blob: 948b0ab5f189c8331a402a19f884d8ca13e7bb9e [file] [log] [blame]
[email protected]8e7b2cf42012-04-18 14:26:581// Copyright (c) 2012 The Chromium Authors. All rights reserved.
[email protected]d8c8f25f2011-11-02 18:18:012// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#ifndef CHROME_BROWSER_EXTENSIONS_UNPACKED_INSTALLER_H_
6#define CHROME_BROWSER_EXTENSIONS_UNPACKED_INSTALLER_H_
[email protected]d8c8f25f2011-11-02 18:18:017
dchengc963c7142016-04-08 03:55:228#include <memory>
[email protected]d8c8f25f2011-11-02 18:18:019#include <string>
[email protected]98270432012-09-11 20:51:2410#include <vector>
[email protected]d8c8f25f2011-11-02 18:18:0111
[email protected]500c7bb2014-04-26 22:44:3312#include "base/bind.h"
[email protected]57999812013-02-24 05:40:5213#include "base/files/file_path.h"
avia2f4804a2015-12-24 23:11:1314#include "base/macros.h"
[email protected]d8c8f25f2011-11-02 18:18:0115#include "base/memory/ref_counted.h"
16#include "base/memory/weak_ptr.h"
Karandeep Bhatiaa8930652017-10-11 17:41:1217#include "base/optional.h"
michaelpg6a4874f2017-04-13 20:41:3318#include "extensions/browser/preload_check.h"
Karan Bhatiafe12281a2017-09-16 02:38:1819#include "extensions/common/manifest.h"
[email protected]d8c8f25f2011-11-02 18:18:0120
[email protected]d8c8f25f2011-11-02 18:18:0121class ExtensionService;
dgozmand741d25d2017-03-23 00:35:3422class Profile;
[email protected]d8c8f25f2011-11-02 18:18:0123
24namespace extensions {
25
[email protected]1c321ee2012-05-21 03:02:3426class Extension;
michaelpg6a4874f2017-04-13 20:41:3327class PreloadCheckGroup;
[email protected]1c321ee2012-05-21 03:02:3428
[email protected]98270432012-09-11 20:51:2429// Installs and loads an unpacked extension. Because internal state needs to be
30// held about the instalation process, only one call to Load*() should be made
31// per UnpackedInstaller.
[email protected]d8c8f25f2011-11-02 18:18:0132// TODO(erikkay): It might be useful to be able to load a packed extension
33// (presumably into memory) without installing it.
34class UnpackedInstaller
35 : public base::RefCountedThreadSafe<UnpackedInstaller> {
36 public:
rdevlin.croninf6ea63a2015-03-04 17:51:0437 using CompletionCallback = base::Callback<void(const Extension* extension,
38 const base::FilePath&,
39 const std::string&)>;
[email protected]500c7bb2014-04-26 22:44:3340
[email protected]d8c8f25f2011-11-02 18:18:0141 static scoped_refptr<UnpackedInstaller> Create(
42 ExtensionService* extension_service);
43
44 // Loads the extension from the directory |extension_path|, which is
45 // the top directory of a specific extension where its manifest file lives.
46 // Errors are reported through ExtensionErrorReporter. On success,
47 // ExtensionService::AddExtension() is called.
[email protected]650b2d52013-02-10 03:41:4548 void Load(const base::FilePath& extension_path);
[email protected]d8c8f25f2011-11-02 18:18:0149
50 // Loads the extension from the directory |extension_path|;
[email protected]2a69b942013-05-31 09:37:5351 // for use with command line switch --load-extension=path or
52 // --load-and-launch-app=path.
53 // This is equivalent to Load, except that it reads the extension from
54 // |extension_path| synchronously.
55 // The return value indicates whether the installation has begun successfully.
56 // The id of the extension being loaded is returned in |extension_id|.
proberge80a37f32016-08-04 19:44:5557 // |only_allow_apps| is used to avoid side-loading of non-app extensions.
[email protected]2a69b942013-05-31 09:37:5358 bool LoadFromCommandLine(const base::FilePath& extension_path,
proberge80a37f32016-08-04 19:44:5559 std::string* extension_id,
60 bool only_allow_apps);
[email protected]d8c8f25f2011-11-02 18:18:0161
62 // Allows prompting for plugins to be disabled; intended for testing only.
63 bool prompt_for_plugins() { return prompt_for_plugins_; }
64 void set_prompt_for_plugins(bool val) { prompt_for_plugins_ = val; }
65
[email protected]b7462f32012-09-02 15:18:1266 // Allows overriding of whether modern manifest versions are required;
67 // intended for testing.
68 bool require_modern_manifest_version() const {
69 return require_modern_manifest_version_;
70 }
71 void set_require_modern_manifest_version(bool val) {
72 require_modern_manifest_version_ = val;
73 }
74
[email protected]1f0722442014-05-01 17:26:0275 void set_be_noisy_on_failure(bool be_noisy_on_failure) {
76 be_noisy_on_failure_ = be_noisy_on_failure;
77 }
78
rdevlin.croninf6ea63a2015-03-04 17:51:0479 void set_completion_callback(const CompletionCallback& callback) {
80 callback_ = callback;
81 }
82
[email protected]d8c8f25f2011-11-02 18:18:0183 private:
84 friend class base::RefCountedThreadSafe<UnpackedInstaller>;
85
86 explicit UnpackedInstaller(ExtensionService* extension_service);
87 virtual ~UnpackedInstaller();
88
[email protected]98270432012-09-11 20:51:2489 // Must be called from the UI thread.
[email protected]849749d2013-05-06 17:30:4590 void ShowInstallPrompt();
91
[email protected]253fc2bb2014-07-10 04:21:1892 // Begin management policy and requirements checks.
