blob: 101369a0ae7fc58e43fa29ebc67bc68fbc613708 [file] [log] [blame]
[email protected]8e7b2cf42012-04-18 14:26:581// Copyright (c) 2012 The Chromium Authors. All rights reserved.
[email protected]d8c8f25f2011-11-02 18:18:012// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#ifndef CHROME_BROWSER_EXTENSIONS_UNPACKED_INSTALLER_H_
6#define CHROME_BROWSER_EXTENSIONS_UNPACKED_INSTALLER_H_
[email protected]d8c8f25f2011-11-02 18:18:017
dchengc963c7142016-04-08 03:55:228#include <memory>
[email protected]d8c8f25f2011-11-02 18:18:019#include <string>
[email protected]98270432012-09-11 20:51:2410#include <vector>
[email protected]d8c8f25f2011-11-02 18:18:0111
[email protected]500c7bb2014-04-26 22:44:3312#include "base/bind.h"
[email protected]57999812013-02-24 05:40:5213#include "base/files/file_path.h"
avia2f4804a2015-12-24 23:11:1314#include "base/macros.h"
[email protected]d8c8f25f2011-11-02 18:18:0115#include "base/memory/ref_counted.h"
16#include "base/memory/weak_ptr.h"
michaelpg6a4874f2017-04-13 20:41:3317#include "extensions/browser/preload_check.h"
Karan Bhatiafe12281a2017-09-16 02:38:1818#include "extensions/common/manifest.h"
[email protected]d8c8f25f2011-11-02 18:18:0119
[email protected]d8c8f25f2011-11-02 18:18:0120class ExtensionService;
dgozmand741d25d2017-03-23 00:35:3421class Profile;
[email protected]d8c8f25f2011-11-02 18:18:0122
23namespace extensions {
24
[email protected]1c321ee2012-05-21 03:02:3425class Extension;
michaelpg6a4874f2017-04-13 20:41:3326class PreloadCheckGroup;
[email protected]1c321ee2012-05-21 03:02:3427
[email protected]98270432012-09-11 20:51:2428// Installs and loads an unpacked extension. Because internal state needs to be
29// held about the instalation process, only one call to Load*() should be made
30// per UnpackedInstaller.
[email protected]d8c8f25f2011-11-02 18:18:0131// TODO(erikkay): It might be useful to be able to load a packed extension
32// (presumably into memory) without installing it.
33class UnpackedInstaller
34 : public base::RefCountedThreadSafe<UnpackedInstaller> {
35 public:
rdevlin.croninf6ea63a2015-03-04 17:51:0436 using CompletionCallback = base::Callback<void(const Extension* extension,
37 const base::FilePath&,
38 const std::string&)>;
[email protected]500c7bb2014-04-26 22:44:3339
[email protected]d8c8f25f2011-11-02 18:18:0140 static scoped_refptr<UnpackedInstaller> Create(
41 ExtensionService* extension_service);
42
43 // Loads the extension from the directory |extension_path|, which is
44 // the top directory of a specific extension where its manifest file lives.
45 // Errors are reported through ExtensionErrorReporter. On success,
46 // ExtensionService::AddExtension() is called.
[email protected]650b2d52013-02-10 03:41:4547 void Load(const base::FilePath& extension_path);
[email protected]d8c8f25f2011-11-02 18:18:0148
49 // Loads the extension from the directory |extension_path|;
[email protected]2a69b942013-05-31 09:37:5350 // for use with command line switch --load-extension=path or
51 // --load-and-launch-app=path.
52 // This is equivalent to Load, except that it reads the extension from
53 // |extension_path| synchronously.
54 // The return value indicates whether the installation has begun successfully.
55 // The id of the extension being loaded is returned in |extension_id|.
proberge80a37f32016-08-04 19:44:5556 // |only_allow_apps| is used to avoid side-loading of non-app extensions.
[email protected]2a69b942013-05-31 09:37:5357 bool LoadFromCommandLine(const base::FilePath& extension_path,
proberge80a37f32016-08-04 19:44:5558 std::string* extension_id,
59 bool only_allow_apps);
[email protected]d8c8f25f2011-11-02 18:18:0160
61 // Allows prompting for plugins to be disabled; intended for testing only.
62 bool prompt_for_plugins() { return prompt_for_plugins_; }
63 void set_prompt_for_plugins(bool val) { prompt_for_plugins_ = val; }
64
[email protected]b7462f32012-09-02 15:18:1265 // Allows overriding of whether modern manifest versions are required;
66 // intended for testing.
67 bool require_modern_manifest_version() const {
68 return require_modern_manifest_version_;
69 }
70 void set_require_modern_manifest_version(bool val) {
71 require_modern_manifest_version_ = val;
72 }
73
[email protected]1f0722442014-05-01 17:26:0274 void set_be_noisy_on_failure(bool be_noisy_on_failure) {
75 be_noisy_on_failure_ = be_noisy_on_failure;
76 }
77
rdevlin.croninf6ea63a2015-03-04 17:51:0478 void set_completion_callback(const CompletionCallback& callback) {
79 callback_ = callback;
80 }
81
[email protected]d8c8f25f2011-11-02 18:18:0182 private:
83 friend class base::RefCountedThreadSafe<UnpackedInstaller>;
84
85 explicit UnpackedInstaller(ExtensionService* extension_service);
86 virtual ~UnpackedInstaller();
87
[email protected]98270432012-09-11 20:51:2488 // Must be called from the UI thread.
