Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "chrome/browser/supervised_user/supervised_user_service.h" | 5 #include "chrome/browser/supervised_user/supervised_user_service.h" |
| 6 | 6 |
| 7 #include <utility> | 7 #include <utility> |
| 8 | 8 |
| 9 #include "base/command_line.h" | 9 #include "base/command_line.h" |
| 10 #include "base/feature_list.h" | |
| 10 #include "base/files/file_path.h" | 11 #include "base/files/file_path.h" |
| 11 #include "base/files/file_util.h" | 12 #include "base/files/file_util.h" |
| 12 #include "base/memory/ref_counted.h" | 13 #include "base/memory/ref_counted.h" |
| 13 #include "base/path_service.h" | 14 #include "base/path_service.h" |
| 14 #include "base/strings/stringprintf.h" | 15 #include "base/strings/stringprintf.h" |
| 15 #include "base/strings/utf_string_conversions.h" | 16 #include "base/strings/utf_string_conversions.h" |
| 16 #include "base/task_runner_util.h" | 17 #include "base/task_runner_util.h" |
| 17 #include "base/version.h" | 18 #include "base/version.h" |
| 18 #include "build/build_config.h" | 19 #include "build/build_config.h" |
| 19 #include "chrome/browser/browser_process.h" | 20 #include "chrome/browser/browser_process.h" |
| 20 #include "chrome/browser/component_updater/supervised_user_whitelist_installer.h " | 21 #include "chrome/browser/component_updater/supervised_user_whitelist_installer.h " |
| 21 #include "chrome/browser/profiles/profile.h" | 22 #include "chrome/browser/profiles/profile.h" |
| 22 #include "chrome/browser/profiles/profile_attributes_entry.h" | 23 #include "chrome/browser/profiles/profile_attributes_entry.h" |
| 23 #include "chrome/browser/profiles/profile_attributes_storage.h" | 24 #include "chrome/browser/profiles/profile_attributes_storage.h" |
| 24 #include "chrome/browser/profiles/profile_manager.h" | 25 #include "chrome/browser/profiles/profile_manager.h" |
| 25 #include "chrome/browser/signin/profile_oauth2_token_service_factory.h" | 26 #include "chrome/browser/signin/profile_oauth2_token_service_factory.h" |
| 26 #include "chrome/browser/signin/signin_manager_factory.h" | 27 #include "chrome/browser/signin/signin_manager_factory.h" |
| 27 #include "chrome/browser/supervised_user/experimental/supervised_user_filtering_ switches.h" | 28 #include "chrome/browser/supervised_user/experimental/supervised_user_filtering_ switches.h" |
| 28 #include "chrome/browser/supervised_user/permission_request_creator.h" | 29 #include "chrome/browser/supervised_user/permission_request_creator.h" |
| 29 #include "chrome/browser/supervised_user/supervised_user_constants.h" | 30 #include "chrome/browser/supervised_user/supervised_user_constants.h" |
| 31 #include "chrome/browser/supervised_user/supervised_user_features.h" | |
| 30 #include "chrome/browser/supervised_user/supervised_user_service_observer.h" | 32 #include "chrome/browser/supervised_user/supervised_user_service_observer.h" |
| 31 #include "chrome/browser/supervised_user/supervised_user_settings_service.h" | 33 #include "chrome/browser/supervised_user/supervised_user_settings_service.h" |
| 32 #include "chrome/browser/supervised_user/supervised_user_settings_service_factor y.h" | 34 #include "chrome/browser/supervised_user/supervised_user_settings_service_factor y.h" |
| 33 #include "chrome/browser/supervised_user/supervised_user_site_list.h" | 35 #include "chrome/browser/supervised_user/supervised_user_site_list.h" |
| 34 #include "chrome/browser/supervised_user/supervised_user_whitelist_service.h" | 36 #include "chrome/browser/supervised_user/supervised_user_whitelist_service.h" |
| 35 #include "chrome/browser/sync/profile_sync_service_factory.h" | 37 #include "chrome/browser/sync/profile_sync_service_factory.h" |
| 36 #include "chrome/browser/ui/browser.h" | 38 #include "chrome/browser/ui/browser.h" |
| 37 #include "chrome/browser/ui/browser_list.h" | 39 #include "chrome/browser/ui/browser_list.h" |
| 38 #include "chrome/common/chrome_paths.h" | 40 #include "chrome/common/chrome_paths.h" |
| 39 #include "chrome/common/chrome_switches.h" | 41 #include "chrome/common/chrome_switches.h" |
| 40 #include "chrome/common/pref_names.h" | 42 #include "chrome/common/pref_names.h" |
| 41 #include "chrome/grit/generated_resources.h" | 43 #include "chrome/grit/generated_resources.h" |
| 42 #include "components/browser_sync/browser/profile_sync_service.h" | 44 #include "components/browser_sync/browser/profile_sync_service.h" |
| 43 #include "components/pref_registry/pref_registry_syncable.h" | 45 #include "components/pref_registry/pref_registry_syncable.h" |
| 44 #include "components/prefs/pref_service.h" | 46 #include "components/prefs/pref_service.h" |
| 45 #include "components/signin/core/browser/profile_oauth2_token_service.h" | 47 #include "components/signin/core/browser/profile_oauth2_token_service.h" |
| 46 #include "components/signin/core/browser/signin_manager.h" | 48 #include "components/signin/core/browser/signin_manager.h" |
| 47 #include "components/signin/core/browser/signin_manager_base.h" | 49 #include "components/signin/core/browser/signin_manager_base.h" |
| 48 #include "components/signin/core/common/signin_switches.h" | 50 #include "components/signin/core/common/signin_switches.h" |
| 49 #include "content/public/browser/browser_thread.h" | 51 #include "content/public/browser/browser_thread.h" |
| 50 #include "content/public/browser/user_metrics.h" | 52 #include "content/public/browser/user_metrics.h" |
| 53 #include "extensions/browser/extension_registry.h" | |
|
Marc Treib
2016/06/14 13:53:34
This needs to go into the #ifdef ENABLE_EXTENSIONS
mamir
2016/06/15 09:40:11
Done.
