Roll src/third_party/WebKit d9c6159:8139f33 (svn 201974:201975)
[chromium-blink-merge.git] / extensions / common / manifest_handlers / app_isolation_info.cc
blob423976cbac840466a23ef72db1448bbd609417b2
1 // Copyright (c) 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "extensions/common/manifest_handlers/app_isolation_info.h"
7 #include "base/memory/scoped_ptr.h"
8 #include "base/strings/string16.h"
9 #include "base/strings/string_number_conversions.h"
10 #include "base/strings/utf_string_conversions.h"
11 #include "base/values.h"
12 #include "extensions/common/error_utils.h"
13 #include "extensions/common/manifest_constants.h"
14 #include "extensions/common/manifest_handlers/permissions_parser.h"
15 #include "extensions/common/permissions/api_permission_set.h"
17 namespace extensions {
19 namespace keys = manifest_keys;
21 AppIsolationInfo::AppIsolationInfo(bool isolated_storage)
22 : has_isolated_storage(isolated_storage) {
25 AppIsolationInfo::~AppIsolationInfo() {
28 // static
29 bool AppIsolationInfo::HasIsolatedStorage(const Extension* extension) {
30 AppIsolationInfo* info = static_cast<AppIsolationInfo*>(
31 extension->GetManifestData(keys::kIsolation));
32 return info ? info->has_isolated_storage : false;
35 AppIsolationHandler::AppIsolationHandler() {
38 AppIsolationHandler::~AppIsolationHandler() {
41 bool AppIsolationHandler::Parse(Extension* extension, base::string16* error) {
42 // Platform apps always get isolated storage.
43 if (extension->is_platform_app()) {
44 extension->SetManifestData(keys::kIsolation, new AppIsolationInfo(true));
45 return true;
48 // Other apps only get it if it is requested _and_ experimental APIs are
49 // enabled.
50 if (!extension->is_app() ||
51 !PermissionsParser::HasAPIPermission(extension,
52 APIPermission::kExperimental)) {
53 return true;
56 // We should only be parsing if the extension has the key in the manifest,
57 // or is a platform app (which we already handled).
58 DCHECK(extension->manifest()->HasPath(keys::kIsolation));
60 const base::ListValue* isolation_list = NULL;
61 if (!extension->manifest()->GetList(keys::kIsolation, &isolation_list)) {
62 *error = base::ASCIIToUTF16(manifest_errors::kInvalidIsolation);
63 return false;
66 bool has_isolated_storage = false;
67 for (size_t i = 0; i < isolation_list->GetSize(); ++i) {
68 std::string isolation_string;
69 if (!isolation_list->GetString(i, &isolation_string)) {
70 *error = ErrorUtils::FormatErrorMessageUTF16(
71 manifest_errors::kInvalidIsolationValue,
72 base::UintToString(i));
73 return false;
76 // Check for isolated storage.
77 if (isolation_string == manifest_values::kIsolatedStorage) {
78 has_isolated_storage = true;
79 } else {
80 DLOG(WARNING) << "Did not recognize isolation type: " << isolation_string;
84 if (has_isolated_storage)
85 extension->SetManifestData(keys::kIsolation, new AppIsolationInfo(true));
87 return true;
90 bool AppIsolationHandler::AlwaysParseForType(Manifest::Type type) const {
91 return type == Manifest::TYPE_PLATFORM_APP;
94 const std::vector<std::string> AppIsolationHandler::Keys() const {
95 return SingleKey(keys::kIsolation);
98 } // namespace extensions