binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 1 | // Copyright 2014 The Chromium Authors. All rights reserved. |
| 2 | // Use of this source code is governed by a BSD-style license that can be |
| 3 | // found in the LICENSE file. |
| 4 | |
| 5 | #ifndef CHROME_BROWSER_EXTENSIONS_EXTENSION_MANAGEMENT_H_ |
| 6 | #define CHROME_BROWSER_EXTENSIONS_EXTENSION_MANAGEMENT_H_ |
| 7 | |
dcheng | c963c714 | 2016-04-08 03:55:22 | [diff] [blame] | 8 | #include <memory> |
binjin | 685ade8 | 2014-11-06 09:53:56 | [diff] [blame] | 9 | #include <string> |
avi | 3ec9c0d | 2016-12-27 22:38:06 | [diff] [blame] | 10 | #include <unordered_map> |
binjin | e6b58b5 | 2014-10-31 01:55:57 | [diff] [blame] | 11 | #include <vector> |
| 12 | |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 13 | #include "base/macros.h" |
binjin | e6b58b5 | 2014-10-31 01:55:57 | [diff] [blame] | 14 | #include "base/memory/ref_counted.h" |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 15 | #include "base/memory/singleton.h" |
| 16 | #include "base/observer_list.h" |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 17 | #include "base/values.h" |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 18 | #include "components/keyed_service/content/browser_context_keyed_service_factory.h" |
| 19 | #include "components/keyed_service/core/keyed_service.h" |
brettw | b1fc1b8 | 2016-02-02 00:19:08 | [diff] [blame] | 20 | #include "components/prefs/pref_change_registrar.h" |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 21 | #include "extensions/browser/management_policy.h" |
rdevlin.cronin | 0670b56 | 2016-07-02 02:05:43 | [diff] [blame] | 22 | #include "extensions/common/extension_id.h" |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 23 | #include "extensions/common/manifest.h" |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 24 | |
binjin | 311ecdf | 2014-09-12 22:56:52 | [diff] [blame] | 25 | class GURL; |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 26 | class PrefService; |
Sergey Poromov | 741e7070 | 2018-10-11 20:11:54 | [diff] [blame] | 27 | class Profile; |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 28 | |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 29 | namespace content { |
| 30 | class BrowserContext; |
| 31 | } // namespace content |
| 32 | |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 33 | namespace extensions { |
| 34 | |
binjin | 81d7c55 | 2014-10-02 11:47:12 | [diff] [blame] | 35 | namespace internal { |
| 36 | |
| 37 | struct IndividualSettings; |
| 38 | struct GlobalSettings; |
| 39 | |
| 40 | } // namespace internal |
| 41 | |
binjin | e6b58b5 | 2014-10-31 01:55:57 | [diff] [blame] | 42 | class APIPermissionSet; |
rdevlin.cronin | 0670b56 | 2016-07-02 02:05:43 | [diff] [blame] | 43 | class Extension; |
binjin | e6b58b5 | 2014-10-31 01:55:57 | [diff] [blame] | 44 | class PermissionSet; |
| 45 | |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 46 | // Tracks the management policies that affect extensions and provides interfaces |
| 47 | // for observing and obtaining the global settings for all extensions, as well |
| 48 | // as per-extension settings. |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 49 | class ExtensionManagement : public KeyedService { |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 50 | public: |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 51 | // Observer class for extension management settings changes. |
| 52 | class Observer { |
| 53 | public: |
| 54 | virtual ~Observer() {} |
| 55 | |
binjin | 81d7c55 | 2014-10-02 11:47:12 | [diff] [blame] | 56 | // Called when the extension management settings change. |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 57 | virtual void OnExtensionManagementSettingsChanged() = 0; |
| 58 | }; |
| 59 | |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 60 | // Installation mode for extensions, default is INSTALLATION_ALLOWED. |
| 61 | // * INSTALLATION_ALLOWED: Extension can be installed. |
| 62 | // * INSTALLATION_BLOCKED: Extension cannot be installed. |
