[email protected] | cce15bb | 2014-06-17 13:43:51 | [diff] [blame] | 1 | // Copyright 2014 The Chromium Authors. All rights reserved. |
[email protected] | 0850e84 | 2013-01-19 03:44:31 | [diff] [blame] | 2 | // Use of this source code is governed by a BSD-style license that can be |
| 3 | // found in the LICENSE file. |
| 4 | |
[email protected] | cce15bb | 2014-06-17 13:43:51 | [diff] [blame] | 5 | #ifndef CHROME_BROWSER_SUPERVISED_USER_SUPERVISED_USER_SERVICE_H_ |
| 6 | #define CHROME_BROWSER_SUPERVISED_USER_SUPERVISED_USER_SERVICE_H_ |
[email protected] | 0850e84 | 2013-01-19 03:44:31 | [diff] [blame] | 7 | |
avi | 664c07b | 2015-12-26 02:18:31 | [diff] [blame] | 8 | #include <stddef.h> |
| 9 | |
dcheng | f624e47 | 2016-04-12 08:33:17 | [diff] [blame] | 10 | #include <memory> |
Toby Huang | 016f549b | 2020-05-04 19:50:47 | [diff] [blame] | 11 | #include <set> |
treib | 950c6e8 | 2014-09-23 13:07:29 | [diff] [blame] | 12 | #include <string> |
[email protected] | 0850e84 | 2013-01-19 03:44:31 | [diff] [blame] | 13 | #include <vector> |
| 14 | |
[email protected] | 438f7e1 | 2013-08-07 06:59:00 | [diff] [blame] | 15 | #include "base/callback.h" |
[email protected] | 076ebeda | 2014-06-06 21:47:26 | [diff] [blame] | 16 | #include "base/gtest_prod_util.h" |
avi | 664c07b | 2015-12-26 02:18:31 | [diff] [blame] | 17 | #include "base/macros.h" |
treib | ab0a39e | 2014-09-24 14:48:28 | [diff] [blame] | 18 | #include "base/observer_list.h" |
[email protected] | f2253ac | 2014-05-28 08:37:21 | [diff] [blame] | 19 | #include "base/scoped_observer.h" |
[email protected] | f9b29436 | 2013-06-10 20:22:31 | [diff] [blame] | 20 | #include "base/strings/string16.h" |
avi | 664c07b | 2015-12-26 02:18:31 | [diff] [blame] | 21 | #include "build/build_config.h" |
treib | f38cc25 | 2016-04-07 14:44:11 | [diff] [blame] | 22 | #include "chrome/browser/net/file_downloader.h" |
Robbie McElrath | 2be691ca | 2020-08-17 20:14:48 | [diff] [blame] | 23 | #include "chrome/browser/supervised_user/supervised_user_denylist.h" |
[email protected] | cce15bb | 2014-06-17 13:43:51 | [diff] [blame] | 24 | #include "chrome/browser/supervised_user/supervised_user_url_filter.h" |
| 25 | #include "chrome/browser/supervised_user/supervised_users.h" |
[email protected] | 12b7af3 | 2014-03-13 05:28:20 | [diff] [blame] | 26 | #include "components/keyed_service/core/keyed_service.h" |
brettw | b1fc1b8 | 2016-02-02 00:19:08 | [diff] [blame] | 27 | #include "components/prefs/pref_change_registrar.h" |
maxbogue | 455a57e3 | 2016-08-14 00:08:32 | [diff] [blame] | 28 | #include "components/sync/driver/sync_type_preference_provider.h" |
Scott Violet | c8240b0 | 2018-03-08 22:03:59 | [diff] [blame] | 29 | #include "extensions/buildflags/buildflags.h" |
[email protected] | c14a680 | 2014-07-11 21:51:12 | [diff] [blame] | 30 | |
brettw | 00899e6 | 2016-11-12 02:10:17 | [diff] [blame] | 31 | #if BUILDFLAG(ENABLE_EXTENSIONS) |
Danan S | e5ba331 | 2020-03-05 03:34:55 | [diff] [blame] | 32 | #include "base/strings/string16.h" |
| 33 | #include "chrome/browser/ui/supervised_user/parent_permission_dialog.h" |
Evan Stade | 2fad901 | 2019-10-09 18:47:50 | [diff] [blame] | 34 | #include "extensions/browser/extension_registry.h" |
mamir | e960964 | 2016-06-28 22:17:54 | [diff] [blame] | 35 | #include "extensions/browser/extension_registry_observer.h" |
[email protected] | 301116c6 | 2013-11-26 10:37:45 | [diff] [blame] | 36 | #include "extensions/browser/management_policy.h" |
[email protected] | c14a680 | 2014-07-11 21:51:12 | [diff] [blame] | 37 | #endif |
[email protected] | 0850e84 | 2013-01-19 03:44:31 | [diff] [blame] | 38 | |
Collin Baker | 06abf00 | 2020-09-24 19:20:12 | [diff] [blame] | 39 | #if !defined(OS_ANDROID) |
| 40 | #include "chrome/browser/ui/browser_list_observer.h" |
| 41 | #endif // !defined(OS_ANDROID) |
| 42 | |
[email protected] | 4db65f95 | 2014-05-20 15:46:30 | [diff] [blame] | 43 | class PermissionRequestCreator; |
Toby Huang | 2009125 | 2020-04-03 03:27:06 | [diff] [blame] | 44 | class PrefService; |
[email protected] | 0850e84 | 2013-01-19 03:44:31 | [diff] [blame] | 45 | class Profile; |
treib | ab0a39e | 2014-09-24 14:48:28 | [diff] [blame] | 46 | class SupervisedUserServiceObserver; |
