Add new certificateProvider extension API.
[chromium-blink-merge.git] / chrome / browser / metrics / extensions_metrics_provider.cc
blob7af9b5a0824bc6bac22d9256a6fee90daa62537f
1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "chrome/browser/metrics/extensions_metrics_provider.h"
7 #include <algorithm>
8 #include <set>
9 #include <vector>
11 #include "base/logging.h"
12 #include "base/memory/scoped_ptr.h"
13 #include "base/strings/stringprintf.h"
14 #include "chrome/browser/browser_process.h"
15 #include "chrome/browser/extensions/install_verifier.h"
16 #include "chrome/browser/profiles/profile_manager.h"
17 #include "components/metrics/metrics_log.h"
18 #include "components/metrics/metrics_state_manager.h"
19 #include "components/metrics/proto/system_profile.pb.h"
20 #include "extensions/browser/extension_registry.h"
21 #include "extensions/browser/extension_system.h"
22 #include "extensions/common/extension_set.h"
23 #include "third_party/smhasher/src/City.h"
25 namespace {
27 // The number of possible hash keys that a client may use. The UMA client_id
28 // value is reduced modulo this value to produce the key used by that
29 // particular client.
30 const size_t kExtensionListClientKeys = 4096;
32 // The number of hash buckets into which extension IDs are mapped. This sets
33 // the possible output range of the HashExtension function.
34 const size_t kExtensionListBuckets = 1024;
36 // Possible states for extensions. The order of these enum values is important,
37 // and is used when combining the state of multiple extensions and multiple
38 // profiles. Combining two states should always result in the higher state.
39 // Ex: One profile is in state FROM_STORE_VERIFIED, and another is in
40 // FROM_STORE_UNVERIFIED. The state of the two profiles together will be
41 // FROM_STORE_UNVERIFIED.
42 // This enum should be kept in sync with the corresponding enum in
43 // components/metrics/proto/system_profile.proto
44 enum ExtensionState {
45 NO_EXTENSIONS,
46 FROM_STORE_VERIFIED,
47 FROM_STORE_UNVERIFIED,
48 OFF_STORE
51 metrics::SystemProfileProto::ExtensionsState ExtensionStateAsProto(
52 ExtensionState value) {
53 switch (value) {
54 case NO_EXTENSIONS:
55 return metrics::SystemProfileProto::NO_EXTENSIONS;
56 case FROM_STORE_VERIFIED:
57 return metrics::SystemProfileProto::NO_OFFSTORE_VERIFIED;
58 case FROM_STORE_UNVERIFIED:
59 return metrics::SystemProfileProto::NO_OFFSTORE_UNVERIFIED;
60 case OFF_STORE:
61 return metrics::SystemProfileProto::HAS_OFFSTORE;
63 NOTREACHED();
64 return metrics::SystemProfileProto::NO_EXTENSIONS;
67 // Determines if the |extension| is an extension (can use extension APIs) and is
68 // not from the webstore. If local information claims the extension is from the
69 // webstore, we attempt to verify with |verifier| by checking if it has been
70 // explicitly deemed invalid. If |verifier| is inactive or if the extension is
71 // unknown to |verifier|, the local information is trusted.
72 ExtensionState IsOffStoreExtension(
73 const extensions::Extension& extension,
74 const extensions::InstallVerifier& verifier) {
75 if (!extension.is_extension() && !extension.is_legacy_packaged_app())
76 return NO_EXTENSIONS;
78 // Component extensions are considered safe.
79 if (extensions::Manifest::IsComponentLocation(extension.location()))
80 return NO_EXTENSIONS;
82 if (verifier.AllowedByEnterprisePolicy(extension.id()))
83 return NO_EXTENSIONS;
85 if (!extensions::InstallVerifier::IsFromStore(extension))
86 return OFF_STORE;
88 // Local information about the extension implies it is from the store. We try
89 // to use the install verifier to verify this.
90 if (!verifier.IsKnownId(extension.id()))
91 return FROM_STORE_UNVERIFIED;
93 if (verifier.IsInvalid(extension.id()))
94 return OFF_STORE;
96 return FROM_STORE_VERIFIED;
99 // Finds the ExtensionState of |extensions|. The return value will be the
100 // highest (as defined by the order of ExtensionState) value of each extension
101 // in |extensions|.
102 ExtensionState CheckForOffStore(const extensions::ExtensionSet& extensions,
103 const extensions::InstallVerifier& verifier) {
104 ExtensionState state = NO_EXTENSIONS;
105 for (extensions::ExtensionSet::const_iterator it = extensions.begin();
106 it != extensions.end() && state < OFF_STORE;
107 ++it) {
108 // Combine the state of each extension, always favoring the higher state as
109 // defined by the order of ExtensionState.