| |
| 51 #include "ui/base/l10n/l10n_util.h" | 54 #include "ui/base/l10n/l10n_util.h" |
| 52 | 55 |
| 53 #if !defined(OS_ANDROID) | 56 #if !defined(OS_ANDROID) |
| 54 #include "chrome/browser/supervised_user/legacy/custodian_profile_downloader_ser vice.h" | 57 #include "chrome/browser/supervised_user/legacy/custodian_profile_downloader_ser vice.h" |
| 55 #include "chrome/browser/supervised_user/legacy/custodian_profile_downloader_ser vice_factory.h" | 58 #include "chrome/browser/supervised_user/legacy/custodian_profile_downloader_ser vice_factory.h" |
| 56 #include "chrome/browser/supervised_user/legacy/permission_request_creator_sync. h" | 59 #include "chrome/browser/supervised_user/legacy/permission_request_creator_sync. h" |
| 57 #include "chrome/browser/supervised_user/legacy/supervised_user_pref_mapping_ser vice.h" | 60 #include "chrome/browser/supervised_user/legacy/supervised_user_pref_mapping_ser vice.h" |
| 58 #include "chrome/browser/supervised_user/legacy/supervised_user_pref_mapping_ser vice_factory.h" | 61 #include "chrome/browser/supervised_user/legacy/supervised_user_pref_mapping_ser vice_factory.h" |
| 59 #include "chrome/browser/supervised_user/legacy/supervised_user_registration_uti lity.h" | 62 #include "chrome/browser/supervised_user/legacy/supervised_user_registration_uti lity.h" |
| 60 #include "chrome/browser/supervised_user/legacy/supervised_user_shared_settings_ service_factory.h" | 63 #include "chrome/browser/supervised_user/legacy/supervised_user_shared_settings_ service_factory.h" |
| 61 #endif | 64 #endif |
| 62 | 65 |
| 63 #if defined(OS_CHROMEOS) | 66 #if defined(OS_CHROMEOS) |
| 64 #include "chrome/browser/chromeos/login/users/chrome_user_manager.h" | 67 #include "chrome/browser/chromeos/login/users/chrome_user_manager.h" |
| 65 #include "chrome/browser/chromeos/login/users/supervised_user_manager.h" | 68 #include "chrome/browser/chromeos/login/users/supervised_user_manager.h" |
| 66 #include "components/user_manager/user_manager.h" | 69 #include "components/user_manager/user_manager.h" |
| 67 #endif | 70 #endif |
| 68 | 71 |
| 69 #if defined(ENABLE_EXTENSIONS) | 72 #if defined(ENABLE_EXTENSIONS) |
| 70 #include "chrome/browser/extensions/extension_service.h" | 73 #include "chrome/browser/extensions/extension_service.h" |
| 74 #include "chrome/browser/extensions/extension_util.h" | |
| 75 #include "chrome/browser/supervised_user/supervised_user_service_factory.h" | |
|
Marc Treib
2016/06/14 13:53:34
This, OTOH, can go out into the regular includes.
mamir
2016/06/15 09:40:11
Done.
| |
| 76 #include "extensions/browser/extension_prefs.h" | |
| 71 #include "extensions/browser/extension_system.h" | 77 #include "extensions/browser/extension_system.h" |
| 72 #endif | 78 #endif |
| 73 | 79 |
| 74 #if defined(ENABLE_THEMES) | 80 #if defined(ENABLE_THEMES) |
| 75 #include "chrome/browser/themes/theme_service.h" | 81 #include "chrome/browser/themes/theme_service.h" |
| 76 #include "chrome/browser/themes/theme_service_factory.h" | 82 #include "chrome/browser/themes/theme_service_factory.h" |
| 77 #endif | 83 #endif |
| 78 | 84 |
| 79 using base::DictionaryValue; | 85 using base::DictionaryValue; |
| 80 using base::UserMetricsAction; | 86 using base::UserMetricsAction; |
| 81 using content::BrowserThread; | 87 using content::BrowserThread; |
| 88 using extensions::Extension; | |
| 89 using extensions::ExtensionPrefs; | |
| 90 using extensions::ExtensionSystem; | |
|
Marc Treib
2016/06/14 13:53:34
These also need to go into an #ifdef
mamir
2016/06/15 09:40:11
Done.
| |
| 82 | 91 |
| 83 namespace { | 92 namespace { |
| 84 | 93 |
| 85 // The URL from which to download a host blacklist if no local one exists yet. | 94 // The URL from which to download a host blacklist if no local one exists yet. |
| 86 const char kBlacklistURL[] = | 95 const char kBlacklistURL[] = |
| 87 "https://www.gstatic.com/chrome/supervised_user/blacklist-20141001-1k.bin"; | 96 "https://www.gstatic.com/chrome/supervised_user/blacklist-20141001-1k.bin"; |
| 88 // The filename under which we'll store the blacklist (in the user data dir). | 97 // The filename under which we'll store the blacklist (in the user data dir). |
| 89 const char kBlacklistFilename[] = "su-blacklist.bin"; | 98 const char kBlacklistFilename[] = "su-blacklist.bin"; |
| 90 | 99 |
| 91 const char* const kCustodianInfoPrefs[] = { | 100 const char* const kCustodianInfoPrefs[] = { |
| 92 prefs::kSupervisedUserCustodianName, | 101 prefs::kSupervisedUserCustodianName, |
| 93 prefs::kSupervisedUserCustodianEmail, | 102 prefs::kSupervisedUserCustodianEmail, |
| 94 prefs::kSupervisedUserCustodianProfileImageURL, | 103 prefs::kSupervisedUserCustodianProfileImageURL, |
| 95 prefs::kSupervisedUserCustodianProfileURL, | 104 prefs::kSupervisedUserCustodianProfileURL, |
| 96 prefs::kSupervisedUserSecondCustodianName, | 105 prefs::kSupervisedUserSecondCustodianName, |
| 97 prefs::kSupervisedUserSecondCustodianEmail, | 106 prefs::kSupervisedUserSecondCustodianEmail, |
| 98 prefs::kSupervisedUserSecondCustodianProfileImageURL, | 107 prefs::kSupervisedUserSecondCustodianProfileImageURL, |
| 99 prefs::kSupervisedUserSecondCustodianProfileURL, | 108 prefs::kSupervisedUserSecondCustodianProfileURL, |
| 100 }; | 109 }; |
| 101 | 110 |
| 102 void CreateURLAccessRequest( | 111 void CreateURLAccessRequest( |
| 103 const GURL& url, | 112 const GURL& url, |
