blob: 6f824e60c8b36e6dc476b89668c785f95f35aa4a [file] [log] [blame]
[email protected]eb75f7b2012-01-04 09:07:281// Copyright (c) 2012 The Chromium Authors. All rights reserved.
[email protected]7713d632008-12-02 07:52:332// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
[email protected]5b1a0e22009-05-26 19:00:585#ifndef CHROME_COMMON_EXTENSIONS_EXTENSION_H_
6#define CHROME_COMMON_EXTENSIONS_EXTENSION_H_
[email protected]32b76ef2010-07-26 23:08:247#pragma once
[email protected]7713d632008-12-02 07:52:338
[email protected]8629c542012-04-20 03:40:039#include <algorithm>
[email protected]300cc58db2009-08-19 20:45:1410#include <map>
[email protected]facd7a7652009-06-05 23:15:0211#include <set>
[email protected]7713d632008-12-02 07:52:3312#include <string>
[email protected]58f62cf2012-03-09 10:45:1113#include <utility>
[email protected]7713d632008-12-02 07:52:3314#include <vector>
15
[email protected]6014d672008-12-05 00:38:2516#include "base/file_path.h"
[email protected]19118d52010-07-26 22:13:4217#include "base/gtest_prod_util.h"
[email protected]8f270be2011-12-21 21:15:2218#include "base/hash_tables.h"
[email protected]b6b805e92011-04-16 09:24:1419#include "base/memory/linked_ptr.h"
[email protected]3b63f8f42011-03-28 01:54:1520#include "base/memory/ref_counted.h"
21#include "base/memory/scoped_ptr.h"
[email protected]902fd7b2011-07-27 18:42:3122#include "base/synchronization/lock.h"
[email protected]65907942012-05-22 19:59:4723#include "chrome/common/extensions/command.h"
[email protected]3349b592012-04-26 12:35:2824#include "chrome/common/extensions/extension_action.h"
[email protected]d83a5602010-09-16 00:22:4825#include "chrome/common/extensions/extension_constants.h"
[email protected]807871f2010-09-16 01:04:4826#include "chrome/common/extensions/extension_icon_set.h"
[email protected]0d3e4a22011-06-23 19:02:5227#include "chrome/common/extensions/extension_permission_set.h"
[email protected]42b6f0f82009-09-18 21:07:3928#include "chrome/common/extensions/user_script.h"
[email protected]7197f4992009-03-23 05:05:4929#include "chrome/common/extensions/url_pattern.h"
[email protected]cced75a2011-05-20 08:31:1230#include "chrome/common/extensions/url_pattern_set.h"
[email protected]eab9b452009-01-23 20:48:5931#include "googleurl/src/gurl.h"
[email protected]f5532472012-02-23 13:00:5532#include "ui/base/accelerators/accelerator.h"
[email protected]08397d52011-02-05 01:53:3833#include "ui/gfx/size.h"
[email protected]eab9b452009-01-23 20:48:5934
[email protected]942690b132010-05-11 06:42:1435class ExtensionResource;
[email protected]b6b805e92011-04-16 09:24:1436class FileBrowserHandler;
[email protected]12802702010-07-09 19:43:0937class SkBitmap;
[email protected]daf66aa2010-08-06 06:24:2838class Version;
[email protected]942690b132010-05-11 06:42:1439
[email protected]f3a1c642011-07-12 19:15:0340namespace base {
41class DictionaryValue;
42class ListValue;
43}
44
[email protected]f0cc7242011-12-13 04:26:1745namespace webkit_glue {
46struct WebIntentServiceData;
47}
48
[email protected]1c321ee2012-05-21 03:02:3449FORWARD_DECLARE_TEST(TabStripModelTest, Apps);
50
51namespace extensions {
52
53class Manifest;
54
[email protected]f0755532010-06-22 07:27:2555// Represents a Chrome extension.
[email protected]66e4eb32010-10-27 20:37:4156class Extension : public base::RefCountedThreadSafe<Extension> {
[email protected]7713d632008-12-02 07:52:3357 public:
[email protected]1e0f45a2012-06-13 00:31:0658 struct InstallWarning;
59
[email protected]d3cfa482009-10-17 13:54:5760 typedef std::map<const std::string, GURL> URLOverrideMap;
[email protected]10fb1992010-10-08 09:00:1761 typedef std::vector<std::string> ScriptingWhitelist;
[email protected]b6b805e92011-04-16 09:24:1462 typedef std::vector<linked_ptr<FileBrowserHandler> > FileBrowserHandlerList;
[email protected]1e0f45a2012-06-13 00:31:0663 typedef std::vector<InstallWarning> InstallWarningVector;
[email protected]b24d8312009-08-27 06:47:4664
[email protected]631cf822009-05-15 07:01:2565 // What an extension was loaded from.
[email protected]9b217652010-10-08 22:04:2366 // NOTE: These values are stored as integers in the preferences and used
67 // in histograms so don't remove or reorder existing items. Just append
68 // to the end.
[email protected]631cf822009-05-15 07:01:2569 enum Location {
70 INVALID,
[email protected]25b34332009-06-05 21:53:1971 INTERNAL, // A crx file from the internal Extensions directory.
72 EXTERNAL_PREF, // A crx file from an external directory (via prefs).
73 EXTERNAL_REGISTRY, // A crx file from an external directory (via eg the
74 // registry on Windows).
[email protected]1952c7d2010-03-04 23:48:3475 LOAD, // --load-extension.
[email protected]8ef78fd2010-08-19 17:14:3276 COMPONENT, // An integral component of Chrome itself, which
77 // happens to be implemented as an extension. We don't
78 // show these in the management UI.
[email protected]4d2913e32010-11-30 00:28:5579 EXTERNAL_PREF_DOWNLOAD, // A crx file from an external directory (via
80 // prefs), installed from an update URL.
81 EXTERNAL_POLICY_DOWNLOAD, // A crx file from an external directory (via
82 // admin policies), installed from an update URL.
[email protected]04cb7542010-10-25 10:50:0683
84 NUM_LOCATIONS
[email protected]25b34332009-06-05 21:53:1985 };
86
87 enum State {
[email protected]0c6da502009-08-14 22:32:3988 DISABLED = 0,
[email protected]25b34332009-06-05 21:53:1989 ENABLED,
[email protected]79c833b52011-04-05 18:31:0190 // An external extension that the user uninstalled. We should not reinstall
91 // such extensions on startup.
92 EXTERNAL_EXTENSION_UNINSTALLED,
[email protected]0c6da502009-08-14 22:32:3993 NUM_STATES
[email protected]631cf822009-05-15 07:01:2594 };
[email protected]7713d632008-12-02 07:52:3395
[email protected]44d62b62012-04-11 00:06:0396 // Used to record the reason an extension was disabled.
97 enum DisableReason {
98 DISABLE_UNKNOWN,
99 DISABLE_USER_ACTION,
100 DISABLE_PERMISSIONS_INCREASE,
101 DISABLE_RELOAD,
102 DISABLE_LAST, // Not used.
103 };
104
[email protected]fbcc40302009-06-12 20:45:45105 enum InstallType {
[email protected]ab6f2b22009-07-28 23:28:37106 INSTALL_ERROR,
[email protected]fbcc40302009-06-12 20:45:45107 DOWNGRADE,
108 REINSTALL,
109 UPGRADE,
110 NEW_INSTALL
111 };
112
[email protected]7fa19f82010-12-21 19:40:08113 // Do not change the order of entries or remove entries in this list
114 // as this is used in UMA_HISTOGRAM_ENUMERATIONs about extensions.
115 enum Type {
[email protected]9b217652010-10-08 22:04:23116 TYPE_UNKNOWN = 0,
117 TYPE_EXTENSION,
118 TYPE_THEME,
119 TYPE_USER_SCRIPT,
120 TYPE_HOSTED_APP,
[email protected]7d3ed2f2011-11-07 23:33:19121 TYPE_PACKAGED_APP,
122 TYPE_PLATFORM_APP
[email protected]9b217652010-10-08 22:04:23123 };
124
[email protected]3bdba0d2011-08-23 07:17:30125 enum SyncType {
126 SYNC_TYPE_NONE = 0,
127 SYNC_TYPE_EXTENSION,
128 SYNC_TYPE_APP
129 };
130
[email protected]92888082010-10-18 19:24:57131 // An NPAPI plugin included in the extension.
132 struct PluginInfo {
133 FilePath path; // Path to the plugin.
134 bool is_public; // False if only this extension can load this plugin.
135 };
136
[email protected]65378f52011-04-08 02:31:23137 // An NaCl module included in the extension.