[email protected] | cce15bb | 2014-06-17 13:43:51 | [diff] [blame] | 47 | class SupervisedUserSettingsService; |
| 48 | class SupervisedUserSiteList; |
| 49 | class SupervisedUserURLFilter; |
Robbie McElrath | 2be691ca | 2020-08-17 20:14:48 | [diff] [blame] | 50 | class SupervisedUserAllowlistService; |
[email protected] | 0850e84 | 2013-01-19 03:44:31 | [diff] [blame] | 51 | |
treib | daece84f | 2014-09-05 12:58:15 | [diff] [blame] | 52 | namespace base { |
| 53 | class FilePath; |
treib | f832a99 | 2015-03-24 18:09:24 | [diff] [blame] | 54 | class Version; |
treib | daece84f | 2014-09-05 12:58:15 | [diff] [blame] | 55 | } |
| 56 | |
Danan S | e5ba331 | 2020-03-05 03:34:55 | [diff] [blame] | 57 | #if BUILDFLAG(ENABLE_EXTENSIONS) |
Danan S | e5ba331 | 2020-03-05 03:34:55 | [diff] [blame] | 58 | namespace extensions { |
| 59 | class Extension; |
| 60 | } |
| 61 | #endif |
| 62 | |
[email protected] | 443e931 | 2013-05-06 06:17:34 | [diff] [blame] | 63 | namespace user_prefs { |
| 64 | class PrefRegistrySyncable; |
| 65 | } |
| 66 | |
Collin Baker | 06abf00 | 2020-09-24 19:20:12 | [diff] [blame] | 67 | #if !defined(OS_ANDROID) |
| 68 | class Browser; |
| 69 | #endif // !defined(OS_ANDROID) |
| 70 | |
[email protected] | cce15bb | 2014-06-17 13:43:51 | [diff] [blame] | 71 | // This class handles all the information related to a given supervised profile |
[email protected] | 0850e84 | 2013-01-19 03:44:31 | [diff] [blame] | 72 | // (e.g. the installed content packs, the default URL filtering behavior, or |
Robbie McElrath | 2be691ca | 2020-08-17 20:14:48 | [diff] [blame] | 73 | // manual allowlist/denylist overrides). |
[email protected] | cce15bb | 2014-06-17 13:43:51 | [diff] [blame] | 74 | class SupervisedUserService : public KeyedService, |
brettw | 00899e6 | 2016-11-12 02:10:17 | [diff] [blame] | 75 | #if BUILDFLAG(ENABLE_EXTENSIONS) |
mamir | e960964 | 2016-06-28 22:17:54 | [diff] [blame] | 76 | public extensions::ExtensionRegistryObserver, |
[email protected] | cce15bb | 2014-06-17 13:43:51 | [diff] [blame] | 77 | public extensions::ManagementPolicy::Provider, |
[email protected] | c14a680 | 2014-07-11 21:51:12 | [diff] [blame] | 78 | #endif |
maxbogue | 7e006db | 2016-10-03 19:48:28 | [diff] [blame] | 79 | public syncer::SyncTypePreferenceProvider, |
jam | 1c5a9149 | 2016-02-24 20:47:53 | [diff] [blame] | 80 | #if !defined(OS_ANDROID) |
cm.sanchi | a0d6add | 2017-12-13 04:59:33 | [diff] [blame] | 81 | public BrowserListObserver, |
bauerb | 5f8cda9 | 2015-10-07 15:36:44 | [diff] [blame] | 82 | #endif |
bauerb | ce9a1a8 | 2014-12-18 13:34:24 | [diff] [blame] | 83 | public SupervisedUserURLFilter::Observer { |
[email protected] | 0850e84 | 2013-01-19 03:44:31 | [diff] [blame] | 84 | public: |
Carlos IL | 6b784a6 | 2018-03-20 00:26:49 | [diff] [blame] | 85 | using SuccessCallback = base::OnceCallback<void(bool)>; |
[email protected] | 0850e84 | 2013-01-19 03:44:31 | [diff] [blame] | 86 | |
[email protected] | f085fdd5 | 2014-06-11 18:09:20 | [diff] [blame] | 87 | class Delegate { |
| 88 | public: |
| 89 | virtual ~Delegate() {} |
| 90 | // Returns true to indicate that the delegate handled the (de)activation, or |
[email protected] | cce15bb | 2014-06-17 13:43:51 | [diff] [blame] | 91 | // false to indicate that the SupervisedUserService itself should handle it. |
[email protected] | f085fdd5 | 2014-06-11 18:09:20 | [diff] [blame] | 92 | virtual bool SetActive(bool active) = 0; |
| 93 | }; |
| 94 | |
Toby Huang | 2009125 | 2020-04-03 03:27:06 | [diff] [blame] | 95 | #if BUILDFLAG(ENABLE_EXTENSIONS) |
| 96 | // These enum values represent operations to manage the |
Toby Huang | 016f549b | 2020-05-04 19:50:47 | [diff] [blame] | 97 | // kSupervisedUserApprovedExtensions user pref, which stores parent approved |
| 98 | // extension ids. |
Toby Huang | 2009125 | 2020-04-03 03:27:06 | [diff] [blame] | 99 | enum class ApprovedExtensionChange { |
| 100 | // Adds a new approved extension to the pref. |
Toby Huang | 016f549b | 2020-05-04 19:50:47 | [diff] [blame] | 101 | kAdd, |
Toby Huang | 2009125 | 2020-04-03 03:27:06 | [diff] [blame] | 102 | // Removes extension approval. |
| 103 | kRemove |
