blob: 4d08fc69d63cde66650abfa7e8f4a74c67f0b36c [file] [log] [blame]
// Copyright 2013 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "apps/shell/common/shell_extensions_client.h"
#include "apps/shell/common/api/generated_schemas.h"
#include "base/logging.h"
#include "chrome/common/extensions/api/generated_schemas.h"
#include "chrome/common/extensions/permissions/chrome_api_permissions.h"
#include "extensions/common/api/generated_schemas.h"
#include "extensions/common/api/sockets/sockets_manifest_handler.h"
#include "extensions/common/common_manifest_handlers.h"
#include "extensions/common/features/api_feature.h"
#include "extensions/common/features/base_feature_provider.h"
#include "extensions/common/features/json_feature_provider_source.h"
#include "extensions/common/features/manifest_feature.h"
#include "extensions/common/features/permission_feature.h"
#include "extensions/common/features/simple_feature.h"
#include "extensions/common/manifest_handler.h"
#include "extensions/common/permissions/permission_message_provider.h"
#include "extensions/common/permissions/permissions_provider.h"
#include "extensions/common/url_pattern_set.h"
#include "grit/common_resources.h"
#include "grit/extensions_resources.h"
using extensions::APIPermissionInfo;
using extensions::APIPermissionSet;
using extensions::BaseFeatureProvider;
using extensions::Extension;
using extensions::FeatureProvider;
using extensions::Manifest;
using extensions::PermissionMessage;
using extensions::PermissionMessages;
using extensions::PermissionSet;
using extensions::URLPatternSet;
namespace apps {
namespace {
template <class FeatureClass>
extensions::SimpleFeature* CreateFeature() {
return new FeatureClass;
}
// TODO(jamescook): Refactor ChromePermissionsMessageProvider so we can share
// code.
class ShellPermissionMessageProvider
: public extensions::PermissionMessageProvider {
public:
ShellPermissionMessageProvider() {}
virtual ~ShellPermissionMessageProvider() {}
// PermissionMessageProvider implementation.
virtual PermissionMessages GetPermissionMessages(
const PermissionSet* permissions,
Manifest::Type extension_type) const OVERRIDE {
return PermissionMessages();
}
virtual std::vector<base::string16> GetWarningMessages(
const PermissionSet* permissions,
Manifest::Type extension_type) const OVERRIDE {
return std::vector<base::string16>();
}
virtual std::vector<base::string16> GetWarningMessagesDetails(
const PermissionSet* permissions,
Manifest::Type extension_type) const OVERRIDE {
return std::vector<base::string16>();
}
virtual bool IsPrivilegeIncrease(
const PermissionSet* old_permissions,
const PermissionSet* new_permissions,
Manifest::Type extension_type) const OVERRIDE {
// Ensure we implement this before shipping.
CHECK(false);
return false;
}
private:
DISALLOW_COPY_AND_ASSIGN(ShellPermissionMessageProvider);
};
} // namespace
ShellExtensionsClient::ShellExtensionsClient() {
}
ShellExtensionsClient::~ShellExtensionsClient() {
}
void ShellExtensionsClient::Initialize() {
extensions::RegisterCommonManifestHandlers();
// TODO(rockot): API manifest handlers which move out to src/extensions
// should either end up in RegisterCommonManifestHandlers or some new
// initialization step specifically for API manifest handlers.
(new extensions::SocketsManifestHandler)->Register();
extensions::ManifestHandler::FinalizeRegistration();
// TODO(jamescook): Do we need to whitelist any extensions?
