Blink roll 25b6bd3a7a131ffe68d809546ad1a20707915cdc:3a503f41ae42e5b79cfcd2ff10e65afde...
[chromium-blink-merge.git] / extensions / common / permissions / permissions_data.h
blobba2f3c3aa54078bbca0e1843e7fc2ec9942e3e70
1 // Copyright (c) 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #ifndef EXTENSIONS_COMMON_PERMISSIONS_PERMISSIONS_DATA_H_
6 #define EXTENSIONS_COMMON_PERMISSIONS_PERMISSIONS_DATA_H_
8 #include <map>
9 #include <string>
10 #include <vector>
12 #include "base/memory/ref_counted.h"
13 #include "base/memory/scoped_ptr.h"
14 #include "base/strings/string16.h"
15 #include "base/synchronization/lock.h"
16 #include "extensions/common/extension.h"
17 #include "extensions/common/manifest.h"
18 #include "extensions/common/permissions/api_permission.h"
19 #include "extensions/common/permissions/permission_message.h"
20 #include "extensions/common/permissions/permission_set.h"
22 class GURL;
24 namespace extensions {
26 class PermissionSet;
27 class Extension;
28 class URLPatternSet;
29 class UserScript;
31 // A container for the active permissions of an extension.
32 // TODO(rdevlin.cronin): For the love of everything good, rename this class to
33 // ActivePermissions. We do *not* need PermissionsParser, PermissionSet,
34 // PermissionInfo, and PermissionsData. No one will be able to keep them
35 // straight.
36 class PermissionsData {
37 public:
38 // The possible types of access for a given frame.
39 enum AccessType {
40 ACCESS_DENIED, // The extension is not allowed to access the given page.
41 ACCESS_ALLOWED, // The extension is allowed to access the given page.
42 ACCESS_WITHHELD // The browser must determine if the extension can access
43 // the given page.
46 // Delegate class to allow different contexts (e.g. browser vs renderer) to
47 // have control over policy decisions.
48 class PolicyDelegate {
49 public:
50 virtual ~PolicyDelegate() {}
52 // Returns false if script access should be blocked on this page.
53 // Otherwise, default policy should decide.
54 virtual bool CanExecuteScriptOnPage(const Extension* extension,
55 const GURL& document_url,
56 const GURL& top_document_url,
57 int tab_id,
58 int process_id,
59 std::string* error) = 0;
62 static void SetPolicyDelegate(PolicyDelegate* delegate);
64 PermissionsData(const Extension* extension);
65 virtual ~PermissionsData();
67 // Returns true if the |extension| can silently increase its permission level.
68 // Users must approve permissions for unpacked and packed extensions in the
69 // following situations:
70 // - when installing or upgrading packed extensions
71 // - when installing unpacked extensions that have NPAPI plugins
72 // - when either type of extension requests optional permissions
73 static bool CanSilentlyIncreasePermissions(const Extension* extension);
75 // Returns true if the extension is a COMPONENT extension or is on the
76 // whitelist of extensions that can script all pages.
77 static bool CanExecuteScriptEverywhere(const Extension* extension);
79 // Returns true if we should skip the permisisons warning for the extension
80 // with the given |extension_id|.
81 static bool ShouldSkipPermissionWarnings(const std::string& extension_id);
83 // Returns true if the given |url| is restricted for the given |extension|,
84 // as is commonly the case for chrome:// urls.
85 // NOTE: You probably want to use CanAccessPage().
86 static bool IsRestrictedUrl(const GURL& document_url,
87 const GURL& top_frame_url,
88 const Extension* extension,
89 std::string* error);
91 // Sets the runtime permissions of the given |extension| to |active| and
92 // |withheld|.
93 void SetPermissions(const scoped_refptr<const PermissionSet>& active,
94 const scoped_refptr<const PermissionSet>& withheld) const;
96 // Updates the tab-specific permissions of |tab_id| to include those from
97 // |permissions|.
98 void UpdateTabSpecificPermissions(
99 int tab_id,
100 scoped_refptr<const PermissionSet> permissions) const;
102 // Clears the tab-specific permissions of |tab_id|.
103 void ClearTabSpecificPermissions(int tab_id) const;
105 // Returns true if the |extension| has the given |permission|. Prefer
106 // IsExtensionWithPermissionOrSuggestInConsole when developers may be using an
107 // api that requires a permission they didn't know about, e.g. open web apis.
108 // Note this does not include APIs with no corresponding permission, like
109 // "runtime" or "browserAction".
110 // TODO(mpcomplete): drop the "API" from these names, it's confusing.
111 bool HasAPIPermission(APIPermission::ID permission) const;
112 bool HasAPIPermission(const std::string& permission_name) const;
113 bool HasAPIPermissionForTab(int tab_id, APIPermission::ID permission) const;
114 bool CheckAPIPermissionWithParam(
115 APIPermission::ID permission,
116 const APIPermission::CheckParam* param) const;
118 // TODO(rdevlin.cronin): GetEffectiveHostPermissions(), HasHostPermission(),
119 // and HasEffectiveAccessToAllHosts() are just forwards for the active
120 // permissions. We should either get rid of these, and have callers use
121 // active_permissions(), or should get rid of active_permissions(), and make
122 // callers use PermissionsData for everything. We should not do both.
124 // Returns the effective hosts associated with the active permissions.
125 const URLPatternSet& GetEffectiveHostPermissions() const;
127 // Whether the extension has access to the given |url|.
128 bool HasHostPermission(const GURL& url) const;
130 // Whether the extension has effective access to all hosts. This is true if
131 // there is a content script that matches all hosts, if there is a host
132 // permission grants access to all hosts (like <all_urls>) or an api
133 // permission that effectively grants access to all hosts (e.g. proxy,
134 // network, etc.)