| 104 | }; |
| 105 | #endif // BUILDFLAG(ENABLE_EXTENSIONS) |
| 106 | |
dcheng | c072fff | 2014-10-21 11:39:05 | [diff] [blame] | 107 | ~SupervisedUserService() override; |
[email protected] | 0850e84 | 2013-01-19 03:44:31 | [diff] [blame] | 108 | |
[email protected] | 37ca3fe0 | 2013-07-05 15:32:44 | [diff] [blame] | 109 | static void RegisterProfilePrefs(user_prefs::PrefRegistrySyncable* registry); |
[email protected] | 0850e84 | 2013-01-19 03:44:31 | [diff] [blame] | 110 | |
bauerb | 5f8cda9 | 2015-10-07 15:36:44 | [diff] [blame] | 111 | // Initializes this object. |
| 112 | void Init(); |
| 113 | |
[email protected] | f085fdd5 | 2014-06-11 18:09:20 | [diff] [blame] | 114 | void SetDelegate(Delegate* delegate); |
| 115 | |
mmenke | db2637ff | 2017-03-30 23:59:42 | [diff] [blame] | 116 | // Returns the URL filter for filtering navigations and classifying sites in |
| 117 | // the history view. Both this method and the returned filter may only be used |
| 118 | // on the UI thread. |
| 119 | SupervisedUserURLFilter* GetURLFilter(); |
[email protected] | 0850e84 | 2013-01-19 03:44:31 | [diff] [blame] | 120 | |
Robbie McElrath | 2be691ca | 2020-08-17 20:14:48 | [diff] [blame] | 121 | // Returns the allowlist service. |
| 122 | SupervisedUserAllowlistService* GetAllowlistService(); |
bauerb | 4da3613 | 2014-12-26 19:53:13 | [diff] [blame] | 123 | |
Robbie McElrath | 2be691ca | 2020-08-17 20:14:48 | [diff] [blame] | 124 | const std::vector<scoped_refptr<SupervisedUserSiteList>>& allowlists() const { |
| 125 | return allowlists_; |
atanasova | 9572aaf | 2016-02-26 18:08:26 | [diff] [blame] | 126 | } |
| 127 | |
treib | 8ecc1eb5 | 2015-03-04 18:29:06 | [diff] [blame] | 128 | // Whether the user can request to get access to blocked URLs or to new |
| 129 | // extensions. |
[email protected] | 0369d6ab | 2013-08-09 01:52:59 | [diff] [blame] | 130 | bool AccessRequestsEnabled(); |
| 131 | |
treib | 8ecc1eb5 | 2015-03-04 18:29:06 | [diff] [blame] | 132 | // Adds an access request for the given URL. |
Carlos IL | 6b784a6 | 2018-03-20 00:26:49 | [diff] [blame] | 133 | void AddURLAccessRequest(const GURL& url, SuccessCallback callback); |
treib | 8ecc1eb5 | 2015-03-04 18:29:06 | [diff] [blame] | 134 | |
mamir | e960964 | 2016-06-28 22:17:54 | [diff] [blame] | 135 | // Get the string used to identify an extension install or update request. |
| 136 | // Public for testing. |
| 137 | static std::string GetExtensionRequestId(const std::string& extension_id, |
| 138 | const base::Version& version); |
treib | 40d3ad9 | 2015-10-20 18:15:42 | [diff] [blame] | 139 | |
[email protected] | a9c2d64 | 2013-05-31 14:37:14 | [diff] [blame] | 140 | // Returns the email address of the custodian. |
| 141 | std::string GetCustodianEmailAddress() const; |
| 142 | |
Danan S | bef6ca2 | 2019-05-09 18:15:54 | [diff] [blame] | 143 | // Returns the obfuscated GAIA id of the custodian. |
| 144 | std::string GetCustodianObfuscatedGaiaId() const; |
| 145 | |
[email protected] | fae057a | 2013-06-21 22:46:08 | [diff] [blame] | 146 | // Returns the name of the custodian, or the email address if the name is |
| 147 | // empty. |
| 148 | std::string GetCustodianName() const; |
| 149 | |
treib | 3e7ecf7 | 2014-10-24 16:44:07 | [diff] [blame] | 150 | // Returns the email address of the second custodian, or the empty string |
| 151 | // if there is no second custodian. |
| 152 | std::string GetSecondCustodianEmailAddress() const; |
| 153 | |
Danan S | bef6ca2 | 2019-05-09 18:15:54 | [diff] [blame] | 154 | // Returns the obfuscated GAIA id of the second custodian or the empty |
| 155 | // string if there is no second custodian. |
| 156 | std::string GetSecondCustodianObfuscatedGaiaId() const; |
| 157 | |
treib | 3e7ecf7 | 2014-10-24 16:44:07 | [diff] [blame] | 158 | // Returns the name of the second custodian, or the email address if the name |
Danan S | bef6ca2 | 2019-05-09 18:15:54 | [diff] [blame] | 159 | // is empty, or the empty string if there is no second custodian. |
treib | 3e7ecf7 | 2014-10-24 16:44:07 | [diff] [blame] | 160 | std::string GetSecondCustodianName() const; |
| 161 | |
treib | 2170ea0 | 2015-10-13 14:55:12 | [diff] [blame] | 162 | // Returns a message saying that extensions can only be modified by the |