| 104 PermissionRequestCreator* creator, | 113 PermissionRequestCreator* creator, |
| 105 const SupervisedUserService::SuccessCallback& callback) { | 114 const SupervisedUserService::SuccessCallback& callback) { |
| 106 creator->CreateURLAccessRequest(url, callback); | 115 creator->CreateURLAccessRequest(url, callback); |
| 107 } | 116 } |
| 108 | 117 |
| 118 void CreateExtensionInstallRequest( | |
| 119 const std::string& id, | |
| 120 PermissionRequestCreator* creator, | |
| 121 const SupervisedUserService::SuccessCallback& callback) { | |
| 122 creator->CreateExtensionInstallRequest(id, callback); | |
| 123 } | |
| 124 | |
| 109 void CreateExtensionUpdateRequest( | 125 void CreateExtensionUpdateRequest( |
| 110 const std::string& id, | 126 const std::string& id, |
| 111 PermissionRequestCreator* creator, | 127 PermissionRequestCreator* creator, |
| 112 const SupervisedUserService::SuccessCallback& callback) { | 128 const SupervisedUserService::SuccessCallback& callback) { |
| 113 creator->CreateExtensionUpdateRequest(id, callback); | 129 creator->CreateExtensionUpdateRequest(id, callback); |
| 114 } | 130 } |
| 115 | 131 |
| 132 // Default callback for AddExtensionInstallRequest. | |
| 133 void ExtensionInstallRequestSent(const std::string& id, bool success) { | |
| 134 VLOG_IF(1, !success) << "Failed sending install request for " << id; | |
| 135 } | |
| 136 | |
| 116 // Default callback for AddExtensionUpdateRequest. | 137 // Default callback for AddExtensionUpdateRequest. |
| 117 void ExtensionUpdateRequestSent(const std::string& id, bool success) { | 138 void ExtensionUpdateRequestSent(const std::string& id, bool success) { |
| 118 VLOG_IF(1, !success) << "Failed sending update request for " << id; | 139 VLOG_IF(1, !success) << "Failed sending update request for " << id; |
| 119 } | 140 } |
| 120 | 141 |
| 121 base::FilePath GetBlacklistPath() { | 142 base::FilePath GetBlacklistPath() { |
| 122 base::FilePath blacklist_dir; | 143 base::FilePath blacklist_dir; |
| 123 PathService::Get(chrome::DIR_USER_DATA, &blacklist_dir); | 144 PathService::Get(chrome::DIR_USER_DATA, &blacklist_dir); |
| 124 return blacklist_dir.AppendASCII(kBlacklistFilename); | 145 return blacklist_dir.AppendASCII(kBlacklistFilename); |
| 125 } | 146 } |
| 126 | |
| 127 #if defined(ENABLE_EXTENSIONS) | |
| 128 enum ExtensionState { | |
| 129 EXTENSION_FORCED, | |
| 130 EXTENSION_BLOCKED, | |
| 131 EXTENSION_ALLOWED | |
| 132 }; | |
| 133 | |
| 134 ExtensionState GetExtensionState(const extensions::Extension* extension) { | |
| 135 bool was_installed_by_default = extension->was_installed_by_default(); | |
| 136 #if defined(OS_CHROMEOS) | |
| 137 // On Chrome OS all external sources are controlled by us so it means that | |
| 138 // they are "default". Method was_installed_by_default returns false because | |
| 139 // extensions creation flags are ignored in case of default extensions with | |
| 140 // update URL(the flags aren't passed to OnExternalExtensionUpdateUrlFound). | |
| 141 // TODO(dpolukhin): remove this Chrome OS specific code as soon as creation | |
| 142 // flags are not ignored. | |
| 143 was_installed_by_default = | |
| 144 extensions::Manifest::IsExternalLocation(extension->location()); | |
| 145 #endif | |
| 146 // Note: Component extensions are protected from modification/uninstallation | |
| 147 // anyway, so there's no need to enforce them again for supervised users. | |
| 148 // Also, leave policy-installed extensions alone - they have their own | |
| 149 // management; in particular we don't want to override the force-install list. | |
| 150 if (extensions::Manifest::IsComponentLocation(extension->location()) || | |
| 151 extensions::Manifest::IsPolicyLocation(extension->location()) || | |
| 152 extension->is_theme() || | |
| 153 extension->from_bookmark() || | |
| 154 extension->is_shared_module() || | |
| 155 was_installed_by_default) { | |
| 156 return EXTENSION_ALLOWED; | |
| 157 } | |
| 158 | |
| 159 if (extension->was_installed_by_custodian()) | |
| 160 return EXTENSION_FORCED; | |
| 161 | |
| 162 return EXTENSION_BLOCKED; | |
| 163 } | |
| 164 #endif | |
| 165 | |
| 166 } // namespace | 147 } // namespace |
| 167 | 148 |
| 168 SupervisedUserService::~SupervisedUserService() { | 149 SupervisedUserService::~SupervisedUserService() { |
| 169 DCHECK(!did_init_ || did_shutdown_); | 150 DCHECK(!did_init_ || did_shutdown_); |
| 170 url_filter_context_.ui_url_filter()->RemoveObserver(this); | 151 url_filter_context_.ui_url_filter()->RemoveObserver(this); |
| 171 } | 152 } |
| 172 | 153 |
| 173 // static | 154 // static |
| 174 void SupervisedUserService::RegisterProfilePrefs( | 155 void SupervisedUserService::RegisterProfilePrefs( |
| 175 user_prefs::PrefRegistrySyncable* registry) { | 156 user_prefs::PrefRegistrySyncable* registry) { |
| 157 registry->RegisterDictionaryPref(prefs::kSupervisedUserApprovedExtensions); | |
| 176 registry->RegisterDictionaryPref(prefs::kSupervisedUserManualHosts); | 158 registry->RegisterDictionaryPref(prefs::kSupervisedUserManualHosts); |
| 177 registry->RegisterDictionaryPref(prefs::kSupervisedUserManualURLs); | 159 registry->RegisterDictionaryPref(prefs::kSupervisedUserManualURLs); |
| 178 registry->RegisterIntegerPref(prefs::kDefaultSupervisedUserFilteringBehavior, | 160 registry->RegisterIntegerPref(prefs::kDefaultSupervisedUserFilteringBehavior, |
