| // Copyright (c) 2013 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "chrome/browser/extensions/extension_service.h" |
| |
| #include <stddef.h> |
| |
| #include <algorithm> |
| #include <iterator> |
| #include <set> |
| |
| #include "base/command_line.h" |
| #include "base/location.h" |
| #include "base/metrics/histogram_macros.h" |
| #include "base/profiler/scoped_profile.h" |
| #include "base/single_thread_task_runner.h" |
| #include "base/strings/string_number_conversions.h" |
| #include "base/strings/stringprintf.h" |
| #include "base/strings/utf_string_conversions.h" |
| #include "base/threading/sequenced_worker_pool.h" |
| #include "base/threading/thread_restrictions.h" |
| #include "base/threading/thread_task_runner_handle.h" |
| #include "base/time/time.h" |
| #include "base/trace_event/trace_event.h" |
| #include "build/build_config.h" |
| #include "chrome/browser/browser_process.h" |
| #include "chrome/browser/chrome_notification_types.h" |
| #include "chrome/browser/content_settings/content_settings_internal_extension_provider.h" |
| #include "chrome/browser/extensions/api/content_settings/content_settings_custom_extension_provider.h" |
| #include "chrome/browser/extensions/api/content_settings/content_settings_service.h" |
| #include "chrome/browser/extensions/app_data_migrator.h" |
| #include "chrome/browser/extensions/component_loader.h" |
| #include "chrome/browser/extensions/crx_installer.h" |
| #include "chrome/browser/extensions/data_deleter.h" |
| #include "chrome/browser/extensions/extension_action_storage_manager.h" |
| #include "chrome/browser/extensions/extension_assets_manager.h" |
| #include "chrome/browser/extensions/extension_disabled_ui.h" |
| #include "chrome/browser/extensions/extension_error_controller.h" |
| #include "chrome/browser/extensions/extension_special_storage_policy.h" |
| #include "chrome/browser/extensions/extension_sync_service.h" |
| #include "chrome/browser/extensions/extension_util.h" |
| #include "chrome/browser/extensions/external_install_manager.h" |
| #include "chrome/browser/extensions/external_provider_impl.h" |
| #include "chrome/browser/extensions/install_verifier.h" |
| #include "chrome/browser/extensions/installed_loader.h" |
| #include "chrome/browser/extensions/pending_extension_manager.h" |
| #include "chrome/browser/extensions/permissions_updater.h" |
| #include "chrome/browser/extensions/shared_module_service.h" |
| #include "chrome/browser/extensions/unpacked_installer.h" |
| #include "chrome/browser/extensions/updater/chrome_extension_downloader_factory.h" |
| #include "chrome/browser/extensions/updater/extension_updater.h" |
| #include "chrome/browser/google/google_brand.h" |
| #include "chrome/browser/profiles/profile.h" |
| #include "chrome/browser/search/thumbnail_source.h" |
| #include "chrome/browser/ui/webui/extensions/extension_icon_source.h" |
| #include "chrome/browser/ui/webui/favicon_source.h" |
| #include "chrome/browser/ui/webui/theme_source.h" |
| #include "chrome/common/chrome_switches.h" |
| #include "chrome/common/crash_keys.h" |
| #include "chrome/common/extensions/extension_constants.h" |
| #include "chrome/common/extensions/features/feature_channel.h" |
| #include "chrome/common/url_constants.h" |
| #include "components/content_settings/core/browser/host_content_settings_map.h" |
| #include "components/crx_file/id_util.h" |
| #include "content/public/browser/devtools_agent_host.h" |
| #include "content/public/browser/notification_service.h" |
| #include "content/public/browser/render_process_host.h" |
| #include "content/public/browser/storage_partition.h" |
| #include "extensions/browser/app_sorting.h" |
| #include "extensions/browser/event_router.h" |
| #include "extensions/browser/extension_host.h" |
| #include "extensions/browser/extension_registry.h" |
| #include "extensions/browser/extension_system.h" |
| #include "extensions/browser/extensions_browser_client.h" |
| #include "extensions/browser/external_install_info.h" |
| #include "extensions/browser/install_flag.h" |
| #include "extensions/browser/runtime_data.h" |
| #include "extensions/browser/uninstall_reason.h" |
| #include "extensions/browser/update_observer.h" |
| #include "extensions/browser/updater/extension_cache.h" |
| #include "extensions/browser/updater/extension_downloader.h" |
| #include "extensions/common/extension_messages.h" |
| #include "extensions/common/extension_urls.h" |
| #include "extensions/common/feature_switch.h" |
| #include "extensions/common/file_util.h" |
| #include "extensions/common/manifest_constants.h" |
| #include "extensions/common/manifest_handlers/background_info.h" |
| #include "extensions/common/manifest_url_handlers.h" |
| #include "extensions/common/one_shot_event.h" |
| #include "extensions/common/permissions/api_permission.h" |
| #include "extensions/common/permissions/permission_message_provider.h" |
| #include "extensions/common/permissions/permissions_data.h" |
| |
| #if defined(ENABLE_SUPERVISED_USERS) |
| #include "chrome/browser/supervised_user/supervised_user_service.h" |
| #include "chrome/browser/supervised_user/supervised_user_service_factory.h" |
| #endif |
| |
| #if defined(OS_CHROMEOS) |
| #include "chrome/browser/chromeos/extensions/install_limiter.h" |
| #include "storage/browser/fileapi/file_system_backend.h" |
| #include "storage/browser/fileapi/file_system_context.h" |
| #endif |
| |
| using content::BrowserContext; |
| using content::BrowserThread; |
| using content::DevToolsAgentHost; |
| using extensions::APIPermission; |
| using extensions::AppSorting; |
| using extensions::CrxInstaller; |
| using extensions::Extension; |
| using extensions::ExtensionIdSet; |
| using extensions::ExtensionInfo; |
| using extensions::ExtensionRegistry; |
| using extensions::ExtensionSet; |
| using extensions::ExternalInstallInfoFile; |
| using extensions::ExternalInstallInfoUpdateUrl; |
| using extensions::ExternalProviderInterface; |
| using extensions::FeatureSwitch; |
| using extensions::InstallVerifier; |
| using extensions::ManagementPolicy; |
| using extensions::Manifest; |
| using extensions::PermissionID; |
| using extensions::PermissionIDSet; |
| using extensions::PermissionSet; |
| using extensions::SharedModuleInfo; |
| using extensions::SharedModuleService; |
| using extensions::UnloadedExtensionInfo; |
| |
| namespace { |
| |
| // Wait this many seconds after an extensions becomes idle before updating it. |
| const int kUpdateIdleDelay = 5; |
| |
| } // namespace |
| |
| // ExtensionService. |
| |
| void ExtensionService::CheckExternalUninstall(const std::string& id) { |
| CHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
| |
| // Check if the providers know about this extension. |
| for (const auto& provider : external_extension_providers_) { |
| DCHECK(provider->IsReady()); |
| if (provider->HasExtension(id)) |
| return; // Yup, known extension, don't uninstall. |
| } |
| |
| // We get the list of external extensions to check from preferences. |
| // It is possible that an extension has preferences but is not loaded. |
| // For example, an extension that requires experimental permissions |
| // will not be loaded if the experimental command line flag is not used. |
| // In this case, do not uninstall. |
| if (!GetInstalledExtension(id)) { |
| // We can't call UninstallExtension with an unloaded/invalid |
| // extension ID. |
| LOG(WARNING) << "Attempted uninstallation of unloaded/invalid extension " |
| << "with id: " << id; |
| return; |
| } |
| UninstallExtension(id, |
| extensions::UNINSTALL_REASON_ORPHANED_EXTERNAL_EXTENSION, |
| base::Bind(&base::DoNothing), nullptr); |
| } |
| |
| void ExtensionService::SetFileTaskRunnerForTesting( |
| const scoped_refptr<base::SequencedTaskRunner>& task_runner) { |
| file_task_runner_ = task_runner; |
| } |
| |
| void ExtensionService::ClearProvidersForTesting() { |
| external_extension_providers_.clear(); |
| } |
| |
| void ExtensionService::AddProviderForTesting( |
| ExternalProviderInterface* test_provider) { |
| CHECK(test_provider); |
| external_extension_providers_.push_back( |
| linked_ptr<ExternalProviderInterface>(test_provider)); |
| } |
| |
| void ExtensionService::BlacklistExtensionForTest( |
| const std::string& extension_id) { |
| ExtensionIdSet blacklisted; |
| ExtensionIdSet unchanged; |
| blacklisted.insert(extension_id); |
| UpdateBlacklistedExtensions(blacklisted, unchanged); |
| } |
| |
| bool ExtensionService::OnExternalExtensionUpdateUrlFound( |
| const ExternalInstallInfoUpdateUrl& info, |
| bool is_initial_load) { |
| CHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
| CHECK(crx_file::id_util::IdIsValid(info.extension_id)); |
| |
| if (Manifest::IsExternalLocation(info.download_location)) { |
| // All extensions that are not user specific can be cached. |
| extensions::ExtensionsBrowserClient::Get() |
| ->GetExtensionCache() |
| ->AllowCaching(info.extension_id); |
| } |
| |
| const Extension* extension = GetExtensionById(info.extension_id, true); |
| if (extension) { |
| // Already installed. Skip this install if the current location has |
| // higher priority than |info.download_location|. |
| Manifest::Location current = extension->location(); |
| if (current == |
| Manifest::GetHigherPriorityLocation(current, info.download_location)) { |
| return false; |
| } |
| // Otherwise, overwrite the current installation. |
| } |
| |
| // Add |info.extension_id| to the set of pending extensions. If it can not |
| // be added, then there is already a pending record from a higher-priority |
| // install source. In this case, signal that this extension will not be |
| // installed by returning false. |
| if (!pending_extension_manager()->AddFromExternalUpdateUrl( |
| info.extension_id, info.install_parameter, *info.update_url, |
| info.download_location, info.creation_flags, |
| info.mark_acknowledged)) { |
| return false; |
| } |
| |
| if (is_initial_load) |
| update_once_all_providers_are_ready_ = true; |
| return true; |
| } |
| |
| void ExtensionService::OnExternalProviderUpdateComplete( |
| const ExternalProviderInterface* provider, |
| const ScopedVector<ExternalInstallInfoUpdateUrl>& update_url_extensions, |
| const ScopedVector<ExternalInstallInfoFile>& file_extensions, |
| const std::set<std::string>& removed_extensions) { |
| // Update pending_extension_manager() with the new extensions first. |
| for (const auto& extension : update_url_extensions) |
| OnExternalExtensionUpdateUrlFound(*extension, false); |
| for (const auto& extension : file_extensions) |
| OnExternalExtensionFileFound(*extension); |
| |
| #if DCHECK_IS_ON() |
| for (const std::string& id : removed_extensions) { |
| for (const auto& extension : update_url_extensions) |
| DCHECK_NE(id, extension->extension_id); |
| for (const auto& extension : file_extensions) |
| DCHECK_NE(id, extension->extension_id); |
| } |
| #endif |
| |
| // Then uninstall before running |updater_|. |
| for (const std::string& id : removed_extensions) |
| CheckExternalUninstall(id); |
| |
| if (!update_url_extensions.empty() && updater_) { |
| // Empty params will cause pending extensions to be updated. |
| extensions::ExtensionUpdater::CheckParams empty_params; |
| updater_->CheckNow(empty_params); |
| } |
| |
| error_controller_->ShowErrorIfNeeded(); |
| external_install_manager_->UpdateExternalExtensionAlert(); |
| } |
| |
| // static |
| // This function is used to uninstall an extension via sync. The LOG statements |
| // within this function are used to inform the user if the uninstall cannot be |
| // done. |
| bool ExtensionService::UninstallExtensionHelper( |
| ExtensionService* extensions_service, |
| const std::string& extension_id, |
| extensions::UninstallReason reason) { |
| // We can't call UninstallExtension with an invalid extension ID. |
| if (!extensions_service->GetInstalledExtension(extension_id)) { |
| LOG(WARNING) << "Attempted uninstallation of non-existent extension with " |
| << "id: " << extension_id; |
| return false; |
| } |
| |
| // The following call to UninstallExtension will not allow an uninstall of a |
| // policy-controlled extension. |
| base::string16 error; |
| if (!extensions_service->UninstallExtension( |
| extension_id, reason, base::Bind(&base::DoNothing), &error)) { |
| LOG(WARNING) << "Cannot uninstall extension with id " << extension_id |
| << ": " << error; |
| return false; |
| } |
| |
| return true; |
| } |
| |
