blob: d58ad80e0849eb259f04eb71b2026a134ee46016 [file] [log] [blame]
// Copyright (c) 2013 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "chrome/browser/extensions/extension_service.h"
#include <stddef.h>
#include <iterator>
#include <memory>
#include <set>
#include <utility>
#include "base/bind.h"
#include "base/command_line.h"
#include "base/debug/alias.h"
#include "base/debug/dump_without_crashing.h"
#include "base/location.h"
#include "base/metrics/histogram_functions.h"
#include "base/metrics/histogram_macros.h"
#include "base/single_thread_task_runner.h"
#include "base/stl_util.h"
#include "base/strings/string_number_conversions.h"
#include "base/strings/string_tokenizer.h"
#include "base/strings/stringprintf.h"
#include "base/strings/utf_string_conversions.h"
#include "base/task/post_task.h"
#include "base/threading/thread_restrictions.h"
#include "base/threading/thread_task_runner_handle.h"
#include "base/time/time.h"
#include "base/trace_event/trace_event.h"
#include "build/build_config.h"
#include "chrome/browser/browser_process.h"
#include "chrome/browser/chrome_notification_types.h"
#include "chrome/browser/extensions/api/content_settings/content_settings_custom_extension_provider.h"
#include "chrome/browser/extensions/api/content_settings/content_settings_service.h"
#include "chrome/browser/extensions/app_data_migrator.h"
#include "chrome/browser/extensions/component_loader.h"
#include "chrome/browser/extensions/crx_installer.h"
#include "chrome/browser/extensions/data_deleter.h"
#include "chrome/browser/extensions/extension_action_storage_manager.h"
#include "chrome/browser/extensions/extension_assets_manager.h"
#include "chrome/browser/extensions/extension_disabled_ui.h"
#include "chrome/browser/extensions/extension_error_controller.h"
#include "chrome/browser/extensions/extension_special_storage_policy.h"
#include "chrome/browser/extensions/extension_sync_service.h"
#include "chrome/browser/extensions/extension_util.h"
#include "chrome/browser/extensions/external_install_manager.h"
#include "chrome/browser/extensions/external_provider_impl.h"
#include "chrome/browser/extensions/forced_extensions/installation_failures.h"
#include "chrome/browser/extensions/install_verifier.h"
#include "chrome/browser/extensions/installed_loader.h"
#include "chrome/browser/extensions/pending_extension_manager.h"
#include "chrome/browser/extensions/permissions_updater.h"
#include "chrome/browser/extensions/shared_module_service.h"
#include "chrome/browser/extensions/unpacked_installer.h"
#include "chrome/browser/extensions/updater/chrome_extension_downloader_factory.h"
#include "chrome/browser/extensions/updater/extension_updater.h"
#include "chrome/browser/google/google_brand.h"
#include "chrome/browser/profiles/profile.h"
#include "chrome/browser/ui/webui/extensions/extension_icon_source.h"
#include "chrome/browser/ui/webui/favicon_source.h"
#include "chrome/browser/ui/webui/theme_source.h"
#include "chrome/browser/upgrade_detector/upgrade_detector.h"
#include "chrome/browser/web_applications/extensions/web_app_extension_ids_map.h"
#include "chrome/common/buildflags.h"
#include "chrome/common/chrome_switches.h"
#include "chrome/common/crash_keys.h"
#include "chrome/common/extensions/extension_constants.h"
#include "chrome/common/url_constants.h"
#include "components/content_settings/core/browser/host_content_settings_map.h"
#include "components/crx_file/id_util.h"
#include "content/public/browser/browser_task_traits.h"
#include "content/public/browser/browser_thread.h"
#include "content/public/browser/notification_service.h"
#include "content/public/browser/render_process_host.h"
#include "content/public/browser/storage_partition.h"
#include "extensions/browser/event_router.h"
#include "extensions/browser/extension_file_task_runner.h"
#include "extensions/browser/extension_host.h"
#include "extensions/browser/extension_registry.h"
#include "extensions/browser/extension_system.h"
#include "extensions/browser/extension_util.h"
#include "extensions/browser/extensions_browser_client.h"
#include "extensions/browser/external_install_info.h"
#include "extensions/browser/install_flag.h"
#include "extensions/browser/management_policy.h"
#include "extensions/browser/runtime_data.h"
#include "extensions/browser/uninstall_reason.h"
#include "extensions/browser/update_observer.h"
#include "extensions/browser/updater/extension_cache.h"
#include "extensions/browser/updater/extension_downloader.h"
#include "extensions/common/extension_messages.h"
#include "extensions/common/extension_urls.h"
#include "extensions/common/feature_switch.h"
#include "extensions/common/features/feature_channel.h"
#include "extensions/common/file_util.h"
#include "extensions/common/manifest_constants.h"
#include "extensions/common/manifest_handlers/shared_module_info.h"
#include "extensions/common/manifest_url_handlers.h"
#include "extensions/common/one_shot_event.h"
#include "extensions/common/permissions/api_permission.h"
#include "extensions/common/permissions/permission_message_provider.h"
#include "extensions/common/permissions/permissions_data.h"
#include "extensions/common/switches.h"
#if BUILDFLAG(ENABLE_SUPERVISED_USERS)
#include "chrome/browser/supervised_user/supervised_user_service.h"
#include "chrome/browser/supervised_user/supervised_user_service_factory.h"
#endif
#if defined(OS_CHROMEOS)
#include "chrome/browser/chromeos/extensions/install_limiter.h"
#include "chrome/browser/chromeos/profiles/profile_helper.h"
#include "storage/browser/fileapi/file_system_backend.h"
#include "storage/browser/fileapi/file_system_context.h"
#endif
using content::BrowserContext;
using content::BrowserThread;
namespace extensions {
using LoadErrorBehavior = ExtensionRegistrar::LoadErrorBehavior;
namespace {
// Wait this long after an extensions becomes idle before updating it.
constexpr base::TimeDelta kUpdateIdleDelay = base::TimeDelta::FromSeconds(5);
// IDs of extensions that have been replaced by component extensions and need to
// be uninstalled.
const char* const kMigratedExtensionIds[] = {
"boadgeojelhgndaghljhdicfkmllpafd", // Google Cast
"dliochdbjfkdbacpmhlcpmleaejidimm" // Google Cast (Beta)
};
} // namespace
// ExtensionService.
void ExtensionService::CheckExternalUninstall(const std::string& id) {
CHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
// Check if the providers know about this extension.
for (const auto& provider : external_extension_providers_) {
DCHECK(provider->IsReady());
if (provider->HasExtension(id))
return; // Yup, known extension, don't uninstall.
}
// Historically, the code under //chrome/browser/extensions has
// unsurprisingly managed all extensions. Later, Progressive Web Apps (PWAs)
// were implemented on top of extensions, more out of convenience than out of
// principle. As of mid 2018, there is work underway to separate PWAs's
// implementation details from the //c/b/e code. During the transition
// period, PWA-extensions are no longer managed solely by //c/b/e code. We
// add a special case here so that //c/b/e code doesn't uninstall
// PWA-extensions that it doesn't otherwise know about.
//
// Long term, PWAs will be completely separate from extensions, and we can
// remove this cross-link.
if (web_app::ExtensionIdsMap::HasExtensionId(profile_->GetPrefs(), id)) {
return;
}
// We get the list of external extensions to check from preferences.
// It is possible that an extension has preferences but is not loaded.
// For example, an extension that requires experimental permissions
// will not be loaded if the experimental command line flag is not used.
// In this case, do not uninstall.
if (!GetInstalledExtension(id)) {
// We can't call UninstallExtension with an unloaded/invalid
// extension ID.
LOG(WARNING) << "Attempted uninstallation of unloaded/invalid extension "
<< "with id: " << id;
return;
}
UninstallExtension(id, UNINSTALL_REASON_ORPHANED_EXTERNAL_EXTENSION, nullptr);
}
void ExtensionService::ClearProvidersForTesting() {
external_extension_providers_.clear();
}
void ExtensionService::AddProviderForTesting(
std::unique_ptr<ExternalProviderInterface> test_provider) {
CHECK(test_provider);
external_extension_providers_.push_back(std::move(test_provider));
}
void ExtensionService::BlacklistExtensionForTest(
const std::string& extension_id) {
ExtensionIdSet blacklisted;
ExtensionIdSet unchanged;
blacklisted.insert(extension_id);
UpdateBlacklistedExtensions(blacklisted, unchanged);
}
bool ExtensionService::OnExternalExtensionUpdateUrlFound(
const ExternalInstallInfoUpdateUrl& info,
bool is_initial_load) {
DCHECK_CURRENTLY_ON(BrowserThread::UI);
CHECK(crx_file::id_util::IdIsValid(info.extension_id));
if (Manifest::IsExternalLocation(info.download_location)) {
// All extensions that are not user specific can be cached.
ExtensionsBrowserClient::Get()->GetExtensionCache()->AllowCaching(
info.extension_id);
}
const Extension* extension = GetExtensionById(info.extension_id, true);
if (extension) {
// Already installed. Skip this install if the current location has higher
// priority than |info.download_location|, and we aren't doing a
// reinstall of a corrupt policy force-installed extension.
Manifest::Location current = extension->location();
if (!pending_extension_manager_.IsPolicyReinstallForCorruptionExpected(
info.extension_id) &&
current == Manifest::GetHigherPriorityLocation(
current, info.download_location)) {
InstallationFailures::ReportFailure(
profile_, info.extension_id,
InstallationFailures::Reason::ALREADY_INSTALLED);
return false;
}
// Otherwise, overwrite the current installation.
