blob: 7f056208d176889739083394a943e6f22d2a75ac [file] [log] [blame]
[email protected]7eeab9ec2013-01-15 04:08:331// Copyright (c) 2013 The Chromium Authors. All rights reserved.
[email protected]7713d632008-12-02 07:52:332// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
[email protected]5b1a0e22009-05-26 19:00:585#ifndef CHROME_COMMON_EXTENSIONS_EXTENSION_H_
6#define CHROME_COMMON_EXTENSIONS_EXTENSION_H_
[email protected]7713d632008-12-02 07:52:337
[email protected]8629c542012-04-20 03:40:038#include <algorithm>
[email protected]18049dc2012-06-19 23:12:559#include <iosfwd>
[email protected]300cc58db2009-08-19 20:45:1410#include <map>
[email protected]facd7a7652009-06-05 23:15:0211#include <set>
[email protected]7713d632008-12-02 07:52:3312#include <string>
[email protected]58f62cf2012-03-09 10:45:1113#include <utility>
[email protected]7713d632008-12-02 07:52:3314#include <vector>
15
[email protected]57999812013-02-24 05:40:5216#include "base/files/file_path.h"
[email protected]8f270be2011-12-21 21:15:2217#include "base/hash_tables.h"
[email protected]b6b805e92011-04-16 09:24:1418#include "base/memory/linked_ptr.h"
[email protected]3b63f8f42011-03-28 01:54:1519#include "base/memory/ref_counted.h"
20#include "base/memory/scoped_ptr.h"
[email protected]902fd7b2011-07-27 18:42:3121#include "base/synchronization/lock.h"
[email protected]7eeab9ec2013-01-15 04:08:3322#include "base/threading/thread_checker.h"
[email protected]d83a5602010-09-16 00:22:4823#include "chrome/common/extensions/extension_constants.h"
[email protected]1d5e58b2013-01-31 08:41:4024#include "chrome/common/extensions/manifest.h"
[email protected]bebe1d02012-08-02 20:17:0925#include "chrome/common/extensions/permissions/api_permission.h"
26#include "chrome/common/extensions/permissions/permission_message.h"
[email protected]885c0e92012-11-13 20:27:4227#include "chrome/common/extensions/user_script.h"
[email protected]993da5e2013-03-23 21:25:1628#include "extensions/common/extension_resource.h"
[email protected]1d5e58b2013-01-31 08:41:4029#include "extensions/common/install_warning.h"
[email protected]885c0e92012-11-13 20:27:4230#include "extensions/common/url_pattern.h"
[email protected]e9f541a2012-11-19 21:52:3131#include "extensions/common/url_pattern_set.h"
[email protected]eab9b452009-01-23 20:48:5932#include "googleurl/src/gurl.h"
[email protected]f5532472012-02-23 13:00:5533#include "ui/base/accelerators/accelerator.h"
[email protected]08397d52011-02-05 01:53:3834#include "ui/gfx/size.h"
[email protected]eab9b452009-01-23 20:48:5935
[email protected]0f34d9082012-10-08 19:16:4436class ExtensionAction;
[email protected]12802702010-07-09 19:43:0937class SkBitmap;
[email protected]942690b132010-05-11 06:42:1438
[email protected]f3a1c642011-07-12 19:15:0339namespace base {
40class DictionaryValue;
41class ListValue;
[email protected]1f04ef42013-04-22 07:35:5042class Version;
[email protected]f3a1c642011-07-12 19:15:0343}
44
[email protected]0f34d9082012-10-08 19:16:4445namespace gfx {
46class ImageSkia;
47}
48
[email protected]1c321ee2012-05-21 03:02:3449namespace extensions {
[email protected]2cb5e302013-05-09 05:00:0650class PermissionsData;
[email protected]465594632013-02-15 19:50:2851class APIPermissionSet;
[email protected]bebe1d02012-08-02 20:17:0952class PermissionSet;
[email protected]1c321ee2012-05-21 03:02:3453
[email protected]f0755532010-06-22 07:27:2554// Represents a Chrome extension.
[email protected]5cd56342013-04-03 19:50:4755// Once created, an Extension object is immutable, with the exception of its
56// RuntimeData. This makes it safe to use on any thread, since access to the
57// RuntimeData is protected by a lock.
[email protected]66e4eb32010-10-27 20:37:4158class Extension : public base::RefCountedThreadSafe<Extension> {
[email protected]7713d632008-12-02 07:52:3359 public:
[email protected]d356c982012-12-12 19:32:5560 struct ManifestData;
[email protected]1e0f45a2012-06-13 00:31:0661
[email protected]10fb1992010-10-08 09:00:1762 typedef std::vector<std::string> ScriptingWhitelist;
[email protected]d356c982012-12-12 19:32:5563 typedef std::map<const std::string, linked_ptr<ManifestData> >
64 ManifestDataMap;
[email protected]b24d8312009-08-27 06:47:4665
[email protected]25b34332009-06-05 21:53:1966 enum State {
[email protected]0c6da502009-08-14 22:32:3967 DISABLED = 0,
[email protected]25b34332009-06-05 21:53:1968 ENABLED,
[email protected]79c833b52011-04-05 18:31:0169 // An external extension that the user uninstalled. We should not reinstall
70 // such extensions on startup.
71 EXTERNAL_EXTENSION_UNINSTALLED,
[email protected]8c484b742012-11-29 06:05:3672 // Special state for component extensions, since they are always loaded by
73 // the component loader, and should never be auto-installed on startup.
74 ENABLED_COMPONENT,
[email protected]0c6da502009-08-14 22:32:3975 NUM_STATES
[email protected]631cf822009-05-15 07:01:2576 };
[email protected]7713d632008-12-02 07:52:3377
[email protected]44d62b62012-04-11 00:06:0378 // Used to record the reason an extension was disabled.
