtensionSet& disabled_extensions = registry_->disabled_extensions();
485 for (ExtensionSet::const_iterator iter = disabled_extensions.begin();
486 iter != disabled_extensions.end(); ++iter) {
[email protected]2edd57852013-08-14 22:07:40487 const Extension* e = iter->get();
488 if (extension_prefs_->GetDisableReasons(e->id()) ==
489 Extension::DISABLE_RELOAD) {
490 extensions_to_enable.push_back(e->id());
491 }
492 }
493 for (std::vector<std::string>::iterator it = extensions_to_enable.begin();
494 it != extensions_to_enable.end(); ++it) {
495 EnableExtension(*it);
496 }
497
[email protected]9f4e4f082013-06-21 07:11:19498 // Finish install (if possible) of extensions that were still delayed while
499 // the browser was shut down.
500 scoped_ptr<extensions::ExtensionPrefs::ExtensionsInfo> delayed_info(
501 extension_prefs_->GetAllDelayedInstallInfo());
502 for (size_t i = 0; i < delayed_info->size(); ++i) {
503 ExtensionInfo* info = delayed_info->at(i).get();
504 scoped_refptr<const Extension> extension(NULL);
505 if (info->extension_manifest) {
506 std::string error;
507 extension = Extension::Create(
508 info->extension_path,
509 info->extension_location,
510 *info->extension_manifest,
511 extension_prefs_->GetDelayedInstallCreationFlags(
512 info->extension_id),
513 info->extension_id,
514 &error);
515 if (extension.get())
516 delayed_installs_.Insert(extension);
517 }
518 }
519 MaybeFinishDelayedInstallations();
520
521 scoped_ptr<extensions::ExtensionPrefs::ExtensionsInfo> delayed_info2(
522 extension_prefs_->GetAllDelayedInstallInfo());
523 UMA_HISTOGRAM_COUNTS_100("Extensions.UpdateOnLoad",
524 delayed_info2->size() - delayed_info->size());
525
[email protected]47b60072013-06-20 10:35:56526 SetReadyAndNotifyListeners();
[email protected]ae4c37e2012-12-21 01:16:25527
[email protected]47b60072013-06-20 10:35:56528 // TODO(erikkay) this should probably be deferred to a future point
529 // rather than running immediately at startup.
530 CheckForExternalUpdates();
[email protected]894bb502009-05-21 22:39:57531
[email protected]47b60072013-06-20 10:35:56532 base::MessageLoop::current()->PostDelayedTask(
533 FROM_HERE,
534 base::Bind(&ExtensionService::GarbageCollectExtensions, AsWeakPtr()),
535 base::TimeDelta::FromSeconds(kGarbageCollectStartupDelay));
[email protected]215a7be2012-10-22 19:53:42536
[email protected]820d9bd2013-04-03 03:46:03537 if (extension_prefs_->NeedsStorageGarbageCollection()) {
538 GarbageCollectIsolatedStorage();
539 extension_prefs_->SetNeedsStorageGarbageCollection(false);
540 }
[email protected]4c9201c42013-08-16 04:56:21541 system_->management_policy()->RegisterProvider(
542 shared_module_policy_provider_.get());
[email protected]2d19eb6e2014-01-27 17:30:00543
544 LoadGreylistFromPrefs();
[email protected]399583b2012-12-11 09:33:42545 }
[email protected]3350d712013-11-18 09:32:24546
547 UMA_HISTOGRAM_TIMES("Extensions.ExtensionServiceInitTime",
548 base::Time::Now() - begin_time);
[email protected]6014d672008-12-05 00:38:25549}
550
[email protected]2d19eb6e2014-01-27 17:30:00551void ExtensionService::LoadGreylistFromPrefs() {
[email protected]f47f7172014-03-19 19:27:10552 scoped_ptr<ExtensionSet> all_extensions =
553 registry_->GenerateInstalledExtensionsSet();
[email protected]2d19eb6e2014-01-27 17:30:00554
555 for (ExtensionSet::const_iterator it = all_extensions->begin();
556 it != all_extensions->end(); ++it) {
557 extensions::BlacklistState state =
558 extension_prefs_->GetExtensionBlacklistState((*it)->id());
559 if (state == extensions::BLACKLISTED_SECURITY_VULNERABILITY ||
560 state == extensions::BLACKLISTED_POTENTIALLY_UNWANTED ||
561 state == extensions::BLACKLISTED_CWS_POLICY_VIOLATION)
562 greylist_.Insert(*it);
563 }
564}
565
[email protected]31bb5ee62012-09-12 22:58:40566bool ExtensionService::UpdateExtension(const std::string& id,
[email protected]650b2d52013-02-10 03:41:45567 const base::FilePath& extension_path,
[email protected]044e86992014-01-24 22:59:11568 bool file_ownership_passed,
[email protected]31bb5ee62012-09-12 22:58:40569 const GURL& download_url,
570 CrxInstaller** out_crx_installer) {
[email protected]a29a517a2011-01-21 21:11:12571 CHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
[email protected]3c4abc82012-10-22 22:25:54572 if (browser_terminating_) {
573 LOG(WARNING) << "Skipping UpdateExtension due to browser shutdown";
574 // Leak the temp file at extension_path. We don't want to add to the disk
575 // I/O burden at shutdown, we can't rely on the I/O completing anyway, and
576 // the file is in the OS temp directory which should be cleaned up for us.
577 return false;
578 }
[email protected]a8af9fdb2010-10-28 21:52:20579
[email protected]3f213ad2012-07-26 23:39:41580 const extensions::PendingExtensionInfo* pending_extension_info =
[email protected]51a3bf8b2012-06-08 22:53:06581 pending_extension_manager()->GetById(id);
[email protected]8ef78fd2010-08-19 17:14:32582
[email protected]695b5712012-12-06 23:55:28583 const Extension* extension = GetInstalledExtension(id);
[email protected]51a3bf8b2012-06-08 22:53:06584 if (!pending_extension_info && !extension) {
[email protected]aa142702010-03-26 01:26:33585 LOG(WARNING) << "Will not update extension " << id
586 << " because it is not installed or pending";
587 // Delete extension_path since we're not creating a CrxInstaller
588 // that would do it for us.
[email protected]7f8f24f2012-11-15 19:40:14589 if (!GetFileTaskRunner()->PostTask(
590 FROM_HERE,
[email protected]53612e82011-10-18 18:00:36591 base::Bind(
[email protected]7296f2762011-11-21 19:23:44592 &extension_file_util::DeleteFile, extension_path, false)))
[email protected]14908b72011-04-20 06:54:36593 NOTREACHED();
[email protected]420a0ec2011-06-01 01:07:03594
595 return false;
[email protected]e957fe52009-06-23 16:51:05596 }
597
[email protected]aa142702010-03-26 01:26:33598 // We want a silent install only for non-pending extensions and
599 // pending extensions that have install_silently set.
[email protected]f8636f92013-08-09 21:02:37600 scoped_ptr<ExtensionInstallPrompt> client;
[email protected]91e51d612012-10-21 23:03:05601 if (pending_extension_info && !pending_extension_info->install_silently())
[email protected]f8636f92013-08-09 21:02:37602 client.reset(ExtensionInstallUI::CreateInstallPromptWithProfile(profile_));
[email protected]aa142702010-03-26 01:26:33603
[email protected]f8636f92013-08-09 21:02:37604 scoped_refptr<CrxInstaller> installer(
605 CrxInstaller::Create(this, client.Pass()));
[email protected]6dfbbf82010-03-12 23:09:16606 installer->set_expected_id(id);
[email protected]464213a2013-10-15 01:06:48607 int creation_flags = Extension::NO_FLAGS;
[email protected]51a3bf8b2012-06-08 22:53:06608 if (pending_extension_info) {
609 installer->set_install_source(pending_extension_info->install_source());
610 if (pending_extension_info->install_silently())
611 installer->set_allow_silent_install(true);
[email protected]464213a2013-10-15 01:06:48612 creation_flags = pending_extension_info->creation_flags();
613 if (pending_extension_info->mark_acknowledged())
614 AcknowledgeExternalExtension(id);
[email protected]51a3bf8b2012-06-08 22:53:06615 } else if (extension) {
[email protected]5eb375e92010-11-26 07:50:41616 installer->set_install_source(extension->location());
[email protected]51a3bf8b2012-06-08 22:53:06617 }
[email protected]7d8b7072012-04-07 01:07:46618 // If the extension was installed from or has migrated to the webstore, or
[email protected]fcb2c2c2012-10-17 21:08:45619 // its auto-update URL is from the webstore, treat it as a webstore install.
620 // Note that we ignore some older extensions with blank auto-update URLs
621 // because we are mostly concerned with restrictions on NaCl extensions,
622 // which are newer.
[email protected]75764512011-12-19 19:54:28623 if ((extension && extension->from_webstore()) ||
[email protected]4a5fe3e22013-06-04 07:06:38624 (extension && extensions::ManifestURL::UpdatesFromGallery(extension)) ||
[email protected]963d13c2012-09-29 17:13:35625 (!extension && extension_urls::IsWebstoreUpdateUrl(
[email protected]51a3bf8b2012-06-08 22:53:06626 pending_extension_info->update_url()))) {
[email protected]a12ce8b22012-01-17 18:40:53627 creation_flags |= Extension::FROM_WEBSTORE;
628 }
629
630 // Bookmark apps being updated is kind of a contradiction, but that's because
631 // we mark the default apps as bookmark apps, and they're hosted in the web
632 // store, thus they can get updated. See http://crbug.com/101605 for more
633 // details.
634 if (extension && extension->from_bookmark())
635 creation_flags |= Extension::FROM_BOOKMARK;
636
[email protected]e33bbc22012-08-27 22:05:46637 if (extension && extension->was_installed_by_default())
638 creation_flags |= Extension::WAS_INSTALLED_BY_DEFAULT;
639
[email protected]acc3c7c22014-03-19 06:23:39640 if (extension && extension->was_installed_by_oem())
641 creation_flags |= Extension::WAS_INSTALLED_BY_OEM;
642
[email protected]ab6c7be42014-01-16 02:05:54643 if (extension && extension->is_ephemeral())
644 creation_flags |= Extension::IS_EPHEMERAL;
645
[email protected]a12ce8b22012-01-17 18:40:53646 installer->set_creation_flags(creation_flags);
647
[email protected]044e86992014-01-24 22:59:11648 installer->set_delete_source(file_ownership_passed);
[email protected]655b2b1a2011-10-13 17:13:06649 installer->set_download_url(download_url);
[email protected]cb0e50312011-05-09 15:03:07650 installer->set_install_cause(extension_misc::INSTALL_CAUSE_UPDATE);
[email protected]6dfbbf82010-03-12 23:09:16651 installer->InstallCrx(extension_path);
[email protected]420a0ec2011-06-01 01:07:03652
653 if (out_crx_installer)
[email protected]dc24976f2013-06-02 21:15:09654 *out_crx_installer = installer.get();
[email protected]420a0ec2011-06-01 01:07:03655
656 return true;
[email protected]e957fe52009-06-23 16:51:05657}
658
[email protected]e178ad92013-06-28 02:29:25659void ExtensionService::ReloadExtension(const std::string extension_id) {
[email protected]a29a517a2011-01-21 21:11:12660 CHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
[email protected]2a947202013-03-06 04:58:05661
662 // If the extension is already reloading, don't reload again.
663 if (extension_prefs_->GetDisableReasons(extension_id) &
664 Extension::DISABLE_RELOAD) {
665 return;
666 }
667
[email protected]650b2d52013-02-10 03:41:45668 base::FilePath path;
[email protected]9adb9692010-10-29 23:14:02669 const Extension* current_extension = GetExtensionById(extension_id, false);
[email protected]9cddd4702009-07-27 22:09:40670
[email protected]f17dbd42010-08-16 23:21:10671 // Disable the extension if it's loaded. It might not be loaded if it crashed.
[email protected]b65272f2009-08-31 15:47:06672 if (current_extension) {
[email protected]4814b512009-11-07 00:12:29673 // If the extension has an inspector open for its background page, detach
674 // the inspector and hang onto a cookie for it, so that we can reattach
675 // later.
[email protected]31d8f5f22012-04-02 15:22:08676 // TODO(yoz): this is not incognito-safe!
[email protected]98b6d942013-11-10 00:34:07677 extensions::ProcessManager* manager = system_->process_manager();
[email protected]3a1dc572012-07-31 22:25:13678 extensions::ExtensionHost* host =
679 manager->GetBackgroundHostForExtension(extension_id);
[email protected]98f66112012-12-25 12:59:36680 if (host && DevToolsAgentHost::HasFor(host->render_view_host())) {
[email protected]4814b512009-11-07 00:12:29681 // Look for an open inspector for the background page.
[email protected]04ea1bb2013-07-10 09:26:09682 scoped_refptr<DevToolsAgentHost> agent_host =
683 DevToolsAgentHost::GetOrCreateFor(host->render_view_host());
684 agent_host->DisconnectRenderViewHost();
685 orphaned_dev_tools_[extension_id] = agent_host;
[email protected]4814b512009-11-07 00:12:29686 }
687
[email protected]b65272f2009-08-31 15:47:06688 path = current_extension->path();
[email protected]58076192013-07-19 19:43:50689 // BeingUpgraded is set back to false when the extension is added.
[email protected]45f5b7d2014-01-22 23:47:13690 system_->runtime_data()->SetBeingUpgraded(current_extension, true);
[email protected]44d62b62012-04-11 00:06:03691 DisableExtension(extension_id, Extension::DISABLE_RELOAD);
[email protected]b914e2952013-04-26 07:10:03692 reloading_extensions_.insert(extension_id);
[email protected]1eb175082010-02-10 09:26:16693 } else {
694 path = unloaded_extension_paths_[extension_id];
[email protected]b65272f2009-08-31 15:47:06695 }
696
[email protected]9f4e4f082013-06-21 07:11:19697 if (delayed_installs_.Contains(extension_id)) {
[email protected]6f6101832012-11-27 22:10:48698 FinishDelayedInstallation(extension_id);
[email protected]0db124b02012-11-07 04:55:05699 return;
700 }
701
[email protected]43ceb002012-02-10 23:19:15702 // If we're reloading a component extension, use the component extension
703 // loader's reloader.
704 if (component_loader_->Exists(extension_id)) {
[email protected]e178ad92013-06-28 02:29:25705 SetBeingReloaded(extension_id, true);
[email protected]43ceb002012-02-10 23:19:15706 component_loader_->Reload(extension_id);
[email protected]e178ad92013-06-28 02:29:25707 SetBeingReloaded(extension_id, false);
[email protected]43ceb002012-02-10 23:19:15708 return;
709 }
710
[email protected]e6090e42010-03-23 22:44:08711 // Check the installed extensions to see if what we're reloading was already
712 // installed.
[email protected]e178ad92013-06-28 02:29:25713 SetBeingReloaded(extension_id, true);
[email protected]e6090e42010-03-23 22:44:08714 scoped_ptr<ExtensionInfo> installed_extension(
715 extension_prefs_->GetInstalledExtensionInfo(extension_id));
716 if (installed_extension.get() &&
717 installed_extension->extension_manifest.get()) {
[email protected]d8c8f25f2011-11-02 18:18:01718 extensions::InstalledLoader(this).Load(*installed_extension, false);
[email protected]e6090e42010-03-23 22:44:08719 } else {
[email protected]d8c8f25f2011-11-02 18:18:01720 // Otherwise, the extension is unpacked (location LOAD).
[email protected]e6090e42010-03-23 22:44:08721 // We should always be able to remember the extension's path. If it's not in
722 // the map, someone failed to update |unloaded_extension_paths_|.
723 CHECK(!path.empty());
[email protected]d8c8f25f2011-11-02 18:18:01724 extensions::UnpackedInstaller::Create(this)->Load(path);
[email protected]e6090e42010-03-23 22:44:08725 }
[email protected]e178ad92013-06-28 02:29:25726 // When reloading is done, mark this extension as done reloading.
727 SetBeingReloaded(extension_id, false);
[email protected]9cddd4702009-07-27 22:09:40728}
729
[email protected]fa2416f2011-05-03 08:41:20730bool ExtensionService::UninstallExtension(
[email protected]a12c706e2011-12-01 00:58:08731 std::string extension_id,
[email protected]fa2416f2011-05-03 08:41:20732 bool external_uninstall,
[email protected]439f1e32013-12-09 20:09:09733 base::string16* error) {
[email protected]a29a517a2011-01-21 21:11:12734 CHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
[email protected]a8af9fdb2010-10-28 21:52:20735
[email protected]0d6ec3a72011-09-02 02:09:43736 scoped_refptr<const Extension> extension(GetInstalledExtension(extension_id));
[email protected]631cf822009-05-15 07:01:25737
[email protected]e7afe2452010-08-22 16:19:13738 // Callers should not send us nonexistent extensions.
[email protected]dc24976f2013-06-02 21:15:09739 CHECK(extension.get());
[email protected]9f1087e2009-06-15 17:29:32740
[email protected]95da88c42011-03-31 10:07:33741 // Policy change which triggers an uninstall will always set
742 // |external_uninstall| to true so this is the only way to uninstall
743 // managed extensions.
[email protected]65187152012-06-02 13:14:14744 if (!external_uninstall &&
745 !system_->management_policy()->UserMayModifySettings(
746 extension.get(), error)) {
[email protected]ad50def52011-10-19 23:17:07747 content::NotificationService::current()->Notify(
[email protected]432115822011-07-10 15:52:27748 chrome::NOTIFICATION_EXTENSION_UNINSTALL_NOT_ALLOWED,
[email protected]6c2381d2011-10-19 02:52:53749 content::Source<Profile>(profile_),
[email protected]dc24976f2013-06-02 21:15:09750 content::Details<const Extension>(extension.get()));
[email protected]d6ebc9792011-04-07 18:18:33751 return false;
752 }
[email protected]95da88c42011-03-31 10:07:33753
[email protected]65f173552012-06-28 22:43:58754 syncer::SyncChange sync_change;
[email protected]f8aefb132013-10-30 09:29:52755 if (extension_sync_service_) {
756 sync_change = extension_sync_service_->PrepareToSyncUninstallExtension(
757 extension.get(), is_ready());
[email protected]3bdba0d2011-08-23 07:17:30758 }
759
[email protected]d820bc52014-03-13 05:35:23760 system_->install_verifier()->Remove(extension->id());
[email protected]ffd2f79e2013-11-14 00:11:46761
[email protected]dc24976f2013-06-02 21:15:09762 if (IsUnacknowledgedExternalExtension(extension.get())) {
[email protected]d96eb512012-11-01 23:44:08763 UMA_HISTOGRAM_ENUMERATION("Extensions.ExternalExtensionEvent",
764 EXTERNAL_EXTENSION_UNINSTALLED,
765 EXTERNAL_EXTENSION_BUCKET_BOUNDARY);
[email protected]446e37e2013-08-07 00:30:02766 if (extensions::ManifestURL::UpdatesFromGallery(extension.get())) {
767 UMA_HISTOGRAM_ENUMERATION("Extensions.ExternalExtensionEventWebstore",
768 EXTERNAL_EXTENSION_UNINSTALLED,
769 EXTERNAL_EXTENSION_BUCKET_BOUNDARY);
770 } else {
771 UMA_HISTOGRAM_ENUMERATION("Extensions.ExternalExtensionEventNonWebstore",
772 EXTERNAL_EXTENSION_UNINSTALLED,
773 EXTERNAL_EXTENSION_BUCKET_BOUNDARY);
774 }
[email protected]d96eb512012-11-01 23:44:08775 }
[email protected]9b217652010-10-08 22:04:23776 UMA_HISTOGRAM_ENUMERATION("Extensions.UninstallType",
[email protected]7fa19f82010-12-21 19:40:08777 extension->GetType(), 100);
[email protected]dc24976f2013-06-02 21:15:09778 RecordPermissionMessagesHistogram(extension.get(),
779 "Extensions.Permissions_Uninstall");
[email protected]9b217652010-10-08 22:04:23780
[email protected]831aa212010-03-26 13:55:19781 // Unload before doing more cleanup to ensure that nothing is hanging on to
782 // any of these resources.