| 63 | // * INSTALLATION_FORCED: Extension will be installed automatically |
| 64 | // and cannot be disabled. |
| 65 | // * INSTALLATION_RECOMMENDED: Extension will be installed automatically but |
| 66 | // can be disabled. |
Kyle Spiers | bb4b9f5f5 | 2019-05-02 17:17:15 | [diff] [blame] | 67 | // * INSTALLATION_REMOVED: Extension cannot be installed and will be |
| 68 | // automatically removed. |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 69 | enum InstallationMode { |
| 70 | INSTALLATION_ALLOWED = 0, |
| 71 | INSTALLATION_BLOCKED, |
| 72 | INSTALLATION_FORCED, |
| 73 | INSTALLATION_RECOMMENDED, |
Kyle Spiers | bb4b9f5f5 | 2019-05-02 17:17:15 | [diff] [blame] | 74 | INSTALLATION_REMOVED, |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 75 | }; |
| 76 | |
Sergey Poromov | 741e7070 | 2018-10-11 20:11:54 | [diff] [blame] | 77 | explicit ExtensionManagement(Profile* profile); |
dcheng | ae36a4a | 2014-10-21 12:36:36 | [diff] [blame] | 78 | ~ExtensionManagement() override; |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 79 | |
binjin | e6b58b5 | 2014-10-31 01:55:57 | [diff] [blame] | 80 | // KeyedService implementations: |
| 81 | void Shutdown() override; |
| 82 | |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 83 | void AddObserver(Observer* observer); |
| 84 | void RemoveObserver(Observer* observer); |
| 85 | |
binjin | e6b58b5 | 2014-10-31 01:55:57 | [diff] [blame] | 86 | // Get the list of ManagementPolicy::Provider controlled by extension |
| 87 | // management policy settings. |
lazyboy | 4aeef20 | 2016-09-07 21:28:59 | [diff] [blame] | 88 | const std::vector<std::unique_ptr<ManagementPolicy::Provider>>& GetProviders() |
| 89 | const; |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 90 | |
| 91 | // Checks if extensions are blacklisted by default, by policy. When true, |
| 92 | // this means that even extensions without an ID should be blacklisted (e.g. |
| 93 | // from the command line, or when loaded as an unpacked extension). |
binjin | 81d7c55 | 2014-10-02 11:47:12 | [diff] [blame] | 94 | bool BlacklistedByDefault() const; |
| 95 | |
| 96 | // Returns installation mode for an extension. |
binjin | 685ade8 | 2014-11-06 09:53:56 | [diff] [blame] | 97 | InstallationMode GetInstallationMode(const Extension* extension) const; |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 98 | |
binjin | 3030106 | 2014-09-08 20:27:34 | [diff] [blame] | 99 | // Returns the force install list, in format specified by |
| 100 | // ExternalPolicyLoader::AddExtension(). |
dcheng | c963c714 | 2016-04-08 03:55:22 | [diff] [blame] | 101 | std::unique_ptr<base::DictionaryValue> GetForceInstallList() const; |
binjin | 3030106 | 2014-09-08 20:27:34 | [diff] [blame] | 102 | |
binjin | cccacef | 2014-10-13 19:00:20 | [diff] [blame] | 103 | // Like GetForceInstallList(), but returns recommended install list instead. |
dcheng | c963c714 | 2016-04-08 03:55:22 | [diff] [blame] | 104 | std::unique_ptr<base::DictionaryValue> GetRecommendedInstallList() const; |
binjin | cccacef | 2014-10-13 19:00:20 | [diff] [blame] | 105 | |
Yann Dago | 726278c6 | 2019-03-18 14:59:55 | [diff] [blame] | 106 | // Returns |true| if there is at least one extension with |
| 107 | // |INSTALLATION_ALLOWED| as installation mode. This excludes force installed |
| 108 | // extensions. |
| 109 | bool HasWhitelistedExtension() const; |
| 110 | |
binjin | c641add | 2014-10-15 16:20:45 | [diff] [blame] | 111 | // Returns if an extension with id |id| is explicitly allowed by enterprise |
| 112 | // policy or not. |
| 113 | bool IsInstallationExplicitlyAllowed(const ExtensionId& id) const; |
binjin | 3030106 | 2014-09-08 20:27:34 | [diff] [blame] | 114 | |
binjin | 311ecdf | 2014-09-12 22:56:52 | [diff] [blame] | 115 | // Returns true if an extension download should be allowed to proceed. |
binjin | 81d7c55 | 2014-10-02 11:47:12 | [diff] [blame] | 116 | bool IsOffstoreInstallAllowed(const GURL& url, |
| 117 | const GURL& referrer_url) const; |
binjin | 311ecdf | 2014-09-12 22:56:52 | [diff] [blame] | 118 | |
Owen Min | a9a13e1 | 2018-11-01 20:43:52 | [diff] [blame] | 119 | // Returns true if an extension with manifest type |manifest_type| and |