| ExtensionService::ExtensionService(Profile* profile, |
| const base::CommandLine* command_line, |
| const base::FilePath& install_directory, |
| extensions::ExtensionPrefs* extension_prefs, |
| extensions::Blacklist* blacklist, |
| bool autoupdate_enabled, |
| bool extensions_enabled, |
| extensions::OneShotEvent* ready) |
| : extensions::Blacklist::Observer(blacklist), |
| profile_(profile), |
| system_(extensions::ExtensionSystem::Get(profile)), |
| extension_prefs_(extension_prefs), |
| blacklist_(blacklist), |
| registry_(extensions::ExtensionRegistry::Get(profile)), |
| pending_extension_manager_(profile), |
| install_directory_(install_directory), |
| extensions_enabled_(extensions_enabled), |
| ready_(ready), |
| shared_module_service_(new extensions::SharedModuleService(profile_)), |
| app_data_migrator_(new extensions::AppDataMigrator(profile_, registry_)) { |
| CHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
| TRACE_EVENT0("browser,startup", "ExtensionService::ExtensionService::ctor"); |
| |
| // Figure out if extension installation should be enabled. |
| if (extensions::ExtensionsBrowserClient::Get()->AreExtensionsDisabled( |
| *command_line, profile)) |
| extensions_enabled_ = false; |
| |
| registrar_.Add(this, chrome::NOTIFICATION_APP_TERMINATING, |
| content::NotificationService::AllBrowserContextsAndSources()); |
| registrar_.Add(this, |
| extensions::NOTIFICATION_EXTENSION_PROCESS_TERMINATED, |
| content::NotificationService::AllBrowserContextsAndSources()); |
| registrar_.Add(this, content::NOTIFICATION_RENDERER_PROCESS_TERMINATED, |
| content::NotificationService::AllBrowserContextsAndSources()); |
| registrar_.Add(this, chrome::NOTIFICATION_UPGRADE_RECOMMENDED, |
| content::NotificationService::AllBrowserContextsAndSources()); |
| registrar_.Add(this, |
| chrome::NOTIFICATION_PROFILE_DESTRUCTION_STARTED, |
| content::Source<Profile>(profile_)); |
| |
| extensions::ExtensionManagementFactory::GetForBrowserContext(profile_) |
| ->AddObserver(this); |
| |
| // Set up the ExtensionUpdater. |
| if (autoupdate_enabled) { |
| int update_frequency = extensions::kDefaultUpdateFrequencySeconds; |
| if (command_line->HasSwitch(switches::kExtensionsUpdateFrequency)) { |
| base::StringToInt(command_line->GetSwitchValueASCII( |
| switches::kExtensionsUpdateFrequency), |
| &update_frequency); |
| } |
| updater_.reset(new extensions::ExtensionUpdater( |
| this, |
| extension_prefs, |
| profile->GetPrefs(), |
| profile, |
| update_frequency, |
| extensions::ExtensionsBrowserClient::Get()->GetExtensionCache(), |
| base::Bind(ChromeExtensionDownloaderFactory::CreateForProfile, |
| profile))); |
| } |
| |
| component_loader_.reset( |
| new extensions::ComponentLoader(this, |
| profile->GetPrefs(), |
| g_browser_process->local_state(), |
| profile)); |
| |
| if (extensions_enabled_) { |
| extensions::ExternalProviderImpl::CreateExternalProviders( |
| this, profile_, &external_extension_providers_); |
| } |
| |
| // Set this as the ExtensionService for app sorting to ensure it causes syncs |
| // if required. |
| is_first_run_ = !extension_prefs_->SetAlertSystemFirstRun(); |
| |
| error_controller_.reset( |
| new extensions::ExtensionErrorController(profile_, is_first_run_)); |
| external_install_manager_.reset( |
| new extensions::ExternalInstallManager(profile_, is_first_run_)); |
| |
| extension_action_storage_manager_.reset( |
| new extensions::ExtensionActionStorageManager(profile_)); |
| |
| // How long is the path to the Extensions directory? |
| UMA_HISTOGRAM_CUSTOM_COUNTS("Extensions.ExtensionRootPathLength", |
| install_directory_.value().length(), 0, 500, 100); |
| } |
| |
| extensions::PendingExtensionManager* |
| ExtensionService::pending_extension_manager() { |
| return &pending_extension_manager_; |
| } |
| |
| ExtensionService::~ExtensionService() { |
| // No need to unload extensions here because they are profile-scoped, and the |
| // profile is in the process of being deleted. |
| for (const auto& provider : external_extension_providers_) |
| provider->ServiceShutdown(); |
| } |
| |
| void ExtensionService::Shutdown() { |
| extensions::ExtensionManagementFactory::GetInstance() |
| ->GetForBrowserContext(profile()) |
| ->RemoveObserver(this); |
| } |
| |
| const Extension* ExtensionService::GetExtensionById( |
| const std::string& id, bool include_disabled) const { |
| int include_mask = ExtensionRegistry::ENABLED; |
| if (include_disabled) { |
| // Include blacklisted and blocked extensions here because there are |
| // hundreds of callers of this function, and many might assume that this |
| // includes those that have been disabled due to blacklisting or blocking. |
| include_mask |= ExtensionRegistry::DISABLED | |
| ExtensionRegistry::BLACKLISTED | ExtensionRegistry::BLOCKED; |
| } |
| return registry_->GetExtensionById(id, include_mask); |
| } |
| |
| void ExtensionService::Init() { |
| CHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
| TRACE_EVENT0("browser,startup", "ExtensionService::Init"); |
| TRACK_SCOPED_REGION("Startup", "ExtensionService::Init"); |
| SCOPED_UMA_HISTOGRAM_TIMER("Extensions.ExtensionServiceInitTime"); |
| |
| DCHECK(!is_ready()); // Can't redo init. |
| DCHECK_EQ(registry_->enabled_extensions().size(), 0u); |
| |
| // LoadAllExtensions() calls OnLoadedInstalledExtensions(). |
| component_loader_->LoadAll(); |
| extensions::InstalledLoader(this).LoadAllExtensions(); |
| |
| EnabledReloadableExtensions(); |
| MaybeFinishShutdownDelayed(); |
| SetReadyAndNotifyListeners(); |
| |
| // TODO(erikkay): this should probably be deferred to a future point |
| // rather than running immediately at startup. |
| CheckForExternalUpdates(); |
| |
| LoadGreylistFromPrefs(); |
| } |
| |
| void ExtensionService::EnabledReloadableExtensions() { |
| TRACE_EVENT0("browser,startup", |
| "ExtensionService::EnabledReloadableExtensions"); |
| |
| std::vector<std::string> extensions_to_enable; |
| for (const auto& e : registry_->disabled_extensions()) { |
| if (extension_prefs_->GetDisableReasons(e->id()) == |
| Extension::DISABLE_RELOAD) |
| extensions_to_enable.push_back(e->id()); |
| } |
| for (const std::string& extension : extensions_to_enable) { |
| EnableExtension(extension); |
| } |
| } |
| |
| void ExtensionService::MaybeFinishShutdownDelayed() { |
| TRACE_EVENT0("browser,startup", |
| "ExtensionService::MaybeFinishShutdownDelayed"); |
| |
| std::unique_ptr<extensions::ExtensionPrefs::ExtensionsInfo> delayed_info( |
| extension_prefs_->GetAllDelayedInstallInfo()); |
| for (size_t i = 0; i < delayed_info->size(); ++i) { |
| ExtensionInfo* info = delayed_info->at(i).get(); |
| scoped_refptr<const Extension> extension(nullptr); |
| if (info->extension_manifest) { |
| std::string error; |
| extension = Extension::Create( |
| info->extension_path, info->extension_location, |
| *info->extension_manifest, |
| extension_prefs_->GetDelayedInstallCreationFlags(info->extension_id), |
| info->extension_id, &error); |
| if (extension.get()) |
| delayed_installs_.Insert(extension); |
| } |
| } |
| MaybeFinishDelayedInstallations(); |
| std::unique_ptr<extensions::ExtensionPrefs::ExtensionsInfo> delayed_info2( |
| extension_prefs_->GetAllDelayedInstallInfo()); |
| UMA_HISTOGRAM_COUNTS_100("Extensions.UpdateOnLoad", |
| delayed_info2->size() - delayed_info->size()); |
| } |
| |
| void ExtensionService::LoadGreylistFromPrefs() { |
| TRACE_EVENT0("browser,startup", "ExtensionService::LoadGreylistFromPrefs"); |
| |
| std::unique_ptr<ExtensionSet> all_extensions = |
| registry_->GenerateInstalledExtensionsSet(); |
| |
| for (const auto& extension : *all_extensions) { |
| const extensions::BlacklistState state = |
| extension_prefs_->GetExtensionBlacklistState(extension->id()); |
| if (state == extensions::BLACKLISTED_SECURITY_VULNERABILITY || |
| state == extensions::BLACKLISTED_POTENTIALLY_UNWANTED || |
| state == extensions::BLACKLISTED_CWS_POLICY_VIOLATION) |
| greylist_.Insert(extension); |
| } |
| } |
| |
| bool ExtensionService::UpdateExtension(const extensions::CRXFileInfo& file, |
| bool file_ownership_passed, |
| CrxInstaller** out_crx_installer) { |
| CHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
| if (browser_terminating_) { |
| LOG(WARNING) << "Skipping UpdateExtension due to browser shutdown"; |
| // Leak the temp file at extension_path. We don't want to add to the disk |
| // I/O burden at shutdown, we can't rely on the I/O completing anyway, and |
| // the file is in the OS temp directory which should be cleaned up for us. |
| return false; |
| } |
| |
| const std::string& id = file.extension_id; |
| |
| const extensions::PendingExtensionInfo* pending_extension_info = |
| pending_extension_manager()->GetById(id); |
| |
| const Extension* extension = GetInstalledExtension(id); |
| if (!pending_extension_info && !extension) { |
| LOG(WARNING) << "Will not update extension " << id |
| << " because it is not installed or pending"; |
| // Delete extension_path since we're not creating a CrxInstaller |
| // that would do it for us. |
| if (file_ownership_passed && |
| !GetFileTaskRunner()->PostTask( |
| FROM_HERE, |
| base::Bind(&extensions::file_util::DeleteFile, file.path, false))) |
| NOTREACHED(); |
| |
| return false; |
| } |
| |
| scoped_refptr<CrxInstaller> installer(CrxInstaller::CreateSilent(this)); |
| installer->set_expected_id(id); |
| installer->set_expected_hash(file.expected_hash); |
| int creation_flags = Extension::NO_FLAGS; |
| if (pending_extension_info) { |
| installer->set_install_source(pending_extension_info->install_source()); |
| installer->set_allow_silent_install(true); |
| // If the extension came in disabled due to a permission increase, then |
| // don't grant it all the permissions. crbug.com/484214 |
| bool has_permissions_increase = |
| extensions::ExtensionPrefs::Get(profile_)->HasDisableReason( |
| id, Extension::DISABLE_PERMISSIONS_INCREASE); |
| const base::Version& expected_version = pending_extension_info->version(); |
| if (has_permissions_increase || |
| pending_extension_info->remote_install() || |
| !expected_version.IsValid()) { |
| installer->set_grant_permissions(false); |
| } else { |
| installer->set_expected_version(expected_version, |
| false /* fail_install_if_unexpected */); |
| } |
| creation_flags = pending_extension_info->creation_flags(); |
| if (pending_extension_info->mark_acknowledged()) |
| external_install_manager_->AcknowledgeExternalExtension(id); |
| } else if (extension) { |
| installer->set_install_source(extension->location()); |
| } |
| // If the extension was installed from or has migrated to the webstore, or |
| // its auto-update URL is from the webstore, treat it as a webstore install. |
| // Note that we ignore some older extensions with blank auto-update URLs |
| // because we are mostly concerned with restrictions on NaCl extensions, |
| // which are newer. |
| if ((extension && extension->from_webstore()) || |
| (extension && extensions::ManifestURL::UpdatesFromGallery(extension)) || |
| (!extension && extension_urls::IsWebstoreUpdateUrl( |
| pending_extension_info->update_url()))) { |
| creation_flags |= Extension::FROM_WEBSTORE; |
| } |
| |
| // Bookmark apps being updated is kind of a contradiction, but that's because |
| // we mark the default apps as bookmark apps, and they're hosted in the web |
| // store, thus they can get updated. See http://crbug.com/101605 for more |
| // details. |
| if (extension && extension->from_bookmark()) |
| creation_flags |= Extension::FROM_BOOKMARK; |
| |
| if (extension && extension->was_installed_by_default()) |
| creation_flags |= Extension::WAS_INSTALLED_BY_DEFAULT; |
| |
| if (extension && extension->was_installed_by_oem()) |
| creation_flags |= Extension::WAS_INSTALLED_BY_OEM; |
| |
| if (extension && extension->was_installed_by_custodian()) |
| creation_flags |= Extension::WAS_INSTALLED_BY_CUSTODIAN; |
| |
| if (extension) |
| installer->set_do_not_sync(extension_prefs_->DoNotSync(id)); |
| |
| installer->set_creation_flags(creation_flags); |
| |
| installer->set_delete_source(file_ownership_passed); |
| installer->set_install_cause(extension_misc::INSTALL_CAUSE_UPDATE); |
| installer->InstallCrxFile(file); |
| |
| if (out_crx_installer) |
| *out_crx_installer = installer.get(); |
| |
| return true; |
| } |
| |
| void ExtensionService::ReloadExtensionImpl( |
| // "transient" because the process of reloading may cause the reference |
| // to become invalid. Instead, use |extension_id|, a copy. |