[email protected]b0af4792013-10-23 09:12:13783 UnloadExtension(extension_id, UnloadedExtensionInfo::REASON_UNINSTALL);
[email protected]831aa212010-03-26 13:55:19784
[email protected]9f1087e2009-06-15 17:29:32785 // Tell the backend to start deleting installed extensions on the file thread.
[email protected]12075d12013-02-27 05:38:05786 if (!Manifest::IsUnpackedLocation(extension->location())) {
[email protected]7f8f24f2012-11-15 19:40:14787 if (!GetFileTaskRunner()->PostTask(
788 FROM_HERE,
[email protected]53612e82011-10-18 18:00:36789 base::Bind(
[email protected]14908b72011-04-20 06:54:36790 &extension_file_util::UninstallExtension,
791 install_directory_,
[email protected]fa2416f2011-05-03 08:41:20792 extension_id)))
[email protected]14908b72011-04-20 06:54:36793 NOTREACHED();
[email protected]9f1087e2009-06-15 17:29:32794 }
795
[email protected]ca0336342014-03-21 12:58:34796 // Do not remove the data of ephemeral apps. They will be garbage collected by
797 // EphemeralAppService.
798 if (!extension->is_ephemeral())
799 extensions::DataDeleter::StartDeleting(profile_, extension.get());
[email protected]0d6ec3a72011-09-02 02:09:43800
[email protected]0dfe05c2011-02-23 23:03:36801 UntrackTerminatedExtension(extension_id);
[email protected]211030342010-09-30 18:41:06802
803 // Notify interested parties that we've uninstalled this extension.
[email protected]ad50def52011-10-19 23:17:07804 content::NotificationService::current()->Notify(
[email protected]432115822011-07-10 15:52:27805 chrome::NOTIFICATION_EXTENSION_UNINSTALLED,
[email protected]6c2381d2011-10-19 02:52:53806 content::Source<Profile>(profile_),
[email protected]dc24976f2013-06-02 21:15:09807 content::Details<const Extension>(extension.get()));
[email protected]d6ebc9792011-04-07 18:18:33808
[email protected]f8aefb132013-10-30 09:29:52809 if (extension_sync_service_) {
810 extension_sync_service_->ProcessSyncUninstallExtension(extension_id,
811 sync_change);
[email protected]3bdba0d2011-08-23 07:17:30812 }
813
[email protected]399583b2012-12-11 09:33:42814 delayed_installs_.Remove(extension_id);
[email protected]0db124b02012-11-07 04:55:05815
[email protected]198b5902013-06-27 10:36:11816 PruneSharedModulesOnUninstall(extension.get());
[email protected]9f4e4f082013-06-21 07:11:19817
[email protected]d4eda592013-09-18 03:37:57818 extension_prefs_->OnExtensionUninstalled(extension_id, extension->location(),
819 external_uninstall);
820
[email protected]333b1de2011-09-12 18:28:50821 // Track the uninstallation.
[email protected]49098f702011-10-13 03:47:18822 UMA_HISTOGRAM_ENUMERATION("Extensions.ExtensionUninstalled", 1, 2);
823
[email protected]d6ebc9792011-04-07 18:18:33824 return true;
[email protected]c10da4b02010-03-25 14:38:32825}
826
[email protected]c3cfb012011-04-06 22:07:35827bool ExtensionService::IsExtensionEnabled(
828 const std::string& extension_id) const {
[email protected]bb1bc9b32013-12-21 03:09:14829 if (registry_->enabled_extensions().Contains(extension_id) ||
830 registry_->terminated_extensions().Contains(extension_id)) {
[email protected]36429da2011-07-11 20:25:18831 return true;
[email protected]dc9a74f72012-08-17 18:07:21832 }
[email protected]36429da2011-07-11 20:25:18833
[email protected]bb1bc9b32013-12-21 03:09:14834 if (registry_->disabled_extensions().Contains(extension_id) ||
835 registry_->blacklisted_extensions().Contains(extension_id)) {
[email protected]ad83ca242011-07-29 01:32:25836 return false;
[email protected]695b5712012-12-06 23:55:28837 }
[email protected]ad83ca242011-07-29 01:32:25838
839 // If the extension hasn't been loaded yet, check the prefs for it. Assume
840 // enabled unless otherwise noted.
841 return !extension_prefs_->IsExtensionDisabled(extension_id) &&
[email protected]f574c402012-12-04 23:20:31842 !extension_prefs_->IsExternalExtensionUninstalled(extension_id);
[email protected]c3cfb012011-04-06 22:07:35843}
844
[email protected]eaa7dd182010-12-14 11:09:00845void ExtensionService::EnableExtension(const std::string& extension_id) {
[email protected]a29a517a2011-01-21 21:11:12846 CHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
[email protected]a8af9fdb2010-10-28 21:52:20847
[email protected]06f92562011-04-29 19:27:31848 if (IsExtensionEnabled(extension_id))
[email protected]0c6da502009-08-14 22:32:39849 return;
[email protected]bb1bc9b32013-12-21 03:09:14850 const Extension* extension =
851 registry_->disabled_extensions().GetByID(extension_id);
[email protected]0d54b682013-11-05 14:15:36852
853 ManagementPolicy* policy = system_->management_policy();
854 if (extension && policy->MustRemainDisabled(extension, NULL, NULL)) {
855 UMA_HISTOGRAM_COUNTS_100("Extensions.EnableDeniedByPolicy", 1);
856 return;
857 }
[email protected]0c6da502009-08-14 22:32:39858
[email protected]b3317ad2011-04-28 23:46:00859 extension_prefs_->SetExtensionState(extension_id, Extension::ENABLED);
[email protected]eb5e4f92012-08-15 23:33:28860 extension_prefs_->ClearDisableReasons(extension_id);
[email protected]1784e83a2009-09-08 21:01:52861
[email protected]06f92562011-04-29 19:27:31862 // This can happen if sync enables an extension that is not
863 // installed yet.
864 if (!extension)
865 return;
866
[email protected]d96eb512012-11-01 23:44:08867 if (IsUnacknowledgedExternalExtension(extension)) {
868 UMA_HISTOGRAM_ENUMERATION("Extensions.ExternalExtensionEvent",
869 EXTERNAL_EXTENSION_REENABLED,
870 EXTERNAL_EXTENSION_BUCKET_BOUNDARY);
[email protected]446e37e2013-08-07 00:30:02871 if (extensions::ManifestURL::UpdatesFromGallery(extension)) {
872 UMA_HISTOGRAM_ENUMERATION("Extensions.ExternalExtensionEventWebstore",
873 EXTERNAL_EXTENSION_REENABLED,
874 EXTERNAL_EXTENSION_BUCKET_BOUNDARY);
875 } else {
876 UMA_HISTOGRAM_ENUMERATION("Extensions.ExternalExtensionEventNonWebstore",
877 EXTERNAL_EXTENSION_REENABLED,
878 EXTERNAL_EXTENSION_BUCKET_BOUNDARY);
879 }
[email protected]612a1cb12012-10-17 13:18:03880 AcknowledgeExternalExtension(extension->id());
[email protected]d96eb512012-11-01 23:44:08881 }
[email protected]612a1cb12012-10-17 13:18:03882
[email protected]0c6da502009-08-14 22:32:39883 // Move it over to the enabled list.
[email protected]bb1bc9b32013-12-21 03:09:14884 registry_->AddEnabled(make_scoped_refptr(extension));
885 registry_->RemoveDisabled(extension->id());
[email protected]0c6da502009-08-14 22:32:39886
[email protected]62d30f42009-10-01 22:36:06887 NotifyExtensionLoaded(extension);
[email protected]3bdba0d2011-08-23 07:17:30888
[email protected]f74d7f32012-06-19 19:22:51889 // Notify listeners that the extension was enabled.
890 content::NotificationService::current()->Notify(
891 chrome::NOTIFICATION_EXTENSION_ENABLED,
892 content::Source<Profile>(profile_),
893 content::Details<const Extension>(extension));
894
[email protected]f8aefb132013-10-30 09:29:52895 if (extension_sync_service_)
896 extension_sync_service_->SyncEnableExtension(*extension);
[email protected]0c6da502009-08-14 22:32:39897}
898
[email protected]44d62b62012-04-11 00:06:03899void ExtensionService::DisableExtension(
900 const std::string& extension_id,
901 Extension::DisableReason disable_reason) {
[email protected]a29a517a2011-01-21 21:11:12902 CHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
[email protected]a8af9fdb2010-10-28 21:52:20903
[email protected]b2ba9962009-12-10 20:10:15904 // The extension may have been disabled already.
[email protected]06f92562011-04-29 19:27:31905 if (!IsExtensionEnabled(extension_id))
[email protected]1784e83a2009-09-08 21:01:52906 return;
[email protected]1784e83a2009-09-08 21:01:52907
[email protected]06f92562011-04-29 19:27:31908 const Extension* extension = GetInstalledExtension(extension_id);
909 // |extension| can be NULL if sync disables an extension that is not
910 // installed yet.
[email protected]65187152012-06-02 13:14:14911 if (extension &&
[email protected]505ccdc2013-06-20 20:15:35912 disable_reason != Extension::DISABLE_RELOAD &&
[email protected]65187152012-06-02 13:14:14913 !system_->management_policy()->UserMayModifySettings(extension, NULL)) {
[email protected]95da88c42011-03-31 10:07:33914 return;
[email protected]65187152012-06-02 13:14:14915 }
[email protected]95da88c42011-03-31 10:07:33916
[email protected]b3317ad2011-04-28 23:46:00917 extension_prefs_->SetExtensionState(extension_id, Extension::DISABLED);
[email protected]eb5e4f92012-08-15 23:33:28918 extension_prefs_->AddDisableReason(extension_id, disable_reason);
[email protected]1784e83a2009-09-08 21:01:52919
[email protected]599539802014-01-07 23:06:00920 int include_mask =
921 ExtensionRegistry::EVERYTHING & ~ExtensionRegistry::DISABLED;
922 extension = registry_->GetExtensionById(extension_id, include_mask);
[email protected]06f92562011-04-29 19:27:31923 if (!extension)
924 return;
925
[email protected]45f5b7d2014-01-22 23:47:13926 // The extension is either enabled or terminated.
927 DCHECK(registry_->enabled_extensions().Contains(extension->id()) ||
928 registry_->terminated_extensions().Contains(extension->id()));
[email protected]64742de32013-04-22 08:44:34929
[email protected]5c094792012-09-07 19:44:53930 // Move it over to the disabled list. Don't send a second unload notification
931 // for terminated extensions being disabled.
[email protected]bb1bc9b32013-12-21 03:09:14932 registry_->AddDisabled(make_scoped_refptr(extension));
933 if (registry_->enabled_extensions().Contains(extension->id())) {
934 registry_->RemoveEnabled(extension->id());
[email protected]b0af4792013-10-23 09:12:13935 NotifyExtensionUnloaded(extension, UnloadedExtensionInfo::REASON_DISABLE);
[email protected]5c094792012-09-07 19:44:53936 } else {
[email protected]bb1bc9b32013-12-21 03:09:14937 registry_->RemoveTerminated(extension->id());
[email protected]5c094792012-09-07 19:44:53938 }
[email protected]3bdba0d2011-08-23 07:17:30939
[email protected]f8aefb132013-10-30 09:29:52940 if (extension_sync_service_)
941 extension_sync_service_->SyncDisableExtension(*extension);
[email protected]1784e83a2009-09-08 21:01:52942}
943
[email protected]1abf05e2013-07-09 17:04:36944void ExtensionService::DisableUserExtensions(
945 const std::vector<std::string>& except_ids) {
[email protected]e516e4c2013-06-12 17:41:14946 extensions::ManagementPolicy* management_policy =
947 system_->management_policy();
948 extensions::ExtensionList to_disable;
949
[email protected]75181f62014-03-19 21:41:12950 // TODO(rlp): Clean up this code. crbug.com/353266.
[email protected]bb1bc9b32013-12-21 03:09:14951 const ExtensionSet& enabled_set = registry_->enabled_extensions();
952 for (ExtensionSet::const_iterator extension = enabled_set.begin();
953 extension != enabled_set.end(); ++extension) {
[email protected]75181f62014-03-19 21:41:12954 if (management_policy->UserMayModifySettings(extension->get(), NULL) &&
955 extension->get()->location() != Manifest::EXTERNAL_COMPONENT)
[email protected]e516e4c2013-06-12 17:41:14956 to_disable.push_back(*extension);
957 }
[email protected]bb1bc9b32013-12-21 03:09:14958 const ExtensionSet& terminated_set = registry_->terminated_extensions();
959 for (ExtensionSet::const_iterator extension = terminated_set.begin();
960 extension != terminated_set.end(); ++extension) {
[email protected]75181f62014-03-19 21:41:12961 if (management_policy->UserMayModifySettings(extension->get(), NULL) &&
962 extension->get()->location() != Manifest::EXTERNAL_COMPONENT)
[email protected]e516e4c2013-06-12 17:41:14963 to_disable.push_back(*extension);
964 }
965
966 for (extensions::ExtensionList::const_iterator extension = to_disable.begin();
967 extension != to_disable.end(); ++extension) {
[email protected]3082fe32013-08-06 11:12:38968 if ((*extension)->was_installed_by_default() &&
969 extension_urls::IsWebstoreUpdateUrl(
970 extensions::ManifestURL::GetUpdateURL(*extension)))
971 continue;
[email protected]1abf05e2013-07-09 17:04:36972 const std::string& id = (*extension)->id();
973 if (except_ids.end() == std::find(except_ids.begin(), except_ids.end(), id))
974 DisableExtension(id, extensions::Extension::DISABLE_USER_ACTION);
[email protected]e516e4c2013-06-12 17:41:14975 }
976}
977
[email protected]eaa7dd182010-12-14 11:09:00978void ExtensionService::GrantPermissionsAndEnableExtension(
[email protected]009633c2013-03-07 22:08:28979 const Extension* extension) {
980 GrantPermissions(extension);
[email protected]fe2dd7742011-04-19 22:52:49981 RecordPermissionMessagesHistogram(
982 extension, "Extensions.Permissions_ReEnable");
[email protected]8d888c12010-11-30 00:00:25983 extension_prefs_->SetDidExtensionEscalatePermissions(extension, false);
984 EnableExtension(extension->id());
985}
986
[email protected]009633c2013-03-07 22:08:28987void ExtensionService::GrantPermissions(const Extension* extension) {
[email protected]be083862012-09-01 03:53:45988 CHECK(extension);
989 extensions::PermissionsUpdater perms_updater(profile());
[email protected]009633c2013-03-07 22:08:28990 perms_updater.GrantActivePermissions(extension);
[email protected]be083862012-09-01 03:53:45991}
992
[email protected]fe2dd7742011-04-19 22:52:49993// static
994void ExtensionService::RecordPermissionMessagesHistogram(
[email protected]13c68b62013-05-17 11:29:05995 const Extension* extension, const char* histogram) {
[email protected]de415552013-01-23 04:12:17996 // Since this is called from multiple sources, and since the histogram macros
997 // use statics, we need to manually lookup the histogram ourselves.
998 base::HistogramBase* counter = base::LinearHistogram::FactoryGet(
[email protected]fe2dd7742011-04-19 22:52:49999 histogram,
1000 1,
[email protected]c2e66e12012-06-27 06:27:061001 PermissionMessage::kEnumBoundary,
1002 PermissionMessage::kEnumBoundary + 1,
[email protected]de415552013-01-23 04:12:171003 base::HistogramBase::kUmaTargetedHistogramFlag);
[email protected]fe2dd7742011-04-19 22:52:491004
[email protected]13c68b62013-05-17 11:29:051005 PermissionMessages permissions =
1006 extensions::PermissionsData::GetPermissionMessages(extension);
[email protected]fe2dd7742011-04-19 22:52:491007 if (permissions.empty()) {
[email protected]c2e66e12012-06-27 06:27:061008 counter->Add(PermissionMessage::kNone);
[email protected]fe2dd7742011-04-19 22:52:491009 } else {
[email protected]c2e66e12012-06-27 06:27:061010 for (PermissionMessages::iterator it = permissions.begin();
[email protected]0d3e4a22011-06-23 19:02:521011 it != permissions.end(); ++it)
1012 counter->Add(it->id());
[email protected]fe2dd7742011-04-19 22:52:491013 }
1014}
1015
[email protected]eaa7dd182010-12-14 11:09:001016void ExtensionService::NotifyExtensionLoaded(const Extension* extension) {
[email protected]57a777f72010-03-31 01:09:421017 // The ChromeURLRequestContexts need to be first to know that the extension
[email protected]62d30f42009-10-01 22:36:061018 // was loaded, otherwise a race can arise where a renderer that is created
1019 // for the extension may try to load an extension URL with an extension id
[email protected]57a777f72010-03-31 01:09:421020 // that the request context doesn't yet know about. The profile is responsible
1021 // for ensuring its URLRequestContexts appropriately discover the loaded
1022 // extension.
[email protected]31d8f5f22012-04-02 15:22:081023 system_->RegisterExtensionWithRequestContexts(extension);
[email protected]62d30f42009-10-01 22:36:061024
[email protected]d5949312012-12-03 22:13:301025 // Tell renderers about the new extension, unless it's a theme (renderers
1026 // don't need to know about themes).
[email protected]a58f599c2012-12-01 03:08:191027 if (!extension->is_theme()) {
[email protected]19647262011-12-16 09:57:491028 for (content::RenderProcessHost::iterator i(
1029 content::RenderProcessHost::AllHostsIterator());
1030 !i.IsAtEnd(); i.Advance()) {
1031 content::RenderProcessHost* host = i.GetCurrentValue();
1032 Profile* host_profile =
1033 Profile::FromBrowserContext(host->GetBrowserContext());
1034 if (host_profile->GetOriginalProfile() ==
1035 profile_->GetOriginalProfile()) {
1036 std::vector<ExtensionMsg_Loaded_Params> loaded_extensions(
1037 1, ExtensionMsg_Loaded_Params(extension));
1038 host->Send(
1039 new ExtensionMsg_Loaded(loaded_extensions));
1040 }
[email protected]c8d407e2011-04-28 21:27:171041 }
[email protected]77a6970c2011-04-23 16:58:561042 }
1043
[email protected]3442a662012-01-12 08:06:171044 // Tell subsystems that use the EXTENSION_LOADED notification about the new
1045 // extension.