| 163 | // custodian. |
| 164 | base::string16 GetExtensionsLockedMessage() const; |
| 165 | |
yilkal | 190d97c | 2019-09-06 23:50:03 | [diff] [blame] | 166 | bool IsSupervisedUserIframeFilterEnabled() const; |
| 167 | |
Danan S | 8f1b296 | 2020-09-16 19:09:31 | [diff] [blame] | 168 | static std::string GetEduCoexistenceLoginUrl(); |
| 169 | |
Danan S | e5ba331 | 2020-03-05 03:34:55 | [diff] [blame] | 170 | // Returns true if the user is a type of Family Link Child account, |
| 171 | // but will not return true for a Legacy Supervised user (or non child users). |
| 172 | bool IsChild() const; |
| 173 | |
| 174 | bool IsSupervisedUserExtensionInstallEnabled() const; |
| 175 | |
| 176 | // Returns true if there is a custodian for the child. A child can have |
| 177 | // up to 2 custodians, and this returns true if they have at least 1. |
| 178 | bool HasACustodian() const; |
| 179 | |
treib | ab0a39e | 2014-09-24 14:48:28 | [diff] [blame] | 180 | void AddObserver(SupervisedUserServiceObserver* observer); |
| 181 | void RemoveObserver(SupervisedUserServiceObserver* observer); |
| 182 | |
treib | 531fc731 | 2014-12-09 12:49:20 | [diff] [blame] | 183 | void AddPermissionRequestCreator( |
dcheng | f624e47 | 2016-04-12 08:33:17 | [diff] [blame] | 184 | std::unique_ptr<PermissionRequestCreator> creator); |
bauerb | 646019b1 | 2014-10-16 16:23:09 | [diff] [blame] | 185 | |
bauerb | 5f8cda9 | 2015-10-07 15:36:44 | [diff] [blame] | 186 | // ProfileKeyedService override: |
| 187 | void Shutdown() override; |
| 188 | |
[email protected] | 3a276ff | 2014-08-12 14:22:09 | [diff] [blame] | 189 | // SyncTypePreferenceProvider implementation: |
Marc Treib | b3bbf1d2 | 2019-03-27 15:45:39 | [diff] [blame] | 190 | bool IsEncryptEverythingAllowed() const override; |
[email protected] | 3a276ff | 2014-08-12 14:22:09 | [diff] [blame] | 191 | |
jam | 1c5a9149 | 2016-02-24 20:47:53 | [diff] [blame] | 192 | #if !defined(OS_ANDROID) |
cm.sanchi | a0d6add | 2017-12-13 04:59:33 | [diff] [blame] | 193 | // BrowserListObserver implementation: |
dcheng | c072fff | 2014-10-21 11:39:05 | [diff] [blame] | 194 | void OnBrowserSetLastActive(Browser* browser) override; |
jam | 1c5a9149 | 2016-02-24 20:47:53 | [diff] [blame] | 195 | #endif // !defined(OS_ANDROID) |
[email protected] | dfddd02 | 2013-07-10 17:29:48 | [diff] [blame] | 196 | |
bauerb | ce9a1a8 | 2014-12-18 13:34:24 | [diff] [blame] | 197 | // SupervisedUserURLFilter::Observer implementation: |
| 198 | void OnSiteListUpdated() override; |
| 199 | |
Danan S | c194591 | 2019-06-27 02:56:30 | [diff] [blame] | 200 | #if !defined(OS_ANDROID) |
| 201 | bool signout_required_after_supervision_enabled() { |
| 202 | return signout_required_after_supervision_enabled_; |
| 203 | } |
| 204 | void set_signout_required_after_supervision_enabled() { |
| 205 | signout_required_after_supervision_enabled_ = true; |
| 206 | } |
| 207 | #endif // !defined(OS_ANDROID) |
| 208 | |
yilkal | 921048bd | 2019-10-09 23:51:04 | [diff] [blame] | 209 | void SetPrimaryPermissionCreatorForTest( |
| 210 | std::unique_ptr<PermissionRequestCreator> permission_creator); |
| 211 | |
Toby Huang | 6f0321f | 2019-11-01 18:03:49 | [diff] [blame] | 212 | #if BUILDFLAG(ENABLE_EXTENSIONS) |
Toby Huang | 016f549b | 2020-05-04 19:50:47 | [diff] [blame] | 213 | // Updates the set of approved extensions to add approval for |extension|. |
| 214 | void AddExtensionApproval(const extensions::Extension& extension); |
Danan S | e5ba331 | 2020-03-05 03:34:55 | [diff] [blame] | 215 | |
Toby Huang | 016f549b | 2020-05-04 19:50:47 | [diff] [blame] | 216 | // Updates the set of approved extensions to remove approval for |extension|. |
Danan S | e5ba331 | 2020-03-05 03:34:55 | [diff] [blame] | 217 | void RemoveExtensionApproval(const extensions::Extension& extension); |
| 218 | |
Toby Huang | 016f549b | 2020-05-04 19:50:47 | [diff] [blame] | 219 | // Wraps UpdateApprovedExtension() for testing. Use this to simulate adding or |
| 220 | // removing custodian approval for an extension via sync. |
Toby Huang | 2009125 | 2020-04-03 03:27:06 | [diff] [blame] | 221 | void UpdateApprovedExtensionForTesting(const std::string& extension_id, |