| const std::string& transient_extension_id, |
| bool be_noisy) { |
| CHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
| |
| // If the extension is already reloading, don't reload again. |
| if (extension_prefs_->GetDisableReasons(transient_extension_id) & |
| Extension::DISABLE_RELOAD) { |
| return; |
| } |
| |
| // Ignore attempts to reload a blacklisted or blocked extension. Sometimes |
| // this can happen in a convoluted reload sequence triggered by the |
| // termination of a blacklisted or blocked extension and a naive attempt to |
| // reload it. For an example see http://crbug.com/373842. |
| if (registry_->blacklisted_extensions().Contains(transient_extension_id) || |
| registry_->blocked_extensions().Contains(transient_extension_id)) { |
| return; |
| } |
| |
| base::FilePath path; |
| |
| std::string extension_id = transient_extension_id; |
| const Extension* transient_current_extension = |
| GetExtensionById(extension_id, false); |
| |
| // Disable the extension if it's loaded. It might not be loaded if it crashed. |
| if (transient_current_extension) { |
| // If the extension has an inspector open for its background page, detach |
| // the inspector and hang onto a cookie for it, so that we can reattach |
| // later. |
| // TODO(yoz): this is not incognito-safe! |
| extensions::ProcessManager* manager = |
| extensions::ProcessManager::Get(profile_); |
| extensions::ExtensionHost* host = |
| manager->GetBackgroundHostForExtension(extension_id); |
| if (host && DevToolsAgentHost::HasFor(host->host_contents())) { |
| // Look for an open inspector for the background page. |
| scoped_refptr<DevToolsAgentHost> agent_host = |
| DevToolsAgentHost::GetOrCreateFor(host->host_contents()); |
| agent_host->DisconnectWebContents(); |
| orphaned_dev_tools_[extension_id] = agent_host; |
| } |
| |
| path = transient_current_extension->path(); |
| // BeingUpgraded is set back to false when the extension is added. |
| system_->runtime_data()->SetBeingUpgraded(transient_current_extension->id(), |
| true); |
| DisableExtension(extension_id, Extension::DISABLE_RELOAD); |
| reloading_extensions_.insert(extension_id); |
| } else { |
| std::map<std::string, base::FilePath>::const_iterator iter = |
| unloaded_extension_paths_.find(extension_id); |
| if (iter == unloaded_extension_paths_.end()) { |
| return; |
| } |
| path = unloaded_extension_paths_[extension_id]; |
| } |
| |
| transient_current_extension = nullptr; |
| |
| if (delayed_installs_.Contains(extension_id)) { |
| FinishDelayedInstallation(extension_id); |
| return; |
| } |
| |
| // If we're reloading a component extension, use the component extension |
| // loader's reloader. |
| if (component_loader_->Exists(extension_id)) { |
| component_loader_->Reload(extension_id); |
| return; |
| } |
| |
| // Check the installed extensions to see if what we're reloading was already |
| // installed. |
| std::unique_ptr<ExtensionInfo> installed_extension( |
| extension_prefs_->GetInstalledExtensionInfo(extension_id)); |
| if (installed_extension.get() && |
| installed_extension->extension_manifest.get()) { |
| extensions::InstalledLoader(this).Load(*installed_extension, false); |
| } else { |
| // Otherwise, the extension is unpacked (location LOAD). |
| // We should always be able to remember the extension's path. If it's not in |
| // the map, someone failed to update |unloaded_extension_paths_|. |
| CHECK(!path.empty()); |
| scoped_refptr<extensions::UnpackedInstaller> unpacked_installer = |
| extensions::UnpackedInstaller::Create(this); |
| unpacked_installer->set_be_noisy_on_failure(be_noisy); |
| unpacked_installer->Load(path); |
| } |
| } |
| |
| void ExtensionService::ReloadExtension(const std::string& extension_id) { |
| ReloadExtensionImpl(extension_id, true); // be_noisy |
| } |
| |
| void ExtensionService::ReloadExtensionWithQuietFailure( |
| const std::string& extension_id) { |
| ReloadExtensionImpl(extension_id, false); // be_noisy |
| } |
| |
| bool ExtensionService::UninstallExtension( |
| // "transient" because the process of uninstalling may cause the reference |
| // to become invalid. Instead, use |extenson->id()|. |
| const std::string& transient_extension_id, |
| extensions::UninstallReason reason, |
| const base::Closure& deletion_done_callback, |
| base::string16* error) { |
| CHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
| |
| scoped_refptr<const Extension> extension = |
| GetInstalledExtension(transient_extension_id); |
| |
| // Callers should not send us nonexistent extensions. |
| CHECK(extension.get()); |
| |
| ManagementPolicy* by_policy = system_->management_policy(); |
| // Policy change which triggers an uninstall will always set |
| // |external_uninstall| to true so this is the only way to uninstall |
| // managed extensions. |
| // Shared modules being uninstalled will also set |external_uninstall| to true |
| // so that we can guarantee users don't uninstall a shared module. |
| // (crbug.com/273300) |
| // TODO(rdevlin.cronin): This is probably not right. We should do something |
| // else, like include an enum IS_INTERNAL_UNINSTALL or IS_USER_UNINSTALL so |
| // we don't do this. |
| bool external_uninstall = |
| (reason == extensions::UNINSTALL_REASON_INTERNAL_MANAGEMENT) || |
| (reason == extensions::UNINSTALL_REASON_COMPONENT_REMOVED) || |
| (reason == extensions::UNINSTALL_REASON_REINSTALL) || |
| (reason == extensions::UNINSTALL_REASON_ORPHANED_EXTERNAL_EXTENSION) || |
| (reason == extensions::UNINSTALL_REASON_ORPHANED_SHARED_MODULE) || |
| (reason == extensions::UNINSTALL_REASON_SYNC && |
| extension->was_installed_by_custodian()); |
| if (!external_uninstall && |
| (!by_policy->UserMayModifySettings(extension.get(), error) || |
| by_policy->MustRemainInstalled(extension.get(), error))) { |
| content::NotificationService::current()->Notify( |
| extensions::NOTIFICATION_EXTENSION_UNINSTALL_NOT_ALLOWED, |
| content::Source<Profile>(profile_), |
| content::Details<const Extension>(extension.get())); |
| return false; |
| } |
| |
| InstallVerifier::Get(GetBrowserContext())->Remove(extension->id()); |
| |
| UMA_HISTOGRAM_ENUMERATION("Extensions.UninstallType", |
| extension->GetType(), 100); |
| RecordPermissionMessagesHistogram(extension.get(), "Uninstall"); |
| |
| // Unload before doing more cleanup to ensure that nothing is hanging on to |
| // any of these resources. |
| UnloadExtension(extension->id(), UnloadedExtensionInfo::REASON_UNINSTALL); |
| |
| // Tell the backend to start deleting installed extensions on the file thread. |
| if (!Manifest::IsUnpackedLocation(extension->location())) { |
| if (!GetFileTaskRunner()->PostTask( |
| FROM_HERE, |
| base::Bind(&ExtensionService::UninstallExtensionOnFileThread, |
| extension->id(), |
| profile_, |
| install_directory_, |
| extension->path()))) |
| NOTREACHED(); |
| } |
| |
| extensions::DataDeleter::StartDeleting( |
| profile_, extension.get(), deletion_done_callback); |
| |
| UntrackTerminatedExtension(extension->id()); |
| |
| // Notify interested parties that we've uninstalled this extension. |
| ExtensionRegistry::Get(profile_) |
| ->TriggerOnUninstalled(extension.get(), reason); |
| |
| delayed_installs_.Remove(extension->id()); |
| |
| extension_prefs_->OnExtensionUninstalled( |
| extension->id(), extension->location(), external_uninstall); |
| |
| // Track the uninstallation. |
| UMA_HISTOGRAM_ENUMERATION("Extensions.ExtensionUninstalled", 1, 2); |
| |
| return true; |
| } |
| |
| // static |
| void ExtensionService::UninstallExtensionOnFileThread( |
| const std::string& id, |
| Profile* profile, |
| const base::FilePath& install_dir, |
| const base::FilePath& extension_path) { |
| extensions::ExtensionAssetsManager* assets_manager = |
| extensions::ExtensionAssetsManager::GetInstance(); |
| assets_manager->UninstallExtension(id, profile, install_dir, extension_path); |
| } |
| |
| bool ExtensionService::IsExtensionEnabled( |
| const std::string& extension_id) const { |
| if (registry_->enabled_extensions().Contains(extension_id) || |
| registry_->terminated_extensions().Contains(extension_id)) { |
| return true; |
| } |
| |
| if (registry_->disabled_extensions().Contains(extension_id) || |
| registry_->blacklisted_extensions().Contains(extension_id) || |
| registry_->blocked_extensions().Contains(extension_id)) { |
| return false; |
| } |
| |
| // Blocked extensions aren't marked as such in prefs, thus if |
| // |block_extensions_| is true then CanBlockExtension() must be called with an |
| // Extension object. If the |extension_id| is not loaded, assume not enabled. |
| if (block_extensions_) { |
| const Extension* extension = GetInstalledExtension(extension_id); |
| if (!extension || CanBlockExtension(extension)) |
| return false; |
| } |
| |
| // If the extension hasn't been loaded yet, check the prefs for it. Assume |
| // enabled unless otherwise noted. |
| return !extension_prefs_->IsExtensionDisabled(extension_id) && |
| !extension_prefs_->IsExtensionBlacklisted(extension_id) && |
| !extension_prefs_->IsExternalExtensionUninstalled(extension_id); |
| } |
| |
| void ExtensionService::EnableExtension(const std::string& extension_id) { |
| CHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
| |
| if (IsExtensionEnabled(extension_id)) |
| return; |
| const Extension* extension = |
| registry_->disabled_extensions().GetByID(extension_id); |
| |
| ManagementPolicy* policy = system_->management_policy(); |
| if (extension && policy->MustRemainDisabled(extension, nullptr, nullptr)) { |
| UMA_HISTOGRAM_COUNTS_100("Extensions.EnableDeniedByPolicy", 1); |
| return; |
| } |
| |
| extension_prefs_->SetExtensionEnabled(extension_id); |
| |
| // This can happen if sync enables an extension that is not installed yet. |
| if (!extension) |
| return; |
| |
| // Move it over to the enabled list. |
| registry_->AddEnabled(make_scoped_refptr(extension)); |
| registry_->RemoveDisabled(extension->id()); |
| |
| NotifyExtensionLoaded(extension); |
| |
| // Notify listeners that the extension was enabled. |
| content::NotificationService::current()->Notify( |
| extensions::NOTIFICATION_EXTENSION_ENABLED, |
| content::Source<Profile>(profile_), |
| content::Details<const Extension>(extension)); |
| } |
| |
| void ExtensionService::DisableExtension(const std::string& extension_id, |
| int disable_reasons) { |
| CHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
| |
| // The extension may have been disabled already. Just add the disable reasons. |
| if (!IsExtensionEnabled(extension_id)) { |
| extension_prefs_->AddDisableReasons(extension_id, disable_reasons); |
| return; |
| } |
| |
| const Extension* extension = GetInstalledExtension(extension_id); |
| // |extension| can be nullptr if sync disables an extension that is not |
| // installed yet. |
| // EXTERNAL_COMPONENT extensions are not generally modifiable by users, but |
| // can be uninstalled by the browser if the user sets extension-specific |
| // preferences. |
| if (extension && !(disable_reasons & Extension::DISABLE_RELOAD) && |
| !(disable_reasons & Extension::DISABLE_UPDATE_REQUIRED_BY_POLICY) && |
| !system_->management_policy()->UserMayModifySettings(extension, |
| nullptr) && |
| extension->location() != Manifest::EXTERNAL_COMPONENT) { |
| return; |
| } |
| |
| extension_prefs_->SetExtensionDisabled(extension_id, disable_reasons); |
| |
| int include_mask = |
| ExtensionRegistry::EVERYTHING & ~ExtensionRegistry::DISABLED; |
| extension = registry_->GetExtensionById(extension_id, include_mask); |
| if (!extension) |
| return; |
| |
| // The extension is either enabled or terminated. |
| DCHECK(registry_->enabled_extensions().Contains(extension->id()) || |
| registry_->terminated_extensions().Contains(extension->id())); |
| |
| // Move it over to the disabled list. Don't send a second unload notification |
| // for terminated extensions being disabled. |
| registry_->AddDisabled(make_scoped_refptr(extension)); |
| if (registry_->enabled_extensions().Contains(extension->id())) { |
| registry_->RemoveEnabled(extension->id()); |
| NotifyExtensionUnloaded(extension, UnloadedExtensionInfo::REASON_DISABLE); |
| } else { |
| registry_->RemoveTerminated(extension->id()); |
| } |
| } |
| |
| void ExtensionService::DisableUserExtensions( |
| const std::vector<std::string>& except_ids) { |
| extensions::ManagementPolicy* management_policy = |
| system_->management_policy(); |