}
// Add |info.extension_id| to the set of pending extensions. If it can not
// be added, then there is already a pending record from a higher-priority
// install source. In this case, signal that this extension will not be
// installed by returning false.
if (!pending_extension_manager()->AddFromExternalUpdateUrl(
info.extension_id, info.install_parameter, info.update_url,
info.download_location, info.creation_flags,
info.mark_acknowledged)) {
return false;
}
if (is_initial_load)
update_once_all_providers_are_ready_ = true;
return true;
}
void ExtensionService::OnExternalProviderUpdateComplete(
const ExternalProviderInterface* provider,
const std::vector<ExternalInstallInfoUpdateUrl>& update_url_extensions,
const std::vector<ExternalInstallInfoFile>& file_extensions,
const std::set<std::string>& removed_extensions) {
// Update pending_extension_manager() with the new extensions first.
for (const auto& extension : update_url_extensions)
OnExternalExtensionUpdateUrlFound(extension, false);
for (const auto& extension : file_extensions)
OnExternalExtensionFileFound(extension);
#if DCHECK_IS_ON()
for (const std::string& id : removed_extensions) {
for (const auto& extension : update_url_extensions)
DCHECK_NE(id, extension.extension_id);
for (const auto& extension : file_extensions)
DCHECK_NE(id, extension.extension_id);
}
#endif
// Then uninstall before running |updater_|.
for (const std::string& id : removed_extensions)
CheckExternalUninstall(id);
if (!update_url_extensions.empty() && updater_) {
// Empty params will cause pending extensions to be updated.
updater_->CheckNow(ExtensionUpdater::CheckParams());
}
error_controller_->ShowErrorIfNeeded();
external_install_manager_->UpdateExternalExtensionAlert();
}
ExtensionService::ExtensionService(Profile* profile,
const base::CommandLine* command_line,
const base::FilePath& install_directory,
ExtensionPrefs* extension_prefs,
Blacklist* blacklist,
bool autoupdate_enabled,
bool extensions_enabled,
OneShotEvent* ready)
: Blacklist::Observer(blacklist),
command_line_(command_line),
profile_(profile),
system_(ExtensionSystem::Get(profile)),
extension_prefs_(extension_prefs),
blacklist_(blacklist),
registry_(ExtensionRegistry::Get(profile)),
pending_extension_manager_(profile),
install_directory_(install_directory),
extensions_enabled_(extensions_enabled),
ready_(ready),
shared_module_service_(new SharedModuleService(profile_)),
app_data_migrator_(new AppDataMigrator(profile_, registry_)),
extension_registrar_(profile_, this),
forced_extensions_tracker_(registry_, profile_) {
CHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
TRACE_EVENT0("browser,startup", "ExtensionService::ExtensionService::ctor");
// Figure out if extension installation should be enabled.
if (ExtensionsBrowserClient::Get()->AreExtensionsDisabled(*command_line,
profile))
extensions_enabled_ = false;
registrar_.Add(this, chrome::NOTIFICATION_APP_TERMINATING,
content::NotificationService::AllBrowserContextsAndSources());
registrar_.Add(this, NOTIFICATION_EXTENSION_PROCESS_TERMINATED,
content::NotificationService::AllBrowserContextsAndSources());
registrar_.Add(this, content::NOTIFICATION_RENDERER_PROCESS_TERMINATED,
content::NotificationService::AllBrowserContextsAndSources());
registrar_.Add(this,
chrome::NOTIFICATION_PROFILE_DESTRUCTION_STARTED,
content::Source<Profile>(profile_));
UpgradeDetector::GetInstance()->AddObserver(this);
ExtensionManagementFactory::GetForBrowserContext(profile_)->AddObserver(this);
// Set up the ExtensionUpdater.
if (autoupdate_enabled) {
updater_.reset(new ExtensionUpdater(
this, extension_prefs, profile->GetPrefs(), profile,
kDefaultUpdateFrequencySeconds,
ExtensionsBrowserClient::Get()->GetExtensionCache(),
base::Bind(ChromeExtensionDownloaderFactory::CreateForProfile,
profile)));
}
component_loader_.reset(new ComponentLoader(
this, profile->GetPrefs(), g_browser_process->local_state(), profile));
if (extensions_enabled_) {
ExternalProviderImpl::CreateExternalProviders(
this, profile_, &external_extension_providers_);
}
// Set this as the ExtensionService for app sorting to ensure it causes syncs
// if required.
is_first_run_ = !extension_prefs_->SetAlertSystemFirstRun();
error_controller_.reset(
new ExtensionErrorController(profile_, is_first_run_));
external_install_manager_.reset(
new ExternalInstallManager(profile_, is_first_run_));
extension_action_storage_manager_.reset(
new ExtensionActionStorageManager(profile_));
// How long is the path to the Extensions directory?
UMA_HISTOGRAM_CUSTOM_COUNTS("Extensions.ExtensionRootPathLength",
install_directory_.value().length(), 1, 500, 100);
}
PendingExtensionManager* ExtensionService::pending_extension_manager() {
return &pending_extension_manager_;
}
ExtensionService::~ExtensionService() {
UpgradeDetector::GetInstance()->RemoveObserver(this);
// No need to unload extensions here because they are profile-scoped, and the
// profile is in the process of being deleted.
for (const auto& provider : external_extension_providers_)
provider->ServiceShutdown();
}
void ExtensionService::Shutdown() {
ExtensionManagementFactory::GetInstance()
->GetForBrowserContext(profile())
->RemoveObserver(this);
}
const Extension* ExtensionService::GetExtensionById(
const std::string& id, bool include_disabled) const {
int include_mask = ExtensionRegistry::ENABLED;
if (include_disabled) {
// Include blacklisted and blocked extensions here because there are
// hundreds of callers of this function, and many might assume that this
// includes those that have been disabled due to blacklisting or blocking.
include_mask |= ExtensionRegistry::DISABLED |
ExtensionRegistry::BLACKLISTED | ExtensionRegistry::BLOCKED;
}
return registry_->GetExtensionById(id, include_mask);
}
void ExtensionService::Init() {
CHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
TRACE_EVENT0("browser,startup", "ExtensionService::Init");
SCOPED_UMA_HISTOGRAM_TIMER("Extensions.ExtensionServiceInitTime");
DCHECK(!is_ready()); // Can't redo init.
DCHECK_EQ(registry_->enabled_extensions().size(), 0u);
component_loader_->LoadAll();
bool load_saved_extensions = true;
bool load_command_line_extensions = extensions_enabled_;
#if defined(OS_CHROMEOS)
if (chromeos::ProfileHelper::IsSigninProfile(profile_) ||
chromeos::ProfileHelper::IsLockScreenAppProfile(profile_)) {
load_saved_extensions = false;
load_command_line_extensions = false;
}
#endif
if (load_saved_extensions)
InstalledLoader(this).LoadAllExtensions();
OnInstalledExtensionsLoaded();
LoadExtensionsFromCommandLineFlag(::switches::kDisableExtensionsExcept);
if (load_command_line_extensions)
LoadExtensionsFromCommandLineFlag(switches::kLoadExtension);
EnabledReloadableExtensions();
MaybeFinishShutdownDelayed();
SetReadyAndNotifyListeners();
UninstallMigratedExtensions();
// TODO(erikkay): this should probably be deferred to a future point
// rather than running immediately at startup.
CheckForExternalUpdates();
LoadGreylistFromPrefs();
}
void ExtensionService::EnabledReloadableExtensions() {
TRACE_EVENT0("browser,startup",
"ExtensionService::EnabledReloadableExtensions");
std::vector<std::string> extensions_to_enable;
for (const auto& e : registry_->disabled_extensions()) {
if (extension_prefs_->GetDisableReasons(e->id()) ==
disable_reason::DISABLE_RELOAD)
extensions_to_enable.push_back(e->id());
}
for (const std::string& extension : extensions_to_enable) {
EnableExtension(extension);
}
}
void ExtensionService::MaybeFinishShutdownDelayed() {
TRACE_EVENT0("browser,startup",
"ExtensionService::MaybeFinishShutdownDelayed");
std::unique_ptr<ExtensionPrefs::ExtensionsInfo> delayed_info(
extension_prefs_->GetAllDelayedInstallInfo());
for (size_t i = 0; i < delayed_info->size(); ++i) {
ExtensionInfo* info = delayed_info->at(i).get();
scoped_refptr<const Extension> extension(nullptr);
if (info->extension_manifest) {
std::string error;
extension = Extension::Create(
info->extension_path, info->extension_location,
*info->extension_manifest,
extension_prefs_->GetDelayedInstallCreationFlags(info->extension_id),
info->extension_id, &error);
if (extension.get())
delayed_installs_.Insert(extension);
}
}
MaybeFinishDelayedInstallations();
std::unique_ptr<ExtensionPrefs::ExtensionsInfo> delayed_info2(
extension_prefs_->GetAllDelayedInstallInfo());
UMA_HISTOGRAM_COUNTS_100("Extensions.UpdateOnLoad",
delayed_info2->size() - delayed_info->size());
}
void ExtensionService::LoadGreylistFromPrefs() {
TRACE_EVENT0("browser,startup", "ExtensionService::LoadGreylistFromPrefs");
std::unique_ptr<ExtensionSet> all_extensions =
registry_->GenerateInstalledExtensionsSet();
for (const auto& extension : *all_extensions) {
const BlacklistState state =
extension_prefs_->GetExtensionBlacklistState(extension->id());
if (state == BLACKLISTED_SECURITY_VULNERABILITY ||
state == BLACKLISTED_POTENTIALLY_UNWANTED ||
state == BLACKLISTED_CWS_POLICY_VIOLATION)
greylist_.Insert(extension);
}
}
bool ExtensionService::UpdateExtension(const CRXFileInfo& file,
bool file_ownership_passed,
CrxInstaller** out_crx_installer) {
CHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
if (browser_terminating_) {
LOG(WARNING) << "Skipping UpdateExtension due to browser shutdown";
// Leak the temp file at extension_path. We don't want to add to the disk
// I/O burden at shutdown, we can't rely on the I/O completing anyway, and
// the file is in the OS temp directory which should be cleaned up for us.
return false;
}
const std::string& id = file.extension_id;
const PendingExtensionInfo* pending_extension_info =
pending_extension_manager()->GetById(id);
const Extension* extension = GetInstalledExtension(id);
if (!pending_extension_info && !extension) {
LOG(WARNING) << "Will not update extension " << id
<< " because it is not installed or pending";
// Delete extension_path since we're not creating a CrxInstaller
// that would do it for us.
if (file_ownership_passed &&
!GetExtensionFileTaskRunner()->PostTask(
FROM_HERE,
base::BindOnce(&file_util::DeleteFile, file.path, false)))
NOTREACHED();
return false;
}
// Either |pending_extension_info| or |extension| or both must not be null.
scoped_refptr<CrxInstaller> installer(CrxInstaller::CreateSilent(this));
installer->set_expected_id(id);
installer->set_expected_hash(file.expected_hash);
int creation_flags = Extension::NO_FLAGS;
if (pending_extension_info) {
installer->set_install_source(pending_extension_info->install_source());
installer->set_allow_silent_install(true);
// If the extension came in disabled due to a permission increase, then
// don't grant it all the permissions. crbug.com/484214
bool has_permissions_increase =
ExtensionPrefs::Get(profile_)->HasDisableReason(
id, disable_reason::DISABLE_PERMISSIONS_INCREASE);
const base::Version& expected_version = pending_extension_info->version();
if (has_permissions_increase ||
pending_extension_info->remote_install() ||
!expected_version.IsValid()) {
installer->set_grant_permissions(false);
} else {
installer->set_expected_version(expected_version,
false /* fail_install_if_unexpected */);
}
creation_flags = pending_extension_info->creation_flags();
if (pending_extension_info->mark_acknowledged())
external_install_manager_->AcknowledgeExternalExtension(id);
// If the extension was installed from or has migrated to the webstore, or
// its auto-update URL is from the webstore, treat it as a webstore install.