1046 //
1047 // NOTE: It is important that this happen after notifying the renderers about
1048 // the new extensions so that if we navigate to an extension URL in
[email protected]dcc47642014-03-26 22:03:491049 // ExtensionRegistryObserver::OnLoaded or NOTIFICATION_EXTENSION_LOADED, the
1050 // renderer is guaranteed to know about it.
1051 registry_->TriggerOnLoaded(extension);
1052
[email protected]3442a662012-01-12 08:06:171053 content::NotificationService::current()->Notify(
1054 chrome::NOTIFICATION_EXTENSION_LOADED,
1055 content::Source<Profile>(profile_),
1056 content::Details<const Extension>(extension));
1057
[email protected]dcc47642014-03-26 22:03:491058 // TODO(kalman): Convert ExtensionSpecialStoragePolicy to a
1059 // BrowserContextKeyedService and use ExtensionRegistryObserver.
[email protected]c8d407e2011-04-28 21:27:171060 profile_->GetExtensionSpecialStoragePolicy()->
1061 GrantRightsForExtension(extension);
1062
[email protected]dcc47642014-03-26 22:03:491063 // TODO(kalman): This is broken. The crash reporter is process-wide so doesn't
1064 // work properly multi-profile. Besides which, it should be using
1065 // ExtensionRegistryObserver. See http://crbug.com/355029.
[email protected]c8d407e2011-04-28 21:27:171066 UpdateActiveExtensionsInCrashReporter();
1067
[email protected]c8d407e2011-04-28 21:27:171068 // If the extension has permission to load chrome://favicon/ resources we need
1069 // to make sure that the FaviconSource is registered with the
1070 // ChromeURLDataManager.
[email protected]13c68b62013-05-17 11:29:051071 if (extensions::PermissionsData::HasHostPermission(
1072 extension, GURL(chrome::kChromeUIFaviconURL))) {
[email protected]c8d407e2011-04-28 21:27:171073 FaviconSource* favicon_source = new FaviconSource(profile_,
1074 FaviconSource::FAVICON);
[email protected]24ea7a12013-01-27 23:54:531075 content::URLDataSource::Add(profile_, favicon_source);
[email protected]c8d407e2011-04-28 21:27:171076 }
[email protected]b07e606e2012-09-15 20:16:151077
1078#if !defined(OS_ANDROID)
1079 // Same for chrome://theme/ resources.
[email protected]13c68b62013-05-17 11:29:051080 if (extensions::PermissionsData::HasHostPermission(
1081 extension, GURL(chrome::kChromeUIThemeURL))) {
[email protected]b07e606e2012-09-15 20:16:151082 ThemeSource* theme_source = new ThemeSource(profile_);
[email protected]24ea7a12013-01-27 23:54:531083 content::URLDataSource::Add(profile_, theme_source);
[email protected]b07e606e2012-09-15 20:16:151084 }
1085#endif
1086
[email protected]5eddc3e2011-10-26 04:33:311087 // Same for chrome://thumb/ resources.
[email protected]13c68b62013-05-17 11:29:051088 if (extensions::PermissionsData::HasHostPermission(
1089 extension, GURL(chrome::kChromeUIThumbnailURL))) {
[email protected]420e6d92013-09-17 01:48:511090 ThumbnailSource* thumbnail_source = new ThumbnailSource(profile_, false);
[email protected]24ea7a12013-01-27 23:54:531091 content::URLDataSource::Add(profile_, thumbnail_source);
[email protected]5eddc3e2011-10-26 04:33:311092 }
[email protected]62d30f42009-10-01 22:36:061093}
1094
[email protected]a9f39a312010-12-23 22:14:271095void ExtensionService::NotifyExtensionUnloaded(
[email protected]814a7bf0f2011-08-13 05:30:591096 const Extension* extension,
[email protected]b0af4792013-10-23 09:12:131097 UnloadedExtensionInfo::Reason reason) {
[email protected]45f5b7d2014-01-22 23:47:131098 registry_->TriggerOnUnloaded(extension);
1099
[email protected]a9f39a312010-12-23 22:14:271100 UnloadedExtensionInfo details(extension, reason);
[email protected]ad50def52011-10-19 23:17:071101 content::NotificationService::current()->Notify(
[email protected]ec870532014-03-19 20:24:051102 chrome::NOTIFICATION_EXTENSION_UNLOADED_DEPRECATED,
[email protected]6c2381d2011-10-19 02:52:531103 content::Source<Profile>(profile_),
1104 content::Details<UnloadedExtensionInfo>(&details));
[email protected]62d30f42009-10-01 22:36:061105
[email protected]f3b1a082011-11-18 00:34:301106 for (content::RenderProcessHost::iterator i(
1107 content::RenderProcessHost::AllHostsIterator());
[email protected]77a6970c2011-04-23 16:58:561108 !i.IsAtEnd(); i.Advance()) {
[email protected]f3b1a082011-11-18 00:34:301109 content::RenderProcessHost* host = i.GetCurrentValue();
[email protected]9b62ecf2011-07-27 20:23:081110 Profile* host_profile =
[email protected]f3b1a082011-11-18 00:34:301111 Profile::FromBrowserContext(host->GetBrowserContext());
[email protected]9b62ecf2011-07-27 20:23:081112 if (host_profile->GetOriginalProfile() == profile_->GetOriginalProfile())
[email protected]c8d407e2011-04-28 21:27:171113 host->Send(new ExtensionMsg_Unloaded(extension->id()));
[email protected]77a6970c2011-04-23 16:58:561114 }
1115
[email protected]31d8f5f22012-04-02 15:22:081116 system_->UnregisterExtensionWithRequestContexts(extension->id(), reason);
[email protected]dcc47642014-03-26 22:03:491117
1118 // TODO(kalman): Convert ExtensionSpecialStoragePolicy to a
1119 // BrowserContextKeyedService and use ExtensionRegistryObserver.
[email protected]c8d407e2011-04-28 21:27:171120 profile_->GetExtensionSpecialStoragePolicy()->
1121 RevokeRightsForExtension(extension);
1122
[email protected]b777b332011-04-16 04:01:081123#if defined(OS_CHROMEOS)
[email protected]ac66e452013-01-11 09:21:231124 // Revoke external file access for the extension from its file system context.
1125 // It is safe to access the extension's storage partition at this point. The
1126 // storage partition may get destroyed only after the extension gets unloaded.
[email protected]3a746ec2014-03-15 05:30:561127 GURL site =
1128 extensions::util::GetSiteForExtensionId(extension->id(), profile_);
[email protected]10eb28162012-09-18 03:04:091129 fileapi::FileSystemContext* filesystem_context =
[email protected]ac66e452013-01-11 09:21:231130 BrowserContext::GetStoragePartitionForSite(profile_, site)->
[email protected]10eb28162012-09-18 03:04:091131 GetFileSystemContext();
[email protected]f19bbf62013-07-09 01:22:321132 if (filesystem_context && filesystem_context->external_backend()) {
1133 filesystem_context->external_backend()->
[email protected]c8d407e2011-04-28 21:27:171134 RevokeAccessForExtension(extension->id());
[email protected]62d30f42009-10-01 22:36:061135 }
[email protected]c8d407e2011-04-28 21:27:171136#endif
1137
[email protected]dcc47642014-03-26 22:03:491138 // TODO(kalman): This is broken. The crash reporter is process-wide so doesn't
1139 // work properly multi-profile. Besides which, it should be using
1140 // ExtensionRegistryObserver::OnExtensionLoaded. See http://crbug.com/355029.
[email protected]c8d407e2011-04-28 21:27:171141 UpdateActiveExtensionsInCrashReporter();
[email protected]62d30f42009-10-01 22:36:061142}
1143
[email protected]0a071a32011-02-08 00:18:241144Profile* ExtensionService::profile() {
1145 return profile_;
1146}
1147
[email protected]599539802014-01-07 23:06:001148content::BrowserContext* ExtensionService::GetBrowserContext() const {
1149 // Implemented in the .cc file to avoid adding a profile.h dependency to
1150 // extension_service.h.
1151 return profile_;
1152}
1153
[email protected]25ae0152011-11-18 14:40:021154bool ExtensionService::is_ready() {
[email protected]4a10006a2013-05-17 23:18:351155 return ready_->is_signaled();
[email protected]25ae0152011-11-18 14:40:021156}
1157
[email protected]7f8f24f2012-11-15 19:40:141158base::SequencedTaskRunner* ExtensionService::GetFileTaskRunner() {
[email protected]dc24976f2013-06-02 21:15:091159 if (file_task_runner_.get())
1160 return file_task_runner_.get();
[email protected]7f8f24f2012-11-15 19:40:141161
1162 // We should be able to interrupt any part of extension install process during
1163 // shutdown. SKIP_ON_SHUTDOWN ensures that not started extension install tasks
1164 // will be ignored/deleted while we will block on started tasks.
1165 std::string token("ext_install-");
1166 token.append(profile_->GetPath().AsUTF8Unsafe());
1167 file_task_runner_ = BrowserThread::GetBlockingPool()->
1168 GetSequencedTaskRunnerWithShutdownBehavior(
1169 BrowserThread::GetBlockingPool()->GetNamedSequenceToken(token),
1170 base::SequencedWorkerPool::SKIP_ON_SHUTDOWN);
[email protected]dc24976f2013-06-02 21:15:091171 return file_task_runner_.get();
[email protected]7f8f24f2012-11-15 19:40:141172}
1173
[email protected]42a08162012-03-16 18:09:111174extensions::ExtensionUpdater* ExtensionService::updater() {
[email protected]2859946f2011-04-04 18:18:061175 return updater_.get();
1176}
1177
[email protected]4ee07c62012-08-21 12:40:421178void ExtensionService::CheckManagementPolicy() {
[email protected]0d54b682013-11-05 14:15:361179 std::vector<std::string> to_unload;
1180 std::map<std::string, Extension::DisableReason> to_disable;
[email protected]695b5712012-12-06 23:55:281181
[email protected]0d54b682013-11-05 14:15:361182 // Loop through the extensions list, finding extensions we need to unload or
1183 // disable.
[email protected]bb1bc9b32013-12-21 03:09:141184 const ExtensionSet& extensions = registry_->enabled_extensions();
1185 for (ExtensionSet::const_iterator iter = extensions.begin();
1186 iter != extensions.end(); ++iter) {
[email protected]cadac622013-06-11 16:46:361187 const Extension* extension = (iter->get());
[email protected]4ee07c62012-08-21 12:40:421188 if (!system_->management_policy()->UserMayLoad(extension, NULL))
[email protected]0d54b682013-11-05 14:15:361189 to_unload.push_back(extension->id());
1190 Extension::DisableReason disable_reason = Extension::DISABLE_NONE;
1191 if (system_->management_policy()->MustRemainDisabled(
1192 extension, &disable_reason, NULL))
1193 to_disable[extension->id()] = disable_reason;
[email protected]aa96d3a2010-08-21 08:45:251194 }
1195
[email protected]0d54b682013-11-05 14:15:361196 for (size_t i = 0; i < to_unload.size(); ++i)
1197 UnloadExtension(to_unload[i], UnloadedExtensionInfo::REASON_DISABLE);
1198
1199 for (std::map<std::string, Extension::DisableReason>::const_iterator i =
1200 to_disable.begin(); i != to_disable.end(); ++i)
1201 DisableExtension(i->first, i->second);
[email protected]aa96d3a2010-08-21 08:45:251202}
1203
[email protected]31206602011-04-13 23:07:321204void ExtensionService::CheckForUpdatesSoon() {
[email protected]c3cfb012011-04-06 22:07:351205 if (updater()) {
[email protected]94fde232012-04-27 10:22:301206 if (AreAllExternalProvidersReady()) {
1207 updater()->CheckSoon();
1208 } else {
1209 // Sync can start updating before all the external providers are ready
1210 // during startup. Start the update as soon as those providers are ready,
1211 // but not before.
1212 update_once_all_providers_are_ready_ = true;
1213 }
[email protected]c3cfb012011-04-06 22:07:351214 } else {
[email protected]31206602011-04-13 23:07:321215 LOG(WARNING) << "CheckForUpdatesSoon() called with auto-update turned off";
[email protected]c3cfb012011-04-06 22:07:351216 }
1217}
1218
[email protected]8e4560b62011-01-14 10:09:141219// Some extensions will autoupdate themselves externally from Chrome. These
1220// are typically part of some larger client application package. To support
1221// these, the extension will register its location in the the preferences file
1222// (and also, on Windows, in the registry) and this code will periodically
1223// check that location for a .crx file, which it will then install locally if
1224// a new version is available.
1225// Errors are reported through ExtensionErrorReporter. Succcess is not
1226// reported.
[email protected]eaa7dd182010-12-14 11:09:001227void ExtensionService::CheckForExternalUpdates() {
[email protected]a29a517a2011-01-21 21:11:121228 CHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
[email protected]8e4560b62011-01-14 10:09:141229
1230 // Note that this installation is intentionally silent (since it didn't
1231 // go through the front-end). Extensions that are registered in this
1232 // way are effectively considered 'pre-bundled', and so implicitly
1233 // trusted. In general, if something has HKLM or filesystem access,
1234 // they could install an extension manually themselves anyway.
[email protected]a29a517a2011-01-21 21:11:121235
[email protected]8e4560b62011-01-14 10:09:141236 // Ask each external extension provider to give us a call back for each
1237 // extension they know about. See OnExternalExtension(File|UpdateUrl)Found.
[email protected]5df038b2012-07-16 19:03:271238 extensions::ProviderCollection::const_iterator i;
[email protected]8e4560b62011-01-14 10:09:141239 for (i = external_extension_providers_.begin();
1240 i != external_extension_providers_.end(); ++i) {
[email protected]5df038b2012-07-16 19:03:271241 extensions::ExternalProviderInterface* provider = i->get();
[email protected]8e4560b62011-01-14 10:09:141242 provider->VisitRegisteredExtension();
1243 }
1244
[email protected]50067e52011-10-20 23:17:071245 // Do any required work that we would have done after completion of all
1246 // providers.
1247 if (external_extension_providers_.empty()) {
1248 OnAllExternalProvidersReady();
1249 }
[email protected]9f1087e2009-06-15 17:29:321250}
1251
[email protected]50067e52011-10-20 23:17:071252void ExtensionService::OnExternalProviderReady(
[email protected]5df038b2012-07-16 19:03:271253 const extensions::ExternalProviderInterface* provider) {
[email protected]a29a517a2011-01-21 21:11:121254 CHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
[email protected]50067e52011-10-20 23:17:071255 CHECK(provider->IsReady());
[email protected]a29a517a2011-01-21 21:11:121256
1257 // An external provider has finished loading. We only take action
[email protected]8e4560b62011-01-14 10:09:141258 // if all of them are finished. So we check them first.
[email protected]94fde232012-04-27 10:22:301259 if (AreAllExternalProvidersReady())
1260 OnAllExternalProvidersReady();
1261}
1262
1263bool ExtensionService::AreAllExternalProvidersReady() const {
[email protected]5df038b2012-07-16 19:03:271264 extensions::ProviderCollection::const_iterator i;
[email protected]8e4560b62011-01-14 10:09:141265 for (i = external_extension_providers_.begin();
1266 i != external_extension_providers_.end(); ++i) {
[email protected]94fde232012-04-27 10:22:301267 if (!i->get()->IsReady())
1268 return false;
[email protected]8e4560b62011-01-14 10:09:141269 }
[email protected]94fde232012-04-27 10:22:301270 return true;
[email protected]50067e52011-10-20 23:17:071271}
1272
1273void ExtensionService::OnAllExternalProvidersReady() {
1274 CHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
[email protected]94fde232012-04-27 10:22:301275 base::TimeDelta elapsed = base::Time::Now() - profile_->GetStartTime();
1276 UMA_HISTOGRAM_TIMES("Extension.ExternalProvidersReadyAfter", elapsed);
[email protected]50067e52011-10-20 23:17:071277
1278 // Install any pending extensions.
[email protected]94fde232012-04-27 10:22:301279 if (update_once_all_providers_are_ready_ && updater()) {
1280 update_once_all_providers_are_ready_ = false;
[email protected]4e9b59d2013-12-18 06:47:141281 extensions::ExtensionUpdater::CheckParams params;
1282 params.callback = external_updates_finished_callback_;
1283 updater()->CheckNow(params);
[email protected]8e4560b62011-01-14 10:09:141284 }
1285
1286 // Uninstall all the unclaimed extensions.
[email protected]45759612012-07-10 17:21:231287 scoped_ptr<extensions::ExtensionPrefs::ExtensionsInfo> extensions_info(
[email protected]8e4560b62011-01-14 10:09:141288 extension_prefs_->GetInstalledExtensionsInfo());
1289 for (size_t i = 0; i < extensions_info->size(); ++i) {
1290 ExtensionInfo* info = extensions_info->at(i).get();
[email protected]1d5e58b2013-01-31 08:41:401291 if (Manifest::IsExternalLocation(info->extension_location))
[email protected]8e4560b62011-01-14 10:09:141292 CheckExternalUninstall(info->extension_id);
1293 }
[email protected]e5af875f2011-10-10 21:09:141294 IdentifyAlertableExtensions();
[email protected]e5af875f2011-10-10 21:09:141295}
1296
1297void ExtensionService::IdentifyAlertableExtensions() {
1298 CHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
1299
[email protected]07c9f2f42012-02-29 18:45:221300 // Build up the lists of extensions that require acknowledgment. If this is
1301 // the first time, grandfather extensions that would have caused
1302 // notification.
[email protected]89226982012-07-16 20:09:181303 extension_error_ui_.reset(ExtensionErrorUI::Create(this));
[email protected]e5af875f2011-10-10 21:09:141304
[email protected]a9aa5932012-01-25 08:27:401305 bool did_show_alert = false;
[email protected]89226982012-07-16 20:09:181306 if (PopulateExtensionErrorUI(extension_error_ui_.get())) {
[email protected]460c6712013-04-24 07:20:011307 if (!is_first_run_) {
[email protected]a9aa5932012-01-25 08:27:401308 CHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
[email protected]89226982012-07-16 20:09:181309 did_show_alert = extension_error_ui_->ShowErrorInBubbleView();
[email protected]e5af875f2011-10-10 21:09:141310 } else {
1311 // First run. Just acknowledge all the extensions, silently, by
1312 // shortcutting the display of the UI and going straight to the
1313 // callback for pressing the Accept button.
[email protected]a9aa5932012-01-25 08:27:401314 HandleExtensionAlertAccept();
[email protected]e5af875f2011-10-10 21:09:141315 }
1316 }
[email protected]a9aa5932012-01-25 08:27:401317
[email protected]612a1cb12012-10-17 13:18:031318 UpdateExternalExtensionAlert();
1319
[email protected]a9aa5932012-01-25 08:27:401320 if (!did_show_alert)
[email protected]89226982012-07-16 20:09:181321 extension_error_ui_.reset();
[email protected]e5af875f2011-10-10 21:09:141322}
1323
[email protected]89226982012-07-16 20:09:181324bool ExtensionService::PopulateExtensionErrorUI(
1325 ExtensionErrorUI* extension_error_ui) {
[email protected]07c9f2f42012-02-29 18:45:221326 bool needs_alert = false;
[email protected]695b5712012-12-06 23:55:281327
1328 // Extensions that are blacklisted.