138 struct NaClModuleInfo {
[email protected]84396dbc2011-04-14 06:33:42139 GURL url;
[email protected]65378f52011-04-08 02:31:23140 std::string mime_type;
141 };
142
[email protected]b0820372011-06-03 07:05:27143 enum InputComponentType {
[email protected]d45f7512011-06-21 21:18:27144 INPUT_COMPONENT_TYPE_NONE = -1,
145 INPUT_COMPONENT_TYPE_IME,
[email protected]b0820372011-06-03 07:05:27146 INPUT_COMPONENT_TYPE_COUNT
147 };
148
149 struct InputComponentInfo {
150 // Define out of line constructor/destructor to please Clang.
151 InputComponentInfo();
152 ~InputComponentInfo();
153
154 std::string name;
155 InputComponentType type;
156 std::string id;
157 std::string description;
158 std::string language;
159 std::set<std::string> layouts;
160 std::string shortcut_keycode;
161 bool shortcut_alt;
162 bool shortcut_ctrl;
163 bool shortcut_shift;
164 };
165
[email protected]a4a38c12010-12-23 16:43:56166 struct TtsVoice {
[email protected]77a3ecac2011-07-07 05:56:33167 // Define out of line constructor/destructor to please Clang.
168 TtsVoice();
169 ~TtsVoice();
170
[email protected]a4a38c12010-12-23 16:43:56171 std::string voice_name;
[email protected]c63f2b72011-07-07 05:25:00172 std::string lang;
[email protected]a4a38c12010-12-23 16:43:56173 std::string gender;
[email protected]c63f2b72011-07-07 05:25:00174 std::set<std::string> event_types;
[email protected]a4a38c12010-12-23 16:43:56175 };
176
[email protected]a79be1f2012-03-23 22:14:00177 // OAuth2 info included in the extension.
178 struct OAuth2Info {
179 OAuth2Info();
180 ~OAuth2Info();
181
[email protected]b6f38622012-04-25 03:20:19182 ExtensionOAuth2Scopes GetScopesAsSet();
183
[email protected]a79be1f2012-03-23 22:14:00184 std::string client_id;
185 std::vector<std::string> scopes;
186 };
187
[email protected]1e0f45a2012-06-13 00:31:06188 struct InstallWarning {
189 enum Format {
190 // IMPORTANT: Do not build HTML strings from user or developer-supplied
191 // input.
192 FORMAT_TEXT,
193 FORMAT_HTML,
194 };
195 InstallWarning(Format format, const std::string& message)
196 : format(format), message(message) {
197 }
198 Format format;
199 std::string message;
200 };
201
[email protected]83048a22011-03-29 00:14:13202 enum InitFromValueFlags {
203 NO_FLAGS = 0,
204
205 // Usually, the id of an extension is generated by the "key" property of
206 // its manifest, but if |REQUIRE_KEY| is not set, a temporary ID will be
207 // generated based on the path.
208 REQUIRE_KEY = 1 << 0,
209
[email protected]3f53dfe2011-11-30 01:18:29210 // Requires the extension to have an up-to-date manifest version.
211 // Typically, we'll support multiple manifest versions during a version
212 // transition. This flag signals that we want to require the most modern
213 // manifest version that Chrome understands.
214 REQUIRE_MODERN_MANIFEST_VERSION = 1 << 1,
215
[email protected]3aff9ad2011-04-01 20:26:48216 // |ALLOW_FILE_ACCESS| indicates that the user is allowing this extension
217 // to have file access. If it's not present, then permissions and content
218 // scripts that match file:/// URLs will be filtered out.
[email protected]ed3b9b12012-05-31 18:37:51219 ALLOW_FILE_ACCESS = 1 << 2,
[email protected]620db1762011-07-15 21:57:34220
221 // |FROM_WEBSTORE| indicates that the extension was installed from the
222 // Chrome Web Store.
[email protected]ed3b9b12012-05-31 18:37:51223 FROM_WEBSTORE = 1 << 3,
[email protected]e805baf2011-07-26 18:23:05224
225 // |FROM_BOOKMARK| indicates the extension was created using a mock App
226 // created from a bookmark.
[email protected]ed3b9b12012-05-31 18:37:51227 FROM_BOOKMARK = 1 << 4,
[email protected]3d41d432012-04-20 20:47:58228
229 // |FOLLOW_SYMLINKS_ANYWHERE| means that resources can be symlinks to
230 // anywhere in the filesystem, rather than being restricted to the
231 // extension directory.
[email protected]ed3b9b12012-05-31 18:37:51232 FOLLOW_SYMLINKS_ANYWHERE = 1 << 5,
[email protected]ab55c2b2012-06-01 23:55:03233
234 // |ERROR_ON_PRIVATE_KEY| means that private keys inside an
235 // extension should be errors rather than warnings.
236 ERROR_ON_PRIVATE_KEY = 1 << 6,
[email protected]83048a22011-03-29 00:14:13237 };
238
[email protected]66e4eb32010-10-27 20:37:41239 static scoped_refptr<Extension> Create(const FilePath& path,
240 Location location,
[email protected]f3a1c642011-07-12 19:15:03241 const base::DictionaryValue& value,
[email protected]83048a22011-03-29 00:14:13242 int flags,
[email protected]66e4eb32010-10-27 20:37:41243 std::string* error);
244
[email protected]87c655e2011-07-01 21:42:00245 // In a few special circumstances, we want to create an Extension and give it
[email protected]f5bf1842012-02-15 02:52:26246 // an explicit id. Most consumers should just use the other Create() method.
247 static scoped_refptr<Extension> Create(const FilePath& path,
[email protected]58f62cf2012-03-09 10:45:11248 Location location,
249 const base::DictionaryValue& value,
250 int flags,
251 const std::string& explicit_id,
252 std::string* error);
[email protected]87c655e2011-07-01 21:42:00253
[email protected]145a317b2011-04-12 16:03:46254 // Given two install sources, return the one which should take priority
255 // over the other. If an extension is installed from two sources A and B,
256 // its install source should be set to GetHigherPriorityLocation(A, B).
257 static Location GetHigherPriorityLocation(Location loc1, Location loc2);
258
[email protected]4c4f8192009-10-17 01:03:26259 // Max size (both dimensions) for browser and page actions.
260 static const int kPageActionIconMaxSize;
261 static const int kBrowserActionIconMaxSize;
262
[email protected]8d888c12010-11-30 00:00:25263 // Valid schemes for web extent URLPatterns.
264 static const int kValidWebExtentSchemes;
265
[email protected]f71f7e62010-12-07 03:45:33266 // Valid schemes for host permission URLPatterns.
267 static const int kValidHostPermissionSchemes;
268
[email protected]6014d672008-12-05 00:38:25269 // The name of the manifest inside an extension.
[email protected]99efb7b12009-12-18 02:39:16270 static const FilePath::CharType kManifestFilename[];
[email protected]6014d672008-12-05 00:38:25271
[email protected]300cc58db2009-08-19 20:45:14272 // The name of locale folder inside an extension.
[email protected]99efb7b12009-12-18 02:39:16273 static const FilePath::CharType kLocaleFolder[];
[email protected]300cc58db2009-08-19 20:45:14274
275 // The name of the messages file inside an extension.
[email protected]99efb7b12009-12-18 02:39:16276 static const FilePath::CharType kMessagesFilename[];
[email protected]300cc58db2009-08-19 20:45:14277
[email protected]25b34332009-06-05 21:53:19278#if defined(OS_WIN)
[email protected]9dcf8f12010-09-02 20:39:19279 static const char kExtensionRegistryPath[];
[email protected]25b34332009-06-05 21:53:19280#endif
281
[email protected]37eeb5a2009-02-26 23:36:17282 // The number of bytes in a legal id.
[email protected]fe0e7822009-02-26 23:51:48283 static const size_t kIdSize;
[email protected]37eeb5a2009-02-26 23:36:17284
[email protected]e435d6b72009-07-25 03:15:58285 // The mimetype used for extensions.
286 static const char kMimeType[];
287
[email protected]25b34332009-06-05 21:53:19288 // Checks to see if the extension has a valid ID.
289 static bool IdIsValid(const std::string& id);
290
[email protected]4ead6f72010-10-13 19:54:18291 // Generate an ID for an extension in the given path.
[email protected]28d7479b2011-03-09 21:33:27292 // Used while developing extensions, before they have a key.
[email protected]4ead6f72010-10-13 19:54:18293 static std::string GenerateIdForPath(const FilePath& file_name);
294
[email protected]e435d6b72009-07-25 03:15:58295 // Returns true if the specified file is an extension.
296 static bool IsExtension(const FilePath& file_name);
297
[email protected]25b34332009-06-05 21:53:19298 // Whether the |location| is external or not.
299 static inline bool IsExternalLocation(Location location) {
300 return location == Extension::EXTERNAL_PREF ||
[email protected]8ef78fd2010-08-19 17:14:32301 location == Extension::EXTERNAL_REGISTRY ||
[email protected]04cb7542010-10-25 10:50:06302 location == Extension::EXTERNAL_PREF_DOWNLOAD ||
303 location == Extension::EXTERNAL_POLICY_DOWNLOAD;
304 }
305
306 // Whether extensions with |location| are auto-updatable or not.