[email protected]eb5e4f92012-08-15 23:33:2879 enum DeprecatedDisableReason {
80 DEPRECATED_DISABLE_UNKNOWN,
81 DEPRECATED_DISABLE_USER_ACTION,
82 DEPRECATED_DISABLE_PERMISSIONS_INCREASE,
83 DEPRECATED_DISABLE_RELOAD,
84 DEPRECATED_DISABLE_LAST, // Not used.
85 };
86
[email protected]44d62b62012-04-11 00:06:0387 enum DisableReason {
[email protected]eb5e4f92012-08-15 23:33:2888 DISABLE_NONE = 0,
89 DISABLE_USER_ACTION = 1 << 0,
90 DISABLE_PERMISSIONS_INCREASE = 1 << 1,
91 DISABLE_RELOAD = 1 << 2,
[email protected]215a7be2012-10-22 19:53:4292 DISABLE_UNSUPPORTED_REQUIREMENT = 1 << 3,
93 DISABLE_SIDELOAD_WIPEOUT = 1 << 4,
[email protected]f56c65ea62012-12-10 22:57:2194 DISABLE_UNKNOWN_FROM_SYNC = 1 << 5,
[email protected]44d62b62012-04-11 00:06:0395 };
96
[email protected]fbcc40302009-06-12 20:45:4597 enum InstallType {
[email protected]ab6f2b22009-07-28 23:28:3798 INSTALL_ERROR,
[email protected]fbcc40302009-06-12 20:45:4599 DOWNGRADE,
100 REINSTALL,
101 UPGRADE,
102 NEW_INSTALL
103 };
104
[email protected]3bdba0d2011-08-23 07:17:30105 enum SyncType {
106 SYNC_TYPE_NONE = 0,
107 SYNC_TYPE_EXTENSION,
108 SYNC_TYPE_APP
109 };
110
[email protected]65378f52011-04-08 02:31:23111 // An NaCl module included in the extension.
112 struct NaClModuleInfo {
[email protected]84396dbc2011-04-14 06:33:42113 GURL url;
[email protected]65378f52011-04-08 02:31:23114 std::string mime_type;
115 };
116
[email protected]d356c982012-12-12 19:32:55117 // A base class for parsed manifest data that APIs want to store on
118 // the extension. Related to base::SupportsUserData, but with an immutable
119 // thread-safe interface to match Extension.
120 struct ManifestData {
121 virtual ~ManifestData() {}
122 };
123
[email protected]83048a22011-03-29 00:14:13124 enum InitFromValueFlags {
125 NO_FLAGS = 0,
126
127 // Usually, the id of an extension is generated by the "key" property of
128 // its manifest, but if |REQUIRE_KEY| is not set, a temporary ID will be
129 // generated based on the path.
130 REQUIRE_KEY = 1 << 0,
131
[email protected]3f53dfe2011-11-30 01:18:29132 // Requires the extension to have an up-to-date manifest version.
133 // Typically, we'll support multiple manifest versions during a version
[email protected]26367b62012-10-04 23:03:32134 // transition. This flag signals that we want to require the most modern
[email protected]3f53dfe2011-11-30 01:18:29135 // manifest version that Chrome understands.
136 REQUIRE_MODERN_MANIFEST_VERSION = 1 << 1,
137
[email protected]3aff9ad2011-04-01 20:26:48138 // |ALLOW_FILE_ACCESS| indicates that the user is allowing this extension
139 // to have file access. If it's not present, then permissions and content
140 // scripts that match file:/// URLs will be filtered out.
[email protected]ed3b9b12012-05-31 18:37:51141 ALLOW_FILE_ACCESS = 1 << 2,
[email protected]620db1762011-07-15 21:57:34142
143 // |FROM_WEBSTORE| indicates that the extension was installed from the
144 // Chrome Web Store.
[email protected]ed3b9b12012-05-31 18:37:51145 FROM_WEBSTORE = 1 << 3,
[email protected]e805baf2011-07-26 18:23:05146
147 // |FROM_BOOKMARK| indicates the extension was created using a mock App
148 // created from a bookmark.
[email protected]ed3b9b12012-05-31 18:37:51149 FROM_BOOKMARK = 1 << 4,
[email protected]3d41d432012-04-20 20:47:58150
151 // |FOLLOW_SYMLINKS_ANYWHERE| means that resources can be symlinks to
152 // anywhere in the filesystem, rather than being restricted to the
153 // extension directory.
[email protected]ed3b9b12012-05-31 18:37:51154 FOLLOW_SYMLINKS_ANYWHERE = 1 << 5,
[email protected]ab55c2b2012-06-01 23:55:03155
156 // |ERROR_ON_PRIVATE_KEY| means that private keys inside an
157 // extension should be errors rather than warnings.
158 ERROR_ON_PRIVATE_KEY = 1 << 6,
[email protected]e33bbc22012-08-27 22:05:46159
160 // |WAS_INSTALLED_BY_DEFAULT| installed by default when the profile was
161 // created.
162 WAS_INSTALLED_BY_DEFAULT = 1 << 7,
[email protected]83048a22011-03-29 00:14:13163 };
164
[email protected]a7329162013-02-07 19:21:48165 static scoped_refptr<Extension> Create(const base::FilePath& path,
[email protected]1d5e58b2013-01-31 08:41:40166 Manifest::Location location,
[email protected]f3a1c642011-07-12 19:15:03167 const base::DictionaryValue& value,
[email protected]83048a22011-03-29 00:14:13168 int flags,
[email protected]66e4eb32010-10-27 20:37:41169 std::string* error);
170
[email protected]87c655e2011-07-01 21:42:00171 // In a few special circumstances, we want to create an Extension and give it
[email protected]f5bf1842012-02-15 02:52:26172 // an explicit id. Most consumers should just use the other Create() method.