[email protected]bb1bc9b32013-12-21 03:09:141329 const ExtensionSet& blacklisted_set = registry_->blacklisted_extensions();
1330 for (ExtensionSet::const_iterator it = blacklisted_set.begin();
1331 it != blacklisted_set.end(); ++it) {
[email protected]695b5712012-12-06 23:55:281332 std::string id = (*it)->id();
1333 if (!extension_prefs_->IsBlacklistedExtensionAcknowledged(id)) {
1334 extension_error_ui->AddBlacklistedExtension(id);
1335 needs_alert = true;
1336 }
1337 }
1338
[email protected]bb1bc9b32013-12-21 03:09:141339 const ExtensionSet& enabled_set = registry_->enabled_extensions();
1340 for (ExtensionSet::const_iterator iter = enabled_set.begin();
1341 iter != enabled_set.end(); ++iter) {
[email protected]cadac622013-06-11 16:46:361342 const Extension* e = iter->get();
[email protected]695b5712012-12-06 23:55:281343
[email protected]870f5572013-12-19 12:30:151344 // Skip for extensions that have pending updates. They will be checked again
1345 // once the pending update is finished.
1346 if (pending_extension_manager()->IsIdPending(e->id()))
1347 continue;
1348
[email protected]695b5712012-12-06 23:55:281349 // Extensions disabled by policy. Note: this no longer includes blacklisted
1350 // extensions, though we still show the same UI.
[email protected]fdd679b2012-11-15 20:49:391351 if (!system_->management_policy()->UserMayLoad(e, NULL)) {
[email protected]07c9f2f42012-02-29 18:45:221352 if (!extension_prefs_->IsBlacklistedExtensionAcknowledged(e->id())) {
[email protected]89226982012-07-16 20:09:181353 extension_error_ui->AddBlacklistedExtension(e->id());
[email protected]07c9f2f42012-02-29 18:45:221354 needs_alert = true;
1355 }
1356 }
[email protected]07c9f2f42012-02-29 18:45:221357 }
[email protected]695b5712012-12-06 23:55:281358
[email protected]07c9f2f42012-02-29 18:45:221359 return needs_alert;
1360}
1361
[email protected]a9aa5932012-01-25 08:27:401362void ExtensionService::HandleExtensionAlertClosed() {
[email protected]612a1cb12012-10-17 13:18:031363 const ExtensionIdSet* extension_ids =
1364 extension_error_ui_->get_blacklisted_extension_ids();
[email protected]e5af875f2011-10-10 21:09:141365 for (ExtensionIdSet::const_iterator iter = extension_ids->begin();
1366 iter != extension_ids->end(); ++iter) {
1367 extension_prefs_->AcknowledgeBlacklistedExtension(*iter);
1368 }
[email protected]879a6092013-03-06 04:12:501369 extension_error_ui_.reset();
1370}
1371
1372void ExtensionService::HandleExtensionAlertAccept() {
[email protected]73a85e012013-04-04 10:45:301373 extension_error_ui_->Close();
[email protected]e5af875f2011-10-10 21:09:141374}
1375
[email protected]47fc70c2011-12-06 07:29:511376void ExtensionService::AcknowledgeExternalExtension(const std::string& id) {
1377 extension_prefs_->AcknowledgeExternalExtension(id);
[email protected]612a1cb12012-10-17 13:18:031378 UpdateExternalExtensionAlert();
[email protected]47fc70c2011-12-06 07:29:511379}
1380
[email protected]d96eb512012-11-01 23:44:081381bool ExtensionService::IsUnacknowledgedExternalExtension(
1382 const Extension* extension) {
[email protected]b82d18da2012-11-09 00:11:321383 if (!FeatureSwitch::prompt_for_external_extensions()->IsEnabled())
1384 return false;
1385
[email protected]1d5e58b2013-01-31 08:41:401386 return (Manifest::IsExternalLocation(extension->location()) &&
[email protected]d96eb512012-11-01 23:44:081387 !extension_prefs_->IsExternalExtensionAcknowledged(extension->id()) &&
1388 !(extension_prefs_->GetDisableReasons(extension->id()) &
1389 Extension::DISABLE_SIDELOAD_WIPEOUT));
1390}
1391
[email protected]59ee99d2013-10-11 15:46:161392void ExtensionService::ReconcileKnownDisabled() {
[email protected]60a8bc962013-12-03 03:17:271393 ExtensionIdSet known_disabled_ids;
1394 if (!extension_prefs_->GetKnownDisabled(&known_disabled_ids)) {
[email protected]bb1bc9b32013-12-21 03:09:141395 extension_prefs_->SetKnownDisabled(
1396 registry_->disabled_extensions().GetIDs());
[email protected]018a5682013-11-20 02:41:211397 UMA_HISTOGRAM_BOOLEAN("Extensions.KnownDisabledInitialized", true);
1398 return;
[email protected]59ee99d2013-10-11 15:46:161399 }
[email protected]195c1582013-10-29 18:42:231400
[email protected]bb1bc9b32013-12-21 03:09:141401 // Both |known_disabled_ids| and |extensions| are ordered (by definition
[email protected]018a5682013-11-20 02:41:211402 // of std::map and std::set). Iterate forward over both sets in parallel
1403 // to find matching IDs and disable the corresponding extensions.
[email protected]bb1bc9b32013-12-21 03:09:141404 const ExtensionSet& enabled_set = registry_->enabled_extensions();
1405 ExtensionSet::const_iterator extensions_it = enabled_set.begin();
[email protected]018a5682013-11-20 02:41:211406 ExtensionIdSet::const_iterator known_disabled_ids_it =
1407 known_disabled_ids.begin();
1408 int known_disabled_count = 0;
[email protected]bb1bc9b32013-12-21 03:09:141409 while (extensions_it != enabled_set.end() &&
[email protected]018a5682013-11-20 02:41:211410 known_disabled_ids_it != known_disabled_ids.end()) {
1411 const std::string& extension_id = extensions_it->get()->id();
1412 const int comparison = extension_id.compare(*known_disabled_ids_it);
1413 if (comparison < 0) {
1414 ++extensions_it;
1415 } else if (comparison > 0) {
1416 ++known_disabled_ids_it;
1417 } else {
1418 ++known_disabled_count;
1419 // Advance |extensions_it| immediately as it will be invalidated upon
1420 // disabling the extension it points to.
1421 ++extensions_it;
1422 ++known_disabled_ids_it;
1423 DisableExtension(extension_id, Extension::DISABLE_KNOWN_DISABLED);
1424 }
1425 }
1426 UMA_HISTOGRAM_COUNTS_100("Extensions.KnownDisabledReDisabled",
1427 known_disabled_count);
1428
[email protected]195c1582013-10-29 18:42:231429 // Update the list of known disabled to reflect every change to
1430 // |disabled_extensions_| from this point forward.
[email protected]bb1bc9b32013-12-21 03:09:141431 registry_->SetDisabledModificationCallback(
[email protected]195c1582013-10-29 18:42:231432 base::Bind(&extensions::ExtensionPrefs::SetKnownDisabled,
1433 base::Unretained(extension_prefs_)));
[email protected]59ee99d2013-10-11 15:46:161434}
1435
[email protected]89226982012-07-16 20:09:181436void ExtensionService::HandleExtensionAlertDetails() {
1437 extension_error_ui_->ShowExtensions();
[email protected]73a85e012013-04-04 10:45:301438 // ShowExtensions may cause the error UI to close synchronously, e.g. if it
1439 // causes a navigation.
1440 if (extension_error_ui_)
1441 extension_error_ui_->Close();
[email protected]6c751e72010-11-23 10:11:101442}
1443
[email protected]612a1cb12012-10-17 13:18:031444void ExtensionService::UpdateExternalExtensionAlert() {
[email protected]41070e8d2012-10-24 01:34:361445 if (!FeatureSwitch::prompt_for_external_extensions()->IsEnabled())
[email protected]612a1cb12012-10-17 13:18:031446 return;
1447
1448 const Extension* extension = NULL;
[email protected]bb1bc9b32013-12-21 03:09:141449 const ExtensionSet& disabled_extensions = registry_->disabled_extensions();
1450 for (ExtensionSet::const_iterator iter = disabled_extensions.begin();
1451 iter != disabled_extensions.end(); ++iter) {
[email protected]cadac622013-06-11 16:46:361452 const Extension* e = iter->get();
[email protected]d96eb512012-11-01 23:44:081453 if (IsUnacknowledgedExternalExtension(e)) {
1454 extension = e;
1455 break;
[email protected]612a1cb12012-10-17 13:18:031456 }
1457 }
1458
1459 if (extension) {
[email protected]d96eb512012-11-01 23:44:081460 if (!extensions::HasExternalInstallError(this)) {
1461 if (extension_prefs_->IncrementAcknowledgePromptCount(extension->id()) >
[email protected]612a1cb12012-10-17 13:18:031462 kMaxExtensionAcknowledgePromptCount) {
[email protected]d96eb512012-11-01 23:44:081463 // Stop prompting for this extension, and check if there's another
1464 // one that needs prompting.
[email protected]612a1cb12012-10-17 13:18:031465 extension_prefs_->AcknowledgeExternalExtension(extension->id());
[email protected]d96eb512012-11-01 23:44:081466 UpdateExternalExtensionAlert();
1467 UMA_HISTOGRAM_ENUMERATION("Extensions.ExternalExtensionEvent",
1468 EXTERNAL_EXTENSION_IGNORED,
1469 EXTERNAL_EXTENSION_BUCKET_BOUNDARY);
[email protected]446e37e2013-08-07 00:30:021470 if (extensions::ManifestURL::UpdatesFromGallery(extension)) {
1471 UMA_HISTOGRAM_ENUMERATION(
1472 "Extensions.ExternalExtensionEventWebstore",
1473 EXTERNAL_EXTENSION_IGNORED,
1474 EXTERNAL_EXTENSION_BUCKET_BOUNDARY);
1475 } else {
1476 UMA_HISTOGRAM_ENUMERATION(
1477 "Extensions.ExternalExtensionEventNonWebstore",
1478 EXTERNAL_EXTENSION_IGNORED,
1479 EXTERNAL_EXTENSION_BUCKET_BOUNDARY);
1480 }
[email protected]d96eb512012-11-01 23:44:081481 return;
[email protected]612a1cb12012-10-17 13:18:031482 }
[email protected]b3aa7182013-04-25 04:45:231483 if (is_first_run_)
1484 extension_prefs_->SetExternalInstallFirstRun(extension->id());
1485 // first_run is true if the extension was installed during a first run
1486 // (even if it's post-first run now).
1487 bool first_run = extension_prefs_->IsExternalInstallFirstRun(
1488 extension->id());
1489 extensions::AddExternalInstallError(this, extension, first_run);
[email protected]612a1cb12012-10-17 13:18:031490 }
1491 } else {
1492 extensions::RemoveExternalInstallError(this);
1493 }
[email protected]612a1cb12012-10-17 13:18:031494}
1495
[email protected]a9f39a312010-12-23 22:14:271496void ExtensionService::UnloadExtension(
1497 const std::string& extension_id,
[email protected]b0af4792013-10-23 09:12:131498 UnloadedExtensionInfo::Reason reason) {
[email protected]27e469a2010-01-11 20:35:091499 // Make sure the extension gets deleted after we return from this function.
[email protected]599539802014-01-07 23:06:001500 int include_mask =
1501 ExtensionRegistry::EVERYTHING & ~ExtensionRegistry::TERMINATED;
[email protected]9adb9692010-10-29 23:14:021502 scoped_refptr<const Extension> extension(
[email protected]599539802014-01-07 23:06:001503 registry_->GetExtensionById(extension_id, include_mask));
[email protected]631cf822009-05-15 07:01:251504
[email protected]fa0c96732010-11-17 00:14:231505 // This method can be called via PostTask, so the extension may have been
1506 // unloaded by the time this runs.
[email protected]dc24976f2013-06-02 21:15:091507 if (!extension.get()) {
[email protected]dd163fb02011-05-04 22:22:171508 // In case the extension may have crashed/uninstalled. Allow the profile to
1509 // clean up its RequestContexts.
[email protected]31d8f5f22012-04-02 15:22:081510 system_->UnregisterExtensionWithRequestContexts(extension_id, reason);
[email protected]fa0c96732010-11-17 00:14:231511 return;
[email protected]dd163fb02011-05-04 22:22:171512 }
[email protected]0c6da502009-08-14 22:32:391513
[email protected]1eb175082010-02-10 09:26:161514 // Keep information about the extension so that we can reload it later
1515 // even if it's not permanently installed.
1516 unloaded_extension_paths_[extension->id()] = extension->path();
1517
[email protected]f17dbd42010-08-16 23:21:101518 // Clean up if the extension is meant to be enabled after a reload.
[email protected]b914e2952013-04-26 07:10:031519 reloading_extensions_.erase(extension->id());
[email protected]f17dbd42010-08-16 23:21:101520
[email protected]bb1bc9b32013-12-21 03:09:141521 if (registry_->disabled_extensions().Contains(extension->id())) {
1522 registry_->RemoveDisabled(extension->id());
[email protected]dd163fb02011-05-04 22:22:171523 // Make sure the profile cleans up its RequestContexts when an already
1524 // disabled extension is unloaded (since they are also tracking the disabled
1525 // extensions).
[email protected]31d8f5f22012-04-02 15:22:081526 system_->UnregisterExtensionWithRequestContexts(extension_id, reason);
[email protected]45f5b7d2014-01-22 23:47:131527 // Don't send the unloaded notification. It was sent when the extension
1528 // was disabled.
[email protected]60a174a2013-08-02 20:29:281529 } else {
[email protected]bb1bc9b32013-12-21 03:09:141530 // Remove the extension from the enabled list.
1531 registry_->RemoveEnabled(extension->id());
[email protected]60a174a2013-08-02 20:29:281532 NotifyExtensionUnloaded(extension.get(), reason);
[email protected]0c6da502009-08-14 22:32:391533 }
1534
[email protected]fb789532013-08-27 02:40:211535 content::NotificationService::current()->Notify(
1536 chrome::NOTIFICATION_EXTENSION_REMOVED,
1537 content::Source<Profile>(profile_),
1538 content::Details<const Extension>(extension.get()));
[email protected]631cf822009-05-15 07:01:251539}
1540
[email protected]8b1ec202013-09-05 02:09:501541void ExtensionService::RemoveComponentExtension(
1542 const std::string& extension_id) {
1543 scoped_refptr<const Extension> extension(
1544 GetExtensionById(extension_id, false));
[email protected]b0af4792013-10-23 09:12:131545 UnloadExtension(extension_id, UnloadedExtensionInfo::REASON_UNINSTALL);
[email protected]8b1ec202013-09-05 02:09:501546 content::NotificationService::current()->Notify(
1547 chrome::NOTIFICATION_EXTENSION_UNINSTALLED,
1548 content::Source<Profile>(profile_),
1549 content::Details<const Extension>(extension.get()));
1550}
1551
[email protected]bb1bc9b32013-12-21 03:09:141552void ExtensionService::UnloadAllExtensionsForTest() {
1553 UnloadAllExtensionsInternal();
[email protected]9f1087e2009-06-15 17:29:321554}
1555
[email protected]bb1bc9b32013-12-21 03:09:141556void ExtensionService::ReloadExtensionsForTest() {
1557 // Calling UnloadAllExtensionsForTest here triggers a false-positive presubmit
1558 // warning about calling test code in production.
1559 UnloadAllExtensionsInternal();
[email protected]eac88332012-12-26 17:57:451560 component_loader_->LoadAll();
[email protected]d8c8f25f2011-11-02 18:18:011561 extensions::InstalledLoader(this).LoadAllExtensions();
[email protected]4a10006a2013-05-17 23:18:351562 // Don't call SetReadyAndNotifyListeners() since tests call this multiple
1563 // times.
[email protected]9f1087e2009-06-15 17:29:321564}
1565
[email protected]eaa7dd182010-12-14 11:09:001566void ExtensionService::GarbageCollectExtensions() {
[email protected]c04fd3dd2013-09-05 08:20:101567#if defined(OS_CHROMEOS)
1568 if (disable_garbage_collection_)
1569 return;
1570#endif
1571
[email protected]2f8757c32012-06-19 19:17:471572 if (extension_prefs_->pref_service()->ReadOnly())
1573 return;
1574
[email protected]e8107c12014-01-14 15:38:011575 bool clean_temp_dir = true;
1576
[email protected]9bd9a6862012-11-29 09:24:221577 if (pending_extension_manager()->HasPendingExtensions()) {
[email protected]e8107c12014-01-14 15:38:011578 // Don't garbage collect temp dir while there are pending installations,
1579 // which may be using the temporary installation directory. Try to garbage
1580 // collect again later.
1581 clean_temp_dir = false;
[email protected]b3a25092013-05-28 22:08:161582 base::MessageLoop::current()->PostDelayedTask(
[email protected]9bd9a6862012-11-29 09:24:221583 FROM_HERE,
1584 base::Bind(&ExtensionService::GarbageCollectExtensions, AsWeakPtr()),
1585 base::TimeDelta::FromSeconds(kGarbageCollectRetryDelay));
[email protected]9bd9a6862012-11-29 09:24:221586 }
1587
[email protected]45759612012-07-10 17:21:231588 scoped_ptr<extensions::ExtensionPrefs::ExtensionsInfo> info(
[email protected]2f8757c32012-06-19 19:17:471589 extension_prefs_->GetInstalledExtensionsInfo());
1590
[email protected]650b2d52013-02-10 03:41:451591 std::multimap<std::string, base::FilePath> extension_paths;
[email protected]2f8757c32012-06-19 19:17:471592 for (size_t i = 0; i < info->size(); ++i)
[email protected]0db124b02012-11-07 04:55:051593 extension_paths.insert(std::make_pair(info->at(i)->extension_id,
1594 info->at(i)->extension_path));
1595
[email protected]399583b2012-12-11 09:33:421596 info = extension_prefs_->GetAllDelayedInstallInfo();
[email protected]0db124b02012-11-07 04:55:051597 for (size_t i = 0; i < info->size(); ++i)
1598 extension_paths.insert(std::make_pair(info->at(i)->extension_id,
1599 info->at(i)->extension_path));
[email protected]2f8757c32012-06-19 19:17:471600
[email protected]7f8f24f2012-11-15 19:40:141601 if (!GetFileTaskRunner()->PostTask(
1602 FROM_HERE,
[email protected]2f8757c32012-06-19 19:17:471603 base::Bind(
1604 &extension_file_util::GarbageCollectExtensions,
1605 install_directory_,
[email protected]e8107c12014-01-14 15:38:011606 extension_paths,
1607 clean_temp_dir))) {
[email protected]2f8757c32012-06-19 19:17:471608 NOTREACHED();
[email protected]31bb5ee62012-09-12 22:58:401609 }
[email protected]3cf4f0992009-02-03 23:00:301610}
1611
[email protected]820d9bd2013-04-03 03:46:031612void ExtensionService::SetReadyAndNotifyListeners() {
[email protected]4a10006a2013-05-17 23:18:351613 ready_->Signal();
[email protected]820d9bd2013-04-03 03:46:031614 content::NotificationService::current()->Notify(
1615 chrome::NOTIFICATION_EXTENSIONS_READY,
1616 content::Source<Profile>(profile_),
1617 content::NotificationService::NoDetails());
1618}
1619
[email protected]eaa7dd182010-12-14 11:09:001620void ExtensionService::OnLoadedInstalledExtensions() {
[email protected]3eeddd892013-04-17 17:00:111621 if (updater_)
[email protected]93fd78f42009-07-10 16:43:171622 updater_->Start();
[email protected]fa6a9102010-11-22 15:38:501623
[email protected]bc151cf92013-02-12 04:57:261624 OnBlacklistUpdated();
[email protected]e72e8eb82009-06-18 17:21:511625}
1626
[email protected]fcb58a862012-05-01 01:03:151627void ExtensionService::AddExtension(const Extension* extension) {
[email protected]c8d407e2011-04-28 21:27:171628 // TODO(jstritar): We may be able to get rid of this branch by overriding the
1629 // default extension state to DISABLED when the --disable-extensions flag
1630 // is set (http://crbug.com/29067).