307 static inline bool IsAutoUpdateableLocation(Location location) {
308 // Only internal and external extensions can be autoupdated.
309 return location == Extension::INTERNAL ||
310 IsExternalLocation(location);
[email protected]25b34332009-06-05 21:53:19311 }
312
[email protected]65187152012-06-02 13:14:14313 // Policy-required extensions are silently auto-installed and updated, and
314 // cannot be disabled or modified by the user in any way. The same applies
315 // to internal components.
316 // This method is not generally called directly; instead, it is accessed
317 // through the ManagementPolicy held by the ExtensionSystem.
318 static inline bool IsRequired(Location location) {
319 return location == Extension::EXTERNAL_POLICY_DOWNLOAD ||
320 location == Extension::COMPONENT;
[email protected]95da88c42011-03-31 10:07:33321 }
322
[email protected]cdfca9702011-08-08 16:07:01323 // Unpacked extensions start off with file access since they are a developer
324 // feature.
325 static inline bool ShouldAlwaysAllowFileAccess(Location location) {
326 return location == Extension::LOAD;
327 }
328
[email protected]fc6b0612012-03-29 13:40:06329 // Fills the |info| dictionary with basic information about the extension.
330 // |enabled| is injected for easier testing.
331 void GetBasicInfo(bool enabled, base::DictionaryValue* info) const;
332
[email protected]7fa19f82010-12-21 19:40:08333 // See Type definition above.
334 Type GetType() const;
[email protected]9b217652010-10-08 22:04:23335
[email protected]07c00d992009-03-04 20:27:04336 // Returns an absolute url to a resource inside of an extension. The
[email protected]eab9b452009-01-23 20:48:59337 // |extension_url| argument should be the url() from an Extension object. The
338 // |relative_path| can be untrusted user input. The returned URL will either
339 // be invalid() or a child of |extension_url|.
340 // NOTE: Static so that it can be used from multiple threads.
341 static GURL GetResourceURL(const GURL& extension_url,
342 const std::string& relative_path);
[email protected]cffd7892010-08-26 17:43:28343 GURL GetResourceURL(const std::string& relative_path) const {
[email protected]3cfbd0e2009-03-18 21:26:24344 return GetResourceURL(url(), relative_path);
345 }
[email protected]eab9b452009-01-23 20:48:59346
[email protected]8f270be2011-12-21 21:15:22347 // Returns true if the specified resource is web accessible.
348 bool IsResourceWebAccessible(const std::string& relative_path) const;
349
[email protected]dbb24162012-06-06 01:41:22350 // Returns true if the specified page is sandboxed (served in a unique
351 // origin).
352 bool IsSandboxedPage(const std::string& relative_path) const;
353
354 // Returns the Content Security Policy that the specified resource should be
355 // served with.
356 std::string GetResourceContentSecurityPolicy(const std::string& relative_path)
357 const;
358
[email protected]8f270be2011-12-21 21:15:22359 // Returns true when 'web_accessible_resources' are defined for the extension.
360 bool HasWebAccessibleResources() const;
361
[email protected]99efb7b12009-12-18 02:39:16362 // Returns an extension resource object. |relative_path| should be UTF8
363 // encoded.
[email protected]9adb9692010-10-29 23:14:02364 ExtensionResource GetResource(const std::string& relative_path) const;
[email protected]99efb7b12009-12-18 02:39:16365
366 // As above, but with |relative_path| following the file system's encoding.
[email protected]9adb9692010-10-29 23:14:02367 ExtensionResource GetResource(const FilePath& relative_path) const;
[email protected]eab9b452009-01-23 20:48:59368
[email protected]a17f9462009-06-09 02:56:41369 // |input| is expected to be the text of an rsa public or private key. It
370 // tolerates the presence or absence of bracking header/footer like this:
371 // -----(BEGIN|END) [RSA PUBLIC/PRIVATE] KEY-----
372 // and may contain newlines.
373 static bool ParsePEMKeyBytes(const std::string& input, std::string* output);
374
375 // Does a simple base64 encoding of |input| into |output|.
376 static bool ProducePEM(const std::string& input, std::string* output);
377
[email protected]84ac7f32009-10-06 06:17:54378 // Generates an extension ID from arbitrary input. The same input string will
379 // always generate the same output ID.
[email protected]af9db5f2011-10-05 05:13:15380 static bool GenerateId(const std::string& input,
381 std::string* output) WARN_UNUSED_RESULT;
[email protected]fbcc40302009-06-12 20:45:45382
[email protected]a17f9462009-06-09 02:56:41383 // Expects base64 encoded |input| and formats into |output| including
384 // the appropriate header & footer.
[email protected]e0d08192011-03-29 19:02:50385 static bool FormatPEMForFileOutput(const std::string& input,
386 std::string* output,
387 bool is_public);
[email protected]a17f9462009-06-09 02:56:41388
[email protected]58f62cf2012-03-09 10:45:11389 // Given an extension, icon size, and match type, read a valid icon if present
[email protected]e3c0bc22012-02-24 01:34:15390 // and decode it into result. In the browser process, this will DCHECK if not
391 // called on the file thread. To easily load extension images on the UI
392 // thread, see ImageLoadingTracker.
393 static void DecodeIcon(const Extension* extension,
394 ExtensionIconSet::Icons icon_size,
395 ExtensionIconSet::MatchType match_type,
396 scoped_ptr<SkBitmap>* result);
397
[email protected]c690a9812009-12-17 05:55:32398 // Given an extension and icon size, read it if present and decode it into
[email protected]ae2e0f92010-04-06 20:32:23399 // result. In the browser process, this will DCHECK if not called on the
400 // file thread. To easily load extension images on the UI thread, see
401 // ImageLoadingTracker.
[email protected]9adb9692010-10-29 23:14:02402 static void DecodeIcon(const Extension* extension,
[email protected]e3c0bc22012-02-24 01:34:15403 ExtensionIconSet::Icons icon_size,
[email protected]c690a9812009-12-17 05:55:32404 scoped_ptr<SkBitmap>* result);
405
406 // Given an icon_path and icon size, read it if present and decode it into
[email protected]ae2e0f92010-04-06 20:32:23407 // result. In the browser process, this will DCHECK if not called on the
408 // file thread. To easily load extension images on the UI thread, see
409 // ImageLoadingTracker.
[email protected]c690a9812009-12-17 05:55:32410 static void DecodeIconFromPath(const FilePath& icon_path,
[email protected]e3c0bc22012-02-24 01:34:15411 ExtensionIconSet::Icons icon_size,
[email protected]c690a9812009-12-17 05:55:32412 scoped_ptr<SkBitmap>* result);
413
[email protected]5349ac6d2011-04-05 22:20:17414 // Returns the default extension/app icon (for extensions or apps that don't
415 // have one).
416 static const SkBitmap& GetDefaultIcon(bool is_app);
417
[email protected]a807bbe2010-04-14 10:51:19418 // Returns the base extension url for a given |extension_id|.
419 static GURL GetBaseURLFromExtensionId(const std::string& extension_id);
420
[email protected]be7e5cb2010-10-04 12:53:17421 // Adds an extension to the scripting whitelist. Used for testing only.
[email protected]10fb1992010-10-08 09:00:17422 static void SetScriptingWhitelist(const ScriptingWhitelist& whitelist);
[email protected]2a521c52011-01-26 18:45:21423 static const ScriptingWhitelist* GetScriptingWhitelist();
[email protected]be7e5cb2010-10-04 12:53:17424
[email protected]902fd7b2011-07-27 18:42:31425 // Parses the host and api permissions from the specified permission |key|
[email protected]d41e2152012-02-24 04:20:27426 // from |manifest_|.
427 bool ParsePermissions(const char* key,
[email protected]fc670822011-12-17 09:33:49428 string16* error,
[email protected]902fd7b2011-07-27 18:42:31429 ExtensionAPIPermissionSet* api_permissions,
430 URLPatternSet* host_permissions);
431
[email protected]0d3e4a22011-06-23 19:02:52432 bool HasAPIPermission(ExtensionAPIPermission::ID permission) const;
433 bool HasAPIPermission(const std::string& function_name) const;
[email protected]583d45c12010-08-31 02:48:12434
[email protected]0d3e4a22011-06-23 19:02:52435 const URLPatternSet& GetEffectiveHostPermissions() const;
[email protected]b24d8312009-08-27 06:47:46436
[email protected]902fd7b2011-07-27 18:42:31437 // Returns true if the extension can silently increase its permission level.