| 120 | // id |extension_id| is allowed to be installed. |
| 121 | bool IsAllowedManifestType(Manifest::Type manifest_type, |
| 122 | const std::string& extension_id) const; |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 123 | |
binjin | 685ade8 | 2014-11-06 09:53:56 | [diff] [blame] | 124 | // Returns the list of blocked API permissions for |extension|. |
| 125 | APIPermissionSet GetBlockedAPIPermissions(const Extension* extension) const; |
binjin | e6b58b5 | 2014-10-31 01:55:57 | [diff] [blame] | 126 | |
nrpeter | 40e1638 | 2017-04-13 17:34:58 | [diff] [blame] | 127 | // Returns the list of hosts blocked by policy for |extension|. |
Devlin Cronin | 7e0f41ff | 2018-05-16 17:19:36 | [diff] [blame] | 128 | const URLPatternSet& GetPolicyBlockedHosts(const Extension* extension) const; |
nrpeter | 40e1638 | 2017-04-13 17:34:58 | [diff] [blame] | 129 | |
Devlin Cronin | 7e0f41ff | 2018-05-16 17:19:36 | [diff] [blame] | 130 | // Returns the hosts exempted by policy from the PolicyBlockedHosts for |
nrpeter | e33d2a5b | 2017-04-25 00:12:31 | [diff] [blame] | 131 | // |extension|. |
Devlin Cronin | 7e0f41ff | 2018-05-16 17:19:36 | [diff] [blame] | 132 | const URLPatternSet& GetPolicyAllowedHosts(const Extension* extension) const; |
nrpeter | 40e1638 | 2017-04-13 17:34:58 | [diff] [blame] | 133 | |
nrpeter | e33d2a5b | 2017-04-25 00:12:31 | [diff] [blame] | 134 | // Returns the list of hosts blocked by policy for Default scope. This can be |
Devlin Cronin | 7e0f41ff | 2018-05-16 17:19:36 | [diff] [blame] | 135 | // overridden by an individual scope which is queried via |
| 136 | // GetPolicyBlockedHosts. |
| 137 | const URLPatternSet& GetDefaultPolicyBlockedHosts() const; |
nrpeter | e33d2a5b | 2017-04-25 00:12:31 | [diff] [blame] | 138 | |
Devlin Cronin | 7e0f41ff | 2018-05-16 17:19:36 | [diff] [blame] | 139 | // Returns the hosts exempted by policy from PolicyBlockedHosts for |
nrpeter | e33d2a5b | 2017-04-25 00:12:31 | [diff] [blame] | 140 | // the default scope. This can be overridden by an individual scope which is |
Devlin Cronin | 7e0f41ff | 2018-05-16 17:19:36 | [diff] [blame] | 141 | // queries via GetPolicyAllowedHosts. This should only be used to |
nrpeter | e33d2a5b | 2017-04-25 00:12:31 | [diff] [blame] | 142 | // initialize a new renderer. |
Devlin Cronin | 7e0f41ff | 2018-05-16 17:19:36 | [diff] [blame] | 143 | const URLPatternSet& GetDefaultPolicyAllowedHosts() const; |
nrpeter | e33d2a5b | 2017-04-25 00:12:31 | [diff] [blame] | 144 | |
| 145 | // Checks if an |extension| has its own runtime_blocked_hosts or |
| 146 | // runtime_allowed_hosts defined in the individual scope of the |
| 147 | // ExtensionSettings policy. |
| 148 | // Returns false if an individual scoped setting isn't defined. |
Devlin Cronin | 7e0f41ff | 2018-05-16 17:19:36 | [diff] [blame] | 149 | bool UsesDefaultPolicyHostRestrictions(const Extension* extension) const; |
nrpeter | e33d2a5b | 2017-04-25 00:12:31 | [diff] [blame] | 150 | |
nrpeter | 40e1638 | 2017-04-13 17:34:58 | [diff] [blame] | 151 | // Checks if a URL is on the blocked host permissions list for a specific |
| 152 | // extension. |
Devlin Cronin | 7e0f41ff | 2018-05-16 17:19:36 | [diff] [blame] | 153 | bool IsPolicyBlockedHost(const Extension* extension, const GURL& url) const; |
nrpeter | 40e1638 | 2017-04-13 17:34:58 | [diff] [blame] | 154 | |
binjin | 685ade8 | 2014-11-06 09:53:56 | [diff] [blame] | 155 | // Returns blocked permission set for |extension|. |
dcheng | c963c714 | 2016-04-08 03:55:22 | [diff] [blame] | 156 | std::unique_ptr<const PermissionSet> GetBlockedPermissions( |
binjin | 685ade8 | 2014-11-06 09:53:56 | [diff] [blame] | 157 | const Extension* extension) const; |
binjin | e6b58b5 | 2014-10-31 01:55:57 | [diff] [blame] | 158 | |
nrpeter | 2362e7e | 2017-05-10 17:21:26 | [diff] [blame] | 159 | // If the extension is blocked from install and a custom error message |
| 160 | // was defined returns it. Otherwise returns an empty string. The maximum |
| 161 | // string length is 1000 characters. |