1631 if (!extensions_enabled() &&
1632 !extension->is_theme() &&
[email protected]1d5e58b2013-01-31 08:41:401633 extension->location() != Manifest::COMPONENT &&
1634 !Manifest::IsExternalLocation(extension->location())) {
[email protected]fcb58a862012-05-01 01:03:151635 return;
[email protected]330840c2012-08-29 22:21:011636 }
[email protected]c8d407e2011-04-28 21:27:171637
[email protected]b914e2952013-04-26 07:10:031638 bool is_extension_upgrade = false;
[email protected]116d40e2013-08-08 17:23:171639 bool is_extension_installed = false;
1640 const Extension* old = GetInstalledExtension(extension->id());
1641 if (old) {
1642 is_extension_installed = true;
1643 int version_compare_result =
1644 extension->version()->CompareTo(*(old->version()));
1645 is_extension_upgrade = version_compare_result > 0;
[email protected]b914e2952013-04-26 07:10:031646 // Other than for unpacked extensions, CrxInstaller should have guaranteed
1647 // that we aren't downgrading.
1648 if (!Manifest::IsUnpackedLocation(extension->location()))
[email protected]116d40e2013-08-08 17:23:171649 CHECK_GE(version_compare_result, 0);
[email protected]b914e2952013-04-26 07:10:031650 }
[email protected]45f5b7d2014-01-22 23:47:131651 system_->runtime_data()->SetBeingUpgraded(extension, is_extension_upgrade);
[email protected]c8d407e2011-04-28 21:27:171652
[email protected]1eb175082010-02-10 09:26:161653 // The extension is now loaded, remove its data from unloaded extension map.
1654 unloaded_extension_paths_.erase(extension->id());
1655
[email protected]bb7f40952011-01-13 00:21:201656 // If a terminated extension is loaded, remove it from the terminated list.
1657 UntrackTerminatedExtension(extension->id());
1658
[email protected]f17dbd42010-08-16 23:21:101659 // If the extension was disabled for a reload, then enable it.
[email protected]ca2e82022013-04-29 16:48:411660 bool reloading = reloading_extensions_.erase(extension->id()) > 0;
[email protected]f17dbd42010-08-16 23:21:101661
[email protected]b914e2952013-04-26 07:10:031662 // Check if the extension's privileges have changed and mark the
1663 // extension disabled if necessary.
[email protected]116d40e2013-08-08 17:23:171664 CheckPermissionsIncrease(extension, is_extension_installed);
[email protected]b914e2952013-04-26 07:10:031665
[email protected]116d40e2013-08-08 17:23:171666 if (is_extension_installed && !reloading) {
[email protected]ca2e82022013-04-29 16:48:411667 // To upgrade an extension in place, unload the old one and then load the
1668 // new one. ReloadExtension disables the extension, which is sufficient.
[email protected]b0af4792013-10-23 09:12:131669 UnloadExtension(extension->id(), UnloadedExtensionInfo::REASON_UPDATE);
[email protected]b914e2952013-04-26 07:10:031670 }
[email protected]0c6da502009-08-14 22:32:391671
[email protected]695b5712012-12-06 23:55:281672 if (extension_prefs_->IsExtensionBlacklisted(extension->id())) {
[email protected]ac875372013-02-28 04:36:091673 // Only prefs is checked for the blacklist. We rely on callers to check the
1674 // blacklist before calling into here, e.g. CrxInstaller checks before
[email protected]9f3c8532013-07-31 19:52:071675 // installation then threads through the install and pending install flow
1676 // of this class, and we check when loading installed extensions.
[email protected]bb1bc9b32013-12-21 03:09:141677 registry_->AddBlacklisted(extension);
[email protected]ca2e82022013-04-29 16:48:411678 } else if (!reloading &&
1679 extension_prefs_->IsExtensionDisabled(extension->id())) {
[email protected]bb1bc9b32013-12-21 03:09:141680 registry_->AddDisabled(extension);
[email protected]f8aefb132013-10-30 09:29:521681 if (extension_sync_service_)
1682 extension_sync_service_->SyncExtensionChangeIfNeeded(*extension);
[email protected]44d62b62012-04-11 00:06:031683 content::NotificationService::current()->Notify(
1684 chrome::NOTIFICATION_EXTENSION_UPDATE_DISABLED,
1685 content::Source<Profile>(profile_),
1686 content::Details<const Extension>(extension));
[email protected]62f051c2012-03-29 17:04:441687
[email protected]7e9e2422012-12-13 19:54:191688 // Show the extension disabled error if a permissions increase was the
1689 // only reason it was disabled.
1690 if (extension_prefs_->GetDisableReasons(extension->id()) ==
[email protected]44d62b62012-04-11 00:06:031691 Extension::DISABLE_PERMISSIONS_INCREASE) {
[email protected]62f051c2012-03-29 17:04:441692 extensions::AddExtensionDisabledError(this, extension);
1693 }
[email protected]ca2e82022013-04-29 16:48:411694 } else if (reloading) {
1695 // Replace the old extension with the new version.
[email protected]bb1bc9b32013-12-21 03:09:141696 CHECK(!registry_->AddDisabled(extension));
[email protected]ca2e82022013-04-29 16:48:411697 EnableExtension(extension->id());
[email protected]695b5712012-12-06 23:55:281698 } else {
1699 // All apps that are displayed in the launcher are ordered by their ordinals
1700 // so we must ensure they have valid ordinals.
1701 if (extension->RequiresSortOrdinal()) {
[email protected]bd36b652013-02-27 02:13:251702 if (!extension->ShouldDisplayInNewTabPage()) {
[email protected]74474042013-11-21 12:03:541703 extension_prefs_->app_sorting()->MarkExtensionAsHidden(extension->id());
[email protected]bd36b652013-02-27 02:13:251704 }
[email protected]74474042013-11-21 12:03:541705 extension_prefs_->app_sorting()->EnsureValidOrdinals(
[email protected]695b5712012-12-06 23:55:281706 extension->id(), syncer::StringOrdinal());
1707 }
1708
[email protected]bb1bc9b32013-12-21 03:09:141709 registry_->AddEnabled(extension);
[email protected]f8aefb132013-10-30 09:29:521710 if (extension_sync_service_)
1711 extension_sync_service_->SyncExtensionChangeIfNeeded(*extension);
[email protected]695b5712012-12-06 23:55:281712 NotifyExtensionLoaded(extension);
[email protected]f574c402012-12-04 23:20:311713 }
[email protected]45f5b7d2014-01-22 23:47:131714 system_->runtime_data()->SetBeingUpgraded(extension, false);
[email protected]aab98a52009-12-02 03:22:351715}
1716
[email protected]8c484b742012-11-29 06:05:361717void ExtensionService::AddComponentExtension(const Extension* extension) {
1718 const std::string old_version_string(
1719 extension_prefs_->GetVersionString(extension->id()));
[email protected]c5e4a2222014-01-03 16:06:131720 const Version old_version(old_version_string);
[email protected]8c484b742012-11-29 06:05:361721
[email protected]0181a7d2013-11-12 01:08:421722 VLOG(1) << "AddComponentExtension " << extension->name();
[email protected]8c484b742012-11-29 06:05:361723 if (!old_version.IsValid() || !old_version.Equals(*extension->version())) {
1724 VLOG(1) << "Component extension " << extension->name() << " ("
1725 << extension->id() << ") installing/upgrading from '"
1726 << old_version_string << "' to " << extension->version()->GetString();
1727
1728 AddNewOrUpdatedExtension(extension,
[email protected]399583b2012-12-11 09:33:421729 Extension::ENABLED_COMPONENT,
[email protected]8e289f0b2013-12-17 17:49:071730 extensions::NOT_BLACKLISTED,
[email protected]d8fd0fd2014-03-24 13:16:061731 syncer::StringOrdinal(),
1732 std::string());
[email protected]8c484b742012-11-29 06:05:361733 return;
1734 }
1735
1736 AddExtension(extension);
1737}
1738
[email protected]b914e2952013-04-26 07:10:031739void ExtensionService::UpdateActivePermissions(const Extension* extension) {
[email protected]902fd7b2011-07-27 18:42:311740 // If the extension has used the optional permissions API, it will have a
1741 // custom set of active permissions defined in the extension prefs. Here,
1742 // we update the extension's active permissions based on the prefs.
[email protected]c2e66e12012-06-27 06:27:061743 scoped_refptr<PermissionSet> active_permissions =
[email protected]7c82539c2014-02-19 06:09:171744 extension_prefs_->GetActivePermissions(extension->id());
[email protected]902fd7b2011-07-27 18:42:311745
[email protected]dc24976f2013-06-02 21:15:091746 if (active_permissions.get()) {
[email protected]902fd7b2011-07-27 18:42:311747 // We restrict the active permissions to be within the bounds defined in the
1748 // extension's manifest.
1749 // a) active permissions must be a subset of optional + default permissions
1750 // b) active permissions must contains all default permissions
[email protected]c2e66e12012-06-27 06:27:061751 scoped_refptr<PermissionSet> total_permissions =
1752 PermissionSet::CreateUnion(
[email protected]2cb5e302013-05-09 05:00:061753 extensions::PermissionsData::GetRequiredPermissions(extension),
1754 extensions::PermissionsData::GetOptionalPermissions(extension));
[email protected]902fd7b2011-07-27 18:42:311755
1756 // Make sure the active permissions contain no more than optional + default.
[email protected]c2e66e12012-06-27 06:27:061757 scoped_refptr<PermissionSet> adjusted_active =
1758 PermissionSet::CreateIntersection(
[email protected]902fd7b2011-07-27 18:42:311759 total_permissions.get(), active_permissions.get());
1760
1761 // Make sure the active permissions contain the default permissions.
[email protected]c2e66e12012-06-27 06:27:061762 adjusted_active = PermissionSet::CreateUnion(
[email protected]2cb5e302013-05-09 05:00:061763 extensions::PermissionsData::GetRequiredPermissions(extension),
1764 adjusted_active.get());
[email protected]902fd7b2011-07-27 18:42:311765
[email protected]c333e792012-01-06 16:57:391766 extensions::PermissionsUpdater perms_updater(profile());
[email protected]dc24976f2013-06-02 21:15:091767 perms_updater.UpdateActivePermissions(extension, adjusted_active.get());
[email protected]902fd7b2011-07-27 18:42:311768 }
[email protected]b914e2952013-04-26 07:10:031769}
1770
1771void ExtensionService::CheckPermissionsIncrease(const Extension* extension,
[email protected]116d40e2013-08-08 17:23:171772 bool is_extension_installed) {
[email protected]b914e2952013-04-26 07:10:031773 UpdateActivePermissions(extension);
[email protected]902fd7b2011-07-27 18:42:311774
[email protected]8d888c12010-11-30 00:00:251775 // We keep track of all permissions the user has granted each extension.
1776 // This allows extensions to gracefully support backwards compatibility
1777 // by including unknown permissions in their manifests. When the user
1778 // installs the extension, only the recognized permissions are recorded.
1779 // When the unknown permissions become recognized (e.g., through browser
1780 // upgrade), we can prompt the user to accept these new permissions.
1781 // Extensions can also silently upgrade to less permissions, and then
1782 // silently upgrade to a version that adds these permissions back.
1783 //
1784 // For example, pretend that Chrome 10 includes a permission "omnibox"
1785 // for an API that adds suggestions to the omnibox. An extension can
1786 // maintain backwards compatibility while still having "omnibox" in the
1787 // manifest. If a user installs the extension on Chrome 9, the browser
1788 // will record the permissions it recognized, not including "omnibox."
1789 // When upgrading to Chrome 10, "omnibox" will be recognized and Chrome
1790 // will disable the extension and prompt the user to approve the increase
1791 // in privileges. The extension could then release a new version that
1792 // removes the "omnibox" permission. When the user upgrades, Chrome will
1793 // still remember that "omnibox" had been granted, so that if the
1794 // extension once again includes "omnibox" in an upgrade, the extension
1795 // can upgrade without requiring this user's approval.
[email protected]eb5e4f92012-08-15 23:33:281796 int disable_reasons = extension_prefs_->GetDisableReasons(extension->id());
[email protected]8d888c12010-11-30 00:00:251797
[email protected]211a3f32013-05-28 21:48:181798 bool auto_grant_permission =
[email protected]1b563df2013-10-30 16:49:361799 (!is_extension_installed && extension->was_installed_by_default()) ||
[email protected]45928b682013-11-28 08:20:271800 extensions::ExtensionsBrowserClient::Get()->IsRunningInForcedAppMode();
[email protected]b914e2952013-04-26 07:10:031801 // Silently grant all active permissions to default apps only on install.
1802 // After install they should behave like other apps.
[email protected]211a3f32013-05-28 21:48:181803 // Silently grant all active permissions to apps install in kiosk mode on both
1804 // install and update.
1805 if (auto_grant_permission)
[email protected]b914e2952013-04-26 07:10:031806 GrantPermissions(extension);
1807
1808 bool is_privilege_increase = false;
1809 // We only need to compare the granted permissions to the current permissions
1810 // if the extension is not allowed to silently increase its permissions.
[email protected]13c68b62013-05-17 11:29:051811 if (!extensions::PermissionsData::CanSilentlyIncreasePermissions(extension) &&
[email protected]211a3f32013-05-28 21:48:181812 !auto_grant_permission) {
[email protected]8d888c12010-11-30 00:00:251813 // Add all the recognized permissions if the granted permissions list
1814 // hasn't been initialized yet.
[email protected]c2e66e12012-06-27 06:27:061815 scoped_refptr<PermissionSet> granted_permissions =
[email protected]902fd7b2011-07-27 18:42:311816 extension_prefs_->GetGrantedPermissions(extension->id());
[email protected]0d3e4a22011-06-23 19:02:521817 CHECK(granted_permissions.get());
[email protected]8d888c12010-11-30 00:00:251818
1819 // Here, we check if an extension's privileges have increased in a manner
1820 // that requires the user's approval. This could occur because the browser
1821 // upgraded and recognized additional privileges, or an extension upgrades
1822 // to a version that requires additional privileges.
[email protected]c41003472013-10-19 15:37:251823 is_privilege_increase =
1824 extensions::PermissionMessageProvider::Get()->IsPrivilegeIncrease(
1825 granted_permissions,
1826 extension->GetActivePermissions().get(),
1827 extension->GetType());
[email protected]8d888c12010-11-30 00:00:251828 }
1829
[email protected]116d40e2013-08-08 17:23:171830 if (is_extension_installed) {
[email protected]44d62b62012-04-11 00:06:031831 // If the extension was already disabled, suppress any alerts for becoming
1832 // disabled on permissions increase.
[email protected]b914e2952013-04-26 07:10:031833 bool previously_disabled =
1834 extension_prefs_->IsExtensionDisabled(extension->id());
[email protected]7e9e2422012-12-13 19:54:191835 // Legacy disabled extensions do not have a disable reason. Infer that if
1836 // there was no permission increase, it was likely disabled by the user.
1837 if (previously_disabled && disable_reasons == Extension::DISABLE_NONE &&
[email protected]b914e2952013-04-26 07:10:031838 !extension_prefs_->DidExtensionEscalatePermissions(extension->id())) {
[email protected]7e9e2422012-12-13 19:54:191839 disable_reasons |= Extension::DISABLE_USER_ACTION;
[email protected]44d62b62012-04-11 00:06:031840 }
[email protected]7e9e2422012-12-13 19:54:191841 // Extensions that came to us disabled from sync need a similar inference,
1842 // except based on the new version's permissions.
1843 if (previously_disabled &&
1844 disable_reasons == Extension::DISABLE_UNKNOWN_FROM_SYNC) {
1845 // Remove the DISABLE_UNKNOWN_FROM_SYNC reason.
1846 extension_prefs_->ClearDisableReasons(extension->id());
1847 if (!is_privilege_increase)
1848 disable_reasons |= Extension::DISABLE_USER_ACTION;
1849 }
[email protected]b914e2952013-04-26 07:10:031850 disable_reasons &= ~Extension::DISABLE_UNKNOWN_FROM_SYNC;
[email protected]8d888c12010-11-30 00:00:251851 }
1852
1853 // Extension has changed permissions significantly. Disable it. A
1854 // notification should be sent by the caller.
1855 if (is_privilege_increase) {
[email protected]7e9e2422012-12-13 19:54:191856 disable_reasons |= Extension::DISABLE_PERMISSIONS_INCREASE;
[email protected]fe2dd7742011-04-19 22:52:491857 if (!extension_prefs_->DidExtensionEscalatePermissions(extension->id())) {
1858 RecordPermissionMessagesHistogram(
1859 extension, "Extensions.Permissions_AutoDisable");
1860 }
[email protected]195c1582013-10-29 18:42:231861 extension_prefs_->SetExtensionState(extension->id(), Extension::DISABLED);
[email protected]8d888c12010-11-30 00:00:251862 extension_prefs_->SetDidExtensionEscalatePermissions(extension, true);
[email protected]b914e2952013-04-26 07:10:031863 }
1864 if (disable_reasons != Extension::DISABLE_NONE) {
[email protected]eb5e4f92012-08-15 23:33:281865 extension_prefs_->AddDisableReason(
1866 extension->id(),
1867 static_cast<Extension::DisableReason>(disable_reasons));
[email protected]8d888c12010-11-30 00:00:251868 }
1869}
1870
[email protected]eaa7dd182010-12-14 11:09:001871void ExtensionService::UpdateActiveExtensionsInCrashReporter() {
[email protected]c8865962009-12-16 07:47:391872 std::set<std::string> extension_ids;
[email protected]bb1bc9b32013-12-21 03:09:141873 const ExtensionSet& extensions = registry_->enabled_extensions();
1874 for (ExtensionSet::const_iterator iter = extensions.begin();
1875 iter != extensions.end(); ++iter) {
[email protected]cadac622013-06-11 16:46:361876 const Extension* extension = iter->get();
[email protected]1d5e58b2013-01-31 08:41:401877 if (!extension->is_theme() && extension->location() != Manifest::COMPONENT)
[email protected]84df8332011-12-06 18:22:461878 extension_ids.insert(extension->id());
[email protected]aab98a52009-12-02 03:22:351879 }
1880
[email protected]dcc47642014-03-26 22:03:491881 // TODO(kalman): This is broken. ExtensionService is per-profile.