[email protected]0d904312012-01-25 23:00:16438 // Users must approve permissions for unpacked and packed extensions in the
439 // following situations:
440 // - when installing or upgrading packed extensions
441 // - when installing unpacked extensions that have NPAPI plugins
442 // - when either type of extension requests optional permissions
[email protected]902fd7b2011-07-27 18:42:31443 bool CanSilentlyIncreasePermissions() const;
444
[email protected]584b8e3f2010-04-10 00:23:37445 // Whether the extension has access to the given URL.
446 bool HasHostPermission(const GURL& url) const;
447
[email protected]0df165f2010-09-28 16:49:40448 // Whether the extension has effective access to all hosts. This is true if
449 // there is a content script that matches all hosts, if there is a host
450 // permission grants access to all hosts (like <all_urls>) or an api
451 // permission that effectively grants access to all hosts (e.g. proxy,
452 // network, etc.)
453 bool HasEffectiveAccessToAllHosts() const;
[email protected]b24d8312009-08-27 06:47:46454
[email protected]8d888c12010-11-30 00:00:25455 // Whether the extension effectively has all permissions (for example, by
456 // having an NPAPI plugin).
457 bool HasFullPermissions() const;
458
[email protected]902fd7b2011-07-27 18:42:31459 // Returns the full list of permission messages that this extension
460 // should display at install time.
461 ExtensionPermissionMessages GetPermissionMessages() const;
462
463 // Returns the full list of permission messages that this extension
464 // should display at install time. The messages are returned as strings
465 // for convenience.
466 std::vector<string16> GetPermissionMessageStrings() const;
467
468 // Sets the active |permissions|.
469 void SetActivePermissions(const ExtensionPermissionSet* permissions) const;
470
471 // Gets the extension's active permission set.
472 scoped_refptr<const ExtensionPermissionSet> GetActivePermissions() const;
473
[email protected]5df6a5d2011-01-26 07:39:12474 // Whether context menu should be shown for page and browser actions.
475 bool ShowConfigureContextMenus() const;
476
[email protected]37cd64d2010-10-25 18:17:58477 // Returns the Homepage URL for this extension. If homepage_url was not
478 // specified in the manifest, this returns the Google Gallery URL. For
[email protected]bfa90a3a2010-04-28 15:43:23479 // third-party extensions, this returns a blank GURL.
[email protected]37cd64d2010-10-25 18:17:58480 GURL GetHomepageURL() const;
[email protected]bfa90a3a2010-04-28 15:43:23481
[email protected]facd7a7652009-06-05 23:15:02482 // Returns a list of paths (relative to the extension dir) for images that
483 // the browser might load (like themes and page action icons).
[email protected]9adb9692010-10-29 23:14:02484 std::set<FilePath> GetBrowserImages() const;
[email protected]facd7a7652009-06-05 23:15:02485
[email protected]807871f2010-09-16 01:04:48486 // Get an extension icon as a resource or URL.
[email protected]9adb9692010-10-29 23:14:02487 ExtensionResource GetIconResource(
488 int size, ExtensionIconSet::MatchType match_type) const;
489 GURL GetIconURL(int size, ExtensionIconSet::MatchType match_type) const;
[email protected]f34e79632010-03-17 02:34:08490
[email protected]867a73e12010-03-19 20:45:46491 // Gets the fully resolved absolute launch URL.
492 GURL GetFullLaunchURL() const;
[email protected]2a521c52011-01-26 18:45:21493
[email protected]6f229e82010-11-02 17:47:26494 // Image cache related methods. These are only valid on the UI thread and
495 // not maintained by this class. See ImageLoadingTracker for usage. The
496 // |original_size| parameter should be the size of the image at |source|
497 // before any scaling may have been done to produce the pixels in |image|.
498 void SetCachedImage(const ExtensionResource& source,
499 const SkBitmap& image,
500 const gfx::Size& original_size) const;
501 bool HasCachedImage(const ExtensionResource& source,
502 const gfx::Size& max_size) const;
503 SkBitmap GetCachedImage(const ExtensionResource& source,
504 const gfx::Size& max_size) const;
[email protected]2a521c52011-01-26 18:45:21505
506 // Returns true if this extension can execute script on a page. If a
507 // UserScript object is passed, permission to run that specific script is
508 // checked (using its matches list). Otherwise, permission to execute script
509 // programmatically is checked (using the extension's host permission).
510 //
511 // This method is also aware of certain special pages that extensions are
512 // usually not allowed to run script on.
513 bool CanExecuteScriptOnPage(const GURL& page_url,
[email protected]fc5e65d6b2012-06-13 00:22:57514 int tab_id,
[email protected]3aff9ad2011-04-01 20:26:48515 const UserScript* script,
[email protected]2a521c52011-01-26 18:45:21516 std::string* error) const;
517
[email protected]6f229e82010-11-02 17:47:26518 // Returns true if this extension is a COMPONENT extension, or if it is
519 // on the whitelist of extensions that can script all pages.
520 bool CanExecuteScriptEverywhere() const;
521
[email protected]5efbfe012011-02-22 23:07:18522 // Returns true if this extension is allowed to obtain the contents of a
523 // page as an image. Since a page may contain sensitive information, this
524 // is restricted to the extension's host permissions as well as the
525 // extension page itself.
[email protected]fc5e65d6b2012-06-13 00:22:57526 bool CanCaptureVisiblePage(const GURL& page_url,
527 int tab_id,
528 std::string* error) const;
[email protected]5efbfe012011-02-22 23:07:18529
[email protected]a65882c2010-11-12 15:15:09530 // Returns true if this extension updates itself using the extension
531 // gallery.
532 bool UpdatesFromGallery() const;
533
[email protected]cca147172011-02-17 01:29:29534 // Returns true if this extension or app includes areas within |origin|.
535 bool OverlapsWithOrigin(const GURL& origin) const;
536
[email protected]3bdba0d2011-08-23 07:17:30537 // Returns the sync bucket to use for this extension.
538 SyncType GetSyncType() const;
539
[email protected]b873cd92012-02-09 21:51:48540 // Returns true if the extension should be synced.
541 bool IsSyncable() const;
542
543 // Returns true if the extension should be displayed in the launcher.
544 bool ShouldDisplayInLauncher() const;
545
[email protected]e0b3de72012-05-01 01:21:34546 // Returns true if the extension should be displayed in the extension
547 // settings page (i.e. chrome://extensions).
548 bool ShouldDisplayInExtensionSettings() const;
549
[email protected]4f886012012-05-19 03:51:10550 // Returns true if the extension has a content script declared at |url|.
551 bool HasContentScriptAtURL(const GURL& url) const;
552
[email protected]0f156a62012-05-28 16:36:36553 // Returns an ExtensionAction representing the script badge that should be
554 // shown for this extension in the location bar.
555 ExtensionAction* GetScriptBadge() const;
556
[email protected]fc5e65d6b2012-06-13 00:22:57557 // Gets the tab-specific host permissions of |tab_id|, or NULL if there
558 // aren't any.
559 //
560 // This is a weak pointer. Callers should create a copy before mutating any
561 // tab specific permissions.
562 const URLPatternSet* GetTabSpecificHostPermissions(int tab_id) const;
563
564 // Sets the tab-specific host permissions of |tab_id| to |permissions|.
565 void SetTabSpecificHostPermissions(int tab_id,
566 const URLPatternSet& permissions) const;
567
568 // Clears the tab-specific host permissions of |tab_id|.
569 void ClearTabSpecificHostPermissions(int tab_id) const;
570
[email protected]6f229e82010-11-02 17:47:26571 // Accessors:
572
573 const FilePath& path() const { return path_; }
574 const GURL& url() const { return extension_url_; }
[email protected]d41e2152012-02-24 04:20:27575 Location location() const;
576 const std::string& id() const;
[email protected]6f229e82010-11-02 17:47:26577 const Version* version() const { return version_.get(); }
578 const std::string VersionString() const;
579 const std::string& name() const { return name_; }
[email protected]701d1e82012-05-14 05:34:19580 const std::string& non_localized_name() const { return non_localized_name_; }
[email protected]200423d2012-06-05 01:16:06581 // Base64-encoded version of the key used to sign this extension.
582 // In pseudocode, returns
583 // base::Base64Encode(RSAPrivateKey(pem_file).ExportPublicKey()).