| 162 | const std::string BlockedInstallMessage(const ExtensionId& id) const; |
| 163 | |
binjin | 685ade8 | 2014-11-06 09:53:56 | [diff] [blame] | 164 | // Returns true if every permission in |perms| is allowed for |extension|. |
| 165 | bool IsPermissionSetAllowed(const Extension* extension, |
rdevlin.cronin | e2d0fd0 | 2015-09-24 22:35:49 | [diff] [blame] | 166 | const PermissionSet& perms) const; |
binjin | e6b58b5 | 2014-10-31 01:55:57 | [diff] [blame] | 167 | |
binjin | 8e3d018 | 2014-12-04 16:44:28 | [diff] [blame] | 168 | // Returns true if |extension| meets the minimum required version set for it. |
| 169 | // If there is no such requirement set for it, returns true as well. |
| 170 | // If false is returned and |required_version| is not null, the minimum |
| 171 | // required version is returned. |
| 172 | bool CheckMinimumVersion(const Extension* extension, |
| 173 | std::string* required_version) const; |
| 174 | |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 175 | private: |
avi | 3ec9c0d | 2016-12-27 22:38:06 | [diff] [blame] | 176 | using SettingsIdMap = |
| 177 | std::unordered_map<ExtensionId, |
| 178 | std::unique_ptr<internal::IndividualSettings>>; |
| 179 | using SettingsUpdateUrlMap = |
| 180 | std::unordered_map<std::string, |
| 181 | std::unique_ptr<internal::IndividualSettings>>; |
binjin | 81d7c55 | 2014-10-02 11:47:12 | [diff] [blame] | 182 | friend class ExtensionManagementServiceTest; |
| 183 | |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 184 | // Load all extension management preferences from |pref_service|, and |
| 185 | // refresh the settings. |
| 186 | void Refresh(); |
| 187 | |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 188 | // Load preference with name |pref_name| and expected type |expected_type|. |
| 189 | // If |force_managed| is true, only loading from the managed preference store |
| 190 | // is allowed. Returns NULL if the preference is not present, not allowed to |
| 191 | // be loaded from or has the wrong type. |
| 192 | const base::Value* LoadPreference(const char* pref_name, |
| 193 | bool force_managed, |
Owen Min | a9a13e1 | 2018-11-01 20:43:52 | [diff] [blame] | 194 | base::Value::Type expected_type) const; |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 195 | |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 196 | void OnExtensionPrefChanged(); |
| 197 | void NotifyExtensionManagementPrefChanged(); |
| 198 | |
achuith | 4607f07 | 2017-03-08 11:49:13 | [diff] [blame] | 199 | // Helper to return an extension install list, in format specified by |
| 200 | // ExternalPolicyLoader::AddExtension(). |
| 201 | std::unique_ptr<base::DictionaryValue> GetInstallListByMode( |
| 202 | InstallationMode installation_mode) const; |
| 203 | |
| 204 | // Helper to update |extension_dict| for forced installs. |
| 205 | void UpdateForcedExtensions(const base::DictionaryValue* extension_dict); |
| 206 | |
Owen Min | a9a13e1 | 2018-11-01 20:43:52 | [diff] [blame] | 207 | // Helper to update |settings_by_id_| for forced cloud reporting extension. |
| 208 | void UpdateForcedCloudReportingExtension(); |
| 209 | |
| 210 | // Returns true if cloud reporting policy is enabled. |
| 211 | bool IsCloudReportingPolicyEnabled() const; |
| 212 | |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 213 | // Helper function to access |settings_by_id_| with |id| as key. |
| 214 | // Adds a new IndividualSettings entry to |settings_by_id_| if none exists for |
| 215 | // |id| yet. |
binjin | 81d7c55 | 2014-10-02 11:47:12 | [diff] [blame] | 216 | internal::IndividualSettings* AccessById(const ExtensionId& id); |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 217 | |
binjin | 685ade8 | 2014-11-06 09:53:56 | [diff] [blame] | 218 | // Similar to AccessById(), but access |settings_by_update_url_| instead. |
| 219 | internal::IndividualSettings* AccessByUpdateUrl( |
| 220 | const std::string& update_url); |
| 221 | |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 222 | // A map containing all IndividualSettings applied to an individual extension |