1882 // crash_keys::SetActiveExtensions is per-process. See
1883 // http://crbug.com/355029.
[email protected]f6431be82013-09-07 02:53:451884 crash_keys::SetActiveExtensions(extension_ids);
[email protected]6014d672008-12-05 00:38:251885}
1886
[email protected]669b2372013-10-17 15:04:581887ExtensionService::ImportStatus ExtensionService::CheckImports(
1888 const extensions::Extension* extension,
1889 std::list<SharedModuleInfo::ImportInfo>* missing_modules,
1890 std::list<SharedModuleInfo::ImportInfo>* outdated_modules) {
1891 DCHECK(extension);
1892 DCHECK(missing_modules && missing_modules->empty());
1893 DCHECK(outdated_modules && outdated_modules->empty());
[email protected]9f4e4f082013-06-21 07:11:191894 ImportStatus status = IMPORT_STATUS_OK;
[email protected]9f4e4f082013-06-21 07:11:191895 if (SharedModuleInfo::ImportsModules(extension)) {
1896 const std::vector<SharedModuleInfo::ImportInfo>& imports =
1897 SharedModuleInfo::GetImports(extension);
1898 std::vector<SharedModuleInfo::ImportInfo>::const_iterator i;
1899 for (i = imports.begin(); i != imports.end(); ++i) {
[email protected]c5e4a2222014-01-03 16:06:131900 Version version_required(i->minimum_version);
[email protected]9f4e4f082013-06-21 07:11:191901 const Extension* imported_module =
1902 GetExtensionById(i->extension_id, true);
1903 if (!imported_module) {
1904 if (extension->from_webstore()) {
1905 status = IMPORT_STATUS_UNSATISFIED;
[email protected]669b2372013-10-17 15:04:581906 missing_modules->push_back(*i);
[email protected]9f4e4f082013-06-21 07:11:191907 } else {
1908 return IMPORT_STATUS_UNRECOVERABLE;
1909 }
1910 } else if (!SharedModuleInfo::IsSharedModule(imported_module)) {
1911 return IMPORT_STATUS_UNRECOVERABLE;
1912 } else if (version_required.IsValid() &&
1913 imported_module->version()->CompareTo(version_required) < 0) {
1914 if (imported_module->from_webstore()) {
[email protected]669b2372013-10-17 15:04:581915 outdated_modules->push_back(*i);
[email protected]9f4e4f082013-06-21 07:11:191916 status = IMPORT_STATUS_UNSATISFIED;
1917 } else {
1918 return IMPORT_STATUS_UNRECOVERABLE;
1919 }
1920 }
1921 }
1922 }
[email protected]669b2372013-10-17 15:04:581923 return status;
1924}
1925
1926ExtensionService::ImportStatus ExtensionService::SatisfyImports(
1927 const Extension* extension) {
1928 std::list<SharedModuleInfo::ImportInfo> noinstalled;
1929 std::list<SharedModuleInfo::ImportInfo> outdated;
1930 ImportStatus status = CheckImports(extension, &noinstalled, &outdated);
1931 if (status == IMPORT_STATUS_UNRECOVERABLE)
1932 return status;
[email protected]9f4e4f082013-06-21 07:11:191933 if (status == IMPORT_STATUS_UNSATISFIED) {
[email protected]669b2372013-10-17 15:04:581934 std::list<SharedModuleInfo::ImportInfo>::const_iterator iter;
1935 for (iter = noinstalled.begin(); iter != noinstalled.end(); ++iter) {
[email protected]9f4e4f082013-06-21 07:11:191936 pending_extension_manager()->AddFromExtensionImport(
[email protected]669b2372013-10-17 15:04:581937 iter->extension_id,
[email protected]9f4e4f082013-06-21 07:11:191938 extension_urls::GetWebstoreUpdateUrl(),
1939 IsSharedModule);
1940 }
1941 CheckForUpdatesSoon();
1942 }
1943 return status;
1944}
1945
1946scoped_ptr<const ExtensionSet>
1947 ExtensionService::GetDependentExtensions(const Extension* extension) {
1948 scoped_ptr<ExtensionSet> dependents(new ExtensionSet());
1949 scoped_ptr<ExtensionSet> set_to_check(new ExtensionSet());
1950 if (SharedModuleInfo::IsSharedModule(extension)) {
[email protected]bb1bc9b32013-12-21 03:09:141951 set_to_check->InsertAll(registry_->disabled_extensions());
[email protected]9f4e4f082013-06-21 07:11:191952 set_to_check->InsertAll(delayed_installs_);
[email protected]bb1bc9b32013-12-21 03:09:141953 set_to_check->InsertAll(registry_->enabled_extensions());
[email protected]9f4e4f082013-06-21 07:11:191954 for (ExtensionSet::const_iterator iter = set_to_check->begin();
1955 iter != set_to_check->end(); ++iter) {
[email protected]198b5902013-06-27 10:36:111956 if (SharedModuleInfo::ImportsExtensionById(iter->get(),
1957 extension->id())) {
[email protected]9f4e4f082013-06-21 07:11:191958 dependents->Insert(*iter);
1959 }
1960 }
1961 }
1962 return dependents.PassAs<const ExtensionSet>();
1963}
1964
1965void ExtensionService::PruneSharedModulesOnUninstall(
1966 const Extension* extension) {
1967 if (SharedModuleInfo::ImportsModules(extension)) {
1968 const std::vector<SharedModuleInfo::ImportInfo>& imports =
1969 SharedModuleInfo::GetImports(extension);
1970 std::vector<SharedModuleInfo::ImportInfo>::const_iterator i;
1971 for (i = imports.begin(); i != imports.end(); ++i) {
1972 const Extension* imported_module =
1973 GetExtensionById(i->extension_id, true);
1974 if (imported_module && imported_module->from_webstore()) {
1975 scoped_ptr<const ExtensionSet> dependents =
1976 GetDependentExtensions(imported_module);
1977 if (dependents->size() == 0) {
[email protected]4c9201c42013-08-16 04:56:211978 UninstallExtension(i->extension_id, true, NULL);
[email protected]9f4e4f082013-06-21 07:11:191979 }
1980 }
1981 }
1982 }
1983}
1984
[email protected]8266d662011-07-12 21:53:261985void ExtensionService::OnExtensionInstalled(
[email protected]36a5c4c2011-12-14 16:34:501986 const Extension* extension,
[email protected]98270432012-09-11 20:51:241987 const syncer::StringOrdinal& page_ordinal,
[email protected]0db124b02012-11-07 04:55:051988 bool has_requirement_errors,
[email protected]8e289f0b2013-12-17 17:49:071989 extensions::BlacklistState blacklist_state,
[email protected]0db124b02012-11-07 04:55:051990 bool wait_for_idle) {
[email protected]a29a517a2011-01-21 21:11:121991 CHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
[email protected]a8af9fdb2010-10-28 21:52:201992
[email protected]c3cfb012011-04-06 22:07:351993 const std::string& id = extension->id();
[email protected]612a1cb12012-10-17 13:18:031994 bool initial_enable = ShouldEnableOnInstall(extension);
[email protected]d8fd0fd2014-03-24 13:16:061995 std::string install_parameter;
[email protected]3f213ad2012-07-26 23:39:411996 const extensions::PendingExtensionInfo* pending_extension_info = NULL;
[email protected]51a3bf8b2012-06-08 22:53:061997 if ((pending_extension_info = pending_extension_manager()->GetById(id))) {
[email protected]8f3bcbd2013-06-05 08:42:401998 if (!pending_extension_info->ShouldAllowInstall(extension)) {
[email protected]51a3bf8b2012-06-08 22:53:061999 pending_extension_manager()->Remove(id);
[email protected]8ef78fd2010-08-19 17:14:322000
[email protected]31bb5ee62012-09-12 22:58:402001 LOG(WARNING) << "ShouldAllowInstall() returned false for "
2002 << id << " of type " << extension->GetType()
[email protected]65348062013-01-15 07:27:222003 << " and update URL "
2004 << extensions::ManifestURL::GetUpdateURL(extension).spec()
[email protected]31bb5ee62012-09-12 22:58:402005 << "; not installing";
[email protected]ae6cb3022011-04-04 20:11:542006
[email protected]4416c5a2010-06-26 01:28:572007 // Delete the extension directory since we're not going to
2008 // load it.
[email protected]7f8f24f2012-11-15 19:40:142009 if (!GetFileTaskRunner()->PostTask(
2010 FROM_HERE,
[email protected]53612e82011-10-18 18:00:362011 base::Bind(&extension_file_util::DeleteFile,
[email protected]31bb5ee62012-09-12 22:58:402012 extension->path(), true))) {
[email protected]14908b72011-04-20 06:54:362013 NOTREACHED();
[email protected]31bb5ee62012-09-12 22:58:402014 }
[email protected]4416c5a2010-06-26 01:28:572015 return;
2016 }
[email protected]51a3bf8b2012-06-08 22:53:062017
[email protected]d8fd0fd2014-03-24 13:16:062018 install_parameter = pending_extension_info->install_parameter();
[email protected]51a3bf8b2012-06-08 22:53:062019 pending_extension_manager()->Remove(id);
[email protected]4416c5a2010-06-26 01:28:572020 } else {
[email protected]c3cfb012011-04-06 22:07:352021 // We explicitly want to re-enable an uninstalled external
2022 // extension; if we're here, that means the user is manually
2023 // installing the extension.
[email protected]46f3e102014-03-25 01:22:452024 if (extension_prefs_->IsExternalExtensionUninstalled(id)) {
[email protected]6cc7dbae2011-04-29 21:18:332025 initial_enable = true;
2026 }
[email protected]aa142702010-03-26 01:26:332027 }
2028
[email protected]98270432012-09-11 20:51:242029 // Unsupported requirements overrides the management policy.
2030 if (has_requirement_errors) {
2031 initial_enable = false;
2032 extension_prefs_->AddDisableReason(
2033 id, Extension::DISABLE_UNSUPPORTED_REQUIREMENT);
2034 // If the extension was disabled because of unsupported requirements but
2035 // now supports all requirements after an update and there are not other
2036 // disable reasons, enable it.
2037 } else if (extension_prefs_->GetDisableReasons(id) ==
2038 Extension::DISABLE_UNSUPPORTED_REQUIREMENT) {
2039 initial_enable = true;
2040 extension_prefs_->ClearDisableReasons(id);
2041 }
2042
[email protected]8e289f0b2013-12-17 17:49:072043 if (blacklist_state == extensions::BLACKLISTED_MALWARE) {
[email protected]9f3c8532013-07-31 19:52:072044 // Installation of a blacklisted extension can happen from sync, policy,
2045 // etc, where to maintain consistency we need to install it, just never
2046 // load it (see AddExtension). Usually it should be the job of callers to
2047 // incercept blacklisted extension earlier (e.g. CrxInstaller, before even
2048 // showing the install dialogue).
[email protected]7c82539c2014-02-19 06:09:172049 extension_prefs_->AcknowledgeBlacklistedExtension(id);
[email protected]9f3c8532013-07-31 19:52:072050 UMA_HISTOGRAM_ENUMERATION("ExtensionBlacklist.SilentInstall",
2051 extension->location(),
2052 Manifest::NUM_LOCATIONS);
2053 }
2054
[email protected]695b5712012-12-06 23:55:282055 if (!GetInstalledExtension(extension->id())) {
[email protected]07533022011-06-27 20:42:552056 UMA_HISTOGRAM_ENUMERATION("Extensions.InstallType",
2057 extension->GetType(), 100);
[email protected]69084dc2012-11-17 07:39:302058 UMA_HISTOGRAM_ENUMERATION("Extensions.InstallSource",
[email protected]1d5e58b2013-01-31 08:41:402059 extension->location(), Manifest::NUM_LOCATIONS);
[email protected]07533022011-06-27 20:42:552060 RecordPermissionMessagesHistogram(
2061 extension, "Extensions.Permissions_Install");
[email protected]69084dc2012-11-17 07:39:302062 } else {
2063 UMA_HISTOGRAM_ENUMERATION("Extensions.UpdateType",
2064 extension->GetType(), 100);
2065 UMA_HISTOGRAM_ENUMERATION("Extensions.UpdateSource",
[email protected]1d5e58b2013-01-31 08:41:402066 extension->location(), Manifest::NUM_LOCATIONS);
[email protected]07533022011-06-27 20:42:552067 }
2068
[email protected]a39921b42012-02-28 03:42:542069 // Certain extension locations are specific enough that we can
2070 // auto-acknowledge any extension that came from one of them.
[email protected]4eef4352014-02-12 02:21:362071 if (Manifest::IsPolicyLocation(extension->location()) ||
2072 extension->location() == Manifest::EXTERNAL_COMPONENT)
[email protected]a39921b42012-02-28 03:42:542073 AcknowledgeExternalExtension(extension->id());
[email protected]399583b2012-12-11 09:33:422074 const Extension::State initial_state =
2075 initial_enable ? Extension::ENABLED : Extension::DISABLED;
[email protected]0f9e6262013-11-05 23:49:192076 const bool blacklisted_for_malware =
[email protected]8e289f0b2013-12-17 17:49:072077 blacklist_state == extensions::BLACKLISTED_MALWARE;
[email protected]e7aa7b7e2012-11-27 04:51:222078 if (ShouldDelayExtensionUpdate(id, wait_for_idle)) {
[email protected]9f3c8532013-07-31 19:52:072079 extension_prefs_->SetDelayedInstallInfo(
2080 extension,
2081 initial_state,
[email protected]0f9e6262013-11-05 23:49:192082 blacklisted_for_malware,
[email protected]9f3c8532013-07-31 19:52:072083 extensions::ExtensionPrefs::DELAY_REASON_WAIT_FOR_IDLE,
[email protected]d8fd0fd2014-03-24 13:16:062084 page_ordinal,
2085 install_parameter);
[email protected]0db124b02012-11-07 04:55:052086
2087 // Transfer ownership of |extension|.
[email protected]9f4e4f082013-06-21 07:11:192088 delayed_installs_.Insert(extension);
[email protected]0db124b02012-11-07 04:55:052089
[email protected]75bdcb872013-03-13 00:41:452090 // Notify observers that app update is available.
2091 FOR_EACH_OBSERVER(extensions::UpdateObserver, update_observers_,
[email protected]a9aa62b312013-11-29 05:35:062092 OnAppUpdateAvailable(extension));
[email protected]0db124b02012-11-07 04:55:052093 return;
2094 }
2095
[email protected]9f4e4f082013-06-21 07:11:192096 ImportStatus status = SatisfyImports(extension);
2097 if (installs_delayed_for_gc()) {
[email protected]9f3c8532013-07-31 19:52:072098 extension_prefs_->SetDelayedInstallInfo(
2099 extension,
2100 initial_state,
[email protected]0f9e6262013-11-05 23:49:192101 blacklisted_for_malware,
[email protected]9f3c8532013-07-31 19:52:072102 extensions::ExtensionPrefs::DELAY_REASON_GC,
[email protected]d8fd0fd2014-03-24 13:16:062103 page_ordinal,
2104 install_parameter);
[email protected]399583b2012-12-11 09:33:422105 delayed_installs_.Insert(extension);
[email protected]9f4e4f082013-06-21 07:11:192106 } else if (status != IMPORT_STATUS_OK) {
2107 if (status == IMPORT_STATUS_UNSATISFIED) {
[email protected]9f3c8532013-07-31 19:52:072108 extension_prefs_->SetDelayedInstallInfo(
2109 extension,
2110 initial_state,
[email protected]0f9e6262013-11-05 23:49:192111 blacklisted_for_malware,
[email protected]9f4e4f082013-06-21 07:11:192112 extensions::ExtensionPrefs::DELAY_REASON_WAIT_FOR_IMPORTS,
[email protected]d8fd0fd2014-03-24 13:16:062113 page_ordinal,
2114 install_parameter);
[email protected]9f4e4f082013-06-21 07:11:192115 delayed_installs_.Insert(extension);
2116 }
[email protected]399583b2012-12-11 09:33:422117 } else {
[email protected]9f3c8532013-07-31 19:52:072118 AddNewOrUpdatedExtension(extension,
2119 initial_state,
2120 blacklist_state,
[email protected]d8fd0fd2014-03-24 13:16:062121 page_ordinal,
2122 install_parameter);
[email protected]399583b2012-12-11 09:33:422123 }
[email protected]8c484b742012-11-29 06:05:362124}
2125
2126void ExtensionService::AddNewOrUpdatedExtension(
2127 const Extension* extension,
[email protected]399583b2012-12-11 09:33:422128 Extension::State initial_state,
[email protected]8e289f0b2013-12-17 17:49:072129 extensions::BlacklistState blacklist_state,
[email protected]d8fd0fd2014-03-24 13:16:062130 const syncer::StringOrdinal& page_ordinal,
2131 const std::string& install_parameter) {
[email protected]8c484b742012-11-29 06:05:362132 CHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
[email protected]0f9e6262013-11-05 23:49:192133 const bool blacklisted_for_malware =
[email protected]8e289f0b2013-12-17 17:49:072134 blacklist_state == extensions::BLACKLISTED_MALWARE;
[email protected]9f3c8532013-07-31 19:52:072135 extension_prefs_->OnExtensionInstalled(extension,
2136 initial_state,
[email protected]0f9e6262013-11-05 23:49:192137 blacklisted_for_malware,
[email protected]d8fd0fd2014-03-24 13:16:062138 page_ordinal,
2139 install_parameter);
[email protected]9e9c1d12013-07-31 01:58:122140 delayed_installs_.Remove(extension->id());
[email protected]913ffca92014-03-27 15:26:162141 if (InstallVerifier::NeedsVerification(*extension))
2142 system_->install_verifier()->VerifyExtension(extension->id());
[email protected]6f6101832012-11-27 22:10:482143 FinishInstallation(extension);
2144}
2145
2146void ExtensionService::MaybeFinishDelayedInstallation(
2147 const std::string& extension_id) {
[email protected]9f4e4f082013-06-21 07:11:192148 // Check if the extension already got installed.
2149 if (!delayed_installs_.Contains(extension_id))
[email protected]6f6101832012-11-27 22:10:482150 return;
[email protected]9f4e4f082013-06-21 07:11:192151 extensions::ExtensionPrefs::DelayReason reason =
2152 extension_prefs_->GetDelayedInstallReason(extension_id);
2153
2154 // Check if the extension is idle. DELAY_REASON_NONE is used for older
2155 // preferences files that will not have set this field but it was previously
2156 // only used for idle updates.
