blob: 6c815bb1fc5563dfe38d4e3e77f1cca55a3af74a [file] [log] [blame]
// Copyright 2015 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef CHROME_BROWSER_EXTENSIONS_CHROME_CONTENT_VERIFIER_DELEGATE_H_
#define CHROME_BROWSER_EXTENSIONS_CHROME_CONTENT_VERIFIER_DELEGATE_H_
#include "base/macros.h"
#include "extensions/browser/content_verifier_delegate.h"
namespace content {
class BrowserContext;
}
namespace extensions {
class ChromeContentVerifierDelegate : public ContentVerifierDelegate {
public:
static Mode GetDefaultMode();
explicit ChromeContentVerifierDelegate(content::BrowserContext* context);
~ChromeContentVerifierDelegate() override;
// ContentVerifierDelegate:
Mode ShouldBeVerified(const Extension& extension) override;
ContentVerifierKey GetPublicKey() override;
GURL GetSignatureFetchUrl(const std::string& extension_id,
const base::Version& version) override;
std::set<base::FilePath> GetBrowserImagePaths(
const extensions::Extension* extension) override;
void VerifyFailed(const std::string& extension_id,
ContentVerifyJob::FailureReason reason) override;
private:
void LogFailureForPolicyForceInstall(const std::string& extension_id);
content::BrowserContext* context_;
ContentVerifierDelegate::Mode default_mode_;
// For reporting metrics in BOOTSTRAP mode, when an extension would be
// disabled if content verification was in ENFORCE mode.
std::set<std::string> would_be_disabled_ids_;
// Currently enterprise policy extensions that must remain enabled will not
// be disabled due to content verification failure, but we are considering
// changing this (crbug.com/447040), so for now we are tracking how often
// this happens to help inform the decision.
std::set<std::string> corrupt_policy_extensions_;
DISALLOW_COPY_AND_ASSIGN(ChromeContentVerifierDelegate);
};
} // namespace extensions
#endif // CHROME_BROWSER_EXTENSIONS_CHROME_CONTENT_VERIFIER_DELEGATE_H_