// Note that we ignore some older extensions with blank auto-update URLs
// because we are mostly concerned with restrictions on NaCl extensions,
// which are newer.
if (!extension && extension_urls::IsWebstoreUpdateUrl(
pending_extension_info->update_url()))
creation_flags |= Extension::FROM_WEBSTORE;
} else {
// |extension| must not be null.
installer->set_install_source(extension->location());
}
if (extension) {
installer->InitializeCreationFlagsForUpdate(extension, creation_flags);
installer->set_do_not_sync(extension_prefs_->DoNotSync(id));
} else {
installer->set_creation_flags(creation_flags);
}
installer->set_delete_source(file_ownership_passed);
installer->set_install_cause(extension_misc::INSTALL_CAUSE_UPDATE);
installer->InstallCrxFile(file);
if (out_crx_installer)
*out_crx_installer = installer.get();
return true;
}
void ExtensionService::LoadExtensionsFromCommandLineFlag(
const char* switch_name) {
if (command_line_->HasSwitch(switch_name)) {
base::CommandLine::StringType path_list =
command_line_->GetSwitchValueNative(switch_name);
base::StringTokenizerT<base::CommandLine::StringType,
base::CommandLine::StringType::const_iterator>
t(path_list, FILE_PATH_LITERAL(","));
while (t.GetNext()) {
std::string extension_id;
UnpackedInstaller::Create(this)->LoadFromCommandLine(
base::FilePath(t.token()), &extension_id, false /*only-allow-apps*/);
// Extension id is added to whitelist after its extension is loaded
// because code is executed asynchronously. TODO(michaelpg): Remove this
// assumption so loading extensions does not have to be asynchronous:
// crbug.com/708354.
if (switch_name == ::switches::kDisableExtensionsExcept)
disable_flag_exempted_extensions_.insert(extension_id);
}
}
}
// TODO(michaelpg): Group with other ExtensionRegistrar::Delegate overrides
// according to header file once diffs have settled down.
void ExtensionService::LoadExtensionForReload(
const ExtensionId& extension_id,
const base::FilePath& path,
LoadErrorBehavior load_error_behavior) {
if (delayed_installs_.Contains(extension_id) &&
FinishDelayedInstallationIfReady(extension_id,
true /*install_immediately*/)) {
return;
}
// If we're reloading a component extension, use the component extension
// loader's reloader.
if (component_loader_->Exists(extension_id)) {
component_loader_->Reload(extension_id);
return;
}
// Check the installed extensions to see if what we're reloading was already
// installed.
std::unique_ptr<ExtensionInfo> installed_extension(
extension_prefs_->GetInstalledExtensionInfo(extension_id));
if (installed_extension.get() &&
installed_extension->extension_manifest.get()) {
InstalledLoader(this).Load(*installed_extension, false);
} else {
// Otherwise, the extension is unpacked (location LOAD). We must load it
// from the path.
CHECK(!path.empty()) << "ExtensionRegistrar should never ask to load an "
"unknown extension with no path";
scoped_refptr<UnpackedInstaller> unpacked_installer =
UnpackedInstaller::Create(this);
unpacked_installer->set_be_noisy_on_failure(load_error_behavior ==
LoadErrorBehavior::kNoisy);
unpacked_installer->Load(path);
}
}
void ExtensionService::ReloadExtension(const std::string& extension_id) {
extension_registrar_.ReloadExtension(extension_id, LoadErrorBehavior::kNoisy);
}
void ExtensionService::ReloadExtensionWithQuietFailure(
const std::string& extension_id) {
extension_registrar_.ReloadExtension(extension_id, LoadErrorBehavior::kQuiet);
}
bool ExtensionService::UninstallExtension(
// "transient" because the process of uninstalling may cause the reference
// to become invalid. Instead, use |extenson->id()|.
const std::string& transient_extension_id,
UninstallReason reason,
base::string16* error) {
CHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
scoped_refptr<const Extension> extension =
GetInstalledExtension(transient_extension_id);
// Callers should not send us nonexistent extensions.
CHECK(extension.get());
ManagementPolicy* by_policy = system_->management_policy();
// Policy change which triggers an uninstall will always set
// |external_uninstall| to true so this is the only way to uninstall
// managed extensions.
// Shared modules being uninstalled will also set |external_uninstall| to true
// so that we can guarantee users don't uninstall a shared module.
// (crbug.com/273300)
// TODO(rdevlin.cronin): This is probably not right. We should do something
// else, like include an enum IS_INTERNAL_UNINSTALL or IS_USER_UNINSTALL so
// we don't do this.
bool external_uninstall =
(reason == UNINSTALL_REASON_INTERNAL_MANAGEMENT) ||
(reason == UNINSTALL_REASON_COMPONENT_REMOVED) ||
(reason == UNINSTALL_REASON_REINSTALL) ||
(reason == UNINSTALL_REASON_ORPHANED_EXTERNAL_EXTENSION) ||
(reason == UNINSTALL_REASON_ORPHANED_SHARED_MODULE) ||
(reason == UNINSTALL_REASON_SYNC &&
util::WasInstalledByCustodian(extension->id(), profile_));
if (!external_uninstall &&
(!by_policy->UserMayModifySettings(extension.get(), error) ||
by_policy->MustRemainInstalled(extension.get(), error))) {
content::NotificationService::current()->Notify(
NOTIFICATION_EXTENSION_UNINSTALL_NOT_ALLOWED,
content::Source<Profile>(profile_),
content::Details<const Extension>(extension.get()));
return false;
}
InstallVerifier::Get(GetBrowserContext())->Remove(extension->id());
UMA_HISTOGRAM_ENUMERATION("Extensions.UninstallType",
extension->GetType(), 100);
RecordPermissionMessagesHistogram(extension.get(), "Uninstall");
// Unload before doing more cleanup to ensure that nothing is hanging on to
// any of these resources.
UnloadExtension(extension->id(), UnloadedExtensionReason::UNINSTALL);
if (registry_->blacklisted_extensions().Contains(extension->id()))
registry_->RemoveBlacklisted(extension->id());
// Tell the backend to start deleting installed extensions on the file thread.
if (!Manifest::IsUnpackedLocation(extension->location())) {
if (!GetExtensionFileTaskRunner()->PostTask(
FROM_HERE,
base::BindOnce(&ExtensionService::UninstallExtensionOnFileThread,
extension->id(), profile_, install_directory_,
extension->path())))
NOTREACHED();
}
DataDeleter::StartDeleting(profile_, extension.get());
extension_registrar_.UntrackTerminatedExtension(extension->id());
// Notify interested parties that we've uninstalled this extension.
ExtensionRegistry::Get(profile_)
->TriggerOnUninstalled(extension.get(), reason);
delayed_installs_.Remove(extension->id());
extension_prefs_->OnExtensionUninstalled(
extension->id(), extension->location(), external_uninstall);
// Track the uninstallation.
UMA_HISTOGRAM_ENUMERATION("Extensions.ExtensionUninstalled", 1, 2);
return true;
}
// static
void ExtensionService::UninstallExtensionOnFileThread(
const std::string& id,
Profile* profile,
const base::FilePath& install_dir,
const base::FilePath& extension_path) {
ExtensionAssetsManager* assets_manager =
ExtensionAssetsManager::GetInstance();
assets_manager->UninstallExtension(id, profile, install_dir, extension_path);
}
bool ExtensionService::IsExtensionEnabled(
const std::string& extension_id) const {
return extension_registrar_.IsExtensionEnabled(extension_id);
}
void ExtensionService::EnableExtension(const std::string& extension_id) {
CHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
extension_registrar_.EnableExtension(extension_id);
}
void ExtensionService::DisableExtension(const std::string& extension_id,
int disable_reasons) {
CHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
extension_registrar_.DisableExtension(extension_id, disable_reasons);
}
void ExtensionService::DisableExtensionWithSource(
const Extension* source_extension,
const std::string& extension_id,
disable_reason::DisableReason disable_reasons) {
CHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
DCHECK(disable_reasons == disable_reason::DISABLE_USER_ACTION ||
disable_reasons == disable_reason::DISABLE_BLOCKED_BY_POLICY);
if (disable_reasons == disable_reason::DISABLE_BLOCKED_BY_POLICY) {
DCHECK(Manifest::IsPolicyLocation(source_extension->location()) ||
Manifest::IsComponentLocation(source_extension->location()));
}
const Extension* extension = GetExtensionById(extension_id, true);
CHECK(system_->management_policy()->ExtensionMayModifySettings(
source_extension, extension, nullptr));
extension_registrar_.DisableExtension(extension_id, disable_reasons);
}
void ExtensionService::DisableUserExtensionsExcept(
const std::vector<std::string>& except_ids) {
ManagementPolicy* management_policy = system_->management_policy();
ExtensionList to_disable;
for (const auto& extension : registry_->enabled_extensions()) {
if (management_policy->UserMayModifySettings(extension.get(), nullptr))
to_disable.push_back(extension);
}
for (const auto& extension : registry_->terminated_extensions()) {
if (management_policy->UserMayModifySettings(extension.get(), nullptr))
to_disable.push_back(extension);
}
for (const auto& extension : to_disable) {
if (extension->was_installed_by_default() &&
extension_urls::IsWebstoreUpdateUrl(
ManifestURL::GetUpdateURL(extension.get())))
continue;
const std::string& id = extension->id();
if (!base::ContainsValue(except_ids, id))
DisableExtension(id, disable_reason::DISABLE_USER_ACTION);
}
}
// Extensions that are not locked, components or forced by policy should be
// locked. Extensions are no longer considered enabled or disabled. Blacklisted
// extensions are now considered both blacklisted and locked.