Toby Huang | 2009125 | 2020-04-03 03:27:06 | [diff] [blame] | 222 | ApprovedExtensionChange type); |
Toby Huang | 114e9b0 | 2019-11-23 02:42:13 | [diff] [blame] | 223 | |
| 224 | bool GetSupervisedUserExtensionsMayRequestPermissionsPref() const; |
| 225 | |
| 226 | void SetSupervisedUserExtensionsMayRequestPermissionsPrefForTesting( |
| 227 | bool enabled); |
Toby Huang | 7b4816f | 2020-02-07 23:54:07 | [diff] [blame] | 228 | |
Danan S | e5ba331 | 2020-03-05 03:34:55 | [diff] [blame] | 229 | bool CanInstallExtensions() const; |
| 230 | |
| 231 | bool IsExtensionAllowed(const extensions::Extension& extension) const; |
Toby Huang | b5076a225 | 2020-05-16 02:24:15 | [diff] [blame] | 232 | |
| 233 | void RecordExtensionEnablementUmaMetrics(bool enabled) const; |
Toby Huang | 6f0321f | 2019-11-01 18:03:49 | [diff] [blame] | 234 | #endif // BUILDFLAG(ENABLE_EXTENSIONS) |
| 235 | |
[email protected] | 0850e84 | 2013-01-19 03:44:31 | [diff] [blame] | 236 | private: |
[email protected] | cce15bb | 2014-06-17 13:43:51 | [diff] [blame] | 237 | friend class SupervisedUserServiceExtensionTestBase; |
| 238 | friend class SupervisedUserServiceFactory; |
mamir | e960964 | 2016-06-28 22:17:54 | [diff] [blame] | 239 | FRIEND_TEST_ALL_PREFIXES( |
| 240 | SupervisedUserServiceExtensionTest, |
| 241 | ExtensionManagementPolicyProviderWithoutSUInitiatedInstalls); |
| 242 | FRIEND_TEST_ALL_PREFIXES( |
| 243 | SupervisedUserServiceExtensionTest, |
| 244 | ExtensionManagementPolicyProviderWithSUInitiatedInstalls); |
bauerb | 95a5068 | 2015-01-07 17:04:15 | [diff] [blame] | 245 | |
treib | 8ecc1eb5 | 2015-03-04 18:29:06 | [diff] [blame] | 246 | using CreatePermissionRequestCallback = |
Carlos IL | 6b784a6 | 2018-03-20 00:26:49 | [diff] [blame] | 247 | base::RepeatingCallback<void(PermissionRequestCreator*, SuccessCallback)>; |
treib | 8ecc1eb5 | 2015-03-04 18:29:06 | [diff] [blame] | 248 | |
[email protected] | cce15bb | 2014-06-17 13:43:51 | [diff] [blame] | 249 | // Use |SupervisedUserServiceFactory::GetForProfile(..)| to get |
[email protected] | 3bf45d0 | 2013-07-10 00:03:41 | [diff] [blame] | 250 | // an instance of this service. |
[email protected] | cce15bb | 2014-06-17 13:43:51 | [diff] [blame] | 251 | explicit SupervisedUserService(Profile* profile); |
[email protected] | 3bf45d0 | 2013-07-10 00:03:41 | [diff] [blame] | 252 | |
[email protected] | f085fdd5 | 2014-06-11 18:09:20 | [diff] [blame] | 253 | void SetActive(bool active); |
| 254 | |
treib | 3fce4e9 | 2014-09-26 16:06:25 | [diff] [blame] | 255 | void OnCustodianInfoChanged(); |
| 256 | |
brettw | 00899e6 | 2016-11-12 02:10:17 | [diff] [blame] | 257 | #if BUILDFLAG(ENABLE_EXTENSIONS) |
treib | bb9a196 | 2015-02-25 13:40:59 | [diff] [blame] | 258 | // extensions::ManagementPolicy::Provider implementation: |
| 259 | std::string GetDebugPolicyProviderName() const override; |
| 260 | bool UserMayLoad(const extensions::Extension* extension, |
| 261 | base::string16* error) const override; |
mamir | e960964 | 2016-06-28 22:17:54 | [diff] [blame] | 262 | bool MustRemainDisabled(const extensions::Extension* extension, |
Minh X. Nguyen | 4547901 | 2017-08-18 21:35:36 | [diff] [blame] | 263 | extensions::disable_reason::DisableReason* reason, |
mamir | e960964 | 2016-06-28 22:17:54 | [diff] [blame] | 264 | base::string16* error) const override; |
| 265 | |
| 266 | // extensions::ExtensionRegistryObserver overrides: |
| 267 | void OnExtensionInstalled(content::BrowserContext* browser_context, |
| 268 | const extensions::Extension* extension, |
| 269 | bool is_update) override; |
[email protected] | 0850e84 | 2013-01-19 03:44:31 | [diff] [blame] | 270 | |
Danan S | e5ba331 | 2020-03-05 03:34:55 | [diff] [blame] | 271 | void OnExtensionUninstalled(content::BrowserContext* browser_context, |
| 272 | const extensions::Extension* extension, |
| 273 | extensions::UninstallReason reason) override; |
| 274 | |
mamir | 192d788 | 2016-06-22 17:10:16 | [diff] [blame] | 275 | // An extension can be in one of the following states: |
| 276 | // |
Toby Huang | 114e9b0 | 2019-11-23 02:42:13 | [diff] [blame] | 277 | // BLOCKED: if kSupervisedUserExtensionsMayRequestPermissions is false and the |