| 179 SupervisedUserURLFilter::ALLOW); | 161 SupervisedUserURLFilter::ALLOW); |
| 180 registry->RegisterBooleanPref(prefs::kSupervisedUserCreationAllowed, true); | 162 registry->RegisterBooleanPref(prefs::kSupervisedUserCreationAllowed, true); |
| 181 registry->RegisterBooleanPref(prefs::kSupervisedUserSafeSites, true); | 163 registry->RegisterBooleanPref(prefs::kSupervisedUserSafeSites, true); |
| 182 for (const char* pref : kCustodianInfoPrefs) { | 164 for (const char* pref : kCustodianInfoPrefs) { |
| 183 registry->RegisterStringPref(pref, std::string()); | 165 registry->RegisterStringPref(pref, std::string()); |
| 184 } | 166 } |
| 185 } | 167 } |
| (...skipping 70 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 256 } | 238 } |
| 257 | 239 |
| 258 void SupervisedUserService::ReportURL(const GURL& url, | 240 void SupervisedUserService::ReportURL(const GURL& url, |
| 259 const SuccessCallback& callback) { | 241 const SuccessCallback& callback) { |
| 260 if (url_reporter_) | 242 if (url_reporter_) |
| 261 url_reporter_->ReportUrl(url, callback); | 243 url_reporter_->ReportUrl(url, callback); |
| 262 else | 244 else |
| 263 callback.Run(false); | 245 callback.Run(false); |
| 264 } | 246 } |
| 265 | 247 |
| 248 void SupervisedUserService::AddExtensionInstallRequest( | |
| 249 const std::string& extension_id, | |
| 250 const base::Version& version, | |
| 251 const SuccessCallback& callback) { | |
| 252 std::string id = GetExtensionRequestId(extension_id, version); | |
| 253 AddPermissionRequestInternal(base::Bind(CreateExtensionInstallRequest, id), | |
| 254 callback, 0); | |
| 255 } | |
| 256 | |
| 257 void SupervisedUserService::AddExtensionInstallRequest( | |
| 258 const std::string& extension_id, | |
| 259 const base::Version& version) { | |
| 260 std::string id = GetExtensionRequestId(extension_id, version); | |
| 261 AddPermissionRequestInternal(base::Bind(CreateExtensionInstallRequest, id), | |
| 262 base::Bind(ExtensionInstallRequestSent, id), 0); | |
| 263 } | |
| 264 | |
| 266 void SupervisedUserService::AddExtensionUpdateRequest( | 265 void SupervisedUserService::AddExtensionUpdateRequest( |
| 267 const std::string& extension_id, | 266 const std::string& extension_id, |
| 268 const base::Version& version, | 267 const base::Version& version, |
| 269 const SuccessCallback& callback) { | 268 const SuccessCallback& callback) { |
| 270 std::string id = GetExtensionUpdateRequestId(extension_id, version); | 269 std::string id = GetExtensionRequestId(extension_id, version); |
| 271 AddPermissionRequestInternal( | 270 AddPermissionRequestInternal( |
| 272 base::Bind(CreateExtensionUpdateRequest, id), callback, 0); | 271 base::Bind(CreateExtensionUpdateRequest, id), callback, 0); |
| 273 } | 272 } |
| 274 | 273 |
| 275 void SupervisedUserService::AddExtensionUpdateRequest( | 274 void SupervisedUserService::AddExtensionUpdateRequest( |
| 276 const std::string& extension_id, | 275 const std::string& extension_id, |
| 277 const base::Version& version) { | 276 const base::Version& version) { |
| 278 std::string id = GetExtensionUpdateRequestId(extension_id, version); | 277 std::string id = GetExtensionRequestId(extension_id, version); |
| 279 AddExtensionUpdateRequest(extension_id, version, | 278 AddExtensionUpdateRequest(extension_id, version, |
| 280 base::Bind(ExtensionUpdateRequestSent, id)); | 279 base::Bind(ExtensionUpdateRequestSent, id)); |
| 281 } | 280 } |
| 282 | 281 |
| 282 void SupervisedUserService::EnableExtensionIfPossible( | |
| 283 const std::string& extension_id) { | |
| 284 extensions::ExtensionRegistry* registry_ = | |
| 285 extensions::ExtensionRegistry::Get(profile_); | |
| 286 const Extension* extension = registry_->GetInstalledExtension(extension_id); | |
|
Marc Treib
2016/06/14 13:53:34
Can extension be null? Seems like it could be, if
mamir
2016/06/15 09:40:11
Fixed and added a proper unit test ;-)
Done!
| |
| 287 | |
| 288 ExtensionState state = GetExtensionState(*extension); | |
| 289 | |
| 290 if (state == ExtensionState::BLOCKED || | |
| 291 state == ExtensionState::REQUIRE_APPROVAL) { | |
| 292 return; // Extension must remain disabled. | |
| 293 } | |
| 294 | |
| 295 ExtensionPrefs* extension_prefs = ExtensionPrefs::Get(profile_); | |
| 296 if (!extension_prefs->HasDisableReason( | |
| 297 extension_id, Extension::DISABLE_CUSTODIAN_APPROVAL_REQUIRED)) { | |
| 298 return; // Extension is disabled for other reasons. | |
| 299 } | |
| 300 extension_prefs->RemoveDisableReason( | |
| 301 extension_id, Extension::DISABLE_CUSTODIAN_APPROVAL_REQUIRED); | |
| 302 // If no other disable reasons, enable it. | |
| 303 if (extension_prefs->GetDisableReasons(extension_id) | |
| 304 == Extension::DISABLE_NONE) { | |
|
Marc Treib
2016/06/14 13:53:34
Is this correctly aligned?
mamir
2016/06/15 09:40:11
Done.
Marc Treib
2016/06/15 12:31:07
git cl formatted now? Still looks weird, but oh we
mamir
2016/06/15 17:30:02
Yup :-)
| |
| 305 // Try to enable the extension, this will call the ManagmentPolicy and | |
| 306 // properly enable the extension if possible. | |
|
Marc Treib
2016/06/14 13:53:34
This comment seems out of place now - we've alread
mamir
2016/06/15 09:40:11
The comment is intended to refer to other Manageme
Marc Treib
2016/06/15 12:31:07
Yes, because it's not really relevant - we don't e
mamir
2016/06/15 17:30:02
Done.