| extensions::ExtensionList to_disable; |
| |
| for (const auto& extension : registry_->enabled_extensions()) { |
| if (management_policy->UserMayModifySettings(extension.get(), nullptr)) |
| to_disable.push_back(extension); |
| } |
| |
| for (const auto& extension : registry_->terminated_extensions()) { |
| if (management_policy->UserMayModifySettings(extension.get(), nullptr)) |
| to_disable.push_back(extension); |
| } |
| |
| for (const auto& extension : to_disable) { |
| if (extension->was_installed_by_default() && |
| extension_urls::IsWebstoreUpdateUrl( |
| extensions::ManifestURL::GetUpdateURL(extension.get()))) |
| continue; |
| const std::string& id = extension->id(); |
| if (except_ids.end() == std::find(except_ids.begin(), except_ids.end(), id)) |
| DisableExtension(id, extensions::Extension::DISABLE_USER_ACTION); |
| } |
| } |
| |
| // Extensions that are not locked, components or forced by policy should be |
| // locked. Extensions are no longer considered enabled or disabled. Blacklisted |
| // extensions are now considered both blacklisted and locked. |
| void ExtensionService::BlockAllExtensions() { |
| if (block_extensions_) |
| return; |
| block_extensions_ = true; |
| |
| // Blacklisted extensions are already unloaded, need not be blocked. |
| std::unique_ptr<ExtensionSet> extensions = |
| registry_->GenerateInstalledExtensionsSet(ExtensionRegistry::ENABLED | |
| ExtensionRegistry::DISABLED | |
| ExtensionRegistry::TERMINATED); |
| |
| for (const auto& extension : *extensions) { |
| const std::string& id = extension->id(); |
| |
| if (!CanBlockExtension(extension.get())) |
| continue; |
| |
| registry_->RemoveEnabled(id); |
| registry_->RemoveDisabled(id); |
| registry_->RemoveTerminated(id); |
| |
| registry_->AddBlocked(extension.get()); |
| UnloadExtension(id, extensions::UnloadedExtensionInfo::REASON_LOCK_ALL); |
| } |
| } |
| |
| // All locked extensions should revert to being either enabled or disabled |
| // as appropriate. |
| void ExtensionService::UnblockAllExtensions() { |
| block_extensions_ = false; |
| std::unique_ptr<ExtensionSet> to_unblock = |
| registry_->GenerateInstalledExtensionsSet(ExtensionRegistry::BLOCKED); |
| |
| for (const auto& extension : *to_unblock) { |
| registry_->RemoveBlocked(extension->id()); |
| AddExtension(extension.get()); |
| } |
| } |
| |
| void ExtensionService::GrantPermissionsAndEnableExtension( |
| const Extension* extension) { |
| GrantPermissions(extension); |
| RecordPermissionMessagesHistogram(extension, "ReEnable"); |
| EnableExtension(extension->id()); |
| } |
| |
| void ExtensionService::GrantPermissions(const Extension* extension) { |
| CHECK(extension); |
| extensions::PermissionsUpdater(profile()).GrantActivePermissions(extension); |
| } |
| |
| // static |
| void ExtensionService::RecordPermissionMessagesHistogram( |
| const Extension* extension, const char* histogram) { |
| // Since this is called from multiple sources, and since the histogram macros |
| // use statics, we need to manually lookup the histogram ourselves. |
| base::HistogramBase* counter = base::LinearHistogram::FactoryGet( |
| base::StringPrintf("Extensions.Permissions_%s3", histogram), |
| 1, |
| APIPermission::kEnumBoundary, |
| APIPermission::kEnumBoundary + 1, |
| base::HistogramBase::kUmaTargetedHistogramFlag); |
| |
| base::HistogramBase* counter_has_any = base::BooleanHistogram::FactoryGet( |
| base::StringPrintf("Extensions.HasPermissions_%s3", histogram), |
| base::HistogramBase::kUmaTargetedHistogramFlag); |
| |
| PermissionIDSet permissions = |
| extensions::PermissionMessageProvider::Get()->GetAllPermissionIDs( |
| extension->permissions_data()->active_permissions(), |
| extension->GetType()); |
| counter_has_any->AddBoolean(!permissions.empty()); |
| for (const PermissionID& id : permissions) |
| counter->Add(id.id()); |
| } |
| |
| void ExtensionService::NotifyExtensionLoaded(const Extension* extension) { |
| // The URLRequestContexts need to be first to know that the extension |
| // was loaded, otherwise a race can arise where a renderer that is created |
| // for the extension may try to load an extension URL with an extension id |
| // that the request context doesn't yet know about. The profile is responsible |
| // for ensuring its URLRequestContexts appropriately discover the loaded |
| // extension. |
| system_->RegisterExtensionWithRequestContexts( |
| extension, |
| base::Bind(&ExtensionService::OnExtensionRegisteredWithRequestContexts, |
| AsWeakPtr(), make_scoped_refptr(extension))); |
| |
| // Tell renderers about the new extension, unless it's a theme (renderers |
| // don't need to know about themes). |
| if (!extension->is_theme()) { |
| for (content::RenderProcessHost::iterator i( |
| content::RenderProcessHost::AllHostsIterator()); |
| !i.IsAtEnd(); i.Advance()) { |
| content::RenderProcessHost* host = i.GetCurrentValue(); |
| Profile* host_profile = |
| Profile::FromBrowserContext(host->GetBrowserContext()); |
| if (host_profile->GetOriginalProfile() == |
| profile_->GetOriginalProfile()) { |
| // We don't need to include tab permisisons here, since the extension |
| // was just loaded. |
| std::vector<ExtensionMsg_Loaded_Params> loaded_extensions( |
| 1, ExtensionMsg_Loaded_Params(extension, |
| false /* no tab permissions */)); |
| host->Send( |
| new ExtensionMsg_Loaded(loaded_extensions)); |
| } |
| } |
| } |
| |
| // Tell subsystems that use the EXTENSION_LOADED notification about the new |
| // extension. |
| // |
| // NOTE: It is important that this happen after notifying the renderers about |
| // the new extensions so that if we navigate to an extension URL in |
| // ExtensionRegistryObserver::OnLoaded or |
| // NOTIFICATION_EXTENSION_LOADED_DEPRECATED, the |
| // renderer is guaranteed to know about it. |
| registry_->TriggerOnLoaded(extension); |
| |
| content::NotificationService::current()->Notify( |
| extensions::NOTIFICATION_EXTENSION_LOADED_DEPRECATED, |
| content::Source<Profile>(profile_), |
| content::Details<const Extension>(extension)); |
| |
| // TODO(kalman): Convert ExtensionSpecialStoragePolicy to a |
| // BrowserContextKeyedService and use ExtensionRegistryObserver. |
| profile_->GetExtensionSpecialStoragePolicy()-> |
| GrantRightsForExtension(extension, profile_); |
| |
| // TODO(kalman): This is broken. The crash reporter is process-wide so doesn't |
| // work properly multi-profile. Besides which, it should be using |
| // ExtensionRegistryObserver. See http://crbug.com/355029. |
| UpdateActiveExtensionsInCrashReporter(); |
| |
| const extensions::PermissionsData* permissions_data = |
| extension->permissions_data(); |
| |
| // If the extension has permission to load chrome://favicon/ resources we need |
| // to make sure that the FaviconSource is registered with the |
| // ChromeURLDataManager. |
| if (permissions_data->HasHostPermission(GURL(chrome::kChromeUIFaviconURL))) { |
| FaviconSource* favicon_source = new FaviconSource(profile_, |
| FaviconSource::FAVICON); |
| content::URLDataSource::Add(profile_, favicon_source); |
| } |
| |
| // Same for chrome://theme/ resources. |
| if (permissions_data->HasHostPermission(GURL(chrome::kChromeUIThemeURL))) { |
| ThemeSource* theme_source = new ThemeSource(profile_); |
| content::URLDataSource::Add(profile_, theme_source); |
| } |
| |
| // Same for chrome://thumb/ resources. |
| if (permissions_data->HasHostPermission( |
| GURL(chrome::kChromeUIThumbnailURL))) { |
| ThumbnailSource* thumbnail_source = new ThumbnailSource(profile_, false); |
| content::URLDataSource::Add(profile_, thumbnail_source); |
| } |
| } |
| |
| void ExtensionService::OnExtensionRegisteredWithRequestContexts( |
| scoped_refptr<const extensions::Extension> extension) { |
| registry_->AddReady(extension); |
| if (registry_->enabled_extensions().Contains(extension->id())) |
| registry_->TriggerOnReady(extension.get()); |
| } |
| |
| void ExtensionService::NotifyExtensionUnloaded( |
| const Extension* extension, |
| UnloadedExtensionInfo::Reason reason) { |
| UnloadedExtensionInfo details(extension, reason); |
| |
| registry_->TriggerOnUnloaded(extension, reason); |
| |
| content::NotificationService::current()->Notify( |
| extensions::NOTIFICATION_EXTENSION_UNLOADED_DEPRECATED, |
| content::Source<Profile>(profile_), |
| content::Details<UnloadedExtensionInfo>(&details)); |
| |
| for (content::RenderProcessHost::iterator i( |
| content::RenderProcessHost::AllHostsIterator()); |
| !i.IsAtEnd(); i.Advance()) { |
| content::RenderProcessHost* host = i.GetCurrentValue(); |
| Profile* host_profile = |
| Profile::FromBrowserContext(host->GetBrowserContext()); |
| if (host_profile->GetOriginalProfile() == profile_->GetOriginalProfile()) |
| host->Send(new ExtensionMsg_Unloaded(extension->id())); |
| } |
| |
| system_->UnregisterExtensionWithRequestContexts(extension->id(), reason); |
| |
| // TODO(kalman): Convert ExtensionSpecialStoragePolicy to a |
| // BrowserContextKeyedService and use ExtensionRegistryObserver. |
| profile_->GetExtensionSpecialStoragePolicy()-> |
| RevokeRightsForExtension(extension); |
| |
| #if defined(OS_CHROMEOS) |
| // Revoke external file access for the extension from its file system context. |
| // It is safe to access the extension's storage partition at this point. The |
| // storage partition may get destroyed only after the extension gets unloaded. |
| GURL site = |
| extensions::util::GetSiteForExtensionId(extension->id(), profile_); |
| storage::FileSystemContext* filesystem_context = |
| BrowserContext::GetStoragePartitionForSite(profile_, site) |
| ->GetFileSystemContext(); |
| if (filesystem_context && filesystem_context->external_backend()) { |
| filesystem_context->external_backend()-> |
| RevokeAccessForExtension(extension->id()); |
| } |
| #endif |
| |
| // TODO(kalman): This is broken. The crash reporter is process-wide so doesn't |
| // work properly multi-profile. Besides which, it should be using |
| // ExtensionRegistryObserver::OnExtensionLoaded. See http://crbug.com/355029. |
| UpdateActiveExtensionsInCrashReporter(); |
| } |
| |
| content::BrowserContext* ExtensionService::GetBrowserContext() const { |
| // Implemented in the .cc file to avoid adding a profile.h dependency to |
| // extension_service.h. |
| return profile_; |
| } |
| |
| bool ExtensionService::is_ready() { |
| return ready_->is_signaled(); |
| } |
| |
| base::SequencedTaskRunner* ExtensionService::GetFileTaskRunner() { |
| if (file_task_runner_.get()) |
| return file_task_runner_.get(); |
| |
| // We should be able to interrupt any part of extension install process during |
| // shutdown. SKIP_ON_SHUTDOWN ensures that not started extension install tasks |
| // will be ignored/deleted while we will block on started tasks. |
| std::string token("ext_install-"); |
| token.append(profile_->GetPath().AsUTF8Unsafe()); |
| file_task_runner_ = BrowserThread::GetBlockingPool()-> |
| GetSequencedTaskRunnerWithShutdownBehavior( |
| BrowserThread::GetBlockingPool()->GetNamedSequenceToken(token), |
| base::SequencedWorkerPool::SKIP_ON_SHUTDOWN); |
| return file_task_runner_.get(); |
| } |
| |
| void ExtensionService::CheckManagementPolicy() { |
| std::vector<std::string> to_unload; |
| std::map<std::string, Extension::DisableReason> to_disable; |
| std::vector<std::string> to_enable; |
| |
| // Loop through the extensions list, finding extensions we need to unload or |
| // disable. |
| for (const auto& extension : registry_->enabled_extensions()) { |
| if (!system_->management_policy()->UserMayLoad(extension.get(), nullptr)) |
| to_unload.push_back(extension->id()); |
| Extension::DisableReason disable_reason = Extension::DISABLE_NONE; |
| if (system_->management_policy()->MustRemainDisabled( |
| extension.get(), &disable_reason, nullptr)) |
| to_disable[extension->id()] = disable_reason; |
| } |
| |
| extensions::ExtensionManagement* management = |
| extensions::ExtensionManagementFactory::GetForBrowserContext(profile()); |
| |
| // Loop through the disabled extension list, find extensions to re-enable |
| // automatically. These extensions are exclusive from the |to_disable| and |
| // |to_unload| lists constructed above, since disabled_extensions() and |
| // enabled_extensions() are supposed to be mutually exclusive. |
| for (const auto& extension : registry_->disabled_extensions()) { |
| // Find all disabled extensions disabled due to minimum version requirement, |
| // but now satisfying it. |