584 const std::string& public_key() const { return public_key_; }
[email protected]6f229e82010-11-02 17:47:26585 const std::string& description() const { return description_; }
[email protected]a47c8a22011-11-17 18:40:31586 int manifest_version() const { return manifest_version_; }
[email protected]6f229e82010-11-02 17:47:26587 bool converted_from_user_script() const {
588 return converted_from_user_script_;
589 }
590 const UserScriptList& content_scripts() const { return content_scripts_; }
591 ExtensionAction* page_action() const { return page_action_.get(); }
592 ExtensionAction* browser_action() const { return browser_action_.get(); }
[email protected]3e819002012-04-30 07:57:55593 ExtensionAction::Type declared_action_type() const {
594 return declared_action_type_;
[email protected]3349b592012-04-26 12:35:28595 }
[email protected]b6b805e92011-04-16 09:24:14596 const FileBrowserHandlerList* file_browser_handlers() const {
597 return file_browser_handlers_.get();
598 }
[email protected]6f229e82010-11-02 17:47:26599 const std::vector<PluginInfo>& plugins() const { return plugins_; }
[email protected]65378f52011-04-08 02:31:23600 const std::vector<NaClModuleInfo>& nacl_modules() const {
601 return nacl_modules_;
602 }
[email protected]b0820372011-06-03 07:05:27603 const std::vector<InputComponentInfo>& input_components() const {
604 return input_components_;
605 }
[email protected]7c519ab2012-05-04 10:02:51606 // The browser action command that the extension wants to use, which is not
607 // necessarily the one it can use, as it might be inactive (see also
608 // GetActiveBrowserActionCommand in ExtensionKeybindingRegistry).
[email protected]3fc5f6a2012-05-04 14:23:59609 const extensions::Command* browser_action_command() const {
[email protected]9c8b54d2012-04-02 10:17:30610 return browser_action_command_.get();
611 }
[email protected]7c519ab2012-05-04 10:02:51612 // The page action command that the extension wants to use, which is not
613 // necessarily the one it can use, as it might be inactive (see also
614 // GetActivePageActionCommand in ExtensionKeybindingRegistry).
[email protected]3fc5f6a2012-05-04 14:23:59615 const extensions::Command* page_action_command() const {
[email protected]9c8b54d2012-04-02 10:17:30616 return page_action_command_.get();
617 }
[email protected]7c519ab2012-05-04 10:02:51618 // The map (of command names to commands) that the extension wants to use,
[email protected]422656932012-05-03 09:31:51619 // which is not necessarily the one it can use, as they might be inactive
620 // (see also GetActiveNamedCommands in ExtensionKeybindingRegistry).
[email protected]3fc5f6a2012-05-04 14:23:59621 const extensions::CommandMap& named_commands() const {
[email protected]9c8b54d2012-04-02 10:17:30622 return named_commands_;
[email protected]f5532472012-02-23 13:00:55623 }
[email protected]a03d4448f2012-01-10 23:25:28624 bool has_background_page() const {
625 return background_url_.is_valid() || !background_scripts_.empty();
626 }
[email protected]7b54ca02012-03-02 18:06:53627 bool allow_background_js_access() const {
628 return allow_background_js_access_;
629 }
[email protected]a03d4448f2012-01-10 23:25:28630 const std::vector<std::string>& background_scripts() const {
631 return background_scripts_;
632 }
[email protected]d2aa06b2012-03-21 20:57:26633 bool has_persistent_background_page() const {
[email protected]dd62fa802012-04-25 18:37:00634 return has_background_page() && background_page_is_persistent_;
[email protected]d2aa06b2012-03-21 20:57:26635 }
636 bool has_lazy_background_page() const {
[email protected]dd62fa802012-04-25 18:37:00637 return has_background_page() && !background_page_is_persistent_;
[email protected]d2aa06b2012-03-21 20:57:26638 }
[email protected]6f229e82010-11-02 17:47:26639 const GURL& options_url() const { return options_url_; }
640 const GURL& devtools_url() const { return devtools_url_; }
[email protected]902fd7b2011-07-27 18:42:31641 const ExtensionPermissionSet* optional_permission_set() const {
642 return optional_permission_set_.get();
643 }
644 const ExtensionPermissionSet* required_permission_set() const {
645 return required_permission_set_.get();
[email protected]6f229e82010-11-02 17:47:26646 }
[email protected]ab55c2b2012-06-01 23:55:03647 // Appends |new_warnings| to install_warnings().
[email protected]1e0f45a2012-06-13 00:31:06648 void AddInstallWarnings(const InstallWarningVector& new_warnings);
649 const InstallWarningVector& install_warnings() const {
[email protected]8629c542012-04-20 03:40:03650 return install_warnings_;
651 }
[email protected]6f229e82010-11-02 17:47:26652 const GURL& update_url() const { return update_url_; }
653 const ExtensionIconSet& icons() const { return icons_; }
[email protected]953620b2011-12-04 00:55:32654 const extensions::Manifest* manifest() const {
[email protected]d41e2152012-02-24 04:20:27655 return manifest_;
[email protected]6f229e82010-11-02 17:47:26656 }
657 const std::string default_locale() const { return default_locale_; }
658 const URLOverrideMap& GetChromeURLOverrides() const {
659 return chrome_url_overrides_;
660 }
661 const std::string omnibox_keyword() const { return omnibox_keyword_; }
662 bool incognito_split_mode() const { return incognito_split_mode_; }
[email protected]1abdf4f2011-08-16 21:11:55663 bool offline_enabled() const { return offline_enabled_; }
[email protected]a4a38c12010-12-23 16:43:56664 const std::vector<TtsVoice>& tts_voices() const { return tts_voices_; }
[email protected]a79be1f2012-03-23 22:14:00665 const OAuth2Info& oauth2_info() const { return oauth2_info_; }
[email protected]56624422011-11-01 22:11:27666 const std::vector<webkit_glue::WebIntentServiceData>&
667 intents_services() const {
668 return intents_services_;
669 }
[email protected]6f229e82010-11-02 17:47:26670
[email protected]3aff9ad2011-04-01 20:26:48671 bool wants_file_access() const { return wants_file_access_; }
[email protected]2af352b2011-07-22 08:21:23672 int creation_flags() const { return creation_flags_; }
673 bool from_webstore() const { return (creation_flags_ & FROM_WEBSTORE) != 0; }
[email protected]e805baf2011-07-26 18:23:05674 bool from_bookmark() const { return (creation_flags_ & FROM_BOOKMARK) != 0; }
[email protected]3aff9ad2011-04-01 20:26:48675
[email protected]6f229e82010-11-02 17:47:26676 // App-related.
[email protected]953620b2011-12-04 00:55:32677 bool is_app() const {
678 return is_packaged_app() || is_hosted_app() || is_platform_app();
[email protected]23690872011-12-01 22:02:39679 }
[email protected]d41e2152012-02-24 04:20:27680 bool is_platform_app() const;
681 bool is_hosted_app() const;
682 bool is_packaged_app() const;
[email protected]605fb8102012-05-04 01:36:55683 bool is_storage_isolated() const { return is_storage_isolated_; }
[email protected]cced75a2011-05-20 08:31:12684 const URLPatternSet& web_extent() const { return extent_; }
[email protected]6f229e82010-11-02 17:47:26685 const std::string& launch_local_path() const { return launch_local_path_; }
686 const std::string& launch_web_url() const { return launch_web_url_; }
687 extension_misc::LaunchContainer launch_container() const {
688 return launch_container_;
689 }
[email protected]dc37b002012-04-23 23:02:26690 int launch_width() const { return launch_width_; }
691 int launch_height() const { return launch_height_; }
[email protected]6f229e82010-11-02 17:47:26692
693 // Theme-related.
[email protected]d41e2152012-02-24 04:20:27694 bool is_theme() const;
[email protected]f3a1c642011-07-12 19:15:03695 base::DictionaryValue* GetThemeImages() const { return theme_images_.get(); }
696 base::DictionaryValue* GetThemeColors() const {return theme_colors_.get(); }
697 base::DictionaryValue* GetThemeTints() const { return theme_tints_.get(); }
698 base::DictionaryValue* GetThemeDisplayProperties() const {
[email protected]6f229e82010-11-02 17:47:26699 return theme_display_properties_.get();
700 }
701
[email protected]a03d4448f2012-01-10 23:25:28702 GURL GetBackgroundURL() const;
703
[email protected]4a8d3272009-03-10 19:15:08704 private:
[email protected]66e4eb32010-10-27 20:37:41705 friend class base::RefCountedThreadSafe<Extension>;
706
[email protected]d7e9a862010-11-03 21:57:49707 // We keep a cache of images loaded from extension resources based on their
708 // path and a string representation of a size that may have been used to
709 // scale it (or the empty string if the image is at its original size).