| 278 | // child user is attempting to install a new extension or an existing |
| 279 | // extension is asking for additional permissions. |
mamir | 192d788 | 2016-06-22 17:10:16 | [diff] [blame] | 280 | // ALLOWED: Components, Themes, Default extensions ..etc |
| 281 | // are generally allowed. Extensions that have been approved by the |
| 282 | // custodian are also allowed. |
Toby Huang | 114e9b0 | 2019-11-23 02:42:13 | [diff] [blame] | 283 | // REQUIRE_APPROVAL: if it is installed by the child user and |
| 284 | // hasn't been approved by the custodian yet. |
Toby Huang | d7caf25 | 2019-10-30 01:11:16 | [diff] [blame] | 285 | enum class ExtensionState { BLOCKED, ALLOWED, REQUIRE_APPROVAL }; |
mamir | 192d788 | 2016-06-22 17:10:16 | [diff] [blame] | 286 | |
Toby Huang | 114e9b0 | 2019-11-23 02:42:13 | [diff] [blame] | 287 | // Returns the state of an extension whether being BLOCKED, ALLOWED or |
mamir | e960964 | 2016-06-28 22:17:54 | [diff] [blame] | 288 | // REQUIRE_APPROVAL from the Supervised User service's point of view. |
mamir | 192d788 | 2016-06-22 17:10:16 | [diff] [blame] | 289 | ExtensionState GetExtensionState( |
mamir | e960964 | 2016-06-28 22:17:54 | [diff] [blame] | 290 | const extensions::Extension& extension) const; |
mamir | 192d788 | 2016-06-22 17:10:16 | [diff] [blame] | 291 | |
Toby Huang | 05ddf27 | 2020-03-21 07:33:04 | [diff] [blame] | 292 | // Returns whether we should block an extension based on the state of the |
| 293 | // "Permissions for sites, apps and extensions" toggle. |
| 294 | bool ShouldBlockExtension(const std::string& extension_id) const; |
| 295 | |
Toby Huang | 016f549b | 2020-05-04 19:50:47 | [diff] [blame] | 296 | // Enables/Disables extensions upon change in approvals. This function is |
| 297 | // idempotent. |
mamir | e960964 | 2016-06-28 22:17:54 | [diff] [blame] | 298 | void ChangeExtensionStateIfNecessary(const std::string& extension_id); |
Toby Huang | 2009125 | 2020-04-03 03:27:06 | [diff] [blame] | 299 | |
Toby Huang | 016f549b | 2020-05-04 19:50:47 | [diff] [blame] | 300 | // Updates the synced set of approved extension ids. |
| 301 | // Use AddExtensionApproval() or RemoveExtensionApproval() for public access. |
| 302 | // If |type| is kAdd, then add approval. |
| 303 | // If |type| is kRemove, then remove approval. |
| 304 | // Triggers a call to RefreshApprovedExtensionsFromPrefs() via a listener. |
| 305 | // TODO(crbug/1072857): We don't need the extension version information. It's |
| 306 | // only included for backwards compatibility with previous versions of Chrome. |
| 307 | // Remove the version information once a sufficient number of users have |
| 308 | // migrated away from M83. |
Toby Huang | 2009125 | 2020-04-03 03:27:06 | [diff] [blame] | 309 | void UpdateApprovedExtension(const std::string& extension_id, |
| 310 | const std::string& version, |
| 311 | ApprovedExtensionChange type); |
| 312 | |
Toby Huang | 016f549b | 2020-05-04 19:50:47 | [diff] [blame] | 313 | // Updates the set of approved extensions when the corresponding preference is |
Toby Huang | 2009125 | 2020-04-03 03:27:06 | [diff] [blame] | 314 | // changed. |
Toby Huang | 016f549b | 2020-05-04 19:50:47 | [diff] [blame] | 315 | void RefreshApprovedExtensionsFromPrefs(); |
Toby Huang | 2009125 | 2020-04-03 03:27:06 | [diff] [blame] | 316 | |
| 317 | // Extensions helper to SetActive(). |
| 318 | void SetExtensionsActive(); |
Toby Huang | 6f0321f | 2019-11-01 18:03:49 | [diff] [blame] | 319 | #endif // BUILDFLAG(ENABLE_EXTENSIONS) |
[email protected] | c14a680 | 2014-07-11 21:51:12 | [diff] [blame] | 320 | |
Toby Huang | 2009125 | 2020-04-03 03:27:06 | [diff] [blame] | 321 | // Returns the SupervisedUserSettingsService associated with |profile_|. |
[email protected] | cce15bb | 2014-06-17 13:43:51 | [diff] [blame] | 322 | SupervisedUserSettingsService* GetSettingsService(); |
[email protected] | e861bba | 2013-06-17 15:20:54 | [diff] [blame] | 323 | |
Toby Huang | 2009125 | 2020-04-03 03:27:06 | [diff] [blame] | 324 | // Returns the PrefService associated with |profile_|. |
| 325 | PrefService* GetPrefService(); |
| 326 | |