93 void StartInstallChecks();
[email protected]98270432012-09-11 20:51:2494
michaelpg6a4874f2017-04-13 20:41:3395 // Callback from PreloadCheckGroup.
Istiaque Ahmed400c83a2017-10-11 02:39:3596 void OnInstallChecksComplete(const PreloadCheck::Errors& errors);
[email protected]98270432012-09-11 20:51:2497
[email protected]8e7b2cf42012-04-18 14:26:5898 // Verifies if loading unpacked extensions is allowed.
99 bool IsLoadingUnpackedAllowed() const;
100
[email protected]d8c8f25f2011-11-02 18:18:01101 // We change the input extension path to an absolute path, on the file thread.
102 // Then we need to check the file access preference, which needs
103 // to happen back on the UI thread, so it posts CheckExtensionFileAccess on
104 // the UI thread. In turn, once that gets the pref, it goes back to the
105 // file thread with LoadWithFileAccess.
106 // TODO(yoz): It would be nice to remove this ping-pong, but we need to know
[email protected]85df9d12014-04-15 17:02:14107 // what file access flags to pass to file_util::LoadExtension.
[email protected]d8c8f25f2011-11-02 18:18:01108 void GetAbsolutePath();
109 void CheckExtensionFileAccess();
[email protected]b7462f32012-09-02 15:18:12110 void LoadWithFileAccess(int flags);
[email protected]d8c8f25f2011-11-02 18:18:01111
[email protected]add57db72014-04-01 23:25:22112 // Notify the frontend that an attempt to retry will not be necessary.
113 void UnregisterLoadRetryListener();
114
[email protected]d8c8f25f2011-11-02 18:18:01115 // Notify the frontend that there was an error loading an extension.
116 void ReportExtensionLoadError(const std::string& error);
117
[email protected]253fc2bb2014-07-10 04:21:18118 // Passes the extension onto extension service.
119 void InstallExtension();
[email protected]d8c8f25f2011-11-02 18:18:01120
[email protected]b7462f32012-09-02 15:18:12121 // Helper to get the Extension::CreateFlags for the installing extension.
122 int GetFlags();
123
Karan Bhatiafe12281a2017-09-16 02:38:18124 // Helper to load an extension. Should be called on a sequence where file IO
Karan Bhatia328e31a2017-09-18 21:46:16125 // is allowed. Loads the extension, validates extension locales and persists
126 // the ruleset for the Declarative Net Request API, if needed. In case of an
127 // error, returns false and populates |error|.
Karan Bhatiafe12281a2017-09-16 02:38:18128 bool LoadExtension(Manifest::Location location,
129 int flags,
130 std::string* error);
131
Karan Bhatia328e31a2017-09-18 21:46:16132 // Reads the Declarative Net Request JSON ruleset for the extension, if it
133 // provided one, and persists the indexed ruleset. Returns false and populates
134 // |error| in case of an error. Should be called on a sequence where file IO
135 // is allowed.
136 bool IndexAndPersistRulesIfNeeded(std::string* error);
137
dgozmand741d25d2017-03-23 00:35:34138 const Extension* extension() { return extension_.get(); }
[email protected]253fc2bb2014-07-10 04:21:18139
[email protected]849749d2013-05-06 17:30:45140 // The service we will report results back to.
[email protected]d8c8f25f2011-11-02 18:18:01141 base::WeakPtr<ExtensionService> service_weak_;
142
dgozmand741d25d2017-03-23 00:35:34143 // The Profile the extension is being installed in.
144 Profile* profile_;
145
[email protected]d8c8f25f2011-11-02 18:18:01146 // The pathname of the directory to load from, which is an absolute path
147 // after GetAbsolutePath has been called.
[email protected]650b2d52013-02-10 03:41:45148 base::FilePath extension_path_;
[email protected]d8c8f25f2011-11-02 18:18:01149
dgozmand741d25d2017-03-23 00:35:34150 // The extension being installed.
Karan Bhatia328e31a2017-09-18 21:46:16151 scoped_refptr<Extension> extension_;
dgozmand741d25d2017-03-23 00:35:34152
[email protected]d8c8f25f2011-11-02 18:18:01153 // If true and the extension contains plugins, we prompt the user before
154 // loading.
155 bool prompt_for_plugins_;
156
[email protected]b7462f32012-09-02 15:18:12157 // Whether to require the extension installed to have a modern manifest
158 // version.
159 bool require_modern_manifest_version_;
160
[email protected]1f0722442014-05-01 17:26:02161 // Whether or not to be noisy (show a dialog) on failure. Defaults to true.
162 bool be_noisy_on_failure_;
163
michaelpg6a4874f2017-04-13 20:41:33164 // Checks to run before the extension can be installed.
165 std::unique_ptr<PreloadCheck> policy_check_;
166 std::unique_ptr<PreloadCheck> requirements_check_;
167
168 // Runs the above checks.
169 std::unique_ptr<PreloadCheckGroup> check_group_;
[email protected]849749d2013-05-06 17:30:45170
Karandeep Bhatiaa8930652017-10-11 17:41:12171 // The checksum for the indexed ruleset corresponding to the Declarative Net
172 // Request API.
173 base::Optional<int> dnr_ruleset_checksum_;
174
rdevlin.croninf6ea63a2015-03-04 17:51:04175 CompletionCallback callback_;
176
[email protected]d8c8f25f2011-11-02 18:18:01177 DISALLOW_COPY_AND_ASSIGN(UnpackedInstaller);
178};
179
180} // namespace extensions
181
182#endif // CHROME_BROWSER_EXTENSIONS_UNPACKED_INSTALLER_H_