710 typedef std::pair<FilePath, std::string> ImageCacheKey;
711 typedef std::map<ImageCacheKey, SkBitmap> ImageCache;
712
[email protected]902fd7b2011-07-27 18:42:31713 class RuntimeData {
714 public:
715 RuntimeData();
716 explicit RuntimeData(const ExtensionPermissionSet* active);
717 ~RuntimeData();
718
719 void SetActivePermissions(const ExtensionPermissionSet* active);
720 scoped_refptr<const ExtensionPermissionSet> GetActivePermissions() const;
721
[email protected]fc5e65d6b2012-06-13 00:22:57722 const URLPatternSet* GetTabSpecificHostPermissions(int tab_id) const;
723 void SetTabSpecificHostPermissions(int tab_id,
724 const URLPatternSet& permissions);
725 void ClearTabSpecificHostPermissions(int tab_id);
726
[email protected]902fd7b2011-07-27 18:42:31727 private:
728 friend class base::RefCountedThreadSafe<RuntimeData>;
[email protected]fc5e65d6b2012-06-13 00:22:57729
[email protected]902fd7b2011-07-27 18:42:31730 scoped_refptr<const ExtensionPermissionSet> active_permissions_;
[email protected]fc5e65d6b2012-06-13 00:22:57731
732 typedef std::map<int, linked_ptr<const URLPatternSet> >
733 TabHostPermissionsMap;
734 TabHostPermissionsMap tab_specific_host_permissions_;
[email protected]902fd7b2011-07-27 18:42:31735 };
736
[email protected]d41e2152012-02-24 04:20:27737 // Chooses the extension ID for an extension based on a variety of criteria.
738 // The chosen ID will be set in |manifest|.
739 static bool InitExtensionID(extensions::Manifest* manifest,
740 const FilePath& path,
741 const std::string& explicit_id,
742 int creation_flags,
743 string16* error);
744
[email protected]4ead6f72010-10-13 19:54:18745 // Normalize the path for use by the extension. On Windows, this will make
746 // sure the drive letter is uppercase.
747 static FilePath MaybeNormalizePath(const FilePath& path);
748
[email protected]87c655e2011-07-01 21:42:00749 // Returns true if this extension id is from a trusted provider.
750 static bool IsTrustedId(const std::string& id);
751
[email protected]d41e2152012-02-24 04:20:27752 Extension(const FilePath& path, scoped_ptr<extensions::Manifest> manifest);
[email protected]66e4eb32010-10-27 20:37:41753 ~Extension();
754
755 // Initialize the extension from a parsed manifest.
[email protected]d41e2152012-02-24 04:20:27756 // TODO(aa): Rename to just Init()? There's no Value here anymore.
757 // TODO(aa): It is really weird the way this class essentially contains a copy
758 // of the underlying DictionaryValue in its members. We should decide to
759 // either wrap the DictionaryValue and go with that only, or we should parse
760 // into strong types and discard the value. But doing both is bad.
761 bool InitFromValue(int flags, string16* error);
[email protected]66e4eb32010-10-27 20:37:41762
[email protected]58f62cf2012-03-09 10:45:11763 // The following are helpers for InitFromValue to load various features of the
764 // extension from the manifest.
765
766 bool CheckMinimumChromeVersion(string16* error);
[email protected]605fb8102012-05-04 01:36:55767 bool LoadAppIsolation(const ExtensionAPIPermissionSet& api_permissions,
768 string16* error);
[email protected]58f62cf2012-03-09 10:45:11769
770 bool LoadRequiredFeatures(string16* error);
771 bool LoadName(string16* error);
772 bool LoadVersion(string16* error);
773
774 bool LoadAppFeatures(string16* error);
[email protected]d41e2152012-02-24 04:20:27775 bool LoadExtent(const char* key,
776 URLPatternSet* extent,
777 const char* list_error,
778 const char* value_error,
779 string16* error);
780 bool LoadLaunchContainer(string16* error);
781 bool LoadLaunchURL(string16* error);
[email protected]10253da2012-03-09 04:06:42782
[email protected]58f62cf2012-03-09 10:45:11783 bool LoadSharedFeatures(const ExtensionAPIPermissionSet& api_permissions,
784 string16* error);
785 bool LoadDescription(string16* error);
786 bool LoadManifestVersion(string16* error);
787 bool LoadHomepageURL(string16* error);
788 bool LoadUpdateURL(string16* error);
789 bool LoadIcons(string16* error);
790 bool LoadCommands(string16* error);
791 bool LoadPlugins(string16* error);
792 bool LoadNaClModules(string16* error);
793 bool LoadWebAccessibleResources(string16* error);
[email protected]dbb24162012-06-06 01:41:22794 bool LoadSandboxedPages(string16* error);
[email protected]58f62cf2012-03-09 10:45:11795 bool CheckRequirements(string16* error);
796 bool LoadDefaultLocale(string16* error);
797 bool LoadOfflineEnabled(string16* error);
798 bool LoadOptionsPage(string16* error);
[email protected]d41e2152012-02-24 04:20:27799 bool LoadBackgroundScripts(string16* error);
[email protected]756038532012-06-08 05:45:03800 bool LoadBackgroundScripts(const std::string& key, string16* error);
[email protected]d41e2152012-02-24 04:20:27801 bool LoadBackgroundPage(const ExtensionAPIPermissionSet& api_permissions,
802 string16* error);
[email protected]756038532012-06-08 05:45:03803 bool LoadBackgroundPage(const std::string& key,
804 const ExtensionAPIPermissionSet& api_permissions,
805 string16* error);
[email protected]dd62fa802012-04-25 18:37:00806 bool LoadBackgroundPersistent(
[email protected]d41e2152012-02-24 04:20:27807 const ExtensionAPIPermissionSet& api_permissions,
808 string16* error);
[email protected]58f62cf2012-03-09 10:45:11809 bool LoadBackgroundAllowJSAccess(
[email protected]7b54ca02012-03-02 18:06:53810 const ExtensionAPIPermissionSet& api_permissions,
811 string16* error);
[email protected]58f62cf2012-03-09 10:45:11812 // Parses a single action in the manifest.
813 bool LoadWebIntentAction(const std::string& action_name,
814 const base::DictionaryValue& intent_service,
815 string16* error);
816 bool LoadWebIntentServices(string16* error);
817 bool LoadExtensionFeatures(const ExtensionAPIPermissionSet& api_permissions,
818 string16* error);
819 bool LoadDevToolsPage(string16* error);
820 bool LoadInputComponents(const ExtensionAPIPermissionSet& api_permissions,
821 string16* error);
822 bool LoadContentScripts(string16* error);
823 bool LoadPageAction(string16* error);
824 bool LoadBrowserAction(string16* error);
825 bool LoadFileBrowserHandlers(string16* error);
826 // Helper method to load a FileBrowserHandlerList from the manifest.
827 FileBrowserHandlerList* LoadFileBrowserHandlersHelper(
828 const base::ListValue* extension_actions, string16* error);
829 // Helper method to load an FileBrowserHandler from manifest.
830 FileBrowserHandler* LoadFileBrowserHandler(
831 const base::DictionaryValue* file_browser_handlers, string16* error);
832 bool LoadChromeURLOverrides(string16* error);
833 bool LoadOmnibox(string16* error);
834 bool LoadTextToSpeechVoices(string16* error);
835 bool LoadIncognitoMode(string16* error);
836 bool LoadContentSecurityPolicy(string16* error);
837
838 bool LoadThemeFeatures(string16* error);
839 bool LoadThemeImages(const base::DictionaryValue* theme_value,
840 string16* error);
841 bool LoadThemeColors(const base::DictionaryValue* theme_value,
842 string16* error);
843 bool LoadThemeTints(const base::DictionaryValue* theme_value,
844 string16* error);
845 bool LoadThemeDisplayProperties(const base::DictionaryValue* theme_value,
846 string16* error);
847
848 // Helper function for implementing HasCachedImage/GetCachedImage. A return
849 // value of NULL means there is no matching image cached (we allow caching an
850 // empty SkBitmap).
851 SkBitmap* GetCachedImageImpl(const ExtensionResource& source,
852 const gfx::Size& max_size) const;
[email protected]d9ad80f2010-03-30 20:40:18853
[email protected]3cfbd0e2009-03-18 21:26:24854 // Helper method that loads a UserScript object from a
855 // dictionary in the content_script list of the manifest.
[email protected]f3a1c642011-07-12 19:15:03856 bool LoadUserScriptHelper(const base::DictionaryValue* content_script,
[email protected]3cfbd0e2009-03-18 21:26:24857 int definition_index,
[email protected]fc670822011-12-17 09:33:49858 string16* error,
[email protected]3cfbd0e2009-03-18 21:26:24859 UserScript* result);
[email protected]f7f3a5f2009-05-01 22:02:34860
[email protected]6657afa62009-11-04 02:15:20861 // Helper method that loads either the include_globs or exclude_globs list
862 // from an entry in the content_script lists of the manifest.
[email protected]f3a1c642011-07-12 19:15:03863 bool LoadGlobsHelper(const base::DictionaryValue* content_script,
[email protected]6657afa62009-11-04 02:15:20864 int content_script_index,
[email protected]e2194742010-08-12 05:54:34865 const char* globs_property_name,
[email protected]fc670822011-12-17 09:33:49866 string16* error,
[email protected]11f4857282009-11-13 19:56:17867 void(UserScript::*add_method)(const std::string& glob),
[email protected]6657afa62009-11-04 02:15:20868 UserScript *instance);
869
[email protected]5d246db22009-10-27 06:17:57870 // Helper method to load an ExtensionAction from the page_action or
[email protected]92c6f9b92009-10-24 04:35:08871 // browser_action entries in the manifest.
