blob: 9470d586ba8320bfbe1bdddbaf3febbc27f81755 [file] [log] [blame]
// Copyright (c) 2013 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef EXTENSIONS_COMMON_PERMISSIONS_PERMISSIONS_DATA_H_
#define EXTENSIONS_COMMON_PERMISSIONS_PERMISSIONS_DATA_H_
#include <map>
#include <string>
#include <vector>
#include "base/memory/ref_counted.h"
#include "base/memory/scoped_ptr.h"
#include "base/strings/string16.h"
#include "base/synchronization/lock.h"
#include "extensions/common/extension.h"
#include "extensions/common/manifest.h"
#include "extensions/common/permissions/api_permission.h"
#include "extensions/common/permissions/permission_message.h"
#include "extensions/common/permissions/permission_set.h"
class GURL;
namespace extensions {
class PermissionSet;
class Extension;
class URLPatternSet;
class UserScript;
// A container for the active permissions of an extension.
// TODO(rdevlin.cronin): For the love of everything good, rename this class to
// ActivePermissions. We do *not* need PermissionsParser, PermissionSet,
// PermissionInfo, and PermissionsData. No one will be able to keep them
// straight.
class PermissionsData {
public:
// Delegate class to allow different contexts (e.g. browser vs renderer) to
// have control over policy decisions.
class PolicyDelegate {
public:
virtual ~PolicyDelegate() {}
// Returns false if script access should be blocked on this page.
// Otherwise, default policy should decide.
virtual bool CanExecuteScriptOnPage(const Extension* extension,
const GURL& document_url,
const GURL& top_document_url,
int tab_id,
int process_id,
std::string* error) = 0;
};
static void SetPolicyDelegate(PolicyDelegate* delegate);
PermissionsData(const Extension* extension);
virtual ~PermissionsData();
// Returns true if the |extension| can silently increase its permission level.
// Users must approve permissions for unpacked and packed extensions in the
// following situations:
// - when installing or upgrading packed extensions
// - when installing unpacked extensions that have NPAPI plugins
// - when either type of extension requests optional permissions
static bool CanSilentlyIncreasePermissions(const Extension* extension);
// Returns true if the extension is a COMPONENT extension or is on the
// whitelist of extensions that can script all pages.
static bool CanExecuteScriptEverywhere(const Extension* extension);
// Returns true if the given |url| is restricted for the given |extension|,
// as is commonly the case for chrome:// urls.
// NOTE: You probably want to use CanAccessPage().
static bool IsRestrictedUrl(const GURL& document_url,
const GURL& top_frame_url,
const Extension* extension,
std::string* error);
// Sets the runtime permissions of the given |extension| to |permissions|.
void SetActivePermissions(const PermissionSet* active) const;
// Updates the tab-specific permissions of |tab_id| to include those from
// |permissions|.
void UpdateTabSpecificPermissions(
int tab_id,
scoped_refptr<const PermissionSet> permissions) const;
// Clears the tab-specific permissions of |tab_id|.
void ClearTabSpecificPermissions(int tab_id) const;
// Returns true if the |extension| has the given |permission|. Prefer
// IsExtensionWithPermissionOrSuggestInConsole when developers may be using an
// api that requires a permission they didn't know about, e.g. open web apis.
// Note this does not include APIs with no corresponding permission, like
// "runtime" or "browserAction".
// TODO(mpcomplete): drop the "API" from these names, it's confusing.
bool HasAPIPermission(APIPermission::ID permission) const;
bool HasAPIPermission(const std::string& permission_name) const;
bool HasAPIPermissionForTab(int tab_id, APIPermission::ID permission) const;
bool CheckAPIPermissionWithParam(
APIPermission::ID permission,
const APIPermission::CheckParam* param) const;
// TODO(rdevlin.cronin): GetEffectiveHostPermissions(), HasHostPermission(),
// and HasEffectiveAccessToAllHosts() are just forwards for the active
// permissions. We should either get rid of these, and have callers use
// active_permissions(), or should get rid of active_permissions(), and make
// callers use PermissionsData for everything. We should not do both.