[email protected]a7329162013-02-07 19:21:48173 static scoped_refptr<Extension> Create(const base::FilePath& path,
[email protected]2cb5e302013-05-09 05:00:06174 Manifest::Location location,
175 const base::DictionaryValue& value,
176 int flags,
177 const std::string& explicit_id,
178 std::string* error);
[email protected]87c655e2011-07-01 21:42:00179
[email protected]8d888c12010-11-30 00:00:25180 // Valid schemes for web extent URLPatterns.
181 static const int kValidWebExtentSchemes;
182
[email protected]f71f7e62010-12-07 03:45:33183 // Valid schemes for host permission URLPatterns.
184 static const int kValidHostPermissionSchemes;
185
[email protected]25b34332009-06-05 21:53:19186#if defined(OS_WIN)
[email protected]9dcf8f12010-09-02 20:39:19187 static const char kExtensionRegistryPath[];
[email protected]25b34332009-06-05 21:53:19188#endif
189
[email protected]e435d6b72009-07-25 03:15:58190 // The mimetype used for extensions.
191 static const char kMimeType[];
192
[email protected]25b34332009-06-05 21:53:19193 // Checks to see if the extension has a valid ID.
194 static bool IdIsValid(const std::string& id);
195
[email protected]e435d6b72009-07-25 03:15:58196 // Returns true if the specified file is an extension.
[email protected]a7329162013-02-07 19:21:48197 static bool IsExtension(const base::FilePath& file_name);
[email protected]e435d6b72009-07-25 03:15:58198
[email protected]fc6b0612012-03-29 13:40:06199 // Fills the |info| dictionary with basic information about the extension.
200 // |enabled| is injected for easier testing.
201 void GetBasicInfo(bool enabled, base::DictionaryValue* info) const;
202
[email protected]1d5e58b2013-01-31 08:41:40203 // See Type definition in Manifest.
204 Manifest::Type GetType() const;
[email protected]9b217652010-10-08 22:04:23205
[email protected]07c00d992009-03-04 20:27:04206 // Returns an absolute url to a resource inside of an extension. The
[email protected]eab9b452009-01-23 20:48:59207 // |extension_url| argument should be the url() from an Extension object. The
208 // |relative_path| can be untrusted user input. The returned URL will either
209 // be invalid() or a child of |extension_url|.
210 // NOTE: Static so that it can be used from multiple threads.
211 static GURL GetResourceURL(const GURL& extension_url,
212 const std::string& relative_path);
[email protected]cffd7892010-08-26 17:43:28213 GURL GetResourceURL(const std::string& relative_path) const {
[email protected]3cfbd0e2009-03-18 21:26:24214 return GetResourceURL(url(), relative_path);
215 }
[email protected]eab9b452009-01-23 20:48:59216
[email protected]f59a8052012-06-20 22:25:00217 // Returns true if the resource matches a pattern in the pattern_set.
218 bool ResourceMatches(const URLPatternSet& pattern_set,
219 const std::string& resource) const;
220
[email protected]99efb7b12009-12-18 02:39:16221 // Returns an extension resource object. |relative_path| should be UTF8
222 // encoded.
[email protected]9adb9692010-10-29 23:14:02223 ExtensionResource GetResource(const std::string& relative_path) const;
[email protected]99efb7b12009-12-18 02:39:16224
225 // As above, but with |relative_path| following the file system's encoding.
[email protected]a7329162013-02-07 19:21:48226 ExtensionResource GetResource(const base::FilePath& relative_path) const;
[email protected]eab9b452009-01-23 20:48:59227
[email protected]a17f9462009-06-09 02:56:41228 // |input| is expected to be the text of an rsa public or private key. It
229 // tolerates the presence or absence of bracking header/footer like this:
230 // -----(BEGIN|END) [RSA PUBLIC/PRIVATE] KEY-----
231 // and may contain newlines.
232 static bool ParsePEMKeyBytes(const std::string& input, std::string* output);
233
234 // Does a simple base64 encoding of |input| into |output|.
235 static bool ProducePEM(const std::string& input, std::string* output);
236
237 // Expects base64 encoded |input| and formats into |output| including
238 // the appropriate header & footer.
[email protected]e0d08192011-03-29 19:02:50239 static bool FormatPEMForFileOutput(const std::string& input,
240 std::string* output,
241 bool is_public);
[email protected]a17f9462009-06-09 02:56:41242
[email protected]a807bbe2010-04-14 10:51:19243 // Returns the base extension url for a given |extension_id|.
244 static GURL GetBaseURLFromExtensionId(const std::string& extension_id);
245
[email protected]be7e5cb2010-10-04 12:53:17246 // Adds an extension to the scripting whitelist. Used for testing only.
[email protected]10fb1992010-10-08 09:00:17247 static void SetScriptingWhitelist(const ScriptingWhitelist& whitelist);
[email protected]2a521c52011-01-26 18:45:21248 static const ScriptingWhitelist* GetScriptingWhitelist();
[email protected]be7e5cb2010-10-04 12:53:17249
[email protected]d624b0b2012-12-12 04:05:19250 // Returns true if this extension has the given permission. Prefer
251 // IsExtensionWithPermissionOrSuggestInConsole when developers may be using an
252 // api that requires a permission they didn't know about, e.g. open web apis.