[email protected]3349b592012-04-26 12:35:28872 scoped_ptr<ExtensionAction> LoadExtensionActionHelper(
[email protected]fc670822011-12-17 09:33:49873 const base::DictionaryValue* extension_action, string16* error);
[email protected]92c6f9b92009-10-24 04:35:08874
[email protected]a79be1f2012-03-23 22:14:00875 // Helper method that loads the OAuth2 info from the 'oauth2' manifest key.
876 bool LoadOAuth2Info(string16* error);
877
[email protected]2f6698b2010-10-14 00:58:21878 // Returns true if the extension has more than one "UI surface". For example,
879 // an extension that has a browser action and a page action.
880 bool HasMultipleUISurfaces() const;
881
[email protected]be9d9c82011-07-13 04:17:31882 // Updates the launch URL and extents for the extension using the given
883 // |override_url|.
884 void OverrideLaunchUrl(const GURL& override_url);
885
[email protected]ae655e4e2012-03-16 21:47:55886 // Custom checks for the experimental permission that can't be expressed in
887 // _permission_features.json.
[email protected]5eddc3e2011-10-26 04:33:31888 bool CanSpecifyExperimentalPermission() const;
[email protected]5eddc3e2011-10-26 04:33:31889
890 // Checks whether the host |pattern| is allowed for this extension, given API
891 // permissions |permissions|.
892 bool CanSpecifyHostPermission(const URLPattern& pattern,
893 const ExtensionAPIPermissionSet& permissions) const;
894
[email protected]e92169e2012-05-04 22:49:32895 // Check that platform app features are valid. Called after InitFromValue.
896 bool CheckPlatformAppFeatures(std::string* utf8_error);
897
[email protected]f1bab9c92012-05-11 21:15:10898 // Check that features don't conflict. Called after InitFromValue.
899 bool CheckConflictingFeatures(std::string* utf8_error);
900
[email protected]d7e9a862010-11-03 21:57:49901 // Cached images for this extension. This should only be touched on the UI
902 // thread.
903 mutable ImageCache image_cache_;
[email protected]1e8c93f2010-02-08 22:58:31904
[email protected]6f229e82010-11-02 17:47:26905 // The extension's human-readable name. Name is used for display purpose. It
906 // might be wrapped with unicode bidi control characters so that it is
907 // displayed correctly in RTL context.
908 // NOTE: Name is UTF-8 and may contain non-ascii characters.
909 std::string name_;
910
[email protected]701d1e82012-05-14 05:34:19911 // A non-localized version of the extension's name. This is useful for
912 // debug output.
913 std::string non_localized_name_;
914
[email protected]a47c8a22011-11-17 18:40:31915 // The version of this extension's manifest. We increase the manifest
916 // version when making breaking changes to the extension system.
917 // Version 1 was the first manifest version (implied by a lack of a
918 // manifest_version attribute in the extension's manifest). We initialize
919 // this member variable to 0 to distinguish the "uninitialized" case from
920 // the case when we know the manifest version actually is 1.
921 int manifest_version_;
922
[email protected]d41e2152012-02-24 04:20:27923 // The absolute path to the directory the extension is stored in.
924 FilePath path_;
925
[email protected]6f229e82010-11-02 17:47:26926 // Default locale for fall back. Can be empty if extension is not localized.
927 std::string default_locale_;
928
929 // If true, a separate process will be used for the extension in incognito
930 // mode.
931 bool incognito_split_mode_;
932
[email protected]1abdf4f2011-08-16 21:11:55933 // Whether the extension or app should be enabled when offline.
934 bool offline_enabled_;
935
[email protected]6f229e82010-11-02 17:47:26936 // Defines the set of URLs in the extension's web content.
[email protected]cced75a2011-05-20 08:31:12937 URLPatternSet extent_;
[email protected]6f229e82010-11-02 17:47:26938
[email protected]902fd7b2011-07-27 18:42:31939 // The extension runtime data.
940 mutable base::Lock runtime_data_lock_;
941 mutable RuntimeData runtime_data_;
942
943 // The set of permissions the extension can request at runtime.
944 scoped_refptr<const ExtensionPermissionSet> optional_permission_set_;
945
946 // The extension's required / default set of permissions.
947 scoped_refptr<const ExtensionPermissionSet> required_permission_set_;
[email protected]6f229e82010-11-02 17:47:26948
[email protected]8629c542012-04-20 03:40:03949 // Any warnings that occurred when trying to create/parse the extension.
[email protected]1e0f45a2012-06-13 00:31:06950 InstallWarningVector install_warnings_;
[email protected]8629c542012-04-20 03:40:03951
[email protected]6f229e82010-11-02 17:47:26952 // The icons for the extension.
953 ExtensionIconSet icons_;
954
955 // The base extension url for the extension.
956 GURL extension_url_;
957
[email protected]6f229e82010-11-02 17:47:26958 // The extension's version.
959 scoped_ptr<Version> version_;
960
961 // An optional longer description of the extension.
962 std::string description_;
963
964 // True if the extension was generated from a user script. (We show slightly
965 // different UI if so).
966 bool converted_from_user_script_;
967
968 // Paths to the content scripts the extension contains.
969 UserScriptList content_scripts_;
970
971 // The extension's page action, if any.
972 scoped_ptr<ExtensionAction> page_action_;
973
974 // The extension's browser action, if any.
975 scoped_ptr<ExtensionAction> browser_action_;
976
[email protected]3e819002012-04-30 07:57:55977 // Indicates the type of action (browser or page) that the extension declared
978 // in its manifest. This doesn't imply any value for page_action or
979 // browser_action, since page actions may be turned into browser actions and
980 // browser actions may be generated without any action declared.
981 ExtensionAction::Type declared_action_type_;
[email protected]3349b592012-04-26 12:35:28982
[email protected]0f156a62012-05-28 16:36:36983 // The extension's script badge. Lazily populated (and subsequently updated)
984 // as required by GetScriptBadge.
985 mutable scoped_ptr<ExtensionAction> script_badge_;
986
[email protected]b6b805e92011-04-16 09:24:14987 // The extension's file browser actions, if any.
988 scoped_ptr<FileBrowserHandlerList> file_browser_handlers_;
989
[email protected]6f229e82010-11-02 17:47:26990 // Optional list of NPAPI plugins and associated properties.
991 std::vector<PluginInfo> plugins_;
992
[email protected]65378f52011-04-08 02:31:23993 // Optional list of NaCl modules and associated properties.
994 std::vector<NaClModuleInfo> nacl_modules_;
995
[email protected]b0820372011-06-03 07:05:27996 // Optional list of input components and associated properties.
997 std::vector<InputComponentInfo> input_components_;
998
[email protected]f5532472012-02-23 13:00:55999 // Optional list of commands (keyboard shortcuts).
[email protected]3fc5f6a2012-05-04 14:23:591000 scoped_ptr<extensions::Command> browser_action_command_;
1001 scoped_ptr<extensions::Command> page_action_command_;
1002 extensions::CommandMap named_commands_;
[email protected]f5532472012-02-23 13:00:551003
[email protected]8f270be2011-12-21 21:15:221004 // Optional list of web accessible extension resources.
1005 base::hash_set<std::string> web_accessible_resources_;
1006
[email protected]dbb24162012-06-06 01:41:221007 // Optional list of extension pages that are sandboxed (served from a unique
1008 // origin with a different Content Security Policy).
1009 base::hash_set<std::string> sandboxed_pages_;
1010
1011 // Content Security Policy that should be used to enforce the sandbox used
1012 // by sandboxed pages (guaranteed to have the "sandbox" directive without the
1013 // "allow-same-origin" token).
1014 std::string sandboxed_pages_content_security_policy_;
1015
[email protected]6f229e82010-11-02 17:47:261016 // Optional URL to a master page of which a single instance should be always
1017 // loaded in the background.
1018 GURL background_url_;
1019
[email protected]a03d4448f2012-01-10 23:25:281020 // Optional list of scripts to use to generate a background page. If this is
1021 // present, background_url_ will be empty and generated by GetBackgroundURL().
1022 std::vector<std::string> background_scripts_;
1023
[email protected]dd62fa802012-04-25 18:37:001024 // True if the background page should stay loaded forever; false if it should
1025 // load on-demand (when it needs to handle an event). Defaults to true.
1026 bool background_page_is_persistent_;
[email protected]9e6720a2012-01-24 02:30:561027
[email protected]7b54ca02012-03-02 18:06:531028 // True if the background page can be scripted by pages of the app or
1029 // extension, in which case all such pages must run in the same process.