}
const extensions::PermissionsProvider&
ShellExtensionsClient::GetPermissionsProvider() const {
// TODO(jamescook): app_shell needs a way to use a subset of the Chrome
// extension Features and Permissions. In particular, the lists of Features
// (including API features, manifest features and permission features) are
// listed in JSON files from c/c/e/api that are included into Chrome's
// resources.pak (_api_features.json and _permission_features.json). The
// PermissionsProvider must match the set of permissions used by the features
// in those files. We either need to make app_shell (and hence the extensions
// module) know about all possible permissions, or create a mechanism whereby
// we can build our own JSON files with only a subset of the data. For now,
// just provide all permissions Chrome knows about. Fixing this issue is
// http://crbug.com/339301
static extensions::ChromeAPIPermissions provider;
return provider;
}
const extensions::PermissionMessageProvider&
ShellExtensionsClient::GetPermissionMessageProvider() const {
NOTIMPLEMENTED();
static ShellPermissionMessageProvider provider;
return provider;
}
scoped_ptr<FeatureProvider> ShellExtensionsClient::CreateFeatureProvider(
const std::string& name) const {
extensions::JSONFeatureProviderSource source(name);
if (name == "api") {
// TODO(yoz): Only include src/extensions resources.
source.LoadJSON(IDR_EXTENSION_API_FEATURES);
source.LoadJSON(IDR_CHROME_EXTENSION_API_FEATURES);
return scoped_ptr<FeatureProvider>(new BaseFeatureProvider(
source.dictionary(), CreateFeature<extensions::APIFeature>));
} else if (name == "manifest") {
source.LoadJSON(IDR_EXTENSION_MANIFEST_FEATURES);
source.LoadJSON(IDR_CHROME_EXTENSION_MANIFEST_FEATURES);
return scoped_ptr<FeatureProvider>(new BaseFeatureProvider(
source.dictionary(), CreateFeature<extensions::ManifestFeature>));
} else if (name == "permission") {
source.LoadJSON(IDR_EXTENSION_PERMISSION_FEATURES);
source.LoadJSON(IDR_CHROME_EXTENSION_PERMISSION_FEATURES);
return scoped_ptr<FeatureProvider>(new BaseFeatureProvider(
source.dictionary(), CreateFeature<extensions::PermissionFeature>));
} else {
NOTREACHED();
}
return scoped_ptr<FeatureProvider>();
}
void ShellExtensionsClient::FilterHostPermissions(
const URLPatternSet& hosts,
URLPatternSet* new_hosts,
std::set<PermissionMessage>* messages) const {
NOTIMPLEMENTED();
}
void ShellExtensionsClient::SetScriptingWhitelist(
const ScriptingWhitelist& whitelist) {
scripting_whitelist_ = whitelist;
}
const extensions::ExtensionsClient::ScriptingWhitelist&
ShellExtensionsClient::GetScriptingWhitelist() const {
// TODO(jamescook): Real whitelist.
return scripting_whitelist_;
}
URLPatternSet ShellExtensionsClient::GetPermittedChromeSchemeHosts(
const Extension* extension,
const APIPermissionSet& api_permissions) const {
NOTIMPLEMENTED();
return URLPatternSet();
}
bool ShellExtensionsClient::IsScriptableURL(const GURL& url,
std::string* error) const {
NOTIMPLEMENTED();
return true;
}
bool ShellExtensionsClient::IsAPISchemaGenerated(
const std::string& name) const {
// TODO(rockot): Remove dependency on src/chrome once we have some core APIs
// moved out. See http://crbug.com/349042.
// Special-case our simplified app.runtime implementation because we don't
// have the Chrome app APIs available.
return extensions::api::GeneratedSchemas::IsGenerated(name) ||
extensions::core_api::GeneratedSchemas::IsGenerated(name) ||
apps::shell_api::GeneratedSchemas::IsGenerated(name);
}
base::StringPiece ShellExtensionsClient::GetAPISchema(
const std::string& name) const {
// TODO(rockot): Remove dependency on src/chrome once we have some core APIs
// moved out. See http://crbug.com/349042.
if (extensions::api::GeneratedSchemas::IsGenerated(name))
return extensions::api::GeneratedSchemas::Get(name);
// Schema for chrome.shell APIs.
if (apps::shell_api::GeneratedSchemas::IsGenerated(name))
return apps::shell_api::GeneratedSchemas::Get(name);
return extensions::core_api::GeneratedSchemas::Get(name);
}
bool ShellExtensionsClient::ShouldSuppressFatalErrors() const { return true; }
} // namespace apps