| |
| 307 ExtensionService* service = | |
| 308 ExtensionSystem::Get(profile_)->extension_service(); | |
| 309 service->EnableExtension(extension_id); | |
| 310 } | |
| 311 } | |
| 312 | |
| 283 // static | 313 // static |
| 284 std::string SupervisedUserService::GetExtensionUpdateRequestId( | 314 std::string SupervisedUserService::GetExtensionRequestId( |
| 285 const std::string& extension_id, | 315 const std::string& extension_id, |
| 286 const base::Version& version) { | 316 const base::Version& version) { |
| 287 return base::StringPrintf("%s:%s", extension_id.c_str(), | 317 return base::StringPrintf("%s:%s", extension_id.c_str(), |
| 288 version.GetString().c_str()); | 318 version.GetString().c_str()); |
| 289 } | 319 } |
| 290 | 320 |
| 291 std::string SupervisedUserService::GetCustodianEmailAddress() const { | 321 std::string SupervisedUserService::GetCustodianEmailAddress() const { |
| 292 std::string email = profile_->GetPrefs()->GetString( | 322 std::string email = profile_->GetPrefs()->GetString( |
| 293 prefs::kSupervisedUserCustodianEmail); | 323 prefs::kSupervisedUserCustodianEmail); |
| 294 #if defined(OS_CHROMEOS) | 324 #if defined(OS_CHROMEOS) |
| (...skipping 219 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 514 SupervisedUserService::SupervisedUserService(Profile* profile) | 544 SupervisedUserService::SupervisedUserService(Profile* profile) |
| 515 : includes_sync_sessions_type_(true), | 545 : includes_sync_sessions_type_(true), |
| 516 profile_(profile), | 546 profile_(profile), |
| 517 active_(false), | 547 active_(false), |
| 518 delegate_(NULL), | 548 delegate_(NULL), |
| 519 waiting_for_sync_initialization_(false), | 549 waiting_for_sync_initialization_(false), |
| 520 is_profile_active_(false), | 550 is_profile_active_(false), |
| 521 did_init_(false), | 551 did_init_(false), |
| 522 did_shutdown_(false), | 552 did_shutdown_(false), |
| 523 blacklist_state_(BlacklistLoadState::NOT_LOADED), | 553 blacklist_state_(BlacklistLoadState::NOT_LOADED), |
| 554 registry_observer_(this), | |
| 524 weak_ptr_factory_(this) { | 555 weak_ptr_factory_(this) { |
| 525 url_filter_context_.ui_url_filter()->AddObserver(this); | 556 url_filter_context_.ui_url_filter()->AddObserver(this); |
| 557 registry_observer_.Add(extensions::ExtensionRegistry::Get(profile)); | |
| 526 } | 558 } |
| 527 | 559 |
| 528 void SupervisedUserService::SetActive(bool active) { | 560 void SupervisedUserService::SetActive(bool active) { |
| 529 if (active_ == active) | 561 if (active_ == active) |
| 530 return; | 562 return; |
| 531 active_ = active; | 563 active_ = active; |
| 532 | 564 |
| 533 if (!delegate_ || !delegate_->SetActive(active_)) { | 565 if (!delegate_ || !delegate_->SetActive(active_)) { |
| 534 if (active_) { | 566 if (active_) { |
| 535 #if !defined(OS_ANDROID) | 567 #if !defined(OS_ANDROID) |
| (...skipping 44 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 580 | 612 |
| 581 #if defined(ENABLE_EXTENSIONS) | 613 #if defined(ENABLE_EXTENSIONS) |
| 582 SetExtensionsActive(); | 614 SetExtensionsActive(); |
| 583 #endif | 615 #endif |
| 584 | 616 |
| 585 if (active_) { | 617 if (active_) { |
| 586 pref_change_registrar_.Add( | 618 pref_change_registrar_.Add( |
| 587 prefs::kDefaultSupervisedUserFilteringBehavior, | 619 prefs::kDefaultSupervisedUserFilteringBehavior, |
| 588 base::Bind(&SupervisedUserService::OnDefaultFilteringBehaviorChanged, | 620 base::Bind(&SupervisedUserService::OnDefaultFilteringBehaviorChanged, |
| 589 base::Unretained(this))); | 621 base::Unretained(this))); |
| 622 pref_change_registrar_.Add( | |
| 623 prefs::kSupervisedUserApprovedExtensions, | |
| 624 base::Bind(&SupervisedUserService::UpdateApprovedExtensions, | |
| 625 base::Unretained(this))); | |
| 590 pref_change_registrar_.Add(prefs::kSupervisedUserSafeSites, | 626 pref_change_registrar_.Add(prefs::kSupervisedUserSafeSites, |
| 591 base::Bind(&SupervisedUserService::OnSafeSitesSettingChanged, | 627 base::Bind(&SupervisedUserService::OnSafeSitesSettingChanged, |
| 592 base::Unretained(this))); | 628 base::Unretained(this))); |
| 593 pref_change_registrar_.Add(prefs::kSupervisedUserManualHosts, | 629 pref_change_registrar_.Add(prefs::kSupervisedUserManualHosts, |
| 594 base::Bind(&SupervisedUserService::UpdateManualHosts, | 630 base::Bind(&SupervisedUserService::UpdateManualHosts, |
| 595 base::Unretained(this))); | 631 base::Unretained(this))); |
| 596 pref_change_registrar_.Add(prefs::kSupervisedUserManualURLs, | 632 pref_change_registrar_.Add(prefs::kSupervisedUserManualURLs, |
| 597 base::Bind(&SupervisedUserService::UpdateManualURLs, | 633 base::Bind(&SupervisedUserService::UpdateManualURLs, |
| 598 base::Unretained(this))); | 634 base::Unretained(this))); |
| 599 for (const char* pref : kCustodianInfoPrefs) { | 635 for (const char* pref : kCustodianInfoPrefs) { |
| 600 pref_change_registrar_.Add(pref, | 636 pref_change_registrar_.Add(pref, |
| 601 base::Bind(&SupervisedUserService::OnCustodianInfoChanged, | 637 base::Bind(&SupervisedUserService::OnCustodianInfoChanged, |
| 602 base::Unretained(this))); | 638 base::Unretained(this))); |
| 603 } | 639 } |
| 604 | 640 |
| 605 // Initialize the filter. | 641 // Initialize the filter. |
| 606 OnDefaultFilteringBehaviorChanged(); | 642 OnDefaultFilteringBehaviorChanged(); |
| 607 OnSafeSitesSettingChanged(); | 643 OnSafeSitesSettingChanged(); |
| 608 whitelist_service_->Init(); | 644 whitelist_service_->Init(); |
| 609 UpdateManualHosts(); | 645 UpdateManualHosts(); |
| 610 UpdateManualURLs(); | 646 UpdateManualURLs(); |
| 647 UpdateApprovedExtensions(); | |
| 611 | 648 |
| 612 #if !defined(OS_ANDROID) | 649 #if !defined(OS_ANDROID) |
| 613 // TODO(bauerb): Get rid of the platform-specific #ifdef here. | 650 // TODO(bauerb): Get rid of the platform-specific #ifdef here. |
| 614 // http://crbug.com/313377 | 651 // http://crbug.com/313377 |