[email protected]c2e66e12012-06-27 06:27:06253 bool HasAPIPermission(APIPermission::ID permission) const;
[email protected]0d3e4a22011-06-23 19:02:52254 bool HasAPIPermission(const std::string& function_name) const;
[email protected]3d0e2262012-08-02 15:32:16255 bool HasAPIPermissionForTab(int tab_id, APIPermission::ID permission) const;
[email protected]583d45c12010-08-31 02:48:12256
[email protected]2cb5e302013-05-09 05:00:06257 bool CheckAPIPermissionWithParam(
258 APIPermission::ID permission,
[email protected]ecb9ad12012-08-21 13:02:15259 const APIPermission::CheckParam* param) const;
[email protected]1d8b79a2012-08-16 20:22:54260
[email protected]0d3e4a22011-06-23 19:02:52261 const URLPatternSet& GetEffectiveHostPermissions() const;
[email protected]b24d8312009-08-27 06:47:46262
[email protected]902fd7b2011-07-27 18:42:31263 // Returns true if the extension can silently increase its permission level.
[email protected]0d904312012-01-25 23:00:16264 // Users must approve permissions for unpacked and packed extensions in the
265 // following situations:
266 // - when installing or upgrading packed extensions
267 // - when installing unpacked extensions that have NPAPI plugins
268 // - when either type of extension requests optional permissions
[email protected]902fd7b2011-07-27 18:42:31269 bool CanSilentlyIncreasePermissions() const;
270
[email protected]584b8e3f2010-04-10 00:23:37271 // Whether the extension has access to the given URL.
272 bool HasHostPermission(const GURL& url) const;
273
[email protected]0df165f2010-09-28 16:49:40274 // Whether the extension has effective access to all hosts. This is true if
275 // there is a content script that matches all hosts, if there is a host
276 // permission grants access to all hosts (like <all_urls>) or an api
277 // permission that effectively grants access to all hosts (e.g. proxy,
278 // network, etc.)
279 bool HasEffectiveAccessToAllHosts() const;
[email protected]b24d8312009-08-27 06:47:46280
[email protected]8d888c12010-11-30 00:00:25281 // Whether the extension effectively has all permissions (for example, by
282 // having an NPAPI plugin).
283 bool HasFullPermissions() const;
284
[email protected]902fd7b2011-07-27 18:42:31285 // Returns the full list of permission messages that this extension
286 // should display at install time.
[email protected]c2e66e12012-06-27 06:27:06287 PermissionMessages GetPermissionMessages() const;
[email protected]902fd7b2011-07-27 18:42:31288
289 // Returns the full list of permission messages that this extension
290 // should display at install time. The messages are returned as strings
291 // for convenience.
292 std::vector<string16> GetPermissionMessageStrings() const;
293
[email protected]b0d1d0b2012-11-02 21:19:03294 // Returns true if the extension does not require permission warnings
295 // to be displayed at install time.
296 bool ShouldSkipPermissionWarnings() const;
297
[email protected]902fd7b2011-07-27 18:42:31298 // Sets the active |permissions|.
[email protected]c2e66e12012-06-27 06:27:06299 void SetActivePermissions(const PermissionSet* permissions) const;
[email protected]902fd7b2011-07-27 18:42:31300
301 // Gets the extension's active permission set.
[email protected]c2e66e12012-06-27 06:27:06302 scoped_refptr<const PermissionSet> GetActivePermissions() const;
[email protected]902fd7b2011-07-27 18:42:31303
[email protected]5df6a5d2011-01-26 07:39:12304 // Whether context menu should be shown for page and browser actions.
305 bool ShowConfigureContextMenus() const;
306
[email protected]867a73e12010-03-19 20:45:46307 // Gets the fully resolved absolute launch URL.
308 GURL GetFullLaunchURL() const;
[email protected]2a521c52011-01-26 18:45:21309
[email protected]2a521c52011-01-26 18:45:21310 // Returns true if this extension can execute script on a page. If a
311 // UserScript object is passed, permission to run that specific script is
312 // checked (using its matches list). Otherwise, permission to execute script
313 // programmatically is checked (using the extension's host permission).
314 //
315 // This method is also aware of certain special pages that extensions are
316 // usually not allowed to run script on.
[email protected]78bdfd662012-08-23 05:53:18317 bool CanExecuteScriptOnPage(const GURL& document_url,
318 const GURL& top_document_url,
[email protected]fc5e65d6b2012-06-13 00:22:57319 int tab_id,
[email protected]3aff9ad2011-04-01 20:26:48320 const UserScript* script,
[email protected]2a521c52011-01-26 18:45:21321 std::string* error) const;
322
[email protected]6f229e82010-11-02 17:47:26323 // Returns true if this extension is a COMPONENT extension, or if it is
324 // on the whitelist of extensions that can script all pages.
325 bool CanExecuteScriptEverywhere() const;
326
[email protected]5efbfe012011-02-22 23:07:18327 // Returns true if this extension is allowed to obtain the contents of a
328 // page as an image. Since a page may contain sensitive information, this
329 // is restricted to the extension's host permissions as well as the
330 // extension page itself.
[email protected]fc5e65d6b2012-06-13 00:22:57331 bool CanCaptureVisiblePage(const GURL& page_url,
332 int tab_id,
333 std::string* error) const;
[email protected]5efbfe012011-02-22 23:07:18334
[email protected]a65882c2010-11-12 15:15:09335 // Returns true if this extension updates itself using the extension
336 // gallery.
337 bool UpdatesFromGallery() const;
338
[email protected]cca147172011-02-17 01:29:29339 // Returns true if this extension or app includes areas within |origin|.
340 bool OverlapsWithOrigin(const GURL& origin) const;
341
[email protected]3bdba0d2011-08-23 07:17:30342 // Returns the sync bucket to use for this extension.
343 SyncType GetSyncType() const;
344
[email protected]b873cd92012-02-09 21:51:48345 // Returns true if the extension should be synced.