// Returns the effective hosts associated with the active permissions.
const URLPatternSet& GetEffectiveHostPermissions() const;
// Whether the extension has access to the given |url|.
bool HasHostPermission(const GURL& url) const;
// Whether the extension has effective access to all hosts. This is true if
// there is a content script that matches all hosts, if there is a host
// permission grants access to all hosts (like <all_urls>) or an api
// permission that effectively grants access to all hosts (e.g. proxy,
// network, etc.)
bool HasEffectiveAccessToAllHosts() const;
// Returns the full list of permission messages that should display at
// install time.
PermissionMessages GetPermissionMessages() const;
// Returns the full list of permission messages that should display at install
// time as strings.
std::vector<base::string16> GetPermissionMessageStrings() const;
// Returns the full list of permission details for messages that should
// display at install time as strings.
std::vector<base::string16> GetPermissionMessageDetailsStrings() const;
// Returns true if the |extension| has permission to access and interact with
// the specified page, in order to do things like inject scripts or modify
// the content.
// If this returns false and |error| is non-NULL, |error| will be popualted
// with the reason the extension cannot access the page.
bool CanAccessPage(const Extension* extension,
const GURL& document_url,
const GURL& top_document_url,
int tab_id,
int process_id,
std::string* error) const;
// Returns true if the |extension| has permission to inject a content script
// on the page.
// If this returns false and |error| is non-NULL, |error| will be popualted
// with the reason the extension cannot script the page.
// NOTE: You almost certainly want to use CanAccessPage() instead of this
// method.
bool CanRunContentScriptOnPage(const Extension* extension,
const GURL& document_url,
const GURL& top_document_url,
int tab_id,
int process_id,
std::string* error) const;
// Returns true if extension is allowed to obtain the contents of a page as
// an image. Since a page may contain sensitive information, this is
// restricted to the extension's host permissions as well as the extension
// page itself.
bool CanCaptureVisiblePage(int tab_id, std::string* error) const;
// Returns true if the user should be alerted that the |extension| is running
// a script. If |tab_id| and |url| are included, this also considers tab-
// specific permissions.
bool RequiresActionForScriptExecution(const Extension* extension) const;
bool RequiresActionForScriptExecution(const Extension* extension,
int tab_id,
const GURL& url) const;
scoped_refptr<const PermissionSet> active_permissions() const {
base::AutoLock auto_lock(runtime_lock_);
return active_permissions_unsafe_;
}
#if defined(UNIT_TEST)
scoped_refptr<const PermissionSet> GetTabSpecificPermissionsForTesting(
int tab_id) const {
return GetTabSpecificPermissions(tab_id);
}
#endif
private:
typedef std::map<int, scoped_refptr<const PermissionSet> > TabPermissionsMap;
// Gets the tab-specific host permissions of |tab_id|, or NULL if there
// aren't any.
scoped_refptr<const PermissionSet> GetTabSpecificPermissions(
int tab_id) const;
// Returns true if the |extension| has tab-specific permission to operate on
// the tab specified by |tab_id| with the given |url|.
// Note that if this returns false, it doesn't mean the extension can't run on
// the given tab, only that it does not have tab-specific permission to do so.
bool HasTabSpecificPermissionToExecuteScript(int tab_id,
const GURL& url) const;
// Returns true if the extension is permitted to run on the given page,
// checking against |permitted_url_patterns| in addition to blocking special
// sites (like the webstore or chrome:// urls).
bool CanRunOnPage(const Extension* extension,
const GURL& document_url,
const GURL& top_document_url,
int tab_id,
int process_id,
const URLPatternSet& permitted_url_patterns,
std::string* error) const;
// The associated extension's id.
std::string extension_id_;
// The associated extension's manifest type.
Manifest::Type manifest_type_;
mutable base::Lock runtime_lock_;
// The permission's which are currently active on the extension during
// runtime.
// Unsafe indicates that we must lock anytime this is directly accessed.
// Unless you need to change |active_permissions_unsafe_|, use the (safe)
// active_permissions() accessor.
mutable scoped_refptr<const PermissionSet> active_permissions_unsafe_;
mutable TabPermissionsMap tab_specific_permissions_;
DISALLOW_COPY_AND_ASSIGN(PermissionsData);
};
} // namespace extensions
#endif // EXTENSIONS_COMMON_PERMISSIONS_PERMISSIONS_DATA_H_