| 615 BrowserList::AddObserver(this); | 652 BrowserList::AddObserver(this); |
| 616 #endif | 653 #endif |
| 617 } else { | 654 } else { |
| 618 permissions_creators_.clear(); | 655 permissions_creators_.clear(); |
| 619 url_reporter_.reset(); | 656 url_reporter_.reset(); |
| 620 | 657 |
| 621 pref_change_registrar_.Remove( | 658 pref_change_registrar_.Remove( |
| 622 prefs::kDefaultSupervisedUserFilteringBehavior); | 659 prefs::kDefaultSupervisedUserFilteringBehavior); |
| 660 pref_change_registrar_.Remove(prefs::kSupervisedUserApprovedExtensions); | |
| 623 pref_change_registrar_.Remove(prefs::kSupervisedUserManualHosts); | 661 pref_change_registrar_.Remove(prefs::kSupervisedUserManualHosts); |
| 624 pref_change_registrar_.Remove(prefs::kSupervisedUserManualURLs); | 662 pref_change_registrar_.Remove(prefs::kSupervisedUserManualURLs); |
| 625 for (const char* pref : kCustodianInfoPrefs) { | 663 for (const char* pref : kCustodianInfoPrefs) { |
| 626 pref_change_registrar_.Remove(pref); | 664 pref_change_registrar_.Remove(pref); |
| 627 } | 665 } |
| 628 | 666 |
| 629 url_filter_context_.Clear(); | 667 url_filter_context_.Clear(); |
| 630 FOR_EACH_OBSERVER( | 668 FOR_EACH_OBSERVER( |
| 631 SupervisedUserServiceObserver, observer_list_, OnURLFilterChanged()); | 669 SupervisedUserServiceObserver, observer_list_, OnURLFilterChanged()); |
| 632 | 670 |
| (...skipping 275 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 908 bool result = it.value().GetAsBoolean(&allow); | 946 bool result = it.value().GetAsBoolean(&allow); |
| 909 DCHECK(result); | 947 DCHECK(result); |
| 910 (*url_map)[GURL(it.key())] = allow; | 948 (*url_map)[GURL(it.key())] = allow; |
| 911 } | 949 } |
| 912 url_filter_context_.SetManualURLs(std::move(url_map)); | 950 url_filter_context_.SetManualURLs(std::move(url_map)); |
| 913 | 951 |
| 914 FOR_EACH_OBSERVER( | 952 FOR_EACH_OBSERVER( |
| 915 SupervisedUserServiceObserver, observer_list_, OnURLFilterChanged()); | 953 SupervisedUserServiceObserver, observer_list_, OnURLFilterChanged()); |
| 916 } | 954 } |
| 917 | 955 |
| 956 void SupervisedUserService::UpdateApprovedExtensions() { | |
| 957 const base::DictionaryValue* dict = profile_->GetPrefs()->GetDictionary( | |
| 958 prefs::kSupervisedUserApprovedExtensions); | |
| 959 approved_extensions_map_.clear(); | |
| 960 for (base::DictionaryValue::Iterator it(*dict); !it.IsAtEnd(); it.Advance()) { | |
| 961 std::string version_str; | |
| 962 bool result = it.value().GetAsString(&version_str); | |
| 963 DCHECK(result); | |
| 964 base::Version version(version_str); | |
| 965 if (version.IsValid()) | |
| 966 approved_extensions_map_[it.key()] = version; | |
| 967 else | |
| 968 LOG(WARNING) << "Invalid version number " << version_str; | |
| 969 } | |
| 970 | |
| 971 for (const auto& extensions_entry : approved_extensions_map_) { | |
| 972 EnableExtensionIfPossible(extensions_entry.first); | |
| 973 } | |
| 974 } | |
| 975 | |
| 918 std::string SupervisedUserService::GetSupervisedUserName() const { | 976 std::string SupervisedUserService::GetSupervisedUserName() const { |
| 919 #if defined(OS_CHROMEOS) | 977 #if defined(OS_CHROMEOS) |
| 920 // The active user can be NULL in unit tests. | 978 // The active user can be NULL in unit tests. |
| 921 if (user_manager::UserManager::Get()->GetActiveUser()) { | 979 if (user_manager::UserManager::Get()->GetActiveUser()) { |
| 922 return UTF16ToUTF8(user_manager::UserManager::Get()->GetUserDisplayName( | 980 return UTF16ToUTF8(user_manager::UserManager::Get()->GetUserDisplayName( |
| 923 user_manager::UserManager::Get()->GetActiveUser()->GetAccountId())); | 981 user_manager::UserManager::Get()->GetActiveUser()->GetAccountId())); |
| 924 } | 982 } |
| 925 return std::string(); | 983 return std::string(); |
| 926 #else | 984 #else |
| 927 return profile_->GetPrefs()->GetString(prefs::kProfileName); | 985 return profile_->GetPrefs()->GetString(prefs::kProfileName); |
| 928 #endif | 986 #endif |
| 929 } | 987 } |
| 930 | 988 |
| 931 void SupervisedUserService::OnForceSessionSyncChanged() { | 989 void SupervisedUserService::OnForceSessionSyncChanged() { |
| 932 includes_sync_sessions_type_ = | 990 includes_sync_sessions_type_ = |
| 933 profile_->GetPrefs()->GetBoolean(prefs::kForceSessionSync); | 991 profile_->GetPrefs()->GetBoolean(prefs::kForceSessionSync); |
| 934 ProfileSyncServiceFactory::GetForProfile(profile_) | 992 ProfileSyncServiceFactory::GetForProfile(profile_) |
| 935 ->ReconfigureDatatypeManager(); | 993 ->ReconfigureDatatypeManager(); |
| 936 } | 994 } |
| 937 | 995 |
| 996 void SupervisedUserService::OnExtensionInstalled( | |
| 997 content::BrowserContext* browser_context, | |
| 998 const extensions::Extension* extension, | |
| 999 bool is_update) { | |
| 1000 // This callback is responsible only for updating the approved version | |
| 1001 // upon extension update if it doesn't require extra permission. | |
| 1002 if (!is_update) | |
| 1003 return; | |
| 1004 | |
| 1005 ExtensionPrefs* extension_prefs = ExtensionPrefs::Get(profile_); | |
| 1006 const std::string& id = extension->id(); | |
| 1007 const base::Version& version = *extension->version(); | |
| 1008 | |
| 1009 // If an already approved extension is updated without requiring | |
| 1010 // new permissions, we update the approved_version and re-enable it. | |
| 1011 if (!extension_prefs->HasDisableReason( | |
| 1012 id, Extension::DISABLE_PERMISSIONS_INCREASE) && | |
| 1013 approved_extensions_map_.count(id) > 0 && | |
| 1014 approved_extensions_map_[id] < version) { | |
| 1015 approved_extensions_map_[id] = version; | |
| 1016 | |
| 1017 std::string key = SupervisedUserSettingsService::MakeSplitSettingKey( | |
| 1018 supervised_users::kApprovedExtensions, id); | |
| 1019 std::unique_ptr<base::Value> version_value( | |
| 1020 new base::StringValue(version.GetString())); | |
| 1021 GetSettingsService()->UpdateSetting(key, std::move(version_value)); | |