110 state = std::max(state, IsOffStoreExtension(**it, verifier));
112 return state;
115 } // namespace
117 ExtensionsMetricsProvider::ExtensionsMetricsProvider(
118 metrics::MetricsStateManager* metrics_state_manager)
119 : metrics_state_manager_(metrics_state_manager), cached_profile_(NULL) {
120 DCHECK(metrics_state_manager_);
123 ExtensionsMetricsProvider::~ExtensionsMetricsProvider() {
126 // static
127 int ExtensionsMetricsProvider::HashExtension(const std::string& extension_id,
128 uint32 client_key) {
129 DCHECK_LE(client_key, kExtensionListClientKeys);
130 std::string message =
131 base::StringPrintf("%u:%s", client_key, extension_id.c_str());
132 uint64 output = CityHash64(message.data(), message.size());
133 return output % kExtensionListBuckets;
136 Profile* ExtensionsMetricsProvider::GetMetricsProfile() {
137 ProfileManager* profile_manager = g_browser_process->profile_manager();
138 if (!profile_manager)
139 return NULL;
141 // If there is a cached profile, reuse that. However, check that it is still
142 // valid first.
143 if (cached_profile_ && profile_manager->IsValidProfile(cached_profile_))
144 return cached_profile_;
146 // Find a suitable profile to use, and cache it so that we continue to report
147 // statistics on the same profile. We would simply use
148 // ProfileManager::GetLastUsedProfile(), except that that has the side effect
149 // of creating a profile if it does not yet exist.
150 cached_profile_ = profile_manager->GetProfileByPath(
151 profile_manager->GetLastUsedProfileDir(profile_manager->user_data_dir()));
152 if (cached_profile_) {
153 // Ensure that the returned profile is not an incognito profile.
154 cached_profile_ = cached_profile_->GetOriginalProfile();
156 return cached_profile_;
159 scoped_ptr<extensions::ExtensionSet>
160 ExtensionsMetricsProvider::GetInstalledExtensions(Profile* profile) {
161 if (profile) {
162 return extensions::ExtensionRegistry::Get(profile)
163 ->GenerateInstalledExtensionsSet();
165 return scoped_ptr<extensions::ExtensionSet>();
168 uint64 ExtensionsMetricsProvider::GetClientID() {
169 // TODO(blundell): Create a MetricsLog::ClientIDAsInt() API and call it
170 // here as well as in MetricsLog's population of the client_id field of
171 // the uma_proto.
172 return metrics::MetricsLog::Hash(metrics_state_manager_->client_id());
175 void ExtensionsMetricsProvider::ProvideSystemProfileMetrics(
176 metrics::SystemProfileProto* system_profile) {
177 ProvideOffStoreMetric(system_profile);
178 ProvideOccupiedBucketMetric(system_profile);
181 void ExtensionsMetricsProvider::ProvideOffStoreMetric(
182 metrics::SystemProfileProto* system_profile) {
183 ProfileManager* profile_manager = g_browser_process->profile_manager();
184 if (!profile_manager)
185 return;
187 ExtensionState state = NO_EXTENSIONS;
189 // The off-store metric includes information from all loaded profiles at the
190 // time when this metric is generated.
191 std::vector<Profile*> profiles = profile_manager->GetLoadedProfiles();
192 for (size_t i = 0u; i < profiles.size() && state < OFF_STORE; ++i) {
193 extensions::InstallVerifier* verifier =
194 extensions::InstallVerifier::Get(profiles[i]);
196 scoped_ptr<extensions::ExtensionSet> extensions(
197 GetInstalledExtensions(profiles[i]));
198 if (!extensions)
199 continue;
201 // Combine the state from each profile, always favoring the higher state as
202 // defined by the order of ExtensionState.
203 state = std::max(state, CheckForOffStore(*extensions.get(), *verifier));
206 system_profile->set_offstore_extensions_state(ExtensionStateAsProto(state));
209 void ExtensionsMetricsProvider::ProvideOccupiedBucketMetric(
210 metrics::SystemProfileProto* system_profile) {
211 // UMA reports do not support multiple profiles, but extensions are installed
212 // per-profile. We return the extensions installed in the primary profile.
213 // In the future, we might consider reporting data about extensions in all
214 // profiles.
215 Profile* profile = GetMetricsProfile();
217 scoped_ptr<extensions::ExtensionSet> extensions(
218 GetInstalledExtensions(profile));
219 if (!extensions)
220 return;
222 const int client_key = GetClientID() % kExtensionListClientKeys;
224 std::set<int> buckets;
225 for (extensions::ExtensionSet::const_iterator it = extensions->begin();
226 it != extensions->end();
227 ++it) {
228 buckets.insert(HashExtension((*it)->id(), client_key));
231 for (std::set<int>::const_iterator it = buckets.begin(); it != buckets.end();
232 ++it) {
233 system_profile->add_occupied_extension_bucket(*it);