346 bool IsSyncable() const;
347
[email protected]7e0f92b2012-11-09 03:51:04348 // Returns true if the extension requires a valid ordinal for sorting, e.g.,
349 // for displaying in a launcher or new tab page.
350 bool RequiresSortOrdinal() const;
351
352 // Returns true if the extension should be displayed in the app launcher.
353 bool ShouldDisplayInAppLauncher() const;
354
355 // Returns true if the extension should be displayed in the browser NTP.
356 bool ShouldDisplayInNewTabPage() const;
[email protected]b873cd92012-02-09 21:51:48357
[email protected]e0b3de72012-05-01 01:21:34358 // Returns true if the extension should be displayed in the extension
359 // settings page (i.e. chrome://extensions).
360 bool ShouldDisplayInExtensionSettings() const;
361
[email protected]fc5e65d6b2012-06-13 00:22:57362 // Gets the tab-specific host permissions of |tab_id|, or NULL if there
363 // aren't any.
[email protected]3d0e2262012-08-02 15:32:16364 scoped_refptr<const PermissionSet> GetTabSpecificPermissions(int tab_id)
365 const;
[email protected]fc5e65d6b2012-06-13 00:22:57366
[email protected]3d0e2262012-08-02 15:32:16367 // Updates the tab-specific permissions of |tab_id| to include those from
368 // |permissions|.
[email protected]6144057e2012-08-02 19:02:37369 void UpdateTabSpecificPermissions(
370 int tab_id,
371 scoped_refptr<const PermissionSet> permissions) const;
[email protected]fc5e65d6b2012-06-13 00:22:57372
[email protected]3d0e2262012-08-02 15:32:16373 // Clears the tab-specific permissions of |tab_id|.
374 void ClearTabSpecificPermissions(int tab_id) const;
[email protected]fc5e65d6b2012-06-13 00:22:57375
[email protected]d356c982012-12-12 19:32:55376 // Get the manifest data associated with the key, or NULL if there is none.
377 // Can only be called after InitValue is finished.
378 ManifestData* GetManifestData(const std::string& key) const;
379
380 // Sets |data| to be associated with the key. Takes ownership of |data|.
381 // Can only be called before InitValue is finished. Not thread-safe;
382 // all SetManifestData calls should be on only one thread.
383 void SetManifestData(const std::string& key, ManifestData* data);
384
[email protected]6f229e82010-11-02 17:47:26385 // Accessors:
386
[email protected]a7329162013-02-07 19:21:48387 const base::FilePath& path() const { return path_; }
[email protected]6f229e82010-11-02 17:47:26388 const GURL& url() const { return extension_url_; }
[email protected]1d5e58b2013-01-31 08:41:40389 Manifest::Location location() const;
[email protected]d41e2152012-02-24 04:20:27390 const std::string& id() const;
[email protected]1f04ef42013-04-22 07:35:50391 const base::Version* version() const { return version_.get(); }
[email protected]6f229e82010-11-02 17:47:26392 const std::string VersionString() const;
393 const std::string& name() const { return name_; }
[email protected]701d1e82012-05-14 05:34:19394 const std::string& non_localized_name() const { return non_localized_name_; }
[email protected]200423d2012-06-05 01:16:06395 // Base64-encoded version of the key used to sign this extension.
396 // In pseudocode, returns
397 // base::Base64Encode(RSAPrivateKey(pem_file).ExportPublicKey()).
398 const std::string& public_key() const { return public_key_; }
[email protected]6f229e82010-11-02 17:47:26399 const std::string& description() const { return description_; }
[email protected]a47c8a22011-11-17 18:40:31400 int manifest_version() const { return manifest_version_; }
[email protected]6f229e82010-11-02 17:47:26401 bool converted_from_user_script() const {
402 return converted_from_user_script_;
403 }
[email protected]65378f52011-04-08 02:31:23404 const std::vector<NaClModuleInfo>& nacl_modules() const {
405 return nacl_modules_;
406 }
[email protected]2cb5e302013-05-09 05:00:06407 PermissionsData* permissions_data() { return permissions_data_.get(); }
408 const PermissionsData* permissions_data() const {
409 return permissions_data_.get();
[email protected]902fd7b2011-07-27 18:42:31410 }
[email protected]2cb5e302013-05-09 05:00:06411
[email protected]23b3c0a2013-01-16 23:36:36412 // Appends |new_warning[s]| to install_warnings_.
413 void AddInstallWarning(const InstallWarning& new_warning);
[email protected]1d5e58b2013-01-31 08:41:40414 void AddInstallWarnings(const std::vector<InstallWarning>& new_warnings);
415 const std::vector<InstallWarning>& install_warnings() const {
[email protected]8629c542012-04-20 03:40:03416 return install_warnings_;
417 }
[email protected]953620b2011-12-04 00:55:32418 const extensions::Manifest* manifest() const {
[email protected]e9629d772012-08-06 19:44:46419 return manifest_.get();
[email protected]6f229e82010-11-02 17:47:26420 }
[email protected]3aff9ad2011-04-01 20:26:48421 bool wants_file_access() const { return wants_file_access_; }
[email protected]334ec0a2013-03-24 01:36:16422 // TODO(rdevlin.cronin): This is needed for ContentScriptsHandler, and should
423 // be moved out as part of crbug.com/159265. This should not be used anywhere
424 // else.
425 void set_wants_file_access(bool wants_file_access) {
426 wants_file_access_ = wants_file_access;
427 }
[email protected]2af352b2011-07-22 08:21:23428 int creation_flags() const { return creation_flags_; }
429 bool from_webstore() const { return (creation_flags_ & FROM_WEBSTORE) != 0; }
[email protected]e805baf2011-07-26 18:23:05430 bool from_bookmark() const { return (creation_flags_ & FROM_BOOKMARK) != 0; }
[email protected]e33bbc22012-08-27 22:05:46431 bool was_installed_by_default() const {
432 return (creation_flags_ & WAS_INSTALLED_BY_DEFAULT) != 0;
433 }
[email protected]3aff9ad2011-04-01 20:26:48434
[email protected]6f229e82010-11-02 17:47:26435 // App-related.