| 1022 | |
| 1023 EnableExtensionIfPossible(id); | |
| 1024 } | |
| 1025 } | |
| 1026 | |
| 938 void SupervisedUserService::Shutdown() { | 1027 void SupervisedUserService::Shutdown() { |
| 939 if (!did_init_) | 1028 if (!did_init_) |
| 940 return; | 1029 return; |
| 941 DCHECK(!did_shutdown_); | 1030 DCHECK(!did_shutdown_); |
| 942 did_shutdown_ = true; | 1031 did_shutdown_ = true; |
| 943 if (ProfileIsSupervised()) { | 1032 if (ProfileIsSupervised()) { |
| 944 content::RecordAction(UserMetricsAction("ManagedUsers_QuitBrowser")); | 1033 content::RecordAction(UserMetricsAction("ManagedUsers_QuitBrowser")); |
| 945 } | 1034 } |
| 946 SetActive(false); | 1035 SetActive(false); |
| 947 | 1036 |
| 948 ProfileSyncService* sync_service = | 1037 ProfileSyncService* sync_service = |
| 949 ProfileSyncServiceFactory::GetForProfile(profile_); | 1038 ProfileSyncServiceFactory::GetForProfile(profile_); |
| 950 | 1039 |
| 951 // Can be null in tests. | 1040 // Can be null in tests. |
| 952 if (sync_service) | 1041 if (sync_service) |
| 953 sync_service->RemovePreferenceProvider(this); | 1042 sync_service->RemovePreferenceProvider(this); |
| 954 } | 1043 } |
| 955 | 1044 |
| 956 #if defined(ENABLE_EXTENSIONS) | 1045 #if defined(ENABLE_EXTENSIONS) |
| 1046 SupervisedUserService::ExtensionState SupervisedUserService::GetExtensionState( | |
| 1047 const Extension& extension) const { | |
| 1048 bool was_installed_by_default = extension.was_installed_by_default(); | |
| 1049 #if defined(OS_CHROMEOS) | |
| 1050 // On Chrome OS all external sources are controlled by us so it means that | |
| 1051 // they are "default". Method was_installed_by_default returns false because | |
| 1052 // extensions creation flags are ignored in case of default extensions with | |
| 1053 // update URL(the flags aren't passed to OnExternalExtensionUpdateUrlFound). | |
| 1054 // TODO(dpolukhin): remove this Chrome OS specific code as soon as creation | |
| 1055 // flags are not ignored. | |
| 1056 was_installed_by_default = | |
| 1057 extensions::Manifest::IsExternalLocation(extension->location()); | |
| 1058 #endif | |
| 1059 // Note: Component extensions are protected from modification/uninstallation | |
| 1060 // anyway, so there's no need to enforce them again for supervised users. | |
| 1061 // Also, leave policy-installed extensions alone - they have their own | |
| 1062 // management; in particular we don't want to override the force-install list. | |
| 1063 if (extensions::Manifest::IsComponentLocation(extension.location()) || | |
| 1064 extensions::Manifest::IsPolicyLocation(extension.location()) || | |
| 1065 extension.is_theme() || extension.from_bookmark() || | |
| 1066 extension.is_shared_module() || was_installed_by_default) { | |
| 1067 return ExtensionState::ALLOWED; | |
| 1068 } | |
| 1069 | |
| 1070 if (extension.was_installed_by_custodian()) | |
| 1071 return ExtensionState::FORCED; | |
| 1072 | |
| 1073 if (!base::FeatureList::IsEnabled( | |
| 1074 supervised_users::kSupervisedUserInitiatedExtensionInstall)) { | |
| 1075 return ExtensionState::BLOCKED; | |
| 1076 } | |
| 1077 | |
| 1078 const std::string& id = extension.id(); | |
| 1079 | |
| 1080 auto extension_it = approved_extensions_map_.find(id); | |
| 1081 if (extension_it == approved_extensions_map_.end() || | |
| 1082 extension_it->second != *(extension.version())) { | |
|
Marc Treib
2016/06/14 13:53:34
nit: parens around extension.version() aren't nece
mamir
2016/06/15 09:40:11
Done.
| |
| 1083 return ExtensionState::REQUIRE_APPROVAL; | |
| 1084 } | |
| 1085 | |
| 1086 if (ExtensionPrefs::Get(profile_)->HasDisableReason( | |
| 1087 id, Extension::DISABLE_PERMISSIONS_INCREASE)) { | |
| 1088 return ExtensionState::REQUIRE_APPROVAL; | |
| 1089 } | |
| 1090 | |
| 1091 return ExtensionState::ALLOWED; | |
| 1092 } | |
| 1093 | |
| 957 std::string SupervisedUserService::GetDebugPolicyProviderName() const { | 1094 std::string SupervisedUserService::GetDebugPolicyProviderName() const { |
| 958 // Save the string space in official builds. | 1095 // Save the string space in official builds. |
| 959 #ifdef NDEBUG | 1096 #ifdef NDEBUG |
| 960 NOTREACHED(); | 1097 NOTREACHED(); |
| 961 return std::string(); | 1098 return std::string(); |
| 962 #else | 1099 #else |
| 963 return "Supervised User Service"; | 1100 return "Supervised User Service"; |
| 964 #endif | 1101 #endif |
| 965 } | 1102 } |
| 966 | 1103 |
| 967 bool SupervisedUserService::UserMayLoad(const extensions::Extension* extension, | 1104 bool SupervisedUserService::UserMayLoad(const Extension* extension, |
| 968 base::string16* error) const { | 1105 base::string16* error) const { |
| 969 DCHECK(ProfileIsSupervised()); | 1106 DCHECK(ProfileIsSupervised()); |
| 970 ExtensionState result = GetExtensionState(extension); | 1107 ExtensionState result = GetExtensionState(*extension); |
| 971 bool may_load = (result != EXTENSION_BLOCKED); | 1108 bool may_load = (result != ExtensionState::BLOCKED); |
| 972 if (!may_load && error) | 1109 if (!may_load && error) |
| 973 *error = GetExtensionsLockedMessage(); | 1110 *error = GetExtensionsLockedMessage(); |
| 974 return may_load; | 1111 return may_load; |
| 975 } | 1112 } |
| 976 | 1113 |
| 977 bool SupervisedUserService::UserMayModifySettings( | 1114 bool SupervisedUserService::UserMayModifySettings(const Extension* extension, |
| 978 const extensions::Extension* extension, | 1115 base::string16* error) const { |
| 979 base::string16* error) const { | |
| 980 DCHECK(ProfileIsSupervised()); | 1116 DCHECK(ProfileIsSupervised()); |
| 981 ExtensionState result = GetExtensionState(extension); | 1117 ExtensionState result = GetExtensionState(*extension); |
| 982 bool may_modify = (result == EXTENSION_ALLOWED); | 1118 // While the following check allows the supervised user to modify the settings |
| 1119 // and enable or disable the extension, MustRemainDisabled properly takes care | |