| if (management->CheckMinimumVersion(extension.get(), nullptr) && |
| extension_prefs_->HasDisableReason( |
| extension->id(), Extension::DISABLE_UPDATE_REQUIRED_BY_POLICY)) { |
| // Is DISABLE_UPDATE_REQUIRED_BY_POLICY the *only* reason? |
| if (extension_prefs_->GetDisableReasons(extension->id()) == |
| Extension::DISABLE_UPDATE_REQUIRED_BY_POLICY) { |
| // We need to enable those disabled *only* due to minimum version |
| // requirement. |
| to_enable.push_back(extension->id()); |
| } |
| extension_prefs_->RemoveDisableReason( |
| extension->id(), Extension::DISABLE_UPDATE_REQUIRED_BY_POLICY); |
| } |
| } |
| |
| for (const std::string& id : to_unload) |
| UnloadExtension(id, UnloadedExtensionInfo::REASON_DISABLE); |
| |
| for (const auto& i : to_disable) |
| DisableExtension(i.first, i.second); |
| |
| // No extension is getting re-enabled here after disabling/unloading |
| // because to_enable is mutually exclusive to to_disable + to_unload. |
| for (const std::string& id : to_enable) |
| EnableExtension(id); |
| |
| if (updater_.get()) { |
| // Find all extensions disabled due to minimum version requirement from |
| // policy (including the ones that got disabled just now), and check |
| // for update. |
| extensions::ExtensionUpdater::CheckParams to_recheck; |
| for (const auto& extension : registry_->disabled_extensions()) { |
| if (extension_prefs_->GetDisableReasons(extension->id()) == |
| Extension::DISABLE_UPDATE_REQUIRED_BY_POLICY) { |
| // The minimum version check is the only thing holding this extension |
| // back, so check if it can be updated to fix that. |
| to_recheck.ids.push_back(extension->id()); |
| } |
| } |
| if (!to_recheck.ids.empty()) |
| updater_->CheckNow(to_recheck); |
| } |
| } |
| |
| void ExtensionService::CheckForUpdatesSoon() { |
| // This can legitimately happen in unit tests. |
| if (!updater_.get()) |
| return; |
| |
| updater_->CheckSoon(); |
| } |
| |
| // Some extensions will autoupdate themselves externally from Chrome. These |
| // are typically part of some larger client application package. To support |
| // these, the extension will register its location in the preferences file |
| // (and also, on Windows, in the registry) and this code will periodically |
| // check that location for a .crx file, which it will then install locally if |
| // a new version is available. |
| // Errors are reported through ExtensionErrorReporter. Success is not |
| // reported. |
| void ExtensionService::CheckForExternalUpdates() { |
| CHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
| TRACE_EVENT0("browser,startup", "ExtensionService::CheckForExternalUpdates"); |
| SCOPED_UMA_HISTOGRAM_TIMER("Extensions.CheckForExternalUpdatesTime"); |
| |
| // Note that this installation is intentionally silent (since it didn't |
| // go through the front-end). Extensions that are registered in this |
| // way are effectively considered 'pre-bundled', and so implicitly |
| // trusted. In general, if something has HKLM or filesystem access, |
| // they could install an extension manually themselves anyway. |
| |
| // Ask each external extension provider to give us a call back for each |
| // extension they know about. See OnExternalExtension(File|UpdateUrl)Found. |
| for (const auto& provider : external_extension_providers_) |
| provider->VisitRegisteredExtension(); |
| |
| // Do any required work that we would have done after completion of all |
| // providers. |
| if (external_extension_providers_.empty()) |
| OnAllExternalProvidersReady(); |
| } |
| |
| void ExtensionService::OnExternalProviderReady( |
| const ExternalProviderInterface* provider) { |
| CHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
| CHECK(provider->IsReady()); |
| |
| // An external provider has finished loading. We only take action |
| // if all of them are finished. So we check them first. |
| if (AreAllExternalProvidersReady()) |
| OnAllExternalProvidersReady(); |
| } |
| |
| bool ExtensionService::AreAllExternalProvidersReady() const { |
| for (const auto& provider : external_extension_providers_) { |
| if (!provider->IsReady()) |
| return false; |
| } |
| return true; |
| } |
| |
| void ExtensionService::OnAllExternalProvidersReady() { |
| CHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
| base::TimeDelta elapsed = base::Time::Now() - profile_->GetStartTime(); |
| UMA_HISTOGRAM_TIMES("Extension.ExternalProvidersReadyAfter", elapsed); |
| |
| // Install any pending extensions. |
| if (update_once_all_providers_are_ready_ && updater()) { |
| update_once_all_providers_are_ready_ = false; |
| extensions::ExtensionUpdater::CheckParams params; |
| params.callback = external_updates_finished_callback_; |
| updater()->CheckNow(params); |
| } |
| |
| // Uninstall all the unclaimed extensions. |
| std::unique_ptr<extensions::ExtensionPrefs::ExtensionsInfo> extensions_info( |
| extension_prefs_->GetInstalledExtensionsInfo()); |
| for (size_t i = 0; i < extensions_info->size(); ++i) { |
| ExtensionInfo* info = extensions_info->at(i).get(); |
| if (Manifest::IsExternalLocation(info->extension_location)) |
| CheckExternalUninstall(info->extension_id); |
| } |
| |
| error_controller_->ShowErrorIfNeeded(); |
| |
| external_install_manager_->UpdateExternalExtensionAlert(); |
| } |
| |
| void ExtensionService::UnloadExtension( |
| const std::string& extension_id, |
| UnloadedExtensionInfo::Reason reason) { |
| // Make sure the extension gets deleted after we return from this function. |
| int include_mask = |
| ExtensionRegistry::EVERYTHING & ~ExtensionRegistry::TERMINATED; |
| scoped_refptr<const Extension> extension( |
| registry_->GetExtensionById(extension_id, include_mask)); |
| |
| // This method can be called via PostTask, so the extension may have been |
| // unloaded by the time this runs. |
| if (!extension.get()) { |
| // In case the extension may have crashed/uninstalled. Allow the profile to |
| // clean up its RequestContexts. |
| system_->UnregisterExtensionWithRequestContexts(extension_id, reason); |
| return; |
| } |
| |
| // Keep information about the extension so that we can reload it later |
| // even if it's not permanently installed. |
| unloaded_extension_paths_[extension->id()] = extension->path(); |
| |
| // Clean up if the extension is meant to be enabled after a reload. |
| reloading_extensions_.erase(extension->id()); |
| |
| if (registry_->disabled_extensions().Contains(extension->id())) { |
| registry_->RemoveDisabled(extension->id()); |
| // Make sure the profile cleans up its RequestContexts when an already |
| // disabled extension is unloaded (since they are also tracking the disabled |
| // extensions). |
| system_->UnregisterExtensionWithRequestContexts(extension_id, reason); |
| // Don't send the unloaded notification. It was sent when the extension |
| // was disabled. |
| } else { |
| // Remove the extension from the enabled list. |
| registry_->RemoveEnabled(extension->id()); |
| NotifyExtensionUnloaded(extension.get(), reason); |
| } |
| |
| content::NotificationService::current()->Notify( |
| extensions::NOTIFICATION_EXTENSION_REMOVED, |
| content::Source<Profile>(profile_), |
| content::Details<const Extension>(extension.get())); |
| } |
| |
| void ExtensionService::RemoveComponentExtension( |
| const std::string& extension_id) { |
| scoped_refptr<const Extension> extension( |
| GetExtensionById(extension_id, false)); |
| UnloadExtension(extension_id, UnloadedExtensionInfo::REASON_UNINSTALL); |
| if (extension.get()) { |
| ExtensionRegistry::Get(profile_)->TriggerOnUninstalled( |
| extension.get(), extensions::UNINSTALL_REASON_COMPONENT_REMOVED); |
| } |
| } |
| |
| void ExtensionService::UnloadAllExtensionsForTest() { |
| UnloadAllExtensionsInternal(); |
| } |
| |
| void ExtensionService::ReloadExtensionsForTest() { |
| // Calling UnloadAllExtensionsForTest here triggers a false-positive presubmit |
| // warning about calling test code in production. |
| UnloadAllExtensionsInternal(); |
| component_loader_->LoadAll(); |
| extensions::InstalledLoader(this).LoadAllExtensions(); |
| // Don't call SetReadyAndNotifyListeners() since tests call this multiple |
| // times. |
| } |
| |
| void ExtensionService::SetReadyAndNotifyListeners() { |
| TRACE_EVENT0("browser,startup", |
| "ExtensionService::SetReadyAndNotifyListeners"); |
| TRACK_SCOPED_REGION( |
| "Startup", "ExtensionService::SetReadyAndNotifyListeners"); |
| SCOPED_UMA_HISTOGRAM_TIMER( |
| "Extensions.ExtensionServiceNotifyReadyListenersTime"); |
| |
| ready_->Signal(); |
| content::NotificationService::current()->Notify( |
| extensions::NOTIFICATION_EXTENSIONS_READY_DEPRECATED, |
| content::Source<Profile>(profile_), |
| content::NotificationService::NoDetails()); |
| } |
| |
| void ExtensionService::OnLoadedInstalledExtensions() { |
| if (updater_) |
| updater_->Start(); |
| |
| OnBlacklistUpdated(); |
| } |
| |
| void ExtensionService::AddExtension(const Extension* extension) { |
| // TODO(jstritar): We may be able to get rid of this branch by overriding the |
| // default extension state to DISABLED when the --disable-extensions flag |
| // is set (http://crbug.com/29067). |
| if (!extensions_enabled() && |
| !extension->is_theme() && |
| extension->location() != Manifest::COMPONENT && |
| !Manifest::IsExternalLocation(extension->location())) { |
| return; |
| } |
| |
| bool is_extension_upgrade = false; |
| bool is_extension_installed = false; |
| const Extension* old = GetInstalledExtension(extension->id()); |
| if (old) { |
| is_extension_installed = true; |
| int version_compare_result = |
| extension->version()->CompareTo(*(old->version())); |
| is_extension_upgrade = version_compare_result > 0; |
| // Other than for unpacked extensions, CrxInstaller should have guaranteed |
| // that we aren't downgrading. |
| if (!Manifest::IsUnpackedLocation(extension->location())) |
| CHECK_GE(version_compare_result, 0); |
| } |
| // If the extension was disabled for a reload, then enable it. |
| bool reloading = reloading_extensions_.erase(extension->id()) > 0; |
| |
| // Set the upgraded bit; we consider reloads upgrades. |
| system_->runtime_data()->SetBeingUpgraded(extension->id(), |
| is_extension_upgrade || reloading); |
| |
| // The extension is now loaded, remove its data from unloaded extension map. |
| unloaded_extension_paths_.erase(extension->id()); |
| |
| // If a terminated extension is loaded, remove it from the terminated list. |
| UntrackTerminatedExtension(extension->id()); |
| |
| // Check if the extension's privileges have changed and mark the |
| // extension disabled if necessary. |
| CheckPermissionsIncrease(extension, is_extension_installed); |
| |
| if (is_extension_installed && !reloading) { |
| // To upgrade an extension in place, unload the old one and then load the |
| // new one. ReloadExtension disables the extension, which is sufficient. |
| UnloadExtension(extension->id(), UnloadedExtensionInfo::REASON_UPDATE); |
| } |
| |
| if (extension_prefs_->IsExtensionBlacklisted(extension->id())) { |
| // Only prefs is checked for the blacklist. We rely on callers to check the |
| // blacklist before calling into here, e.g. CrxInstaller checks before |
| // installation then threads through the install and pending install flow |
| // of this class, and we check when loading installed extensions. |
| registry_->AddBlacklisted(extension); |
| } else if (block_extensions_ && CanBlockExtension(extension)) { |
| registry_->AddBlocked(extension); |
| } else if (!reloading && |
| extension_prefs_->IsExtensionDisabled(extension->id())) { |
| registry_->AddDisabled(extension); |
| content::NotificationService::current()->Notify( |
| extensions::NOTIFICATION_EXTENSION_UPDATE_DISABLED, |
| content::Source<Profile>(profile_), |
| content::Details<const Extension>(extension)); |
| |
| // Show the extension disabled error if a permissions increase or a remote |
| // installation is the reason it was disabled, and no other reasons exist. |
| int reasons = extension_prefs_->GetDisableReasons(extension->id()); |
| const int kReasonMask = Extension::DISABLE_PERMISSIONS_INCREASE | |
| Extension::DISABLE_REMOTE_INSTALL; |
| if (reasons & kReasonMask && !(reasons & ~kReasonMask)) { |
| extensions::AddExtensionDisabledError( |
| this, |
| extension, |
| extension_prefs_->HasDisableReason( |
| extension->id(), Extension::DISABLE_REMOTE_INSTALL)); |
| } |
| } else if (reloading) { |
| // Replace the old extension with the new version. |