void ExtensionService::BlockAllExtensions() {
if (block_extensions_)
return;
block_extensions_ = true;
// Blacklisted extensions are already unloaded, need not be blocked.
std::unique_ptr<ExtensionSet> extensions =
registry_->GenerateInstalledExtensionsSet(ExtensionRegistry::ENABLED |
ExtensionRegistry::DISABLED |
ExtensionRegistry::TERMINATED);
for (const auto& extension : *extensions) {
const std::string& id = extension->id();
if (!CanBlockExtension(extension.get()))
continue;
registry_->RemoveEnabled(id);
registry_->RemoveDisabled(id);
registry_->RemoveTerminated(id);
registry_->AddBlocked(extension.get());
UnloadExtension(id, UnloadedExtensionReason::LOCK_ALL);
}
}
// All locked extensions should revert to being either enabled or disabled
// as appropriate.
void ExtensionService::UnblockAllExtensions() {
block_extensions_ = false;
std::unique_ptr<ExtensionSet> to_unblock =
registry_->GenerateInstalledExtensionsSet(ExtensionRegistry::BLOCKED);
for (const auto& extension : *to_unblock) {
registry_->RemoveBlocked(extension->id());
AddExtension(extension.get());
}
// While extensions are blocked, we won't display any external install
// warnings. Now that they are unblocked, we should update the error.
external_install_manager_->UpdateExternalExtensionAlert();
}
void ExtensionService::GrantPermissionsAndEnableExtension(
const Extension* extension) {
GrantPermissions(extension);
RecordPermissionMessagesHistogram(extension, "ReEnable");
EnableExtension(extension->id());
}
void ExtensionService::GrantPermissions(const Extension* extension) {
CHECK(extension);
PermissionsUpdater(profile()).GrantActivePermissions(extension);
}
// static
void ExtensionService::RecordPermissionMessagesHistogram(
const Extension* extension, const char* histogram) {
// Since this is called from multiple sources, and since the histogram macros
// use statics, we need to manually lookup the histogram ourselves.
base::HistogramBase* counter = base::LinearHistogram::FactoryGet(
base::StringPrintf("Extensions.Permissions_%s3", histogram),
1,
APIPermission::kEnumBoundary,
APIPermission::kEnumBoundary + 1,
base::HistogramBase::kUmaTargetedHistogramFlag);
base::HistogramBase* counter_has_any = base::BooleanHistogram::FactoryGet(
base::StringPrintf("Extensions.HasPermissions_%s3", histogram),
base::HistogramBase::kUmaTargetedHistogramFlag);
PermissionIDSet permissions =
PermissionMessageProvider::Get()->GetAllPermissionIDs(
extension->permissions_data()->active_permissions(),
extension->GetType());
counter_has_any->AddBoolean(!permissions.empty());
for (const PermissionID& id : permissions)
counter->Add(id.id());
}
// TODO(michaelpg): Group with other ExtensionRegistrar::Delegate overrides
// according to header file once diffs have settled down.
void ExtensionService::PostActivateExtension(
scoped_refptr<const Extension> extension) {
// TODO(kalman): Convert ExtensionSpecialStoragePolicy to a
// BrowserContextKeyedService and use ExtensionRegistryObserver.
profile_->GetExtensionSpecialStoragePolicy()->GrantRightsForExtension(
extension.get(), profile_);
// TODO(kalman): This is broken. The crash reporter is process-wide so doesn't
// work properly multi-profile. Besides which, it should be using
// ExtensionRegistryObserver. See http://crbug.com/355029.
UpdateActiveExtensionsInCrashReporter();
const PermissionsData* permissions_data = extension->permissions_data();
// If the extension has permission to load chrome://favicon/ resources we need
// to make sure that the FaviconSource is registered with the
// ChromeURLDataManager.
if (permissions_data->HasHostPermission(GURL(chrome::kChromeUIFaviconURL))) {
content::URLDataSource::Add(profile_,
std::make_unique<FaviconSource>(profile_));
}
// Same for chrome://theme/ resources.
if (permissions_data->HasHostPermission(GURL(chrome::kChromeUIThemeURL))) {
content::URLDataSource::Add(profile_,
std::make_unique<ThemeSource>(profile_));
}
}
// TODO(michaelpg): Group with other ExtensionRegistrar::Delegate overrides
// according to header file once diffs have settled down.
void ExtensionService::PostDeactivateExtension(
scoped_refptr<const Extension> extension) {
// TODO(kalman): Convert ExtensionSpecialStoragePolicy to a
// BrowserContextKeyedService and use ExtensionRegistryObserver.
profile_->GetExtensionSpecialStoragePolicy()->RevokeRightsForExtension(
extension.get());
#if defined(OS_CHROMEOS)
// Revoke external file access for the extension from its file system context.
// It is safe to access the extension's storage partition at this point. The
// storage partition may get destroyed only after the extension gets unloaded.
GURL site = util::GetSiteForExtensionId(extension->id(), profile_);
storage::FileSystemContext* filesystem_context =
BrowserContext::GetStoragePartitionForSite(profile_, site)
->GetFileSystemContext();
if (filesystem_context && filesystem_context->external_backend()) {
filesystem_context->external_backend()->RevokeAccessForExtension(
extension->id());
}
#endif
// TODO(kalman): This is broken. The crash reporter is process-wide so doesn't
// work properly multi-profile. Besides which, it should be using
// ExtensionRegistryObserver::OnExtensionLoaded. See http://crbug.com/355029.
UpdateActiveExtensionsInCrashReporter();
}
content::BrowserContext* ExtensionService::GetBrowserContext() const {
// Implemented in the .cc file to avoid adding a profile.h dependency to
// extension_service.h.
return profile_;
}
bool ExtensionService::is_ready() {
return ready_->is_signaled();
}
void ExtensionService::CheckManagementPolicy() {
std::map<std::string, disable_reason::DisableReason> to_disable;
std::vector<std::string> to_enable;
// Loop through the extensions list, finding extensions we need to disable.
for (const auto& extension : registry_->enabled_extensions()) {
disable_reason::DisableReason disable_reason = disable_reason::DISABLE_NONE;
if (system_->management_policy()->MustRemainDisabled(
extension.get(), &disable_reason, nullptr))
to_disable[extension->id()] = disable_reason;
}
ExtensionManagement* management =
ExtensionManagementFactory::GetForBrowserContext(profile());
PermissionsUpdater(profile()).SetDefaultPolicyHostRestrictions(
management->GetDefaultPolicyBlockedHosts(),
management->GetDefaultPolicyAllowedHosts());
for (const auto& extension : registry_->enabled_extensions()) {
bool uses_default =
management->UsesDefaultPolicyHostRestrictions(extension.get());
if (uses_default) {
PermissionsUpdater(profile()).SetUsesDefaultHostRestrictions(
extension.get());
} else {
PermissionsUpdater(profile()).SetPolicyHostRestrictions(
extension.get(), management->GetPolicyBlockedHosts(extension.get()),
management->GetPolicyAllowedHosts(extension.get()));
}
}
// Loop through the disabled extension list, find extensions to re-enable
// automatically. These extensions are exclusive from the |to_disable| list
// constructed above, since disabled_extensions() and enabled_extensions() are
// supposed to be mutually exclusive.
for (const auto& extension : registry_->disabled_extensions()) {
int disable_reasons = extension_prefs_->GetDisableReasons(extension->id());
// Find all extensions disabled due to minimum version requirement and
// management policy but now satisfying it.
if (management->CheckMinimumVersion(extension.get(), nullptr)) {
disable_reasons &= (~disable_reason::DISABLE_UPDATE_REQUIRED_BY_POLICY);
}
if (!system_->management_policy()->MustRemainDisabled(extension.get(),
nullptr, nullptr)) {
disable_reasons &= (~disable_reason::DISABLE_BLOCKED_BY_POLICY);
}
extension_prefs_->ReplaceDisableReasons(extension->id(), disable_reasons);
if (disable_reasons == disable_reason::DISABLE_NONE)
to_enable.push_back(extension->id());
}
for (const auto& i : to_disable)
DisableExtension(i.first, i.second);
// No extension is getting re-enabled here after disabling because |to_enable|
// is mutually exclusive to |to_disable|.
for (const std::string& id : to_enable)
EnableExtension(id);
if (updater_.get()) {
// Find all extensions disabled due to minimum version requirement from
// policy (including the ones that got disabled just now), and check
// for update.
ExtensionUpdater::CheckParams to_recheck;
for (const auto& extension : registry_->disabled_extensions()) {
if (extension_prefs_->GetDisableReasons(extension->id()) ==
disable_reason::DISABLE_UPDATE_REQUIRED_BY_POLICY) {
// The minimum version check is the only thing holding this extension
// back, so check if it can be updated to fix that.
to_recheck.ids.push_back(extension->id());
}
}
if (!to_recheck.ids.empty())
updater_->CheckNow(std::move(to_recheck));
}
}
void ExtensionService::CheckForUpdatesSoon() {
// This can legitimately happen in unit tests.
if (!updater_.get())
return;
updater_->CheckSoon();
}
// Some extensions will autoupdate themselves externally from Chrome. These
// are typically part of some larger client application package. To support
// these, the extension will register its location in the preferences file
// (and also, on Windows, in the registry) and this code will periodically
// check that location for a .crx file, which it will then install locally if
// a new version is available.
// Errors are reported through LoadErrorReporter. Success is not reported.
void ExtensionService::CheckForExternalUpdates() {
if (external_updates_disabled_for_test_)
return;
CHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
TRACE_EVENT0("browser,startup", "ExtensionService::CheckForExternalUpdates");
SCOPED_UMA_HISTOGRAM_TIMER("Extensions.CheckForExternalUpdatesTime");
// Note that this installation is intentionally silent (since it didn't
// go through the front-end). Extensions that are registered in this
// way are effectively considered 'pre-bundled', and so implicitly
// trusted. In general, if something has HKLM or filesystem access,
// they could install an extension manually themselves anyway.