[email protected]21c01042013-03-10 23:41:14436 bool is_app() const;
[email protected]d41e2152012-02-24 04:20:27437 bool is_platform_app() const;
438 bool is_hosted_app() const;
[email protected]c4f459d2012-09-28 04:40:10439 bool is_legacy_packaged_app() const;
[email protected]ff05a4b102012-12-19 00:12:06440 bool is_extension() const;
[email protected]cdc7b1f42012-12-07 19:39:48441 bool can_be_incognito_enabled() const;
[email protected]636ee43282013-01-12 15:58:00442 void AddWebExtentPattern(const URLPattern& pattern);
[email protected]cced75a2011-05-20 08:31:12443 const URLPatternSet& web_extent() const { return extent_; }
[email protected]6f229e82010-11-02 17:47:26444 const std::string& launch_local_path() const { return launch_local_path_; }
445 const std::string& launch_web_url() const { return launch_web_url_; }
446 extension_misc::LaunchContainer launch_container() const {
447 return launch_container_;
448 }
[email protected]dc37b002012-04-23 23:02:26449 int launch_width() const { return launch_width_; }
450 int launch_height() const { return launch_height_; }
[email protected]6f229e82010-11-02 17:47:26451
452 // Theme-related.
[email protected]d41e2152012-02-24 04:20:27453 bool is_theme() const;
[email protected]6f229e82010-11-02 17:47:26454
[email protected]4a8d3272009-03-10 19:15:08455 private:
[email protected]66e4eb32010-10-27 20:37:41456 friend class base::RefCountedThreadSafe<Extension>;
457
[email protected]902fd7b2011-07-27 18:42:31458 class RuntimeData {
459 public:
460 RuntimeData();
[email protected]c2e66e12012-06-27 06:27:06461 explicit RuntimeData(const PermissionSet* active);
[email protected]902fd7b2011-07-27 18:42:31462 ~RuntimeData();
463
[email protected]c2e66e12012-06-27 06:27:06464 void SetActivePermissions(const PermissionSet* active);
465 scoped_refptr<const PermissionSet> GetActivePermissions() const;
[email protected]902fd7b2011-07-27 18:42:31466
[email protected]3d0e2262012-08-02 15:32:16467 scoped_refptr<const PermissionSet> GetTabSpecificPermissions(int tab_id)
468 const;
[email protected]6144057e2012-08-02 19:02:37469 void UpdateTabSpecificPermissions(
470 int tab_id,
471 scoped_refptr<const PermissionSet> permissions);
[email protected]3d0e2262012-08-02 15:32:16472 void ClearTabSpecificPermissions(int tab_id);
[email protected]fc5e65d6b2012-06-13 00:22:57473
[email protected]902fd7b2011-07-27 18:42:31474 private:
475 friend class base::RefCountedThreadSafe<RuntimeData>;
[email protected]fc5e65d6b2012-06-13 00:22:57476
[email protected]c2e66e12012-06-27 06:27:06477 scoped_refptr<const PermissionSet> active_permissions_;
[email protected]fc5e65d6b2012-06-13 00:22:57478
[email protected]3d0e2262012-08-02 15:32:16479 typedef std::map<int, scoped_refptr<const PermissionSet> >
480 TabPermissionsMap;
481 TabPermissionsMap tab_specific_permissions_;
[email protected]902fd7b2011-07-27 18:42:31482 };
483
[email protected]d41e2152012-02-24 04:20:27484 // Chooses the extension ID for an extension based on a variety of criteria.
485 // The chosen ID will be set in |manifest|.
486 static bool InitExtensionID(extensions::Manifest* manifest,
[email protected]a7329162013-02-07 19:21:48487 const base::FilePath& path,
[email protected]d41e2152012-02-24 04:20:27488 const std::string& explicit_id,
489 int creation_flags,
490 string16* error);
491
[email protected]87c655e2011-07-01 21:42:00492 // Returns true if this extension id is from a trusted provider.
493 static bool IsTrustedId(const std::string& id);
494
[email protected]a7329162013-02-07 19:21:48495 Extension(const base::FilePath& path,
496 scoped_ptr<extensions::Manifest> manifest);
[email protected]d356c982012-12-12 19:32:55497 virtual ~Extension();
[email protected]66e4eb32010-10-27 20:37:41498
499 // Initialize the extension from a parsed manifest.
[email protected]d41e2152012-02-24 04:20:27500 // TODO(aa): Rename to just Init()? There's no Value here anymore.
501 // TODO(aa): It is really weird the way this class essentially contains a copy
502 // of the underlying DictionaryValue in its members. We should decide to
503 // either wrap the DictionaryValue and go with that only, or we should parse
504 // into strong types and discard the value. But doing both is bad.
505 bool InitFromValue(int flags, string16* error);
[email protected]66e4eb32010-10-27 20:37:41506
[email protected]58f62cf2012-03-09 10:45:11507 // The following are helpers for InitFromValue to load various features of the
508 // extension from the manifest.