| CHECK(!registry_->AddDisabled(extension)); |
| EnableExtension(extension->id()); |
| } else { |
| // All apps that are displayed in the launcher are ordered by their ordinals |
| // so we must ensure they have valid ordinals. |
| if (extension->RequiresSortOrdinal()) { |
| AppSorting* app_sorting = |
| extensions::ExtensionSystem::Get(GetBrowserContext())->app_sorting(); |
| app_sorting->SetExtensionVisible( |
| extension->id(), |
| extension->ShouldDisplayInNewTabPage()); |
| app_sorting->EnsureValidOrdinals(extension->id(), |
| syncer::StringOrdinal()); |
| } |
| |
| registry_->AddEnabled(extension); |
| NotifyExtensionLoaded(extension); |
| } |
| system_->runtime_data()->SetBeingUpgraded(extension->id(), false); |
| } |
| |
| void ExtensionService::AddComponentExtension(const Extension* extension) { |
| const std::string old_version_string( |
| extension_prefs_->GetVersionString(extension->id())); |
| const Version old_version(old_version_string); |
| |
| VLOG(1) << "AddComponentExtension " << extension->name(); |
| if (!old_version.IsValid() || old_version != *extension->version()) { |
| VLOG(1) << "Component extension " << extension->name() << " (" |
| << extension->id() << ") installing/upgrading from '" |
| << old_version_string << "' to " << extension->version()->GetString(); |
| |
| AddNewOrUpdatedExtension(extension, |
| Extension::ENABLED, |
| extensions::kInstallFlagNone, |
| syncer::StringOrdinal(), |
| std::string()); |
| return; |
| } |
| |
| AddExtension(extension); |
| } |
| |
| void ExtensionService::CheckPermissionsIncrease(const Extension* extension, |
| bool is_extension_installed) { |
| extensions::PermissionsUpdater(profile_).InitializePermissions(extension); |
| |
| // We keep track of all permissions the user has granted each extension. |
| // This allows extensions to gracefully support backwards compatibility |
| // by including unknown permissions in their manifests. When the user |
| // installs the extension, only the recognized permissions are recorded. |
| // When the unknown permissions become recognized (e.g., through browser |
| // upgrade), we can prompt the user to accept these new permissions. |
| // Extensions can also silently upgrade to less permissions, and then |
| // silently upgrade to a version that adds these permissions back. |
| // |
| // For example, pretend that Chrome 10 includes a permission "omnibox" |
| // for an API that adds suggestions to the omnibox. An extension can |
| // maintain backwards compatibility while still having "omnibox" in the |
| // manifest. If a user installs the extension on Chrome 9, the browser |
| // will record the permissions it recognized, not including "omnibox." |
| // When upgrading to Chrome 10, "omnibox" will be recognized and Chrome |
| // will disable the extension and prompt the user to approve the increase |
| // in privileges. The extension could then release a new version that |
| // removes the "omnibox" permission. When the user upgrades, Chrome will |
| // still remember that "omnibox" had been granted, so that if the |
| // extension once again includes "omnibox" in an upgrade, the extension |
| // can upgrade without requiring this user's approval. |
| int disable_reasons = extension_prefs_->GetDisableReasons(extension->id()); |
| |
| // Silently grant all active permissions to default apps and apps installed |
| // in kiosk mode. |
| bool auto_grant_permission = |
| extension->was_installed_by_default() || |
| extensions::ExtensionsBrowserClient::Get()->IsRunningInForcedAppMode(); |
| if (auto_grant_permission) |
| GrantPermissions(extension); |
| |
| bool is_privilege_increase = false; |
| // We only need to compare the granted permissions to the current permissions |
| // if the extension has not been auto-granted its permissions above and is |
| // installed internally. |
| if (extension->location() == Manifest::INTERNAL && !auto_grant_permission) { |
| // Add all the recognized permissions if the granted permissions list |
| // hasn't been initialized yet. |
| std::unique_ptr<const PermissionSet> granted_permissions = |
| extension_prefs_->GetGrantedPermissions(extension->id()); |
| CHECK(granted_permissions.get()); |
| |
| // Here, we check if an extension's privileges have increased in a manner |
| // that requires the user's approval. This could occur because the browser |
| // upgraded and recognized additional privileges, or an extension upgrades |
| // to a version that requires additional privileges. |
| is_privilege_increase = |
| extensions::PermissionMessageProvider::Get()->IsPrivilegeIncrease( |
| *granted_permissions, |
| extension->permissions_data()->active_permissions(), |
| extension->GetType()); |
| } |
| |
| if (is_extension_installed) { |
| // If the extension was already disabled, suppress any alerts for becoming |
| // disabled on permissions increase. |
| bool previously_disabled = |
| extension_prefs_->IsExtensionDisabled(extension->id()); |
| // Legacy disabled extensions do not have a disable reason. Infer that it |
| // was likely disabled by the user. |
| if (previously_disabled && disable_reasons == Extension::DISABLE_NONE) |
| disable_reasons |= Extension::DISABLE_USER_ACTION; |
| |
| // Extensions that came to us disabled from sync need a similar inference, |
| // except based on the new version's permissions. |
| // TODO(treib,devlin): Since M48, DISABLE_UNKNOWN_FROM_SYNC isn't used |
| // anymore; this code is still here to migrate any existing old state. |
| // Remove it after some grace period. |
| if (previously_disabled && |
| (disable_reasons & Extension::DEPRECATED_DISABLE_UNKNOWN_FROM_SYNC)) { |
| // Remove the DISABLE_UNKNOWN_FROM_SYNC reason. |
| disable_reasons &= ~Extension::DEPRECATED_DISABLE_UNKNOWN_FROM_SYNC; |
| extension_prefs_->RemoveDisableReason( |
| extension->id(), Extension::DEPRECATED_DISABLE_UNKNOWN_FROM_SYNC); |
| // If there was no privilege increase, it was likely disabled by the user. |
| if (!is_privilege_increase) |
| disable_reasons |= Extension::DISABLE_USER_ACTION; |
| } |
| } |
| |
| // Extension has changed permissions significantly. Disable it. A |
| // notification should be sent by the caller. If the extension is already |
| // disabled because it was installed remotely, don't add another disable |
| // reason. |
| if (is_privilege_increase && |
| !(disable_reasons & Extension::DISABLE_REMOTE_INSTALL)) { |
| disable_reasons |= Extension::DISABLE_PERMISSIONS_INCREASE; |
| if (!extension_prefs_->DidExtensionEscalatePermissions(extension->id())) |
| RecordPermissionMessagesHistogram(extension, "AutoDisable"); |
| |
| #if defined(ENABLE_SUPERVISED_USERS) |
| // If a custodian-installed extension is disabled for a supervised user due |
| // to a permissions increase, send a request to the custodian if the |
| // supervised user themselves can't re-enable the extension. |
| if (extensions::util::IsExtensionSupervised(extension, profile_) && |
| extensions::util::NeedCustodianApprovalForPermissionIncrease( |
| profile_) && |
| !ExtensionSyncService::Get(profile_)->HasPendingReenable( |
| extension->id(), *extension->version())) { |
| SupervisedUserService* supervised_user_service = |
| SupervisedUserServiceFactory::GetForProfile(profile_); |
| supervised_user_service->AddExtensionUpdateRequest(extension->id(), |
| *extension->version()); |
| } |
| #endif |
| } |
| if (disable_reasons != Extension::DISABLE_NONE) |
| extension_prefs_->SetExtensionDisabled(extension->id(), disable_reasons); |
| } |
| |
| void ExtensionService::UpdateActiveExtensionsInCrashReporter() { |
| std::set<std::string> extension_ids; |
| for (const auto& extension : registry_->enabled_extensions()) { |
| if (!extension->is_theme() && extension->location() != Manifest::COMPONENT) |
| extension_ids.insert(extension->id()); |
| } |
| |
| // TODO(kalman): This is broken. ExtensionService is per-profile. |
| // crash_keys::SetActiveExtensions is per-process. See |
| // http://crbug.com/355029. |
| crash_keys::SetActiveExtensions(extension_ids); |
| } |
| |
| void ExtensionService::OnExtensionInstalled( |
| const Extension* extension, |
| const syncer::StringOrdinal& page_ordinal, |
| int install_flags) { |
| CHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
| |
| const std::string& id = extension->id(); |
| int disable_reasons = GetDisableReasonsOnInstalled(extension); |
| std::string install_parameter; |
| const extensions::PendingExtensionInfo* pending_extension_info = |
| pending_extension_manager()->GetById(id); |
| if (pending_extension_info) { |
| if (!pending_extension_info->ShouldAllowInstall(extension)) { |
| // Hack for crbug.com/558299, see comment on DeleteThemeDoNotUse. |
| if (extension->is_theme() && pending_extension_info->is_from_sync()) |
| ExtensionSyncService::Get(profile_)->DeleteThemeDoNotUse(*extension); |
| |
| pending_extension_manager()->Remove(id); |
| |
| LOG(WARNING) << "ShouldAllowInstall() returned false for " |
| << id << " of type " << extension->GetType() |
| << " and update URL " |
| << extensions::ManifestURL::GetUpdateURL(extension).spec() |
| << "; not installing"; |
| |
| // Delete the extension directory since we're not going to |
| // load it. |
| if (!GetFileTaskRunner()->PostTask( |
| FROM_HERE, |
| base::Bind(&extensions::file_util::DeleteFile, |
| extension->path(), |
| true))) { |
| NOTREACHED(); |
| } |
| return; |
| } |
| |
| install_parameter = pending_extension_info->install_parameter(); |
| pending_extension_manager()->Remove(id); |
| } else { |
| // We explicitly want to re-enable an uninstalled external |
| // extension; if we're here, that means the user is manually |
| // installing the extension. |
| if (extension_prefs_->IsExternalExtensionUninstalled(id)) { |
| disable_reasons = Extension::DISABLE_NONE; |
| } |
| } |
| |
| // Unsupported requirements overrides the management policy. |
| if (install_flags & extensions::kInstallFlagHasRequirementErrors) { |
| disable_reasons |= Extension::DISABLE_UNSUPPORTED_REQUIREMENT; |
| } else { |
| // Requirement is supported now, remove the corresponding disable reason |
| // instead. |
| disable_reasons &= ~Extension::DISABLE_UNSUPPORTED_REQUIREMENT; |
| } |
| |
| // Check if the extension was disabled because of the minimum version |
| // requirements from enterprise policy, and satisfies it now. |
| if (extensions::ExtensionManagementFactory::GetForBrowserContext(profile()) |
| ->CheckMinimumVersion(extension, nullptr)) { |
| // And remove the corresponding disable reason. |
| disable_reasons &= ~Extension::DISABLE_UPDATE_REQUIRED_BY_POLICY; |
| } |
| |
| if (install_flags & extensions::kInstallFlagIsBlacklistedForMalware) { |
| // Installation of a blacklisted extension can happen from sync, policy, |
| // etc, where to maintain consistency we need to install it, just never |
| // load it (see AddExtension). Usually it should be the job of callers to |
| // intercept blacklisted extensions earlier (e.g. CrxInstaller, before even |
| // showing the install dialogue). |
| extension_prefs_->AcknowledgeBlacklistedExtension(id); |
| UMA_HISTOGRAM_ENUMERATION("ExtensionBlacklist.SilentInstall", |
| extension->location(), |
| Manifest::NUM_LOCATIONS); |
| } |
| |
| if (!GetInstalledExtension(extension->id())) { |
| UMA_HISTOGRAM_ENUMERATION("Extensions.InstallType", |
| extension->GetType(), 100); |
| UMA_HISTOGRAM_ENUMERATION("Extensions.InstallSource", |
| extension->location(), Manifest::NUM_LOCATIONS); |
| RecordPermissionMessagesHistogram(extension, "Install"); |
| } else { |
| UMA_HISTOGRAM_ENUMERATION("Extensions.UpdateType", |
| extension->GetType(), 100); |
| UMA_HISTOGRAM_ENUMERATION("Extensions.UpdateSource", |
| extension->location(), Manifest::NUM_LOCATIONS); |
| } |
| |
| const Extension::State initial_state = |
| disable_reasons == Extension::DISABLE_NONE ? Extension::ENABLED |
| : Extension::DISABLED; |
| if (initial_state == Extension::ENABLED) |
| extension_prefs_->SetExtensionEnabled(id); |
| else |
| extension_prefs_->SetExtensionDisabled(id, disable_reasons); |
| |
| extensions::ExtensionPrefs::DelayReason delay_reason; |
| extensions::InstallGate::Action action = ShouldDelayExtensionInstall( |
| extension, !!(install_flags & extensions::kInstallFlagInstallImmediately), |
| &delay_reason); |
| switch (action) { |
| case extensions::InstallGate::INSTALL: |
| AddNewOrUpdatedExtension(extension, initial_state, install_flags, |
| page_ordinal, install_parameter); |