bauerb | d3a36cc4 | 2014-10-01 13:05:49 | [diff] [blame] | 327 | size_t FindEnabledPermissionRequestCreator(size_t start); |
treib | 8ecc1eb5 | 2015-03-04 18:29:06 | [diff] [blame] | 328 | void AddPermissionRequestInternal( |
| 329 | const CreatePermissionRequestCallback& create_request, |
Carlos IL | 6b784a6 | 2018-03-20 00:26:49 | [diff] [blame] | 330 | SuccessCallback callback, |
treib | 8ecc1eb5 | 2015-03-04 18:29:06 | [diff] [blame] | 331 | size_t index); |
| 332 | void OnPermissionRequestIssued( |
| 333 | const CreatePermissionRequestCallback& create_request, |
Carlos IL | 6b784a6 | 2018-03-20 00:26:49 | [diff] [blame] | 334 | SuccessCallback callback, |
treib | 8ecc1eb5 | 2015-03-04 18:29:06 | [diff] [blame] | 335 | size_t index, |
| 336 | bool success); |
bauerb | d3a36cc4 | 2014-10-01 13:05:49 | [diff] [blame] | 337 | |
[email protected] | cce15bb | 2014-06-17 13:43:51 | [diff] [blame] | 338 | void OnSupervisedUserIdChanged(); |
[email protected] | f085fdd5 | 2014-06-11 18:09:20 | [diff] [blame] | 339 | |
[email protected] | 0850e84 | 2013-01-19 03:44:31 | [diff] [blame] | 340 | void OnDefaultFilteringBehaviorChanged(); |
| 341 | |
treib | 9cc1b11 | 2016-01-08 10:08:01 | [diff] [blame] | 342 | void OnSafeSitesSettingChanged(); |
| 343 | |
yilkal | 87e6cc8 | 2020-08-11 17:54:44 | [diff] [blame] | 344 | void UpdateAsyncUrlChecker(); |
| 345 | |
bauerb | 95a5068 | 2015-01-07 17:04:15 | [diff] [blame] | 346 | void OnSiteListsChanged( |
| 347 | const std::vector<scoped_refptr<SupervisedUserSiteList>>& site_lists); |
[email protected] | 0850e84 | 2013-01-19 03:44:31 | [diff] [blame] | 348 | |
Robbie McElrath | 2be691ca | 2020-08-17 20:14:48 | [diff] [blame] | 349 | // Asynchronously loads a denylist from a binary file at |path| and applies |
treib | 2fd18739 | 2015-04-16 17:19:38 | [diff] [blame] | 350 | // it to the URL filters. If no file exists at |path| yet, downloads a file |
| 351 | // from |url| and stores it at |path| first. |
Robbie McElrath | 2be691ca | 2020-08-17 20:14:48 | [diff] [blame] | 352 | void LoadDenylist(const base::FilePath& path, const GURL& url); |
treib | f136dfb | 2014-09-25 17:37:47 | [diff] [blame] | 353 | |
Robbie McElrath | 2be691ca | 2020-08-17 20:14:48 | [diff] [blame] | 354 | void OnDenylistFileChecked(const base::FilePath& path, |
| 355 | const GURL& url, |
| 356 | bool file_exists); |
treib | 2fd18739 | 2015-04-16 17:19:38 | [diff] [blame] | 357 | |
Robbie McElrath | 2be691ca | 2020-08-17 20:14:48 | [diff] [blame] | 358 | // Asynchronously loads a denylist from a binary file at |path| and applies |
treib | 2fd18739 | 2015-04-16 17:19:38 | [diff] [blame] | 359 | // it to the URL filters. |
Robbie McElrath | 2be691ca | 2020-08-17 20:14:48 | [diff] [blame] | 360 | void LoadDenylistFromFile(const base::FilePath& path); |
treib | f136dfb | 2014-09-25 17:37:47 | [diff] [blame] | 361 | |
Robbie McElrath | 2be691ca | 2020-08-17 20:14:48 | [diff] [blame] | 362 | void OnDenylistDownloadDone(const base::FilePath& path, |
| 363 | FileDownloader::Result result); |
treib | 4edbded | 2014-09-05 08:43:55 | [diff] [blame] | 364 | |
Robbie McElrath | 2be691ca | 2020-08-17 20:14:48 | [diff] [blame] | 365 | void OnDenylistLoaded(); |
bauerb | ce9a1a8 | 2014-12-18 13:34:24 | [diff] [blame] | 366 | |
Robbie McElrath | 2be691ca | 2020-08-17 20:14:48 | [diff] [blame] | 367 | void UpdateDenylist(); |
treib | 9cc1b11 | 2016-01-08 10:08:01 | [diff] [blame] | 368 | |
[email protected] | 5e02229 | 2013-02-06 16:42:17 | [diff] [blame] | 369 | // Updates the manual overrides for hosts in the URL filters when the |
| 370 | // corresponding preference is changed. |
| 371 | void UpdateManualHosts(); |
[email protected] | 0850e84 | 2013-01-19 03:44:31 | [diff] [blame] | 372 | |
[email protected] | 5e02229 | 2013-02-06 16:42:17 | [diff] [blame] | 373 | // Updates the manual overrides for URLs in the URL filters when the |
| 374 | // corresponding preference is changed. |
| 375 | void UpdateManualURLs(); |
[email protected] | 0850e84 | 2013-01-19 03:44:31 | [diff] [blame] | 376 | |
[email protected] | 12b7af3 | 2014-03-13 05:28:20 | [diff] [blame] | 377 | // Owns us via the KeyedService mechanism. |