[email protected]849749d2013-05-06 17:30:4589 void ShowInstallPrompt();
90
[email protected]253fc2bb2014-07-10 04:21:1891 // Begin management policy and requirements checks.
92 void StartInstallChecks();
[email protected]98270432012-09-11 20:51:2493
michaelpg6a4874f2017-04-13 20:41:3394 // Callback from PreloadCheckGroup.
Istiaque Ahmed400c83a2017-10-11 02:39:3595 void OnInstallChecksComplete(const PreloadCheck::Errors& errors);
[email protected]98270432012-09-11 20:51:2496
[email protected]8e7b2cf42012-04-18 14:26:5897 // Verifies if loading unpacked extensions is allowed.
98 bool IsLoadingUnpackedAllowed() const;
99
[email protected]d8c8f25f2011-11-02 18:18:01100 // We change the input extension path to an absolute path, on the file thread.
101 // Then we need to check the file access preference, which needs
102 // to happen back on the UI thread, so it posts CheckExtensionFileAccess on
103 // the UI thread. In turn, once that gets the pref, it goes back to the
104 // file thread with LoadWithFileAccess.
105 // TODO(yoz): It would be nice to remove this ping-pong, but we need to know
[email protected]85df9d12014-04-15 17:02:14106 // what file access flags to pass to file_util::LoadExtension.
[email protected]d8c8f25f2011-11-02 18:18:01107 void GetAbsolutePath();
108 void CheckExtensionFileAccess();
[email protected]b7462f32012-09-02 15:18:12109 void LoadWithFileAccess(int flags);
[email protected]d8c8f25f2011-11-02 18:18:01110
[email protected]add57db72014-04-01 23:25:22111 // Notify the frontend that an attempt to retry will not be necessary.
112 void UnregisterLoadRetryListener();
113
[email protected]d8c8f25f2011-11-02 18:18:01114 // Notify the frontend that there was an error loading an extension.
115 void ReportExtensionLoadError(const std::string& error);
116
[email protected]253fc2bb2014-07-10 04:21:18117 // Passes the extension onto extension service.
118 void InstallExtension();
[email protected]d8c8f25f2011-11-02 18:18:01119
[email protected]b7462f32012-09-02 15:18:12120 // Helper to get the Extension::CreateFlags for the installing extension.
121 int GetFlags();
122
Karan Bhatiafe12281a2017-09-16 02:38:18123 // Helper to load an extension. Should be called on a sequence where file IO
Karan Bhatia328e31a2017-09-18 21:46:16124 // is allowed. Loads the extension, validates extension locales and persists
125 // the ruleset for the Declarative Net Request API, if needed. In case of an
126 // error, returns false and populates |error|.
Karan Bhatiafe12281a2017-09-16 02:38:18127 bool LoadExtension(Manifest::Location location,
128 int flags,
129 std::string* error);
130
Karan Bhatia328e31a2017-09-18 21:46:16131 // Reads the Declarative Net Request JSON ruleset for the extension, if it
132 // provided one, and persists the indexed ruleset. Returns false and populates
133 // |error| in case of an error. Should be called on a sequence where file IO
134 // is allowed.
135 bool IndexAndPersistRulesIfNeeded(std::string* error);
136
dgozmand741d25d2017-03-23 00:35:34137 const Extension* extension() { return extension_.get(); }
[email protected]253fc2bb2014-07-10 04:21:18138
[email protected]849749d2013-05-06 17:30:45139 // The service we will report results back to.
[email protected]d8c8f25f2011-11-02 18:18:01140 base::WeakPtr<ExtensionService> service_weak_;
141
dgozmand741d25d2017-03-23 00:35:34142 // The Profile the extension is being installed in.
143 Profile* profile_;
144
[email protected]d8c8f25f2011-11-02 18:18:01145 // The pathname of the directory to load from, which is an absolute path
146 // after GetAbsolutePath has been called.
[email protected]650b2d52013-02-10 03:41:45147 base::FilePath extension_path_;
[email protected]d8c8f25f2011-11-02 18:18:01148
dgozmand741d25d2017-03-23 00:35:34149 // The extension being installed.
Karan Bhatia328e31a2017-09-18 21:46:16150 scoped_refptr<Extension> extension_;
dgozmand741d25d2017-03-23 00:35:34151
[email protected]d8c8f25f2011-11-02 18:18:01152 // If true and the extension contains plugins, we prompt the user before
153 // loading.
154 bool prompt_for_plugins_;
155
[email protected]b7462f32012-09-02 15:18:12156 // Whether to require the extension installed to have a modern manifest
157 // version.
158 bool require_modern_manifest_version_;
159
[email protected]1f0722442014-05-01 17:26:02160 // Whether or not to be noisy (show a dialog) on failure. Defaults to true.
161 bool be_noisy_on_failure_;
162
michaelpg6a4874f2017-04-13 20:41:33163 // Checks to run before the extension can be installed.
164 std::unique_ptr<PreloadCheck> policy_check_;
165 std::unique_ptr<PreloadCheck> requirements_check_;
166
167 // Runs the above checks.
168 std::unique_ptr<PreloadCheckGroup> check_group_;
[email protected]849749d2013-05-06 17:30:45169
rdevlin.croninf6ea63a2015-03-04 17:51:04170 CompletionCallback callback_;
171
[email protected]d8c8f25f2011-11-02 18:18:01172 DISALLOW_COPY_AND_ASSIGN(UnpackedInstaller);
173};
174
175} // namespace extensions
176
177#endif // CHROME_BROWSER_EXTENSIONS_UNPACKED_INSTALLER_H_