| return; |
| case extensions::InstallGate::DELAY: |
| extension_prefs_->SetDelayedInstallInfo(extension, initial_state, |
| install_flags, delay_reason, |
| page_ordinal, install_parameter); |
| |
| // Transfer ownership of |extension|. |
| delayed_installs_.Insert(extension); |
| |
| if (delay_reason == |
| extensions::ExtensionPrefs::DELAY_REASON_WAIT_FOR_IDLE) { |
| // Notify observers that app update is available. |
| FOR_EACH_OBSERVER(extensions::UpdateObserver, update_observers_, |
| OnAppUpdateAvailable(extension)); |
| } |
| return; |
| case extensions::InstallGate::ABORT: |
| // Do nothing to abort the install. One such case is the shared module |
| // service gets IMPORT_STATUS_UNRECOVERABLE status for the pending |
| // install. |
| return; |
| } |
| |
| NOTREACHED() << "Unknown action for delayed install: " << action; |
| } |
| |
| void ExtensionService::OnExtensionManagementSettingsChanged() { |
| error_controller_->ShowErrorIfNeeded(); |
| |
| // Revokes blocked permissions from active_permissions for all extensions. |
| extensions::ExtensionManagement* settings = |
| extensions::ExtensionManagementFactory::GetForBrowserContext(profile()); |
| CHECK(settings); |
| std::unique_ptr<ExtensionSet> all_extensions( |
| registry_->GenerateInstalledExtensionsSet()); |
| for (const auto& extension : *all_extensions) { |
| if (!settings->IsPermissionSetAllowed( |
| extension.get(), |
| extension->permissions_data()->active_permissions())) { |
| extensions::PermissionsUpdater(profile()).RemovePermissionsUnsafe( |
| extension.get(), *settings->GetBlockedPermissions(extension.get())); |
| } |
| } |
| |
| CheckManagementPolicy(); |
| } |
| |
| void ExtensionService::AddNewOrUpdatedExtension( |
| const Extension* extension, |
| Extension::State initial_state, |
| int install_flags, |
| const syncer::StringOrdinal& page_ordinal, |
| const std::string& install_parameter) { |
| CHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
| extension_prefs_->OnExtensionInstalled( |
| extension, initial_state, page_ordinal, install_flags, install_parameter); |
| delayed_installs_.Remove(extension->id()); |
| if (InstallVerifier::NeedsVerification(*extension)) |
| InstallVerifier::Get(GetBrowserContext())->VerifyExtension(extension->id()); |
| |
| const Extension* old = GetInstalledExtension(extension->id()); |
| if (extensions::AppDataMigrator::NeedsMigration(old, extension)) { |
| app_data_migrator_->DoMigrationAndReply( |
| old, extension, base::Bind(&ExtensionService::FinishInstallation, |
| AsWeakPtr(), base::RetainedRef(extension))); |
| return; |
| } |
| |
| FinishInstallation(extension); |
| } |
| |
| void ExtensionService::MaybeFinishDelayedInstallation( |
| const std::string& extension_id) { |
| // Check if the extension already got installed. |
| const Extension* extension = delayed_installs_.GetByID(extension_id); |
| if (!extension) |
| return; |
| |
| extensions::ExtensionPrefs::DelayReason reason; |
| const extensions::InstallGate::Action action = ShouldDelayExtensionInstall( |
| extension, false /* install_immediately*/, &reason); |
| switch (action) { |
| case extensions::InstallGate::INSTALL: |
| break; |
| case extensions::InstallGate::DELAY: |
| // Bail out and continue to delay the install. |
| return; |
| case extensions::InstallGate::ABORT: |
| delayed_installs_.Remove(extension_id); |
| // Make sure no version of the extension is actually installed, (i.e., |
| // that this delayed install was not an update). |
| CHECK(!extension_prefs_->GetInstalledExtensionInfo(extension_id).get()); |
| extension_prefs_->DeleteExtensionPrefs(extension_id); |
| return; |
| } |
| |
| FinishDelayedInstallation(extension_id); |
| } |
| |
| void ExtensionService::FinishDelayedInstallation( |
| const std::string& extension_id) { |
| scoped_refptr<const Extension> extension( |
| GetPendingExtensionUpdate(extension_id)); |
| CHECK(extension.get()); |
| delayed_installs_.Remove(extension_id); |
| |
| if (!extension_prefs_->FinishDelayedInstallInfo(extension_id)) |
| NOTREACHED(); |
| |
| FinishInstallation(extension.get()); |
| } |
| |
| void ExtensionService::FinishInstallation( |
| const Extension* extension) { |
| const extensions::Extension* existing_extension = |
| GetInstalledExtension(extension->id()); |
| bool is_update = false; |
| std::string old_name; |
| if (existing_extension) { |
| is_update = true; |
| old_name = existing_extension->name(); |
| } |
| registry_->TriggerOnWillBeInstalled( |
| extension, is_update, old_name); |
| |
| // Unpacked extensions default to allowing file access, but if that has been |
| // overridden, don't reset the value. |
| if (Manifest::ShouldAlwaysAllowFileAccess(extension->location()) && |
| !extension_prefs_->HasAllowFileAccessSetting(extension->id())) { |
| extension_prefs_->SetAllowFileAccess(extension->id(), true); |
| } |
| |
| AddExtension(extension); |
| |
| // Notify observers that need to know when an installation is complete. |
| registry_->TriggerOnInstalled(extension, is_update); |
| |
| // Check extensions that may have been delayed only because this shared module |
| // was not available. |
| if (SharedModuleInfo::IsSharedModule(extension)) |
| MaybeFinishDelayedInstallations(); |
| } |
| |
| const Extension* ExtensionService::GetPendingExtensionUpdate( |
| const std::string& id) const { |
| return delayed_installs_.GetByID(id); |
| } |
| |
| void ExtensionService::RegisterContentSettings( |
| HostContentSettingsMap* host_content_settings_map) { |
| TRACE_EVENT0("browser,startup", "ExtensionService::RegisterContentSettings"); |
| DCHECK_CURRENTLY_ON(BrowserThread::UI); |
| host_content_settings_map->RegisterProvider( |
| HostContentSettingsMap::INTERNAL_EXTENSION_PROVIDER, |
| std::unique_ptr<content_settings::ObservableProvider>( |
| new content_settings::InternalExtensionProvider(profile_))); |
| |
| host_content_settings_map->RegisterProvider( |
| HostContentSettingsMap::CUSTOM_EXTENSION_PROVIDER, |
| std::unique_ptr<content_settings::ObservableProvider>( |
| new content_settings::CustomExtensionProvider( |
| extensions::ContentSettingsService::Get(profile_) |
| ->content_settings_store(), |
| profile_->GetOriginalProfile() != profile_))); |
| } |
| |
| void ExtensionService::TrackTerminatedExtension( |
| const std::string& extension_id) { |
| extensions_being_terminated_.erase(extension_id); |
| |
| const Extension* extension = GetInstalledExtension(extension_id); |
| if (!extension) { |
| return; |
| } |
| |
| // No need to check for duplicates; inserting a duplicate is a no-op. |
| registry_->AddTerminated(make_scoped_refptr(extension)); |
| UnloadExtension(extension->id(), UnloadedExtensionInfo::REASON_TERMINATE); |
| } |
| |
| void ExtensionService::TerminateExtension(const std::string& extension_id) { |
| TrackTerminatedExtension(extension_id); |
| } |
| |
| void ExtensionService::UntrackTerminatedExtension(const std::string& id) { |
| std::string lowercase_id = base::ToLowerASCII(id); |
| const Extension* extension = |
| registry_->terminated_extensions().GetByID(lowercase_id); |
| registry_->RemoveTerminated(lowercase_id); |
| if (extension) { |
| content::NotificationService::current()->Notify( |
| extensions::NOTIFICATION_EXTENSION_REMOVED, |
| content::Source<Profile>(profile_), |
| content::Details<const Extension>(extension)); |
| } |
| } |
| |
| const Extension* ExtensionService::GetInstalledExtension( |
| const std::string& id) const { |
| return registry_->GetExtensionById(id, ExtensionRegistry::EVERYTHING); |
| } |
| |
| bool ExtensionService::OnExternalExtensionFileFound( |
| const ExternalInstallInfoFile& info) { |
| CHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
| CHECK(crx_file::id_util::IdIsValid(info.extension_id)); |
| if (extension_prefs_->IsExternalExtensionUninstalled(info.extension_id)) |
| return false; |
| |
| // Before even bothering to unpack, check and see if we already have this |
| // version. This is important because these extensions are going to get |
| // installed on every startup. |
| const Extension* existing = GetExtensionById(info.extension_id, true); |
| |
| if (existing) { |
| // The default apps will have the location set as INTERNAL. Since older |
| // default apps are installed as EXTERNAL, we override them. However, if the |
| // app is already installed as internal, then do the version check. |
| // TODO(grv) : Remove after Q1-2013. |
| bool is_default_apps_migration = |
| (info.crx_location == Manifest::INTERNAL && |
| Manifest::IsExternalLocation(existing->location())); |
| |
| if (!is_default_apps_migration) { |
| DCHECK(info.version.get()); |
| |
| switch (existing->version()->CompareTo(*info.version)) { |
| case -1: // existing version is older, we should upgrade |
| break; |
| case 0: // existing version is same, do nothing |
| return false; |
| case 1: // existing version is newer, uh-oh |
| LOG(WARNING) << "Found external version of extension " |
| << info.extension_id |
| << "that is older than current version. Current version " |
| << "is: " << existing->VersionString() << ". New " |
| << "version is: " << info.version->GetString() |
| << ". Keeping current version."; |
| return false; |
| } |
| } |
| } |
| |
| // If the extension is already pending, don't start an install. |
| if (!pending_extension_manager()->AddFromExternalFile( |
| info.extension_id, info.crx_location, *info.version, |
| info.creation_flags, info.mark_acknowledged)) { |
| return false; |
| } |
| |
| // no client (silent install) |
| scoped_refptr<CrxInstaller> installer(CrxInstaller::CreateSilent(this)); |
| installer->set_install_source(info.crx_location); |
| installer->set_expected_id(info.extension_id); |
| installer->set_expected_version(*info.version, |
| true /* fail_install_if_unexpected */); |
| installer->set_install_cause(extension_misc::INSTALL_CAUSE_EXTERNAL_FILE); |
| installer->set_install_immediately(info.install_immediately); |
| installer->set_creation_flags(info.creation_flags); |
| #if defined(OS_CHROMEOS) |
| extensions::InstallLimiter::Get(profile_)->Add(installer, info.path); |
| #else |
| installer->InstallCrx(info.path); |
| #endif |
| |
| // Depending on the source, a new external extension might not need a user |
| // notification on installation. For such extensions, mark them acknowledged |
| // now to suppress the notification. |
| if (info.mark_acknowledged) |
| external_install_manager_->AcknowledgeExternalExtension(info.extension_id); |
| |
| return true; |
| } |
| |
| void ExtensionService::DidCreateRenderViewForBackgroundPage( |
| extensions::ExtensionHost* host) { |
| OrphanedDevTools::iterator iter = |
| orphaned_dev_tools_.find(host->extension_id()); |
| if (iter == orphaned_dev_tools_.end()) |
| return; |
| |
| // Keepalive count is reset on extension reload. This re-establishes the |
| // keepalive that was added when the DevTools agent was initially attached. |
| extensions::ProcessManager::Get(profile_)->IncrementLazyKeepaliveCount( |
| host->extension()); |
| iter->second->ConnectWebContents(host->host_contents()); |
| orphaned_dev_tools_.erase(iter); |
| } |
| |
| void ExtensionService::Observe(int type, |
| const content::NotificationSource& source, |
| const content::NotificationDetails& details) { |
| switch (type) { |
| case chrome::NOTIFICATION_APP_TERMINATING: |
| // Shutdown has started. Don't start any more extension installs. |
| // (We cannot use ExtensionService::Shutdown() for this because it |
| // happens too late in browser teardown.) |
| browser_terminating_ = true; |
| break; |
| case extensions::NOTIFICATION_EXTENSION_PROCESS_TERMINATED: { |
| if (profile_ != |
| content::Source<Profile>(source).ptr()->GetOriginalProfile()) { |
| break; |
| } |
| |
| extensions::ExtensionHost* host = |
| content::Details<extensions::ExtensionHost>(details).ptr(); |
| |
| // If the extension is already being terminated, there is nothing left to |
| // do. |
| if (!extensions_being_terminated_.insert(host->extension_id()).second) |
| break; |
| |
| // Mark the extension as terminated and Unload it. We want it to |
| // be in a consistent state: either fully working or not loaded |
| // at all, but never half-crashed. We do it in a PostTask so |
| // that other handlers of this notification will still have |
| // access to the Extension and ExtensionHost. |
| base::ThreadTaskRunnerHandle::Get()->PostTask( |
| FROM_HERE, base::Bind(&ExtensionService::TrackTerminatedExtension, |