// Ask each external extension provider to give us a call back for each
// extension they know about. See OnExternalExtension(File|UpdateUrl)Found.
for (const auto& provider : external_extension_providers_)
provider->VisitRegisteredExtension();
// Do any required work that we would have done after completion of all
// providers.
if (external_extension_providers_.empty())
OnAllExternalProvidersReady();
}
void ExtensionService::OnExternalProviderReady(
const ExternalProviderInterface* provider) {
DCHECK_CURRENTLY_ON(BrowserThread::UI);
CHECK(provider->IsReady());
// An external provider has finished loading. We only take action
// if all of them are finished. So we check them first.
if (AreAllExternalProvidersReady())
OnAllExternalProvidersReady();
}
bool ExtensionService::AreAllExternalProvidersReady() const {
for (const auto& provider : external_extension_providers_) {
if (!provider->IsReady())
return false;
}
return true;
}
void ExtensionService::OnAllExternalProvidersReady() {
DCHECK_CURRENTLY_ON(BrowserThread::UI);
// Install any pending extensions.
if (update_once_all_providers_are_ready_ && updater()) {
update_once_all_providers_are_ready_ = false;
ExtensionUpdater::CheckParams params;
params.callback =
external_updates_finished_callback_.is_null()
? base::OnceClosure()
: base::BindOnce(
[](base::RepeatingClosure callback) { callback.Run(); },
external_updates_finished_callback_);
updater()->CheckNow(std::move(params));
}
// Uninstall all the unclaimed extensions.
std::unique_ptr<ExtensionPrefs::ExtensionsInfo> extensions_info(
extension_prefs_->GetInstalledExtensionsInfo());
for (size_t i = 0; i < extensions_info->size(); ++i) {
ExtensionInfo* info = extensions_info->at(i).get();
if (Manifest::IsExternalLocation(info->extension_location))
CheckExternalUninstall(info->extension_id);
}
error_controller_->ShowErrorIfNeeded();
external_install_manager_->UpdateExternalExtensionAlert();
}
void ExtensionService::UnloadExtension(const std::string& extension_id,
UnloadedExtensionReason reason) {
extension_registrar_.RemoveExtension(extension_id, reason);
}
void ExtensionService::RemoveComponentExtension(
const std::string& extension_id) {
scoped_refptr<const Extension> extension(
GetExtensionById(extension_id, false));
UnloadExtension(extension_id, UnloadedExtensionReason::UNINSTALL);
if (extension.get()) {
ExtensionRegistry::Get(profile_)->TriggerOnUninstalled(
extension.get(), UNINSTALL_REASON_COMPONENT_REMOVED);
}
}
void ExtensionService::UnloadAllExtensionsForTest() {
UnloadAllExtensionsInternal();
}
void ExtensionService::ReloadExtensionsForTest() {
// Calling UnloadAllExtensionsForTest here triggers a false-positive presubmit
// warning about calling test code in production.
UnloadAllExtensionsInternal();
component_loader_->LoadAll();
InstalledLoader(this).LoadAllExtensions();
OnInstalledExtensionsLoaded();
// Don't call SetReadyAndNotifyListeners() since tests call this multiple
// times.
}
void ExtensionService::SetReadyAndNotifyListeners() {
TRACE_EVENT0("browser,startup",
"ExtensionService::SetReadyAndNotifyListeners");
SCOPED_UMA_HISTOGRAM_TIMER(
"Extensions.ExtensionServiceNotifyReadyListenersTime");
ready_->Signal();
content::NotificationService::current()->Notify(
NOTIFICATION_EXTENSIONS_READY_DEPRECATED,
content::Source<Profile>(profile_),
content::NotificationService::NoDetails());
}
void ExtensionService::AddExtension(const Extension* extension) {
if (!Manifest::IsValidLocation(extension->location())) {
// TODO(devlin): We should *never* add an extension with an invalid
// location, but some bugs (e.g. crbug.com/692069) seem to indicate we do.
// Track down the cases when this can happen, and remove this
// DumpWithoutCrashing() (possibly replacing it with a CHECK).
NOTREACHED();
DEBUG_ALIAS_FOR_CSTR(extension_id_copy, extension->id().c_str(), 33);
Manifest::Location location = extension->location();
int creation_flags = extension->creation_flags();
Manifest::Type type = extension->manifest()->type();
base::debug::Alias(&location);
base::debug::Alias(&creation_flags);
base::debug::Alias(&type);
base::debug::DumpWithoutCrashing();
return;
}
// TODO(jstritar): We may be able to get rid of this branch by overriding the
// default extension state to DISABLED when the --disable-extensions flag
// is set (http://crbug.com/29067).
if (!extensions_enabled_ &&
!Manifest::ShouldAlwaysLoadExtension(extension->location(),
extension->is_theme()) &&
disable_flag_exempted_extensions_.count(extension->id()) == 0) {
return;
}
extension_registrar_.AddExtension(extension);
if (registry_->disabled_extensions().Contains(extension->id())) {
// Show the extension disabled error if a permissions increase or a remote
// installation is the reason it was disabled, and no other reasons exist.
int reasons = extension_prefs_->GetDisableReasons(extension->id());
const int kReasonMask = disable_reason::DISABLE_PERMISSIONS_INCREASE |
disable_reason::DISABLE_REMOTE_INSTALL;
if (reasons & kReasonMask && !(reasons & ~kReasonMask)) {
AddExtensionDisabledError(
this, extension,
extension_prefs_->HasDisableReason(
extension->id(), disable_reason::DISABLE_REMOTE_INSTALL));
}
}
}
void ExtensionService::AddComponentExtension(const Extension* extension) {
const std::string old_version_string(
extension_prefs_->GetVersionString(extension->id()));
const base::Version old_version(old_version_string);
VLOG(1) << "AddComponentExtension " << extension->name();
if (!old_version.IsValid() || old_version != extension->version()) {
VLOG(1) << "Component extension " << extension->name() << " ("
<< extension->id() << ") installing/upgrading from '"
<< old_version_string << "' to "
<< extension->version().GetString();
// TODO(crbug.com/696822): If needed, add support for Declarative Net
// Request to component extensions and pass the ruleset checksum here.
AddNewOrUpdatedExtension(extension, Extension::ENABLED, kInstallFlagNone,
syncer::StringOrdinal(), std::string(),
base::nullopt);
return;
}
AddExtension(extension);
}
void ExtensionService::CheckPermissionsIncrease(const Extension* extension,
bool is_extension_loaded) {
PermissionsUpdater(profile_).InitializePermissions(extension);
// We keep track of all permissions the user has granted each extension.
// This allows extensions to gracefully support backwards compatibility
// by including unknown permissions in their manifests. When the user
// installs the extension, only the recognized permissions are recorded.
// When the unknown permissions become recognized (e.g., through browser
// upgrade), we can prompt the user to accept these new permissions.
// Extensions can also silently upgrade to less permissions, and then
// silently upgrade to a version that adds these permissions back.
//
// For example, pretend that Chrome 10 includes a permission "omnibox"
// for an API that adds suggestions to the omnibox. An extension can
// maintain backwards compatibility while still having "omnibox" in the
// manifest. If a user installs the extension on Chrome 9, the browser
// will record the permissions it recognized, not including "omnibox."
// When upgrading to Chrome 10, "omnibox" will be recognized and Chrome
// will disable the extension and prompt the user to approve the increase
// in privileges. The extension could then release a new version that
// removes the "omnibox" permission. When the user upgrades, Chrome will
// still remember that "omnibox" had been granted, so that if the
// extension once again includes "omnibox" in an upgrade, the extension
// can upgrade without requiring this user's approval.
int disable_reasons = extension_prefs_->GetDisableReasons(extension->id());
// Silently grant all active permissions to default apps and apps installed
// in kiosk mode.
bool auto_grant_permission =
extension->was_installed_by_default() ||
ExtensionsBrowserClient::Get()->IsRunningInForcedAppMode();
if (auto_grant_permission)
GrantPermissions(extension);
bool is_privilege_increase = false;
// We only need to compare the granted permissions to the current permissions
// if the extension has not been auto-granted its permissions above and is
// installed internally.
if (extension->location() == Manifest::INTERNAL && !auto_grant_permission) {
// Add all the recognized permissions if the granted permissions list
// hasn't been initialized yet.
std::unique_ptr<const PermissionSet> granted_permissions =
extension_prefs_->GetGrantedPermissions(extension->id());
CHECK(granted_permissions.get());
// Here, we check if an extension's privileges have increased in a manner
// that requires the user's approval. This could occur because the browser
// upgraded and recognized additional privileges, or an extension upgrades
// to a version that requires additional privileges.
is_privilege_increase =
PermissionMessageProvider::Get()->IsPrivilegeIncrease(
*granted_permissions,
extension->permissions_data()->active_permissions(),
extension->GetType());
// If there was no privilege increase, the extension might still have new
// permissions (which either don't generate a warning message, or whose
// warning messages are suppressed by existing permissions). Grant the new
// permissions.
if (!is_privilege_increase)
GrantPermissions(extension);
}
// TODO(crbug.com/860198): Before M48, extensions that came to us from sync in
// a disabled state got assigned disable_reason::DISABLE_UNKNOWN_FROM_SYNC.
// That reason isn't used anymore since the actual disable reason(s) are now
// synced. This code is here to migrate any existing old state.
if (disable_reasons & disable_reason::DEPRECATED_DISABLE_UNKNOWN_FROM_SYNC) {
// Remove the disable_reason::DEPRECATED_DISABLE_UNKNOWN_FROM_SYNC
// reason.
disable_reasons &= ~disable_reason::DEPRECATED_DISABLE_UNKNOWN_FROM_SYNC;
extension_prefs_->RemoveDisableReason(
extension->id(), disable_reason::DEPRECATED_DISABLE_UNKNOWN_FROM_SYNC);
// If there was no privilege increase, it was likely disabled by the user.
// (If there *was* a privilege increase, we'll add an appropriate reason
// later on, so nothing needs to be done here.)
if (!is_privilege_increase)
disable_reasons |= disable_reason::DISABLE_USER_ACTION;
}
bool previously_disabled =
extension_prefs_->IsExtensionDisabled(extension->id());
// TODO(devlin): Is the |is_extension_loaded| check needed here?
if (is_extension_loaded && previously_disabled) {
// Legacy disabled extensions do not have a disable reason. Infer that it
// was likely disabled by the user.
if (disable_reasons == disable_reason::DISABLE_NONE)
disable_reasons |= disable_reason::DISABLE_USER_ACTION;
}
// If the extension is disabled due to a permissions increase, but does in
// fact have all permissions, remove that disable reason.