| 223 | // identified by extension ID. The extension ID is used as index key of the |
| 224 | // map. |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 225 | SettingsIdMap settings_by_id_; |
| 226 | |
binjin | 685ade8 | 2014-11-06 09:53:56 | [diff] [blame] | 227 | // Similar to |settings_by_id_|, but contains the settings for a group of |
| 228 | // extensions with same update URL. The update url itself is used as index |
| 229 | // key for the map. |
| 230 | SettingsUpdateUrlMap settings_by_update_url_; |
| 231 | |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 232 | // The default IndividualSettings. |
| 233 | // For extension settings applied to an individual extension (identified by |
| 234 | // extension ID) or a group of extension (with specified extension update |
| 235 | // URL), all unspecified part will take value from |default_settings_|. |
| 236 | // For all other extensions, all settings from |default_settings_| will be |
| 237 | // enforced. |
dcheng | c963c714 | 2016-04-08 03:55:22 | [diff] [blame] | 238 | std::unique_ptr<internal::IndividualSettings> default_settings_; |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 239 | |
| 240 | // Extension settings applicable to all extensions. |
dcheng | c963c714 | 2016-04-08 03:55:22 | [diff] [blame] | 241 | std::unique_ptr<internal::GlobalSettings> global_settings_; |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 242 | |
Sergey Poromov | 741e7070 | 2018-10-11 20:11:54 | [diff] [blame] | 243 | Profile* const profile_ = nullptr; |
achuith | 4607f07 | 2017-03-08 11:49:13 | [diff] [blame] | 244 | PrefService* pref_service_ = nullptr; |
| 245 | bool is_signin_profile_ = false; |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 246 | |
Trent Apted | a250ec3ab | 2018-08-19 08:52:19 | [diff] [blame] | 247 | base::ObserverList<Observer, true>::Unchecked observer_list_; |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 248 | PrefChangeRegistrar pref_change_registrar_; |
lazyboy | 4aeef20 | 2016-09-07 21:28:59 | [diff] [blame] | 249 | std::vector<std::unique_ptr<ManagementPolicy::Provider>> providers_; |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 250 | |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 251 | DISALLOW_COPY_AND_ASSIGN(ExtensionManagement); |
| 252 | }; |
| 253 | |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 254 | class ExtensionManagementFactory : public BrowserContextKeyedServiceFactory { |
| 255 | public: |
| 256 | static ExtensionManagement* GetForBrowserContext( |
| 257 | content::BrowserContext* context); |
| 258 | static ExtensionManagementFactory* GetInstance(); |
| 259 | |
| 260 | private: |
olli.raula | 36aa8be | 2015-09-10 11:14:22 | [diff] [blame] | 261 | friend struct base::DefaultSingletonTraits<ExtensionManagementFactory>; |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 262 | |
| 263 | ExtensionManagementFactory(); |
dcheng | ae36a4a | 2014-10-21 12:36:36 | [diff] [blame] | 264 | ~ExtensionManagementFactory() override; |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 265 | |
| 266 | // BrowserContextKeyedServiceExtensionManagementFactory: |
dcheng | ae36a4a | 2014-10-21 12:36:36 | [diff] [blame] | 267 | KeyedService* BuildServiceInstanceFor( |
mostynb | a15bee1 | 2014-10-04 00:40:32 | [diff] [blame] | 268 | content::BrowserContext* context) const override; |
dcheng | ae36a4a | 2014-10-21 12:36:36 | [diff] [blame] | 269 | content::BrowserContext* GetBrowserContextToUse( |
mostynb | a15bee1 | 2014-10-04 00:40:32 | [diff] [blame] | 270 | content::BrowserContext* context) const override; |
dcheng | ae36a4a | 2014-10-21 12:36:36 | [diff] [blame] | 271 | void RegisterProfilePrefs( |
mostynb | a15bee1 | 2014-10-04 00:40:32 | [diff] [blame] | 272 | user_prefs::PrefRegistrySyncable* registry) override; |
binjin | 1569c9b | 2014-09-05 13:33:18 | [diff] [blame] | 273 | |
| 274 | DISALLOW_COPY_AND_ASSIGN(ExtensionManagementFactory); |
| 275 | }; |
| 276 | |
binjin | 5f405ef | 2014-09-03 21:23:16 | [diff] [blame] | 277 | } // namespace extensions |
| 278 | |
| 279 | #endif // CHROME_BROWSER_EXTENSIONS_EXTENSION_MANAGEMENT_H_ |