2157 if ((reason == extensions::ExtensionPrefs::DELAY_REASON_WAIT_FOR_IDLE ||
2158 reason == extensions::ExtensionPrefs::DELAY_REASON_NONE) &&
[email protected]1d5cf4142014-01-24 18:25:222159 is_ready() && !extensions::util::IsExtensionIdle(extension_id, profile_))
[email protected]6f6101832012-11-27 22:10:482160 return;
2161
[email protected]9f4e4f082013-06-21 07:11:192162 const Extension* extension = delayed_installs_.GetByID(extension_id);
2163 if (reason == extensions::ExtensionPrefs::DELAY_REASON_WAIT_FOR_IMPORTS) {
2164 ImportStatus status = SatisfyImports(extension);
2165 if (status != IMPORT_STATUS_OK) {
2166 if (status == IMPORT_STATUS_UNRECOVERABLE) {
2167 delayed_installs_.Remove(extension_id);
2168 // Make sure no version of the extension is actually installed, (i.e.,
2169 // that this delayed install was not an update).
2170 CHECK(!extension_prefs_->GetInstalledExtensionInfo(extension_id).get());
2171 extension_prefs_->DeleteExtensionPrefs(extension_id);
2172 }
2173 return;
2174 }
2175 }
2176
[email protected]6f6101832012-11-27 22:10:482177 FinishDelayedInstallation(extension_id);
2178}
2179
2180void ExtensionService::FinishDelayedInstallation(
2181 const std::string& extension_id) {
2182 scoped_refptr<const Extension> extension(
2183 GetPendingExtensionUpdate(extension_id));
[email protected]dc24976f2013-06-02 21:15:092184 CHECK(extension.get());
[email protected]9f4e4f082013-06-21 07:11:192185 delayed_installs_.Remove(extension_id);
[email protected]6f6101832012-11-27 22:10:482186
[email protected]399583b2012-12-11 09:33:422187 if (!extension_prefs_->FinishDelayedInstallInfo(extension_id))
[email protected]6f6101832012-11-27 22:10:482188 NOTREACHED();
2189
[email protected]dc24976f2013-06-02 21:15:092190 FinishInstallation(extension.get());
[email protected]6f6101832012-11-27 22:10:482191}
2192
2193void ExtensionService::FinishInstallation(const Extension* extension) {
[email protected]e7554c3f2013-05-29 00:36:562194 const extensions::Extension* existing_extension =
2195 GetInstalledExtension(extension->id());
2196 bool is_update = false;
2197 std::string old_name;
2198 if (existing_extension) {
2199 is_update = true;
2200 old_name = existing_extension->name();
2201 }
2202 extensions::InstalledExtensionInfo details(extension, is_update, old_name);
[email protected]fcb58a862012-05-01 01:03:152203 content::NotificationService::current()->Notify(
2204 chrome::NOTIFICATION_EXTENSION_INSTALLED,
2205 content::Source<Profile>(profile_),
[email protected]41bb80bd2013-05-03 10:56:022206 content::Details<const extensions::InstalledExtensionInfo>(&details));
[email protected]fcb58a862012-05-01 01:03:152207
[email protected]d96eb512012-11-01 23:44:082208 bool unacknowledged_external = IsUnacknowledgedExternalExtension(extension);
[email protected]41070e8d2012-10-24 01:34:362209
[email protected]399583b2012-12-11 09:33:422210 // Unpacked extensions default to allowing file access, but if that has been
2211 // overridden, don't reset the value.
[email protected]1d5e58b2013-01-31 08:41:402212 if (Manifest::ShouldAlwaysAllowFileAccess(extension->location()) &&
[email protected]399583b2012-12-11 09:33:422213 !extension_prefs_->HasAllowFileAccessSetting(extension->id())) {
2214 extension_prefs_->SetAllowFileAccess(extension->id(), true);
2215 }
2216
[email protected]6f6101832012-11-27 22:10:482217 AddExtension(extension);
[email protected]612a1cb12012-10-17 13:18:032218
2219 // If this is a new external extension that was disabled, alert the user
[email protected]d96eb512012-11-01 23:44:082220 // so he can reenable it. We do this last so that it has already been
2221 // added to our list of extensions.
[email protected]3e3fafbb2013-08-17 13:33:162222 if (unacknowledged_external && !is_update) {
[email protected]612a1cb12012-10-17 13:18:032223 UpdateExternalExtensionAlert();
[email protected]d96eb512012-11-01 23:44:082224 UMA_HISTOGRAM_ENUMERATION("Extensions.ExternalExtensionEvent",
2225 EXTERNAL_EXTENSION_INSTALLED,
2226 EXTERNAL_EXTENSION_BUCKET_BOUNDARY);
[email protected]446e37e2013-08-07 00:30:022227 if (extensions::ManifestURL::UpdatesFromGallery(extension)) {
2228 UMA_HISTOGRAM_ENUMERATION("Extensions.ExternalExtensionEventWebstore",
2229 EXTERNAL_EXTENSION_INSTALLED,
2230 EXTERNAL_EXTENSION_BUCKET_BOUNDARY);
2231 } else {
2232 UMA_HISTOGRAM_ENUMERATION("Extensions.ExternalExtensionEventNonWebstore",
2233 EXTERNAL_EXTENSION_INSTALLED,
2234 EXTERNAL_EXTENSION_BUCKET_BOUNDARY);
2235 }
[email protected]d96eb512012-11-01 23:44:082236 }
[email protected]9f4e4f082013-06-21 07:11:192237
2238 // Check extensions that may have been delayed only because this shared module
2239 // was not available.
2240 if (SharedModuleInfo::IsSharedModule(extension)) {
2241 MaybeFinishDelayedInstallations();
2242 }
[email protected]4a190632009-05-09 01:07:422243}
2244
[email protected]76b65442012-11-17 14:11:482245const Extension* ExtensionService::GetPendingExtensionUpdate(
2246 const std::string& id) const {
[email protected]9f4e4f082013-06-21 07:11:192247 return delayed_installs_.GetByID(id);
[email protected]76b65442012-11-17 14:11:482248}
2249
[email protected]bb7f40952011-01-13 00:21:202250void ExtensionService::TrackTerminatedExtension(const Extension* extension) {
[email protected]bb1bc9b32013-12-21 03:09:142251 // No need to check for duplicates; inserting a duplicate is a no-op.
2252 registry_->AddTerminated(make_scoped_refptr(extension));
[email protected]3964e572014-02-13 21:57:412253 extensions_being_terminated_.erase(extension->id());
[email protected]b0af4792013-10-23 09:12:132254 UnloadExtension(extension->id(), UnloadedExtensionInfo::REASON_TERMINATE);
[email protected]bb7f40952011-01-13 00:21:202255}
2256
2257void ExtensionService::UntrackTerminatedExtension(const std::string& id) {
[email protected]fa2416f2011-05-03 08:41:202258 std::string lowercase_id = StringToLowerASCII(id);
[email protected]bb1bc9b32013-12-21 03:09:142259 const Extension* extension =
2260 registry_->terminated_extensions().GetByID(lowercase_id);
2261 registry_->RemoveTerminated(lowercase_id);
[email protected]fb789532013-08-27 02:40:212262 if (extension) {
2263 content::NotificationService::current()->Notify(
2264 chrome::NOTIFICATION_EXTENSION_REMOVED,
2265 content::Source<Profile>(profile_),
2266 content::Details<const Extension>(extension));
2267 }
[email protected]bb7f40952011-01-13 00:21:202268}
2269
[email protected]8001df22011-04-28 19:59:472270const Extension* ExtensionService::GetInstalledExtension(
2271 const std::string& id) const {
[email protected]599539802014-01-07 23:06:002272 return registry_->GetExtensionById(id, ExtensionRegistry::EVERYTHING);
[email protected]0dfe05c2011-02-23 23:03:362273}
2274
[email protected]eaa7dd182010-12-14 11:09:002275bool ExtensionService::ExtensionBindingsAllowed(const GURL& url) {
[email protected]615d88f2011-12-13 01:47:442276 // Allow bindings for all packaged extensions and component hosted apps.
[email protected]bb1bc9b32013-12-21 03:09:142277 const Extension* extension =
2278 registry_->enabled_extensions().GetExtensionOrAppByURL(url);
[email protected]615d88f2011-12-13 01:47:442279 return extension && (!extension->is_hosted_app() ||
[email protected]1d5e58b2013-01-31 08:41:402280 extension->location() == Manifest::COMPONENT);
[email protected]6d2e60bd2010-06-03 22:37:392281}
2282
[email protected]9060d8b02012-01-13 02:14:302283bool ExtensionService::OnExternalExtensionFileFound(
[email protected]8ef78fd2010-08-19 17:14:322284 const std::string& id,
[email protected]c5e4a2222014-01-03 16:06:132285 const Version* version,
[email protected]650b2d52013-02-10 03:41:452286 const base::FilePath& path,
[email protected]1d5e58b2013-01-31 08:41:402287 Manifest::Location location,
[email protected]47fc70c2011-12-06 07:29:512288 int creation_flags,
2289 bool mark_acknowledged) {
[email protected]ab22ba42011-01-14 16:36:382290 CHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
2291 CHECK(Extension::IdIsValid(id));
[email protected]79c833b52011-04-05 18:31:012292 if (extension_prefs_->IsExternalExtensionUninstalled(id))
[email protected]9060d8b02012-01-13 02:14:302293 return false;
[email protected]a8af9fdb2010-10-28 21:52:202294
[email protected]7577a5c52009-07-30 06:21:582295 // Before even bothering to unpack, check and see if we already have this
[email protected]4c967932009-07-31 01:15:492296 // version. This is important because these extensions are going to get
[email protected]7577a5c52009-07-30 06:21:582297 // installed on every startup.
[email protected]9adb9692010-10-29 23:14:022298 const Extension* existing = GetExtensionById(id, true);
[email protected]910f72ce2012-08-24 01:38:352299
[email protected]7577a5c52009-07-30 06:21:582300 if (existing) {
[email protected]910f72ce2012-08-24 01:38:352301 // The default apps will have the location set as INTERNAL. Since older
2302 // default apps are installed as EXTERNAL, we override them. However, if the
2303 // app is already installed as internal, then do the version check.
[email protected]31bb5ee62012-09-12 22:58:402304 // TODO(grv) : Remove after Q1-2013.
[email protected]910f72ce2012-08-24 01:38:352305 bool is_default_apps_migration =
[email protected]1d5e58b2013-01-31 08:41:402306 (location == Manifest::INTERNAL &&
2307 Manifest::IsExternalLocation(existing->location()));
[email protected]910f72ce2012-08-24 01:38:352308
2309 if (!is_default_apps_migration) {
2310 DCHECK(version);
2311
2312 switch (existing->version()->CompareTo(*version)) {
2313 case -1: // existing version is older, we should upgrade
2314 break;
2315 case 0: // existing version is same, do nothing
2316 return false;
2317 case 1: // existing version is newer, uh-oh
2318 LOG(WARNING) << "Found external version of extension " << id
2319 << "that is older than current version. Current version "
2320 << "is: " << existing->VersionString() << ". New "
2321 << "version is: " << version->GetString()
2322 << ". Keeping current version.";
2323 return false;
2324 }
[email protected]7577a5c52009-07-30 06:21:582325 }
2326 }
2327
[email protected]9060d8b02012-01-13 02:14:302328 // If the extension is already pending, don't start an install.
[email protected]e3987852012-05-04 10:06:302329 if (!pending_extension_manager()->AddFromExternalFile(
[email protected]464213a2013-10-15 01:06:482330 id, location, *version, creation_flags, mark_acknowledged)) {
[email protected]9060d8b02012-01-13 02:14:302331 return false;
[email protected]e3987852012-05-04 10:06:302332 }
[email protected]9c635f22010-12-02 09:36:362333
[email protected]14908b72011-04-20 06:54:362334 // no client (silent install)
[email protected]f8636f92013-08-09 21:02:372335 scoped_refptr<CrxInstaller> installer(CrxInstaller::CreateSilent(this));
[email protected]6dfbbf82010-03-12 23:09:162336 installer->set_install_source(location);
2337 installer->set_expected_id(id);
[email protected]cb0e50312011-05-09 15:03:072338 installer->set_expected_version(*version);
2339 installer->set_install_cause(extension_misc::INSTALL_CAUSE_EXTERNAL_FILE);
[email protected]1bf73cc32011-10-26 22:38:312340 installer->set_creation_flags(creation_flags);
[email protected]88e8ec9152013-01-17 04:05:182341#if defined(OS_CHROMEOS)
2342 extensions::InstallLimiter::Get(profile_)->Add(installer, path);
2343#else
[email protected]6dfbbf82010-03-12 23:09:162344 installer->InstallCrx(path);
[email protected]88e8ec9152013-01-17 04:05:182345#endif
[email protected]47fc70c2011-12-06 07:29:512346
2347 // Depending on the source, a new external extension might not need a user
2348 // notification on installation. For such extensions, mark them acknowledged
2349 // now to suppress the notification.
2350 if (mark_acknowledged)
2351 AcknowledgeExternalExtension(id);
[email protected]9060d8b02012-01-13 02:14:302352
2353 return true;
[email protected]7577a5c52009-07-30 06:21:582354}
2355
[email protected]eaa7dd182010-12-14 11:09:002356void ExtensionService::ReportExtensionLoadError(
[email protected]650b2d52013-02-10 03:41:452357 const base::FilePath& extension_path,
[email protected]d11c8e92009-10-20 23:26:402358 const std::string &error,
[email protected]d11c8e92009-10-20 23:26:402359 bool be_noisy) {
[email protected]d8c8f25f2011-11-02 18:18:012360 content::NotificationService::current()->Notify(
2361 chrome::NOTIFICATION_EXTENSION_LOAD_ERROR,
2362 content::Source<Profile>(profile_),
2363 content::Details<const std::string>(&error));
[email protected]d11c8e92009-10-20 23:26:402364
[email protected]04338722013-12-24 23:18:052365 std::string path_str = base::UTF16ToUTF8(extension_path.LossyDisplayName());
[email protected]179fb952014-03-21 22:04:582366 bool retry = false;
2367 std::string retry_prompt;
2368 if (be_noisy)
2369 retry_prompt = "\n\nWould you like to retry?";
2370
2371 base::string16 message = base::UTF8ToUTF16(
2372 base::StringPrintf("Could not load extension from '%s'. %s%s",
2373 path_str.c_str(),
2374 error.c_str(),
2375 retry_prompt.c_str()));
2376 ExtensionErrorReporter::GetInstance()->ReportError(message, be_noisy, &retry);
2377 std::pair<bool, const base::FilePath&> details(retry, extension_path);
2378 content::NotificationService::current()->Notify(
2379 chrome::NOTIFICATION_EXTENSION_LOAD_RETRY,
2380 content::Source<Profile>(profile_),
2381 content::Details<std::pair<bool, const base::FilePath&> >(&details));
[email protected]d11c8e92009-10-20 23:26:402382}
2383
[email protected]eaa7dd182010-12-14 11:09:002384void ExtensionService::DidCreateRenderViewForBackgroundPage(
[email protected]3a1dc572012-07-31 22:25:132385 extensions::ExtensionHost* host) {
[email protected]406027c02010-09-27 08:03:182386 OrphanedDevTools::iterator iter =
[email protected]2d2f6cfc2011-05-06 21:09:332387 orphaned_dev_tools_.find(host->extension_id());
[email protected]406027c02010-09-27 08:03:182388 if (iter == orphaned_dev_tools_.end())
2389 return;
2390
[email protected]04ea1bb2013-07-10 09:26:092391 iter->second->ConnectRenderViewHost(host->render_view_host());
[email protected]406027c02010-09-27 08:03:182392 orphaned_dev_tools_.erase(iter);
2393}
2394
[email protected]432115822011-07-10 15:52:272395void ExtensionService::Observe(int type,
[email protected]6c2381d2011-10-19 02:52:532396 const content::NotificationSource& source,
2397 const content::NotificationDetails& details) {
[email protected]432115822011-07-10 15:52:272398 switch (type) {
[email protected]3c4abc82012-10-22 22:25:542399 case chrome::NOTIFICATION_APP_TERMINATING:
2400 // Shutdown has started. Don't start any more extension installs.
2401 // (We cannot use ExtensionService::Shutdown() for this because it
2402 // happens too late in browser teardown.)
2403 browser_terminating_ = true;
2404 break;
[email protected]432115822011-07-10 15:52:272405 case chrome::NOTIFICATION_EXTENSION_PROCESS_TERMINATED: {
[email protected]6c2381d2011-10-19 02:52:532406 if (profile_ !=
2407 content::Source<Profile>(source).ptr()->GetOriginalProfile()) {
[email protected]bc535ee52010-08-31 18:40:322408 break;
[email protected]6c2381d2011-10-19 02:52:532409 }
[email protected]a4ed6282009-12-14 20:51:162410
[email protected]3a1dc572012-07-31 22:25:132411 extensions::ExtensionHost* host =
2412 content::Details<extensions::ExtensionHost>(details).ptr();
[email protected]f128af42010-08-05 18:05:262413
[email protected]3964e572014-02-13 21:57:412414 // If the extension is already being terminated, there is nothing left to
2415 // do.
2416 if (!extensions_being_terminated_.insert(host->extension_id()).second)
2417 break;
2418
[email protected]fa2416f2011-05-03 08:41:202419 // Mark the extension as terminated and Unload it. We want it to
2420 // be in a consistent state: either fully working or not loaded
2421 // at all, but never half-crashed. We do it in a PostTask so
2422 // that other handlers of this notification will still have
2423 // access to the Extension and ExtensionHost.
[email protected]b3a25092013-05-28 22:08:162424 base::MessageLoop::current()->PostTask(
[email protected]14908b72011-04-20 06:54:362425 FROM_HERE,
[email protected]53612e82011-10-18 18:00:362426 base::Bind(
[email protected]fa2416f2011-05-03 08:41:202427 &ExtensionService::TrackTerminatedExtension,
[email protected]d8c8f25f2011-11-02 18:18:012428 AsWeakPtr(),
[email protected]fa2416f2011-05-03 08:41:202429 host->extension()));
[email protected]31f77262009-12-02 20:48:532430 break;
2431 }
[email protected]432115822011-07-10 15:52:272432 case content::NOTIFICATION_RENDERER_PROCESS_TERMINATED: {
[email protected]f3b1a082011-11-18 00:34:302433 content::RenderProcessHost* process =
2434 content::Source<content::RenderProcessHost>(source).ptr();
[email protected]fc30ef082011-08-18 04:07:192435 Profile* host_profile =
[email protected]f3b1a082011-11-18 00:34:302436 Profile::FromBrowserContext(process->GetBrowserContext());
[email protected]fc30ef082011-08-18 04:07:192437 if (!profile_->IsSameProfile(host_profile->GetOriginalProfile()))
2438 break;
2439
[email protected]fafdc842014-01-17 18:09:082440 extensions::ProcessMap* process_map =
2441 extensions::ProcessMap::Get(profile_);
2442 if (process_map->Contains(process->GetID())) {
[email protected]52b76592013-11-02 17:59:032443 // An extension process was terminated, this might have resulted in an
2444 // app or extension becoming idle.