// TODO(devlin): This was added to fix crbug.com/616474, but it's unclear
// if this behavior should stay forever.
if (disable_reasons & disable_reason::DISABLE_PERMISSIONS_INCREASE) {
bool reset_permissions_increase = false;
if (!is_privilege_increase) {
reset_permissions_increase = true;
disable_reasons &= ~disable_reason::DISABLE_PERMISSIONS_INCREASE;
extension_prefs_->RemoveDisableReason(
extension->id(), disable_reason::DISABLE_PERMISSIONS_INCREASE);
}
UMA_HISTOGRAM_BOOLEAN("Extensions.ResetPermissionsIncrease",
reset_permissions_increase);
}
// Extension has changed permissions significantly. Disable it. A
// notification should be sent by the caller. If the extension is already
// disabled because it was installed remotely, don't add another disable
// reason.
if (is_privilege_increase &&
!(disable_reasons & disable_reason::DISABLE_REMOTE_INSTALL)) {
disable_reasons |= disable_reason::DISABLE_PERMISSIONS_INCREASE;
if (!extension_prefs_->DidExtensionEscalatePermissions(extension->id()))
RecordPermissionMessagesHistogram(extension, "AutoDisable");
#if BUILDFLAG(ENABLE_SUPERVISED_USERS)
// If a custodian-installed extension is disabled for a supervised user due
// to a permissions increase, send a request to the custodian.
if (util::IsExtensionSupervised(extension, profile_) &&
!ExtensionSyncService::Get(profile_)->HasPendingReenable(
extension->id(), extension->version())) {
SupervisedUserService* supervised_user_service =
SupervisedUserServiceFactory::GetForProfile(profile_);
supervised_user_service->AddExtensionUpdateRequest(extension->id(),
extension->version());
}
#endif
}
if (disable_reasons == disable_reason::DISABLE_NONE)
extension_prefs_->SetExtensionEnabled(extension->id());
else
extension_prefs_->SetExtensionDisabled(extension->id(), disable_reasons);
}
void ExtensionService::UpdateActiveExtensionsInCrashReporter() {
std::set<std::string> extension_ids;
for (const auto& extension : registry_->enabled_extensions()) {
if (!extension->is_theme() && extension->location() != Manifest::COMPONENT)
extension_ids.insert(extension->id());
}
// TODO(kalman): This is broken. ExtensionService is per-profile.
// crash_keys::SetActiveExtensions is per-process. See
// http://crbug.com/355029.
crash_keys::SetActiveExtensions(extension_ids);
}
void ExtensionService::OnExtensionInstalled(
const Extension* extension,
const syncer::StringOrdinal& page_ordinal,
int install_flags,
const base::Optional<int>& dnr_ruleset_checksum) {
CHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
const std::string& id = extension->id();
int disable_reasons = GetDisableReasonsOnInstalled(extension);
std::string install_parameter;
const PendingExtensionInfo* pending_extension_info =
pending_extension_manager()->GetById(id);
if (pending_extension_info) {
if (!pending_extension_info->ShouldAllowInstall(extension)) {
// Hack for crbug.com/558299, see comment on DeleteThemeDoNotUse.
if (extension->is_theme() && pending_extension_info->is_from_sync())
ExtensionSyncService::Get(profile_)->DeleteThemeDoNotUse(*extension);
pending_extension_manager()->Remove(id);
LOG(WARNING) << "ShouldAllowInstall() returned false for " << id
<< " of type " << extension->GetType() << " and update URL "
<< ManifestURL::GetUpdateURL(extension).spec()
<< "; not installing";
// Delete the extension directory since we're not going to
// load it.
if (!GetExtensionFileTaskRunner()->PostTask(
FROM_HERE, base::BindOnce(&file_util::DeleteFile,
extension->path(), true))) {
NOTREACHED();
}
return;
}
install_parameter = pending_extension_info->install_parameter();
pending_extension_manager()->Remove(id);
} else {
// We explicitly want to re-enable an uninstalled external
// extension; if we're here, that means the user is manually
// installing the extension.
if (extension_prefs_->IsExternalExtensionUninstalled(id)) {
disable_reasons = disable_reason::DISABLE_NONE;
}
}
// If the old version of the extension was disabled due to corruption, this
// new install may correct the problem.
disable_reasons &= ~disable_reason::DISABLE_CORRUPTED;
// Unsupported requirements overrides the management policy.
if (install_flags & kInstallFlagHasRequirementErrors) {
disable_reasons |= disable_reason::DISABLE_UNSUPPORTED_REQUIREMENT;
} else {
// Requirement is supported now, remove the corresponding disable reason
// instead.
disable_reasons &= ~disable_reason::DISABLE_UNSUPPORTED_REQUIREMENT;
}
// Check if the extension was disabled because of the minimum version
// requirements from enterprise policy, and satisfies it now.
if (ExtensionManagementFactory::GetForBrowserContext(profile())
->CheckMinimumVersion(extension, nullptr)) {
// And remove the corresponding disable reason.
disable_reasons &= ~disable_reason::DISABLE_UPDATE_REQUIRED_BY_POLICY;
}
if (install_flags & kInstallFlagIsBlacklistedForMalware) {
// Installation of a blacklisted extension can happen from sync, policy,
// etc, where to maintain consistency we need to install it, just never
// load it (see AddExtension). Usually it should be the job of callers to
// intercept blacklisted extensions earlier (e.g. CrxInstaller, before even
// showing the install dialogue).
extension_prefs_->AcknowledgeBlacklistedExtension(id);
UMA_HISTOGRAM_ENUMERATION("ExtensionBlacklist.SilentInstall",
extension->location(),
Manifest::NUM_LOCATIONS);
}
if (!GetInstalledExtension(extension->id())) {
UMA_HISTOGRAM_ENUMERATION("Extensions.InstallType",
extension->GetType(), 100);
UMA_HISTOGRAM_ENUMERATION("Extensions.InstallSource",
extension->location(), Manifest::NUM_LOCATIONS);
RecordPermissionMessagesHistogram(extension, "Install");
} else {
UMA_HISTOGRAM_ENUMERATION("Extensions.UpdateType",
extension->GetType(), 100);
UMA_HISTOGRAM_ENUMERATION("Extensions.UpdateSource",
extension->location(), Manifest::NUM_LOCATIONS);
}
const Extension::State initial_state =
disable_reasons == disable_reason::DISABLE_NONE ? Extension::ENABLED
: Extension::DISABLED;
if (initial_state == Extension::ENABLED)
extension_prefs_->SetExtensionEnabled(id);
else
extension_prefs_->SetExtensionDisabled(id, disable_reasons);
ExtensionPrefs::DelayReason delay_reason;
InstallGate::Action action = ShouldDelayExtensionInstall(
extension, !!(install_flags & kInstallFlagInstallImmediately),
&delay_reason);
switch (action) {
case InstallGate::INSTALL:
AddNewOrUpdatedExtension(extension, initial_state, install_flags,
page_ordinal, install_parameter,
dnr_ruleset_checksum);
return;
case InstallGate::DELAY:
extension_prefs_->SetDelayedInstallInfo(
extension, initial_state, install_flags, delay_reason, page_ordinal,
install_parameter, dnr_ruleset_checksum);
// Transfer ownership of |extension|.
delayed_installs_.Insert(extension);
if (delay_reason == ExtensionPrefs::DELAY_REASON_WAIT_FOR_IDLE) {
// Notify observers that app update is available.
for (auto& observer : update_observers_)
observer.OnAppUpdateAvailable(extension);
}
return;
case InstallGate::ABORT:
// Do nothing to abort the install. One such case is the shared module
// service gets IMPORT_STATUS_UNRECOVERABLE status for the pending
// install.
return;
}
NOTREACHED() << "Unknown action for delayed install: " << action;
}
void ExtensionService::OnExtensionManagementSettingsChanged() {
error_controller_->ShowErrorIfNeeded();
// Revokes blocked permissions from active_permissions for all extensions.
ExtensionManagement* settings =
ExtensionManagementFactory::GetForBrowserContext(profile());
CHECK(settings);
std::unique_ptr<ExtensionSet> all_extensions(
registry_->GenerateInstalledExtensionsSet());
for (const auto& extension : *all_extensions) {
if (!settings->IsPermissionSetAllowed(
extension.get(),
extension->permissions_data()->active_permissions()) &&
CanBlockExtension(extension.get())) {
PermissionsUpdater(profile()).RemovePermissionsUnsafe(
extension.get(), *settings->GetBlockedPermissions(extension.get()));
}
}
CheckManagementPolicy();
}
void ExtensionService::AddNewOrUpdatedExtension(
const Extension* extension,
Extension::State initial_state,
int install_flags,
const syncer::StringOrdinal& page_ordinal,
const std::string& install_parameter,
const base::Optional<int>& dnr_ruleset_checksum) {
CHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
extension_prefs_->OnExtensionInstalled(extension, initial_state, page_ordinal,
install_flags, install_parameter,
dnr_ruleset_checksum);
delayed_installs_.Remove(extension->id());
if (InstallVerifier::NeedsVerification(*extension))
InstallVerifier::Get(GetBrowserContext())->VerifyExtension(extension->id());
const Extension* old = GetInstalledExtension(extension->id());
if (AppDataMigrator::NeedsMigration(old, extension)) {
app_data_migrator_->DoMigrationAndReply(
old, extension, base::Bind(&ExtensionService::FinishInstallation,
AsWeakPtr(), base::RetainedRef(extension)));
return;
}
FinishInstallation(extension);
}
bool ExtensionService::FinishDelayedInstallationIfReady(
const std::string& extension_id,
bool install_immediately) {
// Check if the extension already got installed.
const Extension* extension = delayed_installs_.GetByID(extension_id);
if (!extension)
return false;
ExtensionPrefs::DelayReason reason;
const InstallGate::Action action =
ShouldDelayExtensionInstall(extension, install_immediately, &reason);
switch (action) {
case InstallGate::INSTALL:
break;
case InstallGate::DELAY:
// Bail out and continue to delay the install.
return false;
case InstallGate::ABORT:
delayed_installs_.Remove(extension_id);
// Make sure no version of the extension is actually installed, (i.e.,
// that this delayed install was not an update).