| 1120 // of keeping an extension disabled when required. | |
| 1121 // For custodian-installed extensions, the state is always FORCED, even if | |
| 1122 // it's waiting for an update approval. | |
| 1123 bool may_modify = result != ExtensionState::FORCED; | |
| 983 if (!may_modify && error) | 1124 if (!may_modify && error) |
| 984 *error = GetExtensionsLockedMessage(); | 1125 *error = GetExtensionsLockedMessage(); |
| 985 return may_modify; | 1126 return may_modify; |
| 986 } | 1127 } |
| 987 | 1128 |
| 988 // Note: Having MustRemainInstalled always say "true" for custodian-installed | 1129 // Note: Having MustRemainInstalled always say "true" for custodian-installed |
| 989 // extensions does NOT prevent remote uninstalls (which is a bit unexpected, but | 1130 // extensions does NOT prevent remote uninstalls (which is a bit unexpected, but |
| 990 // exactly what we want). | 1131 // exactly what we want). |
| 991 bool SupervisedUserService::MustRemainInstalled( | 1132 bool SupervisedUserService::MustRemainInstalled(const Extension* extension, |
| 992 const extensions::Extension* extension, | 1133 base::string16* error) const { |
| 993 base::string16* error) const { | |
| 994 DCHECK(ProfileIsSupervised()); | 1134 DCHECK(ProfileIsSupervised()); |
| 995 ExtensionState result = GetExtensionState(extension); | 1135 ExtensionState result = GetExtensionState(*extension); |
| 996 bool may_not_uninstall = (result == EXTENSION_FORCED); | 1136 bool may_not_uninstall = (result == ExtensionState::FORCED); |
| 997 if (may_not_uninstall && error) | 1137 if (may_not_uninstall && error) |
| 998 *error = GetExtensionsLockedMessage(); | 1138 *error = GetExtensionsLockedMessage(); |
| 999 return may_not_uninstall; | 1139 return may_not_uninstall; |
| 1000 } | 1140 } |
| 1001 | 1141 |
| 1142 bool SupervisedUserService::MustRemainDisabled(const Extension* extension, | |
| 1143 Extension::DisableReason* reason, | |
| 1144 base::string16* error) const { | |
| 1145 DCHECK(ProfileIsSupervised()); | |
| 1146 ExtensionState state = GetExtensionState(*extension); | |
| 1147 bool must_remain_disabled = state == ExtensionState::BLOCKED || | |
| 1148 state == ExtensionState::REQUIRE_APPROVAL; | |
| 1149 | |
| 1150 if (must_remain_disabled) { | |
| 1151 // If the extension must remain disabled due to permission increase, | |
| 1152 // then the update request has been already sent at update time. | |
| 1153 // We do nothing and we don't add an extra disable reason. | |
| 1154 ExtensionPrefs* extension_prefs = ExtensionPrefs::Get(profile_); | |
| 1155 if (extension_prefs->HasDisableReason( | |
| 1156 extension->id(), Extension::DISABLE_PERMISSIONS_INCREASE)) { | |
| 1157 if (reason) | |
| 1158 *reason = Extension::DISABLE_PERMISSIONS_INCREASE; | |
|
Marc Treib
2016/06/14 13:53:34
You probably also need to set error here?
mamir
2016/06/15 09:40:11
Done.
| |
| 1159 return true; | |
| 1160 } | |
| 1161 if (reason) | |
| 1162 *reason = Extension::DISABLE_CUSTODIAN_APPROVAL_REQUIRED; | |
|
Marc Treib
2016/06/14 13:53:34
Hm, this is confusing. Can we ever get here if SU-
mamir
2016/06/15 09:40:11
Not really, because if SU-initiated installs are n
Marc Treib
2016/06/15 12:31:07
If it can't happen, then the code shouldn't handle
mamir
2016/06/15 17:30:02
Sorry, I was wrong.
It can actually reach this par
| |
| 1163 if (error) | |
| 1164 *error = l10n_util::GetStringUTF16(IDS_EXTENSIONS_LOCKED_SUPERVISED_USER); | |
| 1165 if (base::FeatureList::IsEnabled( | |
| 1166 supervised_users::kSupervisedUserInitiatedExtensionInstall)) { | |
| 1167 // If the Extension isn't pending a custodian approval already, send | |
| 1168 // an approval request. | |
| 1169 if (!extension_prefs->HasDisableReason( | |
| 1170 extension->id(), | |
| 1171 Extension::DISABLE_CUSTODIAN_APPROVAL_REQUIRED)) { | |
| 1172 // MustRemainDisabled is a const method and hence cannot call | |
| 1173 // AddExtensionInstallRequest directly. | |
| 1174 SupervisedUserService* supervised_user_service = | |
| 1175 SupervisedUserServiceFactory::GetForProfile(profile_); | |
| 1176 supervised_user_service->AddExtensionInstallRequest( | |
| 1177 extension->id(), *extension->version()); | |
| 1178 } | |
| 1179 } | |
| 1180 } | |
| 1181 return must_remain_disabled; | |
| 1182 } | |
| 1183 | |
| 1002 void SupervisedUserService::SetExtensionsActive() { | 1184 void SupervisedUserService::SetExtensionsActive() { |
| 1003 extensions::ExtensionSystem* extension_system = | 1185 extensions::ExtensionSystem* extension_system = |
| 1004 extensions::ExtensionSystem::Get(profile_); | 1186 extensions::ExtensionSystem::Get(profile_); |
| 1005 extensions::ManagementPolicy* management_policy = | 1187 extensions::ManagementPolicy* management_policy = |
| 1006 extension_system->management_policy(); | 1188 extension_system->management_policy(); |
| 1007 | 1189 |
| 1008 if (management_policy) { | 1190 if (management_policy) { |
| 1009 if (active_) | 1191 if (active_) |
| 1010 management_policy->RegisterProvider(this); | 1192 management_policy->RegisterProvider(this); |
| 1011 else | 1193 else |
| (...skipping 45 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 1057 content::RecordAction(UserMetricsAction("ManagedUsers_SwitchProfile")); | 1239 content::RecordAction(UserMetricsAction("ManagedUsers_SwitchProfile")); |
| 1058 | 1240 |
| 1059 is_profile_active_ = profile_became_active; | 1241 is_profile_active_ = profile_became_active; |
| 1060 } | 1242 } |
| 1061 #endif // !defined(OS_ANDROID) | 1243 #endif // !defined(OS_ANDROID) |
| 1062 | 1244 |
| 1063 void SupervisedUserService::OnSiteListUpdated() { | 1245 void SupervisedUserService::OnSiteListUpdated() { |
| 1064 FOR_EACH_OBSERVER( | 1246 FOR_EACH_OBSERVER( |
| 1065 SupervisedUserServiceObserver, observer_list_, OnURLFilterChanged()); | 1247 SupervisedUserServiceObserver, observer_list_, OnURLFilterChanged()); |
| 1066 } | 1248 } |
| OLD | NEW |