135 bool HasEffectiveAccessToAllHosts() const;
137 // Returns the full list of permission messages that should display at
138 // install time.
139 PermissionMessages GetPermissionMessages() const;
141 // Returns the full list of permission messages that should display at install
142 // time as strings.
143 std::vector<base::string16> GetPermissionMessageStrings() const;
145 // Returns the full list of permission details for messages that should
146 // display at install time as strings.
147 std::vector<base::string16> GetPermissionMessageDetailsStrings() const;
149 // Returns true if the extension has requested all-hosts permissions (or
150 // something close to it), but has had it withheld.
151 bool HasWithheldImpliedAllHosts() const;
153 // Returns true if the |extension| has permission to access and interact with
154 // the specified page, in order to do things like inject scripts or modify
155 // the content.
156 // If this returns false and |error| is non-NULL, |error| will be popualted
157 // with the reason the extension cannot access the page.
158 bool CanAccessPage(const Extension* extension,
159 const GURL& document_url,
160 const GURL& top_document_url,
161 int tab_id,
162 int process_id,
163 std::string* error) const;
164 // Like CanAccessPage, but also takes withheld permissions into account.
165 // TODO(rdevlin.cronin) We shouldn't have two functions, but not all callers
166 // know how to wait for permission.
167 AccessType GetPageAccess(const Extension* extension,
168 const GURL& document_url,
169 const GURL& top_document_url,
170 int tab_id,
171 int process_id,
172 std::string* error) const;
174 // Returns true if the |extension| has permission to inject a content script
175 // on the page.
176 // If this returns false and |error| is non-NULL, |error| will be popualted
177 // with the reason the extension cannot script the page.
178 // NOTE: You almost certainly want to use CanAccessPage() instead of this
179 // method.
180 bool CanRunContentScriptOnPage(const Extension* extension,
181 const GURL& document_url,
182 const GURL& top_document_url,
183 int tab_id,
184 int process_id,
185 std::string* error) const;
186 // Like CanRunContentScriptOnPage, but also takes withheld permissions into
187 // account.
188 // TODO(rdevlin.cronin) We shouldn't have two functions, but not all callers
189 // know how to wait for permission.
190 AccessType GetContentScriptAccess(const Extension* extension,
191 const GURL& document_url,
192 const GURL& top_document_url,
193 int tab_id,
194 int process_id,
195 std::string* error) const;
197 // Returns true if extension is allowed to obtain the contents of a page as
198 // an image. Since a page may contain sensitive information, this is
199 // restricted to the extension's host permissions as well as the extension
200 // page itself.
201 bool CanCaptureVisiblePage(int tab_id, std::string* error) const;
203 const scoped_refptr<const PermissionSet>& active_permissions() const {
204 // TODO(dcheng): What is the point of this lock?
205 base::AutoLock auto_lock(runtime_lock_);
206 return active_permissions_unsafe_;
209 const scoped_refptr<const PermissionSet>& withheld_permissions() const {
210 // TODO(dcheng): What is the point of this lock?
211 return withheld_permissions_unsafe_;
214 #if defined(UNIT_TEST)
215 scoped_refptr<const PermissionSet> GetTabSpecificPermissionsForTesting(
216 int tab_id) const {
217 return GetTabSpecificPermissions(tab_id);
219 #endif
221 private:
222 typedef std::map<int, scoped_refptr<const PermissionSet> > TabPermissionsMap;
224 // Gets the tab-specific host permissions of |tab_id|, or NULL if there
225 // aren't any.
226 scoped_refptr<const PermissionSet> GetTabSpecificPermissions(
227 int tab_id) const;
229 // Returns true if the |extension| has tab-specific permission to operate on
230 // the tab specified by |tab_id| with the given |url|.
231 // Note that if this returns false, it doesn't mean the extension can't run on
232 // the given tab, only that it does not have tab-specific permission to do so.
233 bool HasTabSpecificPermissionToExecuteScript(int tab_id,
234 const GURL& url) const;
236 // Returns whether or not the extension is permitted to run on the given page,
237 // checking against |permitted_url_patterns| in addition to blocking special
238 // sites (like the webstore or chrome:// urls).
239 AccessType CanRunOnPage(const Extension* extension,
240 const GURL& document_url,
241 const GURL& top_document_url,
242 int tab_id,
243 int process_id,
244 const URLPatternSet& permitted_url_patterns,
245 const URLPatternSet& withheld_url_patterns,
246 std::string* error) const;
248 // The associated extension's id.
249 std::string extension_id_;
251 // The associated extension's manifest type.
252 Manifest::Type manifest_type_;
254 mutable base::Lock runtime_lock_;
256 // The permission's which are currently active on the extension during
257 // runtime.
258 // Unsafe indicates that we must lock anytime this is directly accessed.
259 // Unless you need to change |active_permissions_unsafe_|, use the (safe)
260 // active_permissions() accessor.
261 mutable scoped_refptr<const PermissionSet> active_permissions_unsafe_;
263 // The permissions the extension requested, but was not granted due because
264 // they are too powerful. This includes things like all_hosts.
265 // Unsafe indicates that we must lock anytime this is directly accessed.
266 // Unless you need to change |withheld_permissions_unsafe_|, use the (safe)
267 // withheld_permissions() accessor.
268 mutable scoped_refptr<const PermissionSet> withheld_permissions_unsafe_;
270 mutable TabPermissionsMap tab_specific_permissions_;
272 DISALLOW_COPY_AND_ASSIGN(PermissionsData);
275 } // namespace extensions
277 #endif // EXTENSIONS_COMMON_PERMISSIONS_PERMISSIONS_DATA_H_