CHECK(!extension_prefs_->GetInstalledExtensionInfo(extension_id).get());
extension_prefs_->DeleteExtensionPrefs(extension_id);
return false;
}
scoped_refptr<const Extension> delayed_install =
GetPendingExtensionUpdate(extension_id);
CHECK(delayed_install.get());
delayed_installs_.Remove(extension_id);
if (!extension_prefs_->FinishDelayedInstallInfo(extension_id))
NOTREACHED();
FinishInstallation(delayed_install.get());
return true;
}
void ExtensionService::FinishInstallation(
const Extension* extension) {
const Extension* existing_extension = GetInstalledExtension(extension->id());
bool is_update = false;
std::string old_name;
if (existing_extension) {
is_update = true;
old_name = existing_extension->name();
}
registry_->TriggerOnWillBeInstalled(
extension, is_update, old_name);
// Unpacked extensions default to allowing file access, but if that has been
// overridden, don't reset the value.
if (Manifest::ShouldAlwaysAllowFileAccess(extension->location()) &&
!extension_prefs_->HasAllowFileAccessSetting(extension->id())) {
extension_prefs_->SetAllowFileAccess(extension->id(), true);
}
AddExtension(extension);
// Notify observers that need to know when an installation is complete.
registry_->TriggerOnInstalled(extension, is_update);
// Check extensions that may have been delayed only because this shared module
// was not available.
if (SharedModuleInfo::IsSharedModule(extension))
MaybeFinishDelayedInstallations();
}
const Extension* ExtensionService::GetPendingExtensionUpdate(
const std::string& id) const {
return delayed_installs_.GetByID(id);
}
void ExtensionService::RegisterContentSettings(
HostContentSettingsMap* host_content_settings_map,
Profile* profile) {
// Most extension services key off of the original profile.
Profile* original_profile = profile->GetOriginalProfile();
TRACE_EVENT0("browser,startup", "ExtensionService::RegisterContentSettings");
DCHECK_CURRENTLY_ON(BrowserThread::UI);
host_content_settings_map->RegisterProvider(
HostContentSettingsMap::CUSTOM_EXTENSION_PROVIDER,
std::unique_ptr<content_settings::ObservableProvider>(
new content_settings::CustomExtensionProvider(
ContentSettingsService::Get(original_profile)
->content_settings_store(),
// TODO(mmenke): CustomExtensionProvider expects this to be true
// for incognito profiles.
false)));
}
void ExtensionService::TerminateExtension(const std::string& extension_id) {
extension_registrar_.TerminateExtension(extension_id);
}
const Extension* ExtensionService::GetInstalledExtension(
const std::string& id) const {
return registry_->GetExtensionById(id, ExtensionRegistry::EVERYTHING);
}
bool ExtensionService::OnExternalExtensionFileFound(
const ExternalInstallInfoFile& info) {
DCHECK_CURRENTLY_ON(BrowserThread::UI);
CHECK(crx_file::id_util::IdIsValid(info.extension_id));
if (extension_prefs_->IsExternalExtensionUninstalled(info.extension_id))
return false;
// Before even bothering to unpack, check and see if we already have this
// version. This is important because these extensions are going to get
// installed on every startup.
const Extension* existing = GetExtensionById(info.extension_id, true);
if (existing) {
// The default apps will have the location set as INTERNAL. Since older
// default apps are installed as EXTERNAL, we override them. However, if the
// app is already installed as internal, then do the version check.
// TODO(grv) : Remove after Q1-2013.
bool is_default_apps_migration =
(info.crx_location == Manifest::INTERNAL &&
Manifest::IsExternalLocation(existing->location()));
if (!is_default_apps_migration) {
switch (existing->version().CompareTo(info.version)) {
case -1: // existing version is older, we should upgrade
break;
case 0: // existing version is same, do nothing
return false;
case 1: // existing version is newer, uh-oh
LOG(WARNING) << "Found external version of extension "
<< info.extension_id
<< "that is older than current version. Current version "
<< "is: " << existing->VersionString() << ". New "
<< "version is: " << info.version.GetString()
<< ". Keeping current version.";
return false;
}
}
}
// If the extension is already pending, don't start an install.
if (!pending_extension_manager()->AddFromExternalFile(
info.extension_id, info.crx_location, info.version,
info.creation_flags, info.mark_acknowledged)) {
return false;
}
// no client (silent install)
scoped_refptr<CrxInstaller> installer(CrxInstaller::CreateSilent(this));
installer->set_install_source(info.crx_location);
installer->set_expected_id(info.extension_id);
installer->set_expected_version(info.version,
true /* fail_install_if_unexpected */);
installer->set_install_cause(extension_misc::INSTALL_CAUSE_EXTERNAL_FILE);
installer->set_install_immediately(info.install_immediately);
installer->set_creation_flags(info.creation_flags);
#if defined(OS_CHROMEOS)
InstallLimiter::Get(profile_)->Add(installer, info.path);
#else
installer->InstallCrx(info.path);
#endif
// Depending on the source, a new external extension might not need a user
// notification on installation. For such extensions, mark them acknowledged
// now to suppress the notification.
if (info.mark_acknowledged)
external_install_manager_->AcknowledgeExternalExtension(info.extension_id);
return true;
}
void ExtensionService::DidCreateRenderViewForBackgroundPage(
ExtensionHost* host) {
extension_registrar_.DidCreateRenderViewForBackgroundPage(host);
}
void ExtensionService::Observe(int type,
const content::NotificationSource& source,
const content::NotificationDetails& details) {
switch (type) {
case chrome::NOTIFICATION_APP_TERMINATING:
// Shutdown has started. Don't start any more extension installs.
// (We cannot use ExtensionService::Shutdown() for this because it
// happens too late in browser teardown.)
browser_terminating_ = true;
break;
case NOTIFICATION_EXTENSION_PROCESS_TERMINATED: {
if (profile_ !=
content::Source<Profile>(source).ptr()->GetOriginalProfile()) {
break;
}
// Mark the extension as terminated and deactivated. We want it to
// be in a consistent state: either fully working or not loaded
// at all, but never half-crashed. We do it in a PostTask so
// that other handlers of this notification will still have
// access to the Extension and ExtensionHost.
ExtensionHost* host = content::Details<ExtensionHost>(details).ptr();
base::ThreadTaskRunnerHandle::Get()->PostTask(
FROM_HERE, base::BindOnce(&ExtensionService::TerminateExtension,
AsWeakPtr(), host->extension_id()));
break;
}
case content::NOTIFICATION_RENDERER_PROCESS_TERMINATED: {
content::RenderProcessHost* process =
content::Source<content::RenderProcessHost>(source).ptr();
Profile* host_profile =
Profile::FromBrowserContext(process->GetBrowserContext());
if (!profile_->IsSameProfile(host_profile->GetOriginalProfile()))
break;
ProcessMap* process_map = ProcessMap::Get(profile_);
if (process_map->Contains(process->GetID())) {
// An extension process was terminated, this might have resulted in an
// app or extension becoming idle.
std::set<std::string> extension_ids =
process_map->GetExtensionsInProcess(process->GetID());
// In addition to the extensions listed in the process map, one of those
// extensions could be referencing a shared module which is waiting for
// idle to update. Check all imports of these extensions, too.
std::set<std::string> import_ids;
for (auto it = extension_ids.begin(); it != extension_ids.end(); ++it) {
const Extension* extension = GetExtensionById(*it, true);
if (!extension)
continue;
const std::vector<SharedModuleInfo::ImportInfo>& imports =
SharedModuleInfo::GetImports(extension);
std::vector<SharedModuleInfo::ImportInfo>::const_iterator import_it;
for (import_it = imports.begin(); import_it != imports.end();
import_it++) {
import_ids.insert((*import_it).extension_id);
}
}
extension_ids.insert(import_ids.begin(), import_ids.end());
for (auto it = extension_ids.begin(); it != extension_ids.end(); ++it) {
if (delayed_installs_.Contains(*it)) {
base::ThreadTaskRunnerHandle::Get()->PostDelayedTask(
FROM_HERE,
base::BindOnce(
base::IgnoreResult(
&ExtensionService::FinishDelayedInstallationIfReady),
AsWeakPtr(), *it, false /*install_immediately*/),
kUpdateIdleDelay);
}
}
}
process_map->RemoveAllFromProcess(process->GetID());
base::PostTaskWithTraits(
FROM_HERE, {BrowserThread::IO},
base::BindOnce(&InfoMap::UnregisterAllExtensionsInProcess,
system_->info_map(), process->GetID()));
break;
}
case chrome::NOTIFICATION_PROFILE_DESTRUCTION_STARTED: {
OnProfileDestructionStarted();
break;
}
default:
NOTREACHED() << "Unexpected notification type.";
}
}
int ExtensionService::GetDisableReasonsOnInstalled(const Extension* extension) {
bool is_update_from_same_type = false;
{
const Extension* existing_extension =
GetInstalledExtension(extension->id());
is_update_from_same_type =
existing_extension &&
existing_extension->manifest()->type() == extension->manifest()->type();
}
disable_reason::DisableReason disable_reason = disable_reason::DISABLE_NONE;
// Extensions disabled by management policy should always be disabled, even
// if it's force-installed.
if (system_->management_policy()->MustRemainDisabled(
extension, &disable_reason, nullptr)) {
// A specified reason is required to disable the extension.
DCHECK(disable_reason != disable_reason::DISABLE_NONE);
return disable_reason;
}
// Extensions installed by policy can't be disabled. So even if a previous
// installation disabled the extension, make sure it is now enabled.
if (system_->management_policy()->MustRemainEnabled(extension, nullptr))
return disable_reason::DISABLE_NONE;
// An already disabled extension should inherit the disable reasons and
// remain disabled.
if (extension_prefs_->IsExtensionDisabled(extension->id())) {
int disable_reasons = extension_prefs_->GetDisableReasons(extension->id());
// If an extension was disabled without specified reason, presume it's
// disabled by user.
return disable_reasons == disable_reason::DISABLE_NONE
? disable_reason::DISABLE_USER_ACTION
: disable_reasons;
}
if (ExternalInstallManager::IsPromptingEnabled()) {
// External extensions are initially disabled. We prompt the user before
// enabling them. Hosted apps are excepted because they are not dangerous
// (they need to be launched by the user anyway). We also don't prompt for
// extensions updating; this is because the extension will be disabled from
// the initial install if it is supposed to be, and this allows us to turn
// this on for other platforms without disabling already-installed
// extensions.
if (extension->GetType() != Manifest::TYPE_HOSTED_APP &&
Manifest::IsExternalLocation(extension->location()) &&
!extension_prefs_->IsExternalExtensionAcknowledged(extension->id()) &&
!is_update_from_same_type) {
return disable_reason::DISABLE_EXTERNAL_EXTENSION;
}
}
return disable_reason::DISABLE_NONE;
}
// Helper method to determine if an extension can be blocked.