2445 std::set<std::string> extension_ids =
[email protected]fafdc842014-01-17 18:09:082446 process_map->GetExtensionsInProcess(process->GetID());
[email protected]52b76592013-11-02 17:59:032447 for (std::set<std::string>::const_iterator it = extension_ids.begin();
2448 it != extension_ids.end(); ++it) {
2449 if (delayed_installs_.Contains(*it)) {
2450 base::MessageLoop::current()->PostDelayedTask(
2451 FROM_HERE,
2452 base::Bind(&ExtensionService::MaybeFinishDelayedInstallation,
2453 AsWeakPtr(), *it),
2454 base::TimeDelta::FromSeconds(kUpdateIdleDelay));
2455 }
2456 }
2457 }
2458
[email protected]fafdc842014-01-17 18:09:082459 process_map->RemoveAllFromProcess(process->GetID());
[email protected]6f371442011-11-09 06:45:462460 BrowserThread::PostTask(
[email protected]38427a12013-11-09 17:34:202461 BrowserThread::IO,
2462 FROM_HERE,
2463 base::Bind(&extensions::InfoMap::UnregisterAllExtensionsInProcess,
[email protected]31d8f5f22012-04-02 15:22:082464 system_->info_map(),
[email protected]f3b1a082011-11-18 00:34:302465 process->GetID()));
[email protected]da5683db2011-04-23 17:12:212466 break;
2467 }
[email protected]92dd8d92013-02-26 00:41:082468 case chrome::NOTIFICATION_UPGRADE_RECOMMENDED: {
[email protected]75bdcb872013-03-13 00:41:452469 // Notify observers that chrome update is available.
2470 FOR_EACH_OBSERVER(extensions::UpdateObserver, update_observers_,
2471 OnChromeUpdateAvailable());
[email protected]92dd8d92013-02-26 00:41:082472 break;
2473 }
[email protected]aa96d3a2010-08-21 08:45:252474
[email protected]4814b512009-11-07 00:12:292475 default:
2476 NOTREACHED() << "Unexpected notification type.";
2477 }
2478}
2479
[email protected]90bb38d2012-11-14 18:36:032480void ExtensionService::OnExtensionInstallPrefChanged() {
[email protected]a6a7ced2012-11-01 17:24:182481 IdentifyAlertableExtensions();
2482 CheckManagementPolicy();
2483}
2484
[email protected]e178ad92013-06-28 02:29:252485bool ExtensionService::IsBeingReloaded(
2486 const std::string& extension_id) const {
2487 return ContainsKey(extensions_being_reloaded_, extension_id);
2488}
2489
2490void ExtensionService::SetBeingReloaded(const std::string& extension_id,
[email protected]5e7015c2013-07-23 23:29:432491 bool isBeingReloaded) {
2492 if (isBeingReloaded)
[email protected]e178ad92013-06-28 02:29:252493 extensions_being_reloaded_.insert(extension_id);
[email protected]5e7015c2013-07-23 23:29:432494 else
[email protected]e178ad92013-06-28 02:29:252495 extensions_being_reloaded_.erase(extension_id);
[email protected]e178ad92013-06-28 02:29:252496}
2497
[email protected]612a1cb12012-10-17 13:18:032498bool ExtensionService::ShouldEnableOnInstall(const Extension* extension) {
2499 // Extensions installed by policy can't be disabled. So even if a previous
2500 // installation disabled the extension, make sure it is now enabled.
[email protected]75181f62014-03-19 21:41:122501 // TODO(rlp): Clean up the special case for external components as noted
2502 // in crbug.com/353266. For now, EXTERNAL_COMPONENT apps should be
2503 // default enabled on install as before.
2504 if (system_->management_policy()->MustRemainEnabled(extension, NULL) ||
2505 extension->location() == Manifest::EXTERNAL_COMPONENT) {
[email protected]612a1cb12012-10-17 13:18:032506 return true;
[email protected]75181f62014-03-19 21:41:122507 }
[email protected]612a1cb12012-10-17 13:18:032508
2509 if (extension_prefs_->IsExtensionDisabled(extension->id()))
2510 return false;
2511
[email protected]41070e8d2012-10-24 01:34:362512 if (FeatureSwitch::prompt_for_external_extensions()->IsEnabled()) {
[email protected]612a1cb12012-10-17 13:18:032513 // External extensions are initially disabled. We prompt the user before
[email protected]2c495c42013-01-04 21:49:542514 // enabling them. Hosted apps are excepted because they are not dangerous
2515 // (they need to be launched by the user anyway).
[email protected]1d5e58b2013-01-31 08:41:402516 if (extension->GetType() != Manifest::TYPE_HOSTED_APP &&
2517 Manifest::IsExternalLocation(extension->location()) &&
[email protected]612a1cb12012-10-17 13:18:032518 !extension_prefs_->IsExternalExtensionAcknowledged(extension->id())) {
2519 return false;
2520 }
2521 }
[email protected]612a1cb12012-10-17 13:18:032522
2523 return true;
2524}
[email protected]0db124b02012-11-07 04:55:052525
[email protected]e7aa7b7e2012-11-27 04:51:222526bool ExtensionService::ShouldDelayExtensionUpdate(
2527 const std::string& extension_id,
2528 bool wait_for_idle) const {
2529 const char kOnUpdateAvailableEvent[] = "runtime.onUpdateAvailable";
2530
2531 // If delayed updates are globally disabled, or just for this extension,
2532 // don't delay.
2533 if (!install_updates_when_idle_ || !wait_for_idle)
2534 return false;
2535
[email protected]695b5712012-12-06 23:55:282536 const Extension* old = GetInstalledExtension(extension_id);
[email protected]e7aa7b7e2012-11-27 04:51:222537 // If there is no old extension, this is not an update, so don't delay.
2538 if (!old)
2539 return false;
2540
[email protected]9367eabc2013-03-01 01:29:292541 if (extensions::BackgroundInfo::HasPersistentBackgroundPage(old)) {
[email protected]e7aa7b7e2012-11-27 04:51:222542 // Delay installation if the extension listens for the onUpdateAvailable
2543 // event.
2544 return system_->event_router()->ExtensionHasEventListener(
2545 extension_id, kOnUpdateAvailableEvent);
2546 } else {
2547 // Delay installation if the extension is not idle.
[email protected]1d5cf4142014-01-24 18:25:222548 return !extensions::util::IsExtensionIdle(extension_id, profile_);
[email protected]e7aa7b7e2012-11-27 04:51:222549 }
[email protected]0db124b02012-11-07 04:55:052550}
[email protected]fdd679b2012-11-15 20:49:392551
[email protected]399583b2012-12-11 09:33:422552void ExtensionService::GarbageCollectIsolatedStorage() {
[email protected]650b2d52013-02-10 03:41:452553 scoped_ptr<base::hash_set<base::FilePath> > active_paths(
2554 new base::hash_set<base::FilePath>());
[email protected]bb1bc9b32013-12-21 03:09:142555 const ExtensionSet& extensions = registry_->enabled_extensions();
2556 for (ExtensionSet::const_iterator it = extensions.begin();
2557 it != extensions.end(); ++it) {
[email protected]cadac622013-06-11 16:46:362558 if (extensions::AppIsolationInfo::HasIsolatedStorage(it->get())) {
2559 active_paths->insert(BrowserContext::GetStoragePartitionForSite(
[email protected]3a746ec2014-03-15 05:30:562560 profile_,
2561 extensions::util::GetSiteForExtensionId(
2562 (*it)->id(), profile()))->GetPath());
[email protected]399583b2012-12-11 09:33:422563 }
2564 }
2565
[email protected]ca0336342014-03-21 12:58:342566 // The data of ephemeral apps can outlive their cache lifetime. Ensure
2567 // they are not garbage collected.
2568 scoped_ptr<extensions::ExtensionPrefs::ExtensionsInfo> evicted_apps_info(
2569 extension_prefs_->GetEvictedEphemeralAppsInfo());
2570 for (size_t i = 0; i < evicted_apps_info->size(); ++i) {
2571 extensions::ExtensionInfo* info = evicted_apps_info->at(i).get();
2572 if (extensions::util::HasIsolatedStorage(*info)) {
2573 active_paths->insert(BrowserContext::GetStoragePartitionForSite(
2574 profile_,
2575 extensions::util::GetSiteForExtensionId(
2576 info->extension_id, profile()))->GetPath());
2577 }
2578 }
2579
[email protected]9f4e4f082013-06-21 07:11:192580 DCHECK(!installs_delayed_for_gc());
2581 set_installs_delayed_for_gc(true);
[email protected]399583b2012-12-11 09:33:422582 BrowserContext::GarbageCollectStoragePartitions(
2583 profile_, active_paths.Pass(),
2584 base::Bind(&ExtensionService::OnGarbageCollectIsolatedStorageFinished,
2585 AsWeakPtr()));
2586}
2587
2588void ExtensionService::OnGarbageCollectIsolatedStorageFinished() {
[email protected]9f4e4f082013-06-21 07:11:192589 set_installs_delayed_for_gc(false);
2590 MaybeFinishDelayedInstallations();
2591}
2592
2593void ExtensionService::MaybeFinishDelayedInstallations() {
2594 std::vector<std::string> to_be_installed;
[email protected]399583b2012-12-11 09:33:422595 for (ExtensionSet::const_iterator it = delayed_installs_.begin();
2596 it != delayed_installs_.end();
2597 ++it) {
[email protected]9f4e4f082013-06-21 07:11:192598 to_be_installed.push_back((*it)->id());
[email protected]399583b2012-12-11 09:33:422599 }
[email protected]9f4e4f082013-06-21 07:11:192600 for (std::vector<std::string>::const_iterator it = to_be_installed.begin();
2601 it != to_be_installed.end();
[email protected]399583b2012-12-11 09:33:422602 ++it) {
[email protected]9f4e4f082013-06-21 07:11:192603 MaybeFinishDelayedInstallation(*it);
[email protected]399583b2012-12-11 09:33:422604 }
[email protected]399583b2012-12-11 09:33:422605}
2606
[email protected]fdd679b2012-11-15 20:49:392607void ExtensionService::OnBlacklistUpdated() {
[email protected]2d19eb6e2014-01-27 17:30:002608 blacklist_->GetBlacklistedIDs(
[email protected]f47f7172014-03-19 19:27:102609 registry_->GenerateInstalledExtensionsSet()->GetIDs(),
[email protected]3f2a2fa2013-09-24 02:55:252610 base::Bind(&ExtensionService::ManageBlacklist, AsWeakPtr()));
[email protected]695b5712012-12-06 23:55:282611}
2612
[email protected]2d19eb6e2014-01-27 17:30:002613void ExtensionService::ManageBlacklist(
2614 const extensions::Blacklist::BlacklistStateMap& state_map) {
[email protected]695b5712012-12-06 23:55:282615 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
2616
[email protected]2d19eb6e2014-01-27 17:30:002617 std::set<std::string> blocked;
2618 ExtensionIdSet greylist;
2619 ExtensionIdSet unchanged;
2620 for (extensions::Blacklist::BlacklistStateMap::const_iterator it =
2621 state_map.begin();
2622 it != state_map.end();
2623 ++it) {
2624 switch (it->second) {
2625 case extensions::NOT_BLACKLISTED:
2626 break;
[email protected]695b5712012-12-06 23:55:282627
[email protected]2d19eb6e2014-01-27 17:30:002628 case extensions::BLACKLISTED_MALWARE:
2629 blocked.insert(it->first);
2630 break;
2631
2632 case extensions::BLACKLISTED_SECURITY_VULNERABILITY:
2633 case extensions::BLACKLISTED_CWS_POLICY_VIOLATION:
2634 case extensions::BLACKLISTED_POTENTIALLY_UNWANTED:
2635 greylist.insert(it->first);
2636 break;
2637
2638 case extensions::BLACKLISTED_UNKNOWN:
2639 unchanged.insert(it->first);
2640 break;
2641 }
2642 }
2643
2644 UpdateBlockedExtensions(blocked, unchanged);
2645 UpdateGreylistedExtensions(greylist, unchanged, state_map);
2646
2647 IdentifyAlertableExtensions();
2648}
2649
2650namespace {
2651void Partition(const ExtensionIdSet& before,
2652 const ExtensionIdSet& after,
2653 const ExtensionIdSet& unchanged,
2654 ExtensionIdSet* no_longer,
2655 ExtensionIdSet* not_yet) {
2656 *not_yet = base::STLSetDifference<ExtensionIdSet>(after, before);
2657 *no_longer = base::STLSetDifference<ExtensionIdSet>(before, after);
2658 *no_longer = base::STLSetDifference<ExtensionIdSet>(*no_longer, unchanged);
2659}
2660} // namespace
2661
2662void ExtensionService::UpdateBlockedExtensions(
2663 const ExtensionIdSet& blocked,
2664 const ExtensionIdSet& unchanged) {
2665 ExtensionIdSet not_yet_blocked, no_longer_blocked;
2666 Partition(registry_->blacklisted_extensions().GetIDs(),
2667 blocked, unchanged,
2668 &no_longer_blocked, &not_yet_blocked);
2669
2670 for (ExtensionIdSet::iterator it = no_longer_blocked.begin();
2671 it != no_longer_blocked.end(); ++it) {
[email protected]695b5712012-12-06 23:55:282672 scoped_refptr<const Extension> extension =
[email protected]bb1bc9b32013-12-21 03:09:142673 registry_->blacklisted_extensions().GetByID(*it);
[email protected]3f2a2fa2013-09-24 02:55:252674 if (!extension.get()) {
[email protected]2d19eb6e2014-01-27 17:30:002675 NOTREACHED() << "Extension " << *it << " no longer blocked, "
2676 << "but it was never blocked.";
[email protected]695b5712012-12-06 23:55:282677 continue;
[email protected]3f2a2fa2013-09-24 02:55:252678 }
[email protected]bb1bc9b32013-12-21 03:09:142679 registry_->RemoveBlacklisted(*it);
[email protected]3f2a2fa2013-09-24 02:55:252680 extension_prefs_->SetExtensionBlacklisted(extension->id(), false);
[email protected]dc24976f2013-06-02 21:15:092681 AddExtension(extension.get());
[email protected]ac875372013-02-28 04:36:092682 UMA_HISTOGRAM_ENUMERATION("ExtensionBlacklist.UnblacklistInstalled",
[email protected]dc24976f2013-06-02 21:15:092683 extension->location(),
2684 Manifest::NUM_LOCATIONS);
[email protected]695b5712012-12-06 23:55:282685 }
2686
[email protected]2d19eb6e2014-01-27 17:30:002687 for (ExtensionIdSet::iterator it = not_yet_blocked.begin();
2688 it != not_yet_blocked.end(); ++it) {
[email protected]695b5712012-12-06 23:55:282689 scoped_refptr<const Extension> extension = GetInstalledExtension(*it);
[email protected]3f2a2fa2013-09-24 02:55:252690 if (!extension.get()) {
2691 NOTREACHED() << "Extension " << *it << " needs to be "
2692 << "blacklisted, but it's not installed.";
[email protected]695b5712012-12-06 23:55:282693 continue;
[email protected]3f2a2fa2013-09-24 02:55:252694 }
[email protected]bb1bc9b32013-12-21 03:09:142695 registry_->AddBlacklisted(extension);
[email protected]2d19eb6e2014-01-27 17:30:002696 extension_prefs_->SetExtensionBlacklistState(
2697 extension->id(), extensions::BLACKLISTED_MALWARE);
[email protected]b0af4792013-10-23 09:12:132698 UnloadExtension(*it, UnloadedExtensionInfo::REASON_BLACKLIST);
[email protected]ac875372013-02-28 04:36:092699 UMA_HISTOGRAM_ENUMERATION("ExtensionBlacklist.BlacklistInstalled",
2700 extension->location(), Manifest::NUM_LOCATIONS);
[email protected]695b5712012-12-06 23:55:282701 }
[email protected]2d19eb6e2014-01-27 17:30:002702}
[email protected]695b5712012-12-06 23:55:282703
[email protected]2d19eb6e2014-01-27 17:30:002704// TODO(oleg): UMA logging
2705void ExtensionService::UpdateGreylistedExtensions(
2706 const ExtensionIdSet& greylist,
2707 const ExtensionIdSet& unchanged,
2708 const extensions::Blacklist::BlacklistStateMap& state_map) {
2709 ExtensionIdSet not_yet_greylisted, no_longer_greylisted;
2710 Partition(greylist_.GetIDs(),
2711 greylist, unchanged,
2712 &no_longer_greylisted, &not_yet_greylisted);
2713
2714 for (ExtensionIdSet::iterator it = no_longer_greylisted.begin();
2715 it != no_longer_greylisted.end(); ++it) {
2716 scoped_refptr<const Extension> extension = greylist_.GetByID(*it);
2717 if (!extension.get()) {
2718 NOTREACHED() << "Extension " << *it << " no longer greylisted, "
2719 << "but it was not marked as greylisted.";
2720 continue;
2721 }
2722
2723 greylist_.Remove(*it);
2724 extension_prefs_->SetExtensionBlacklistState(extension->id(),
2725 extensions::NOT_BLACKLISTED);
2726 if (extension_prefs_->GetDisableReasons(extension->id()) &
2727 extensions::Extension::DISABLE_GREYLIST)
2728 EnableExtension(*it);
2729 }
2730
2731 for (ExtensionIdSet::iterator it = not_yet_greylisted.begin();
2732 it != not_yet_greylisted.end(); ++it) {
2733 scoped_refptr<const Extension> extension = GetInstalledExtension(*it);
2734 if (!extension.get()) {
2735 NOTREACHED() << "Extension " << *it << " needs to be "
2736 << "disabled, but it's not installed.";
2737 continue;
2738 }
2739 greylist_.Insert(extension);
2740 extension_prefs_->SetExtensionBlacklistState(extension->id(),
2741 state_map.find(*it)->second);
2742 if (registry_->enabled_extensions().Contains(extension->id()))
2743 DisableExtension(*it, extensions::Extension::DISABLE_GREYLIST);
2744 }
[email protected]fdd679b2012-11-15 20:49:392745}
[email protected]75bdcb872013-03-13 00:41:452746
2747void ExtensionService::AddUpdateObserver(extensions::UpdateObserver* observer) {
2748 update_observers_.AddObserver(observer);
2749}
2750
2751void ExtensionService::RemoveUpdateObserver(
2752 extensions::UpdateObserver* observer) {
2753 update_observers_.RemoveObserver(observer);
2754}
[email protected]bb1bc9b32013-12-21 03:09:142755
2756// Used only by test code.
2757void ExtensionService::UnloadAllExtensionsInternal() {
2758 profile_->GetExtensionSpecialStoragePolicy()->RevokeRightsForAllExtensions();
2759
2760 registry_->ClearAll();
[email protected]45f5b7d2014-01-22 23:47:132761 system_->runtime_data()->ClearAll();
[email protected]bb1bc9b32013-12-21 03:09:142762
2763 // TODO(erikkay) should there be a notification for this? We can't use
2764 // EXTENSION_UNLOADED since that implies that the extension has been disabled
2765 // or uninstalled.
2766}