509
[email protected]465594632013-02-15 19:50:28510 bool LoadAppIsolation(string16* error);
[email protected]58f62cf2012-03-09 10:45:11511
512 bool LoadRequiredFeatures(string16* error);
513 bool LoadName(string16* error);
514 bool LoadVersion(string16* error);
515
516 bool LoadAppFeatures(string16* error);
[email protected]d41e2152012-02-24 04:20:27517 bool LoadExtent(const char* key,
518 URLPatternSet* extent,
519 const char* list_error,
520 const char* value_error,
521 string16* error);
522 bool LoadLaunchContainer(string16* error);
523 bool LoadLaunchURL(string16* error);
[email protected]10253da2012-03-09 04:06:42524
[email protected]465594632013-02-15 19:50:28525 bool LoadSharedFeatures(string16* error);
[email protected]58f62cf2012-03-09 10:45:11526 bool LoadDescription(string16* error);
527 bool LoadManifestVersion(string16* error);
[email protected]58f62cf2012-03-09 10:45:11528 bool LoadNaClModules(string16* error);
[email protected]66008002013-01-08 09:09:13529
[email protected]2f6698b2010-10-14 00:58:21530 // Returns true if the extension has more than one "UI surface". For example,
531 // an extension that has a browser action and a page action.
532 bool HasMultipleUISurfaces() const;
533
[email protected]be9d9c82011-07-13 04:17:31534 // Updates the launch URL and extents for the extension using the given
535 // |override_url|.
536 void OverrideLaunchUrl(const GURL& override_url);
537
[email protected]488e6502012-09-07 14:17:34538 bool CheckMinimumChromeVersion(string16* error) const;
[email protected]488e6502012-09-07 14:17:34539
[email protected]e92169e2012-05-04 22:49:32540 // Check that platform app features are valid. Called after InitFromValue.
[email protected]9a494872013-03-02 03:05:45541 bool CheckPlatformAppFeatures(string16* error) const;
[email protected]e92169e2012-05-04 22:49:32542
[email protected]f1bab9c92012-05-11 21:15:10543 // Check that features don't conflict. Called after InitFromValue.
[email protected]9a494872013-03-02 03:05:45544 bool CheckConflictingFeatures(string16* error) const;
[email protected]f1bab9c92012-05-11 21:15:10545
[email protected]6f229e82010-11-02 17:47:26546 // The extension's human-readable name. Name is used for display purpose. It
547 // might be wrapped with unicode bidi control characters so that it is
548 // displayed correctly in RTL context.
549 // NOTE: Name is UTF-8 and may contain non-ascii characters.
550 std::string name_;
551
[email protected]701d1e82012-05-14 05:34:19552 // A non-localized version of the extension's name. This is useful for
553 // debug output.
554 std::string non_localized_name_;
555
[email protected]a47c8a22011-11-17 18:40:31556 // The version of this extension's manifest. We increase the manifest
557 // version when making breaking changes to the extension system.
558 // Version 1 was the first manifest version (implied by a lack of a
559 // manifest_version attribute in the extension's manifest). We initialize
560 // this member variable to 0 to distinguish the "uninitialized" case from
561 // the case when we know the manifest version actually is 1.
562 int manifest_version_;
563
[email protected]d41e2152012-02-24 04:20:27564 // The absolute path to the directory the extension is stored in.
[email protected]a7329162013-02-07 19:21:48565 base::FilePath path_;
[email protected]d41e2152012-02-24 04:20:27566
[email protected]6f229e82010-11-02 17:47:26567 // Defines the set of URLs in the extension's web content.
[email protected]cced75a2011-05-20 08:31:12568 URLPatternSet extent_;
[email protected]6f229e82010-11-02 17:47:26569
[email protected]902fd7b2011-07-27 18:42:31570 // The extension runtime data.
571 mutable base::Lock runtime_data_lock_;
572 mutable RuntimeData runtime_data_;
573
[email protected]2cb5e302013-05-09 05:00:06574 scoped_ptr<PermissionsData> permissions_data_;
[email protected]6f229e82010-11-02 17:47:26575
[email protected]8629c542012-04-20 03:40:03576 // Any warnings that occurred when trying to create/parse the extension.
[email protected]1d5e58b2013-01-31 08:41:40577 std::vector<InstallWarning> install_warnings_;
[email protected]8629c542012-04-20 03:40:03578
[email protected]6f229e82010-11-02 17:47:26579 // The base extension url for the extension.
580 GURL extension_url_;
581
[email protected]6f229e82010-11-02 17:47:26582 // The extension's version.
[email protected]1f04ef42013-04-22 07:35:50583 scoped_ptr<base::Version> version_;
[email protected]6f229e82010-11-02 17:47:26584
585 // An optional longer description of the extension.
586 std::string description_;
587
588 // True if the extension was generated from a user script. (We show slightly
589 // different UI if so).
590 bool converted_from_user_script_;
591
[email protected]65378f52011-04-08 02:31:23592 // Optional list of NaCl modules and associated properties.
593 std::vector<NaClModuleInfo> nacl_modules_;
594
[email protected]6f229e82010-11-02 17:47:26595 // The public key used to sign the contents of the crx package.
596 std::string public_key_;
597
[email protected]58f62cf2012-03-09 10:45:11598 // The manifest from which this extension was created.
[email protected]e9629d772012-08-06 19:44:46599 scoped_ptr<Manifest> manifest_;
[email protected]6f229e82010-11-02 17:47:26600
[email protected]d356c982012-12-12 19:32:55601 // Stored parsed manifest data.
602 ManifestDataMap manifest_data_;
603
604 // Set to true at the end of InitValue when initialization is finished.
605 bool finished_parsing_manifest_;
606
[email protected]7eeab9ec2013-01-15 04:08:33607 // Ensures that any call to GetManifestData() prior to finishing
608 // initialization happens from the same thread (this can happen when certain
609 // parts of the initialization process need information from previous parts).
610 base::ThreadChecker thread_checker_;
611
[email protected]6f229e82010-11-02 17:47:26612 // The local path inside the extension to use with the launcher.