[email protected] | 0850e84 | 2013-01-19 03:44:31 | [diff] [blame] | 378 | Profile* profile_; |
| 379 | |
[email protected] | f085fdd5 | 2014-06-11 18:09:20 | [diff] [blame] | 380 | bool active_; |
| 381 | |
| 382 | Delegate* delegate_; |
| 383 | |
[email protected] | 0850e84 | 2013-01-19 03:44:31 | [diff] [blame] | 384 | PrefChangeRegistrar pref_change_registrar_; |
| 385 | |
[email protected] | dfddd02 | 2013-07-10 17:29:48 | [diff] [blame] | 386 | bool is_profile_active_; |
[email protected] | a243d644c | 2013-06-20 18:37:55 | [diff] [blame] | 387 | |
[email protected] | 3a276ff | 2014-08-12 14:22:09 | [diff] [blame] | 388 | // True only when |Init()| method has been called. |
| 389 | bool did_init_; |
| 390 | |
[email protected] | 3bf45d0 | 2013-07-10 00:03:41 | [diff] [blame] | 391 | // True only when |Shutdown()| method has been called. |
| 392 | bool did_shutdown_; |
| 393 | |
mmenke | db2637ff | 2017-03-30 23:59:42 | [diff] [blame] | 394 | SupervisedUserURLFilter url_filter_; |
treib | 9cc1b11 | 2016-01-08 10:08:01 | [diff] [blame] | 395 | |
Toby Huang | 016f549b | 2020-05-04 19:50:47 | [diff] [blame] | 396 | // Store a set of extension ids approved by the custodian. |
mamir | e960964 | 2016-06-28 22:17:54 | [diff] [blame] | 397 | // It is only relevant for SU-initiated installs. |
Toby Huang | 016f549b | 2020-05-04 19:50:47 | [diff] [blame] | 398 | std::set<std::string> approved_extensions_set_; |
mamir | e960964 | 2016-06-28 22:17:54 | [diff] [blame] | 399 | |
Robbie McElrath | 2be691ca | 2020-08-17 20:14:48 | [diff] [blame] | 400 | enum class DenylistLoadState { |
treib | 9cc1b11 | 2016-01-08 10:08:01 | [diff] [blame] | 401 | NOT_LOADED, |
| 402 | LOAD_STARTED, |
| 403 | LOADED |
Robbie McElrath | 2be691ca | 2020-08-17 20:14:48 | [diff] [blame] | 404 | } denylist_state_; |
treib | 9cc1b11 | 2016-01-08 10:08:01 | [diff] [blame] | 405 | |
Robbie McElrath | 2be691ca | 2020-08-17 20:14:48 | [diff] [blame] | 406 | SupervisedUserDenylist denylist_; |
| 407 | std::unique_ptr<FileDownloader> denylist_downloader_; |
[email protected] | 8052b24 | 2013-11-15 16:40:55 | [diff] [blame] | 408 | |
Robbie McElrath | 2be691ca | 2020-08-17 20:14:48 | [diff] [blame] | 409 | std::unique_ptr<SupervisedUserAllowlistService> allowlist_service_; |
bauerb | 4da3613 | 2014-12-26 19:53:13 | [diff] [blame] | 410 | |
Robbie McElrath | 2be691ca | 2020-08-17 20:14:48 | [diff] [blame] | 411 | std::vector<scoped_refptr<SupervisedUserSiteList>> allowlists_; |
atanasova | 9572aaf | 2016-02-26 18:08:26 | [diff] [blame] | 412 | |
[email protected] | 4db65f95 | 2014-05-20 15:46:30 | [diff] [blame] | 413 | // Used to create permission requests. |
leon.han | 4ea301f | 2017-03-28 03:36:31 | [diff] [blame] | 414 | std::vector<std::unique_ptr<PermissionRequestCreator>> permissions_creators_; |
[email protected] | 4db65f95 | 2014-05-20 15:46:30 | [diff] [blame] | 415 | |
brettw | 00899e6 | 2016-11-12 02:10:17 | [diff] [blame] | 416 | #if BUILDFLAG(ENABLE_EXTENSIONS) |
mamir | e960964 | 2016-06-28 22:17:54 | [diff] [blame] | 417 | ScopedObserver<extensions::ExtensionRegistry, |
| 418 | extensions::ExtensionRegistryObserver> |
Evan Stade | 2fad901 | 2019-10-09 18:47:50 | [diff] [blame] | 419 | registry_observer_{this}; |
mamir | e960964 | 2016-06-28 22:17:54 | [diff] [blame] | 420 | #endif |
| 421 | |
Trent Apted | a250ec3ab | 2018-08-19 08:52:19 | [diff] [blame] | 422 | base::ObserverList<SupervisedUserServiceObserver>::Unchecked observer_list_; |
treib | ab0a39e | 2014-09-24 14:48:28 | [diff] [blame] | 423 | |
Danan S | c194591 | 2019-06-27 02:56:30 | [diff] [blame] | 424 | #if !defined(OS_ANDROID) |
| 425 | bool signout_required_after_supervision_enabled_ = false; |
| 426 | #endif |
| 427 | |
Jeremy Roman | 495db68 | 2019-07-12 16:03:24 | [diff] [blame] | 428 | base::WeakPtrFactory<SupervisedUserService> weak_ptr_factory_{this}; |
leon.han | 4ea301f | 2017-03-28 03:36:31 | [diff] [blame] | 429 | |
| 430 | DISALLOW_COPY_AND_ASSIGN(SupervisedUserService); |
[email protected] | 0850e84 | 2013-01-19 03:44:31 | [diff] [blame] | 431 | }; |
| 432 | |
[email protected] | cce15bb | 2014-06-17 13:43:51 | [diff] [blame] | 433 | #endif // CHROME_BROWSER_SUPERVISED_USER_SUPERVISED_USER_SERVICE_H_ |