bool ExtensionService::CanBlockExtension(const Extension* extension) const {
DCHECK(extension);
return extension->location() != Manifest::COMPONENT &&
extension->location() != Manifest::EXTERNAL_COMPONENT &&
!system_->management_policy()->MustRemainEnabled(extension, nullptr);
}
InstallGate::Action ExtensionService::ShouldDelayExtensionInstall(
const Extension* extension,
bool install_immediately,
ExtensionPrefs::DelayReason* reason) const {
for (const auto& entry : install_delayer_registry_) {
InstallGate* const delayer = entry.second;
InstallGate::Action action =
delayer->ShouldDelay(extension, install_immediately);
if (action != InstallGate::INSTALL) {
*reason = entry.first;
return action;
}
}
return InstallGate::INSTALL;
}
void ExtensionService::MaybeFinishDelayedInstallations() {
std::vector<std::string> to_be_installed;
for (const auto& extension : delayed_installs_) {
to_be_installed.push_back(extension->id());
}
for (const auto& extension_id : to_be_installed) {
FinishDelayedInstallationIfReady(extension_id,
false /*install_immediately*/);
}
}
void ExtensionService::OnBlacklistUpdated() {
blacklist_->GetBlacklistedIDs(
registry_->GenerateInstalledExtensionsSet()->GetIDs(),
base::Bind(&ExtensionService::ManageBlacklist, AsWeakPtr()));
}
void ExtensionService::OnUpgradeRecommended() {
// Notify observers that chrome update is available.
for (auto& observer : update_observers_)
observer.OnChromeUpdateAvailable();
}
void ExtensionService::PreAddExtension(const Extension* extension,
const Extension* old_extension) {
// Check if the extension's privileges have changed and mark the
// extension disabled if necessary.
CheckPermissionsIncrease(extension, !!old_extension);
}
bool ExtensionService::CanEnableExtension(const Extension* extension) {
return !system_->management_policy()->MustRemainDisabled(extension, nullptr,
nullptr);
}
bool ExtensionService::CanDisableExtension(const Extension* extension) {
// Some extensions cannot be disabled by users:
// - |extension| can be null if sync disables an extension that is not
// installed yet; allow disablement in this case.
if (!extension)
return true;
// - Shared modules are just resources used by other extensions, and are not
// user-controlled.
if (SharedModuleInfo::IsSharedModule(extension))
return false;
// - EXTERNAL_COMPONENT extensions are not generally modifiable by users, but
// can be uninstalled by the browser if the user sets extension-specific
// preferences.
if (extension->location() == Manifest::EXTERNAL_COMPONENT)
return true;
return system_->management_policy()->UserMayModifySettings(extension,
nullptr);
}
bool ExtensionService::ShouldBlockExtension(const Extension* extension) {
if (!block_extensions_)
return false;
// Blocked extensions aren't marked as such in prefs, thus if
// |block_extensions_| is true then CanBlockExtension() must be called with an
// Extension object. If |extension| is not loaded, assume it should be
// blocked.
return !extension || CanBlockExtension(extension);
}
void ExtensionService::ManageBlacklist(
const Blacklist::BlacklistStateMap& state_map) {
DCHECK_CURRENTLY_ON(BrowserThread::UI);
std::set<std::string> blacklisted;
ExtensionIdSet greylist;
ExtensionIdSet unchanged;
for (const auto& it : state_map) {
switch (it.second) {
case NOT_BLACKLISTED:
break;
case BLACKLISTED_MALWARE:
blacklisted.insert(it.first);
break;
case BLACKLISTED_SECURITY_VULNERABILITY:
case BLACKLISTED_CWS_POLICY_VIOLATION:
case BLACKLISTED_POTENTIALLY_UNWANTED:
greylist.insert(it.first);
break;
case BLACKLISTED_UNKNOWN:
unchanged.insert(it.first);
break;
}
}
UpdateBlacklistedExtensions(blacklisted, unchanged);
UpdateGreylistedExtensions(greylist, unchanged, state_map);
error_controller_->ShowErrorIfNeeded();
}
namespace {
void Partition(const ExtensionIdSet& before,
const ExtensionIdSet& after,
const ExtensionIdSet& unchanged,
ExtensionIdSet* no_longer,
ExtensionIdSet* not_yet) {
*not_yet = base::STLSetDifference<ExtensionIdSet>(after, before);
*no_longer = base::STLSetDifference<ExtensionIdSet>(before, after);
*no_longer = base::STLSetDifference<ExtensionIdSet>(*no_longer, unchanged);
}
} // namespace
void ExtensionService::UpdateBlacklistedExtensions(
const ExtensionIdSet& blacklisted,
const ExtensionIdSet& unchanged) {
ExtensionIdSet not_yet_blocked, no_longer_blocked;
Partition(registry_->blacklisted_extensions().GetIDs(), blacklisted,
unchanged, &no_longer_blocked, &not_yet_blocked);
for (auto it = no_longer_blocked.begin(); it != no_longer_blocked.end();
++it) {
scoped_refptr<const Extension> extension =
registry_->blacklisted_extensions().GetByID(*it);
if (!extension.get()) {
NOTREACHED() << "Extension " << *it << " no longer blacklisted, "
<< "but it was never blacklisted.";
continue;
}
registry_->RemoveBlacklisted(*it);
extension_prefs_->SetExtensionBlacklistState(extension->id(),
NOT_BLACKLISTED);
AddExtension(extension.get());
UMA_HISTOGRAM_ENUMERATION("ExtensionBlacklist.UnblacklistInstalled",
extension->location(),
Manifest::NUM_LOCATIONS);
}
for (auto it = not_yet_blocked.begin(); it != not_yet_blocked.end(); ++it) {
scoped_refptr<const Extension> extension = GetInstalledExtension(*it);
if (!extension.get()) {
NOTREACHED() << "Extension " << *it << " needs to be "
<< "blacklisted, but it's not installed.";
continue;
}
registry_->AddBlacklisted(extension);
extension_prefs_->SetExtensionBlacklistState(extension->id(),
BLACKLISTED_MALWARE);
UnloadExtension(*it, UnloadedExtensionReason::BLACKLIST);
UMA_HISTOGRAM_ENUMERATION("ExtensionBlacklist.BlacklistInstalled",
extension->location(), Manifest::NUM_LOCATIONS);
}
}
// TODO(oleg): UMA logging
void ExtensionService::UpdateGreylistedExtensions(
const ExtensionIdSet& greylist,
const ExtensionIdSet& unchanged,
const Blacklist::BlacklistStateMap& state_map) {
ExtensionIdSet not_yet_greylisted, no_longer_greylisted;
Partition(greylist_.GetIDs(),
greylist, unchanged,
&no_longer_greylisted, &not_yet_greylisted);
for (auto it = no_longer_greylisted.begin(); it != no_longer_greylisted.end();
++it) {
scoped_refptr<const Extension> extension = greylist_.GetByID(*it);
if (!extension.get()) {
NOTREACHED() << "Extension " << *it << " no longer greylisted, "
<< "but it was not marked as greylisted.";
continue;
}
greylist_.Remove(*it);
extension_prefs_->SetExtensionBlacklistState(extension->id(),
NOT_BLACKLISTED);
if (extension_prefs_->GetDisableReasons(extension->id()) &
disable_reason::DISABLE_GREYLIST)
EnableExtension(*it);
}
for (auto it = not_yet_greylisted.begin(); it != not_yet_greylisted.end();
++it) {
scoped_refptr<const Extension> extension = GetInstalledExtension(*it);
if (!extension.get()) {
NOTREACHED() << "Extension " << *it << " needs to be "
<< "disabled, but it's not installed.";
continue;
}
greylist_.Insert(extension);
extension_prefs_->SetExtensionBlacklistState(extension->id(),
state_map.find(*it)->second);
if (registry_->enabled_extensions().Contains(extension->id()))
DisableExtension(*it, disable_reason::DISABLE_GREYLIST);
}
}
void ExtensionService::AddUpdateObserver(UpdateObserver* observer) {
update_observers_.AddObserver(observer);
}
void ExtensionService::RemoveUpdateObserver(UpdateObserver* observer) {
update_observers_.RemoveObserver(observer);
}
void ExtensionService::RegisterInstallGate(ExtensionPrefs::DelayReason reason,
InstallGate* install_delayer) {
DCHECK(install_delayer_registry_.end() ==
install_delayer_registry_.find(reason));
install_delayer_registry_[reason] = install_delayer;
}
void ExtensionService::UnregisterInstallGate(InstallGate* install_delayer) {
for (auto it = install_delayer_registry_.begin();
it != install_delayer_registry_.end(); ++it) {
if (it->second == install_delayer) {
install_delayer_registry_.erase(it);
return;
}
}
}
// Used only by test code.
void ExtensionService::UnloadAllExtensionsInternal() {
profile_->GetExtensionSpecialStoragePolicy()->RevokeRightsForAllExtensions();
registry_->ClearAll();
system_->runtime_data()->ClearAll();
// TODO(erikkay) should there be a notification for this? We can't use
// EXTENSION_UNLOADED since that implies that the extension has
// been disabled or uninstalled.
}
void ExtensionService::OnProfileDestructionStarted() {
ExtensionIdSet ids_to_unload = registry_->enabled_extensions().GetIDs();
for (auto it = ids_to_unload.begin(); it != ids_to_unload.end(); ++it) {
UnloadExtension(*it, UnloadedExtensionReason::PROFILE_SHUTDOWN);
}
}
void ExtensionService::OnInstalledExtensionsLoaded() {
if (updater_)
updater_->Start();
// Enable any Shared Modules that incorrectly got disabled previously.
// This is temporary code to fix incorrect behavior from previous versions of
// Chrome and can be removed after several releases (perhaps M60).
ExtensionList to_enable;
for (const auto& extension : registry_->disabled_extensions()) {
if (SharedModuleInfo::IsSharedModule(extension.get()))
to_enable.push_back(extension);
}
for (const auto& extension : to_enable) {
EnableExtension(extension->id());
}
OnBlacklistUpdated();
}
void ExtensionService::UninstallMigratedExtensions() {
std::unique_ptr<ExtensionSet> installed_extensions =
registry_->GenerateInstalledExtensionsSet();
for (const std::string& extension_id : kMigratedExtensionIds) {
if (installed_extensions->Contains(extension_id)) {
UninstallExtension(extension_id, UNINSTALL_REASON_MIGRATED, nullptr);
}
}
}
} // namespace extensions