| AsWeakPtr(), host->extension()->id())); |
| break; |
| } |
| case content::NOTIFICATION_RENDERER_PROCESS_TERMINATED: { |
| content::RenderProcessHost* process = |
| content::Source<content::RenderProcessHost>(source).ptr(); |
| Profile* host_profile = |
| Profile::FromBrowserContext(process->GetBrowserContext()); |
| if (!profile_->IsSameProfile(host_profile->GetOriginalProfile())) |
| break; |
| |
| extensions::ProcessMap* process_map = |
| extensions::ProcessMap::Get(profile_); |
| if (process_map->Contains(process->GetID())) { |
| // An extension process was terminated, this might have resulted in an |
| // app or extension becoming idle. |
| std::set<std::string> extension_ids = |
| process_map->GetExtensionsInProcess(process->GetID()); |
| // In addition to the extensions listed in the process map, one of those |
| // extensions could be referencing a shared module which is waiting for |
| // idle to update. Check all imports of these extensions, too. |
| std::set<std::string> import_ids; |
| for (std::set<std::string>::const_iterator it = extension_ids.begin(); |
| it != extension_ids.end(); |
| ++it) { |
| const Extension* extension = GetExtensionById(*it, true); |
| if (!extension) |
| continue; |
| const std::vector<SharedModuleInfo::ImportInfo>& imports = |
| SharedModuleInfo::GetImports(extension); |
| std::vector<SharedModuleInfo::ImportInfo>::const_iterator import_it; |
| for (import_it = imports.begin(); import_it != imports.end(); |
| import_it++) { |
| import_ids.insert((*import_it).extension_id); |
| } |
| } |
| extension_ids.insert(import_ids.begin(), import_ids.end()); |
| |
| for (std::set<std::string>::const_iterator it = extension_ids.begin(); |
| it != extension_ids.end(); ++it) { |
| if (delayed_installs_.Contains(*it)) { |
| base::ThreadTaskRunnerHandle::Get()->PostDelayedTask( |
| FROM_HERE, |
| base::Bind(&ExtensionService::MaybeFinishDelayedInstallation, |
| AsWeakPtr(), *it), |
| base::TimeDelta::FromSeconds(kUpdateIdleDelay)); |
| } |
| } |
| } |
| |
| process_map->RemoveAllFromProcess(process->GetID()); |
| BrowserThread::PostTask( |
| BrowserThread::IO, |
| FROM_HERE, |
| base::Bind(&extensions::InfoMap::UnregisterAllExtensionsInProcess, |
| system_->info_map(), |
| process->GetID())); |
| break; |
| } |
| case chrome::NOTIFICATION_UPGRADE_RECOMMENDED: { |
| // Notify observers that chrome update is available. |
| FOR_EACH_OBSERVER(extensions::UpdateObserver, update_observers_, |
| OnChromeUpdateAvailable()); |
| break; |
| } |
| case chrome::NOTIFICATION_PROFILE_DESTRUCTION_STARTED: { |
| OnProfileDestructionStarted(); |
| break; |
| } |
| |
| default: |
| NOTREACHED() << "Unexpected notification type."; |
| } |
| } |
| |
| int ExtensionService::GetDisableReasonsOnInstalled(const Extension* extension) { |
| Extension::DisableReason disable_reason; |
| // Extensions disabled by management policy should always be disabled, even |
| // if it's force-installed. |
| if (system_->management_policy()->MustRemainDisabled( |
| extension, &disable_reason, nullptr)) { |
| // A specified reason is required to disable the extension. |
| DCHECK(disable_reason != Extension::DISABLE_NONE); |
| return disable_reason; |
| } |
| |
| // Extensions installed by policy can't be disabled. So even if a previous |
| // installation disabled the extension, make sure it is now enabled. |
| if (system_->management_policy()->MustRemainEnabled(extension, nullptr)) |
| return Extension::DISABLE_NONE; |
| |
| // An already disabled extension should inherit the disable reasons and |
| // remain disabled. |
| if (extension_prefs_->IsExtensionDisabled(extension->id())) { |
| int disable_reasons = extension_prefs_->GetDisableReasons(extension->id()); |
| // If an extension was disabled without specified reason, presume it's |
| // disabled by user. |
| return disable_reasons == Extension::DISABLE_NONE |
| ? Extension::DISABLE_USER_ACTION |
| : disable_reasons; |
| } |
| |
| if (FeatureSwitch::prompt_for_external_extensions()->IsEnabled()) { |
| // External extensions are initially disabled. We prompt the user before |
| // enabling them. Hosted apps are excepted because they are not dangerous |
| // (they need to be launched by the user anyway). |
| if (extension->GetType() != Manifest::TYPE_HOSTED_APP && |
| Manifest::IsExternalLocation(extension->location()) && |
| !extension_prefs_->IsExternalExtensionAcknowledged(extension->id())) { |
| return Extension::DISABLE_EXTERNAL_EXTENSION; |
| } |
| } |
| |
| return Extension::DISABLE_NONE; |
| } |
| |
| // Helper method to determine if an extension can be blocked. |
| bool ExtensionService::CanBlockExtension(const Extension* extension) const { |
| DCHECK(extension); |
| return extension->location() != Manifest::COMPONENT && |
| extension->location() != Manifest::EXTERNAL_COMPONENT && |
| !system_->management_policy()->MustRemainEnabled(extension, nullptr); |
| } |
| |
| extensions::InstallGate::Action ExtensionService::ShouldDelayExtensionInstall( |
| const extensions::Extension* extension, |
| bool install_immediately, |
| extensions::ExtensionPrefs::DelayReason* reason) const { |
| for (const auto& entry : install_delayer_registry_) { |
| extensions::InstallGate* const delayer = entry.second; |
| extensions::InstallGate::Action action = |
| delayer->ShouldDelay(extension, install_immediately); |
| if (action != extensions::InstallGate::INSTALL) { |
| *reason = entry.first; |
| return action; |
| } |
| } |
| |
| return extensions::InstallGate::INSTALL; |
| } |
| |
| void ExtensionService::MaybeFinishDelayedInstallations() { |
| std::vector<std::string> to_be_installed; |
| for (const auto& extension : delayed_installs_) { |
| to_be_installed.push_back(extension->id()); |
| } |
| for (const auto& extension_id : to_be_installed) { |
| MaybeFinishDelayedInstallation(extension_id); |
| } |
| } |
| |
| void ExtensionService::OnBlacklistUpdated() { |
| blacklist_->GetBlacklistedIDs( |
| registry_->GenerateInstalledExtensionsSet()->GetIDs(), |
| base::Bind(&ExtensionService::ManageBlacklist, AsWeakPtr())); |
| } |
| |
| void ExtensionService::ManageBlacklist( |
| const extensions::Blacklist::BlacklistStateMap& state_map) { |
| DCHECK_CURRENTLY_ON(BrowserThread::UI); |
| |
| std::set<std::string> blacklisted; |
| ExtensionIdSet greylist; |
| ExtensionIdSet unchanged; |
| for (const auto& it : state_map) { |
| switch (it.second) { |
| case extensions::NOT_BLACKLISTED: |
| break; |
| |
| case extensions::BLACKLISTED_MALWARE: |
| blacklisted.insert(it.first); |
| break; |
| |
| case extensions::BLACKLISTED_SECURITY_VULNERABILITY: |
| case extensions::BLACKLISTED_CWS_POLICY_VIOLATION: |
| case extensions::BLACKLISTED_POTENTIALLY_UNWANTED: |
| greylist.insert(it.first); |
| break; |
| |
| case extensions::BLACKLISTED_UNKNOWN: |
| unchanged.insert(it.first); |
| break; |
| } |
| } |
| |
| UpdateBlacklistedExtensions(blacklisted, unchanged); |
| UpdateGreylistedExtensions(greylist, unchanged, state_map); |
| |
| error_controller_->ShowErrorIfNeeded(); |
| } |
| |
| namespace { |
| void Partition(const ExtensionIdSet& before, |
| const ExtensionIdSet& after, |
| const ExtensionIdSet& unchanged, |
| ExtensionIdSet* no_longer, |
| ExtensionIdSet* not_yet) { |
| *not_yet = base::STLSetDifference<ExtensionIdSet>(after, before); |
| *no_longer = base::STLSetDifference<ExtensionIdSet>(before, after); |
| *no_longer = base::STLSetDifference<ExtensionIdSet>(*no_longer, unchanged); |
| } |
| } // namespace |
| |
| void ExtensionService::UpdateBlacklistedExtensions( |
| const ExtensionIdSet& blacklisted, |
| const ExtensionIdSet& unchanged) { |
| ExtensionIdSet not_yet_blocked, no_longer_blocked; |
| Partition(registry_->blacklisted_extensions().GetIDs(), blacklisted, |
| unchanged, &no_longer_blocked, ¬_yet_blocked); |
| |
| for (ExtensionIdSet::iterator it = no_longer_blocked.begin(); |
| it != no_longer_blocked.end(); ++it) { |
| scoped_refptr<const Extension> extension = |
| registry_->blacklisted_extensions().GetByID(*it); |
| if (!extension.get()) { |
| NOTREACHED() << "Extension " << *it << " no longer blacklisted, " |
| << "but it was never blacklisted."; |
| continue; |
| } |
| registry_->RemoveBlacklisted(*it); |
| extension_prefs_->SetExtensionBlacklisted(extension->id(), false); |
| AddExtension(extension.get()); |
| UMA_HISTOGRAM_ENUMERATION("ExtensionBlacklist.UnblacklistInstalled", |
| extension->location(), |
| Manifest::NUM_LOCATIONS); |
| } |
| |
| for (ExtensionIdSet::iterator it = not_yet_blocked.begin(); |
| it != not_yet_blocked.end(); ++it) { |
| scoped_refptr<const Extension> extension = GetInstalledExtension(*it); |
| if (!extension.get()) { |
| NOTREACHED() << "Extension " << *it << " needs to be " |
| << "blacklisted, but it's not installed."; |
| continue; |
| } |
| registry_->AddBlacklisted(extension); |
| extension_prefs_->SetExtensionBlacklistState( |
| extension->id(), extensions::BLACKLISTED_MALWARE); |
| UnloadExtension(*it, UnloadedExtensionInfo::REASON_BLACKLIST); |
| UMA_HISTOGRAM_ENUMERATION("ExtensionBlacklist.BlacklistInstalled", |
| extension->location(), Manifest::NUM_LOCATIONS); |
| } |
| } |
| |
| // TODO(oleg): UMA logging |
| void ExtensionService::UpdateGreylistedExtensions( |
| const ExtensionIdSet& greylist, |
| const ExtensionIdSet& unchanged, |
| const extensions::Blacklist::BlacklistStateMap& state_map) { |
| ExtensionIdSet not_yet_greylisted, no_longer_greylisted; |
| Partition(greylist_.GetIDs(), |
| greylist, unchanged, |
| &no_longer_greylisted, ¬_yet_greylisted); |
| |
| for (ExtensionIdSet::iterator it = no_longer_greylisted.begin(); |
| it != no_longer_greylisted.end(); ++it) { |
| scoped_refptr<const Extension> extension = greylist_.GetByID(*it); |
| if (!extension.get()) { |
| NOTREACHED() << "Extension " << *it << " no longer greylisted, " |
| << "but it was not marked as greylisted."; |
| continue; |
| } |
| |
| greylist_.Remove(*it); |
| extension_prefs_->SetExtensionBlacklistState(extension->id(), |
| extensions::NOT_BLACKLISTED); |
| if (extension_prefs_->GetDisableReasons(extension->id()) & |
| extensions::Extension::DISABLE_GREYLIST) |
| EnableExtension(*it); |
| } |
| |
| for (ExtensionIdSet::iterator it = not_yet_greylisted.begin(); |
| it != not_yet_greylisted.end(); ++it) { |
| scoped_refptr<const Extension> extension = GetInstalledExtension(*it); |
| if (!extension.get()) { |
| NOTREACHED() << "Extension " << *it << " needs to be " |
| << "disabled, but it's not installed."; |
| continue; |
| } |
| greylist_.Insert(extension); |
| extension_prefs_->SetExtensionBlacklistState(extension->id(), |
| state_map.find(*it)->second); |
| if (registry_->enabled_extensions().Contains(extension->id())) |
| DisableExtension(*it, extensions::Extension::DISABLE_GREYLIST); |
| } |
| } |
| |
| void ExtensionService::AddUpdateObserver(extensions::UpdateObserver* observer) { |
| update_observers_.AddObserver(observer); |
| } |
| |
| void ExtensionService::RemoveUpdateObserver( |
| extensions::UpdateObserver* observer) { |
| update_observers_.RemoveObserver(observer); |
| } |
| |
| void ExtensionService::RegisterInstallGate( |
| extensions::ExtensionPrefs::DelayReason reason, |
| extensions::InstallGate* install_delayer) { |
| DCHECK(install_delayer_registry_.end() == |
| install_delayer_registry_.find(reason)); |
| install_delayer_registry_[reason] = install_delayer; |
| } |
| |
| void ExtensionService::UnregisterInstallGate( |
| extensions::InstallGate* install_delayer) { |
| for (auto it = install_delayer_registry_.begin(); |
| it != install_delayer_registry_.end(); ++it) { |
| if (it->second == install_delayer) { |
| install_delayer_registry_.erase(it); |
| return; |
| } |
| } |
| } |
| |
| // Used only by test code. |
| void ExtensionService::UnloadAllExtensionsInternal() { |
| profile_->GetExtensionSpecialStoragePolicy()->RevokeRightsForAllExtensions(); |
| |
| registry_->ClearAll(); |
| system_->runtime_data()->ClearAll(); |
| |
| // TODO(erikkay) should there be a notification for this? We can't use |
| // EXTENSION_UNLOADED since that implies that the extension has been disabled |
| // or uninstalled. |
| } |
| |
| void ExtensionService::OnProfileDestructionStarted() { |
| ExtensionIdSet ids_to_unload = registry_->enabled_extensions().GetIDs(); |
| for (ExtensionIdSet::iterator it = ids_to_unload.begin(); |
| it != ids_to_unload.end(); |
| ++it) { |
| UnloadExtension(*it, UnloadedExtensionInfo::REASON_PROFILE_SHUTDOWN); |
| } |
| } |