613 std::string launch_local_path_;
614
615 // A web url to use with the launcher. Note that this might be relative or
616 // absolute. If relative, it is relative to web_origin.
617 std::string launch_web_url_;
618
[email protected]4e595682011-02-09 17:07:02619 // The window type that an app's manifest specifies to launch into.
620 // This is not always the window type an app will open into, because
621 // users can override the way each app launches. See
622 // ExtensionPrefs::GetLaunchContainer(), which looks at a per-app pref
623 // to decide what container an app will launch in.
[email protected]6f229e82010-11-02 17:47:26624 extension_misc::LaunchContainer launch_container_;
625
626 // The default size of the container when launching. Only respected for
627 // containers like panels and windows.
628 int launch_width_;
629 int launch_height_;
630
[email protected]7e0f92b2012-11-09 03:51:04631 // Should this app be shown in the app launcher.
[email protected]ed1a204f2012-09-22 00:28:44632 bool display_in_launcher_;
633
[email protected]7e0f92b2012-11-09 03:51:04634 // Should this app be shown in the browser New Tab Page.
635 bool display_in_new_tab_page_;
636
[email protected]3aff9ad2011-04-01 20:26:48637 // Whether the extension has host permissions or user script patterns that
638 // imply access to file:/// scheme URLs (the user may not have actually
639 // granted it that access).
640 bool wants_file_access_;
641
[email protected]2af352b2011-07-22 08:21:23642 // The flags that were passed to InitFromValue.
643 int creation_flags_;
[email protected]620db1762011-07-15 21:57:34644
[email protected]894bb502009-05-21 22:39:57645 DISALLOW_COPY_AND_ASSIGN(Extension);
[email protected]7713d632008-12-02 07:52:33646};
647
[email protected]bc151cf92013-02-12 04:57:26648typedef std::vector<scoped_refptr<const Extension> > ExtensionList;
[email protected]ec5b50d2010-10-09 16:35:18649typedef std::set<std::string> ExtensionIdSet;
[email protected]82590cb2012-09-28 04:14:08650typedef std::vector<std::string> ExtensionIdList;
[email protected]b1748b1d82009-11-30 20:32:56651
[email protected]c6d474f82009-12-16 21:11:06652// Handy struct to pass core extension info around.
653struct ExtensionInfo {
[email protected]f3a1c642011-07-12 19:15:03654 ExtensionInfo(const base::DictionaryValue* manifest,
[email protected]c6d474f82009-12-16 21:11:06655 const std::string& id,
[email protected]a7329162013-02-07 19:21:48656 const base::FilePath& path,
[email protected]1d5e58b2013-01-31 08:41:40657 Manifest::Location location);
[email protected]3bb84992010-08-26 17:23:46658 ~ExtensionInfo();
[email protected]c6d474f82009-12-16 21:11:06659
[email protected]f3a1c642011-07-12 19:15:03660 scoped_ptr<base::DictionaryValue> extension_manifest;
[email protected]c6d474f82009-12-16 21:11:06661 std::string extension_id;
[email protected]a7329162013-02-07 19:21:48662 base::FilePath extension_path;
[email protected]1d5e58b2013-01-31 08:41:40663 Manifest::Location extension_location;
[email protected]c6d474f82009-12-16 21:11:06664
665 private:
666 DISALLOW_COPY_AND_ASSIGN(ExtensionInfo);
667};
668
[email protected]41bb80bd2013-05-03 10:56:02669struct InstalledExtensionInfo {
670 // The extension being installed - this should always be non-NULL.
671 const Extension* extension;
672
673 // True if the extension is being updated; false if it is being installed.
674 bool is_update;
675
676 InstalledExtensionInfo(const Extension* extension, bool is_update);
677};
678
[email protected]a9f39a312010-12-23 22:14:27679struct UnloadedExtensionInfo {
[email protected]814a7bf0f2011-08-13 05:30:59680 extension_misc::UnloadedExtensionReason reason;
[email protected]a9f39a312010-12-23 22:14:27681
682 // Was the extension already disabled?
683 bool already_disabled;
684
685 // The extension being unloaded - this should always be non-NULL.
686 const Extension* extension;
687
[email protected]814a7bf0f2011-08-13 05:30:59688 UnloadedExtensionInfo(
689 const Extension* extension,
690 extension_misc::UnloadedExtensionReason reason);
[email protected]a9f39a312010-12-23 22:14:27691};
692
[email protected]902fd7b2011-07-27 18:42:31693// The details sent for EXTENSION_PERMISSIONS_UPDATED notifications.
694struct UpdatedExtensionPermissionsInfo {
695 enum Reason {
[email protected]f5532472012-02-23 13:00:55696 ADDED, // The permissions were added to the extension.
697 REMOVED, // The permissions were removed from the extension.
[email protected]902fd7b2011-07-27 18:42:31698 };
699
700 Reason reason;
701
702 // The extension who's permissions have changed.
703 const Extension* extension;
704
705 // The permissions that have changed. For Reason::ADDED, this would contain
706 // only the permissions that have added, and for Reason::REMOVED, this would
707 // only contain the removed permissions.
[email protected]c2e66e12012-06-27 06:27:06708 const PermissionSet* permissions;
[email protected]902fd7b2011-07-27 18:42:31709
710 UpdatedExtensionPermissionsInfo(
711 const Extension* extension,
[email protected]c2e66e12012-06-27 06:27:06712 const PermissionSet* permissions,
[email protected]902fd7b2011-07-27 18:42:31713 Reason reason);
714};
715
[email protected]488e6502012-09-07 14:17:34716} // namespace extensions
[email protected]1c321ee2012-05-21 03:02:34717
[email protected]5b1a0e22009-05-26 19:00:58718#endif // CHROME_COMMON_EXTENSIONS_EXTENSION_H_