1030 // False if such pages are not permitted to script the background page,
1031 // allowing them to run in different processes.
1032 bool allow_background_js_access_;
1033
[email protected]6f229e82010-11-02 17:47:261034 // Optional URL to a page for setting options/preferences.
1035 GURL options_url_;
1036
1037 // Optional URL to a devtools extension page.
1038 GURL devtools_url_;
1039
[email protected]6f229e82010-11-02 17:47:261040 // The public key used to sign the contents of the crx package.
1041 std::string public_key_;
1042
1043 // A map of resource id's to relative file paths.
[email protected]f3a1c642011-07-12 19:15:031044 scoped_ptr<base::DictionaryValue> theme_images_;
[email protected]6f229e82010-11-02 17:47:261045
1046 // A map of color names to colors.
[email protected]f3a1c642011-07-12 19:15:031047 scoped_ptr<base::DictionaryValue> theme_colors_;
[email protected]6f229e82010-11-02 17:47:261048
1049 // A map of color names to colors.
[email protected]f3a1c642011-07-12 19:15:031050 scoped_ptr<base::DictionaryValue> theme_tints_;
[email protected]6f229e82010-11-02 17:47:261051
1052 // A map of display properties.
[email protected]f3a1c642011-07-12 19:15:031053 scoped_ptr<base::DictionaryValue> theme_display_properties_;
[email protected]6f229e82010-11-02 17:47:261054
[email protected]6f229e82010-11-02 17:47:261055 // The homepage for this extension. Useful if it is not hosted by Google and
1056 // therefore does not have a Gallery URL.
1057 GURL homepage_url_;
1058
1059 // URL for fetching an update manifest
1060 GURL update_url_;
1061
[email protected]58f62cf2012-03-09 10:45:111062 // The manifest from which this extension was created.
[email protected]d41e2152012-02-24 04:20:271063 //
1064 // NOTE: This is an owned pointer, but can't use scoped_ptr because that would
1065 // require manifest.h, which would in turn create a circulate dependency
1066 // between extension.h and manifest.h.
1067 //
1068 // TODO(aa): Pull Extension::Type and Extension::Location out into their own
1069 // files so that manifest.h can rely on them and not get all of extension.h
1070 // too, and then change this back to a scoped_ptr.
1071 extensions::Manifest* manifest_;
[email protected]6f229e82010-11-02 17:47:261072
1073 // A map of chrome:// hostnames (newtab, downloads, etc.) to Extension URLs
1074 // which override the handling of those URLs. (see ExtensionOverrideUI).
1075 URLOverrideMap chrome_url_overrides_;
1076
[email protected]d9696672011-03-15 22:45:091077 // Whether this extension requests isolated storage.
1078 bool is_storage_isolated_;
1079
[email protected]6f229e82010-11-02 17:47:261080 // The local path inside the extension to use with the launcher.
1081 std::string launch_local_path_;
1082
1083 // A web url to use with the launcher. Note that this might be relative or
1084 // absolute. If relative, it is relative to web_origin.
1085 std::string launch_web_url_;
1086
[email protected]4e595682011-02-09 17:07:021087 // The window type that an app's manifest specifies to launch into.
1088 // This is not always the window type an app will open into, because
1089 // users can override the way each app launches. See
1090 // ExtensionPrefs::GetLaunchContainer(), which looks at a per-app pref
1091 // to decide what container an app will launch in.
[email protected]6f229e82010-11-02 17:47:261092 extension_misc::LaunchContainer launch_container_;
1093
1094 // The default size of the container when launching. Only respected for
1095 // containers like panels and windows.
1096 int launch_width_;
1097 int launch_height_;
1098
1099 // The Omnibox keyword for this extension, or empty if there is none.
1100 std::string omnibox_keyword_;
1101
[email protected]a4a38c12010-12-23 16:43:561102 // List of text-to-speech voices that this extension provides, if any.
1103 std::vector<TtsVoice> tts_voices_;
1104
[email protected]a79be1f2012-03-23 22:14:001105 // The OAuth2 client id and scopes, if specified by the extension.
1106 OAuth2Info oauth2_info_;
1107
[email protected]56624422011-11-01 22:11:271108 // List of intent services that this extension provides, if any.
1109 std::vector<webkit_glue::WebIntentServiceData> intents_services_;
[email protected]be5f007862011-09-23 00:35:131110
[email protected]3aff9ad2011-04-01 20:26:481111 // Whether the extension has host permissions or user script patterns that
1112 // imply access to file:/// scheme URLs (the user may not have actually
1113 // granted it that access).
1114 bool wants_file_access_;
1115
[email protected]2af352b2011-07-22 08:21:231116 // The flags that were passed to InitFromValue.
1117 int creation_flags_;
[email protected]620db1762011-07-15 21:57:341118
[email protected]7f7b9d932011-04-20 16:13:261119 // The Content-Security-Policy for this extension. Extensions can use
1120 // Content-Security-Policies to mitigate cross-site scripting and other
1121 // vulnerabilities.
1122 std::string content_security_policy_;
1123
[email protected]19118d52010-07-26 22:13:421124 FRIEND_TEST_ALL_PREFIXES(ExtensionTest, LoadPageActionHelper);
[email protected]1c321ee2012-05-21 03:02:341125 FRIEND_TEST_ALL_PREFIXES(::TabStripModelTest, Apps);
[email protected]ae7fe712009-07-02 20:33:581126
[email protected]894bb502009-05-21 22:39:571127 DISALLOW_COPY_AND_ASSIGN(Extension);
[email protected]7713d632008-12-02 07:52:331128};
1129
[email protected]9adb9692010-10-29 23:14:021130typedef std::vector< scoped_refptr<const Extension> > ExtensionList;
[email protected]ec5b50d2010-10-09 16:35:181131typedef std::set<std::string> ExtensionIdSet;
[email protected]b1748b1d82009-11-30 20:32:561132
[email protected]c6d474f82009-12-16 21:11:061133// Handy struct to pass core extension info around.
1134struct ExtensionInfo {
[email protected]f3a1c642011-07-12 19:15:031135 ExtensionInfo(const base::DictionaryValue* manifest,
[email protected]c6d474f82009-12-16 21:11:061136 const std::string& id,
1137 const FilePath& path,
[email protected]3bb84992010-08-26 17:23:461138 Extension::Location location);
1139 ~ExtensionInfo();
[email protected]c6d474f82009-12-16 21:11:061140
[email protected]f3a1c642011-07-12 19:15:031141 scoped_ptr<base::DictionaryValue> extension_manifest;
[email protected]c6d474f82009-12-16 21:11:061142 std::string extension_id;
1143 FilePath extension_path;
1144 Extension::Location extension_location;
1145
1146 private:
1147 DISALLOW_COPY_AND_ASSIGN(ExtensionInfo);
1148};
1149
[email protected]a9f39a312010-12-23 22:14:271150struct UnloadedExtensionInfo {
[email protected]814a7bf0f2011-08-13 05:30:591151 extension_misc::UnloadedExtensionReason reason;
[email protected]a9f39a312010-12-23 22:14:271152
1153 // Was the extension already disabled?
1154 bool already_disabled;
1155
1156 // The extension being unloaded - this should always be non-NULL.
1157 const Extension* extension;
1158
[email protected]814a7bf0f2011-08-13 05:30:591159 UnloadedExtensionInfo(
1160 const Extension* extension,
1161 extension_misc::UnloadedExtensionReason reason);
[email protected]a9f39a312010-12-23 22:14:271162};
1163
[email protected]902fd7b2011-07-27 18:42:311164// The details sent for EXTENSION_PERMISSIONS_UPDATED notifications.
1165struct UpdatedExtensionPermissionsInfo {
1166 enum Reason {
[email protected]f5532472012-02-23 13:00:551167 ADDED, // The permissions were added to the extension.
1168 REMOVED, // The permissions were removed from the extension.
[email protected]902fd7b2011-07-27 18:42:311169 };
1170
1171 Reason reason;
1172
1173 // The extension who's permissions have changed.
1174 const Extension* extension;
1175
1176 // The permissions that have changed. For Reason::ADDED, this would contain
1177 // only the permissions that have added, and for Reason::REMOVED, this would
1178 // only contain the removed permissions.
1179 const ExtensionPermissionSet* permissions;
1180
1181 UpdatedExtensionPermissionsInfo(
1182 const Extension* extension,
1183 const ExtensionPermissionSet* permissions,
1184 Reason reason);
1185};
1186
[email protected]1c321ee2012-05-21 03:02:341187} // namespace extensions
1188
[email protected]5b1a0e22009-05-26 19:00:581189#endif // CHROME_COMMON_EXTENSIONS_EXTENSION_H_