Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(418)

Side by Side Diff: chrome/browser/supervised_user/supervised_user_service.cc

Issue 2004043002: Supervised Users Initiated Installs v2 (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@kid_initiated_install
Patch Set: Response to codereview by rdevlin.cronin@ Created 4 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2014 The Chromium Authors. All rights reserved. 1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "chrome/browser/supervised_user/supervised_user_service.h" 5 #include "chrome/browser/supervised_user/supervised_user_service.h"
6 6
7 #include <utility> 7 #include <utility>
8 8
9 #include "base/command_line.h" 9 #include "base/command_line.h"
10 #include "base/feature_list.h"
10 #include "base/files/file_path.h" 11 #include "base/files/file_path.h"
11 #include "base/files/file_util.h" 12 #include "base/files/file_util.h"
12 #include "base/memory/ref_counted.h" 13 #include "base/memory/ref_counted.h"
13 #include "base/path_service.h" 14 #include "base/path_service.h"
14 #include "base/strings/stringprintf.h" 15 #include "base/strings/stringprintf.h"
15 #include "base/strings/utf_string_conversions.h" 16 #include "base/strings/utf_string_conversions.h"
16 #include "base/task_runner_util.h" 17 #include "base/task_runner_util.h"
17 #include "base/version.h" 18 #include "base/version.h"
18 #include "build/build_config.h" 19 #include "build/build_config.h"
19 #include "chrome/browser/browser_process.h" 20 #include "chrome/browser/browser_process.h"
20 #include "chrome/browser/component_updater/supervised_user_whitelist_installer.h " 21 #include "chrome/browser/component_updater/supervised_user_whitelist_installer.h "
21 #include "chrome/browser/profiles/profile.h" 22 #include "chrome/browser/profiles/profile.h"
22 #include "chrome/browser/profiles/profile_attributes_entry.h" 23 #include "chrome/browser/profiles/profile_attributes_entry.h"
23 #include "chrome/browser/profiles/profile_attributes_storage.h" 24 #include "chrome/browser/profiles/profile_attributes_storage.h"
24 #include "chrome/browser/profiles/profile_manager.h" 25 #include "chrome/browser/profiles/profile_manager.h"
25 #include "chrome/browser/signin/profile_oauth2_token_service_factory.h" 26 #include "chrome/browser/signin/profile_oauth2_token_service_factory.h"
26 #include "chrome/browser/signin/signin_manager_factory.h" 27 #include "chrome/browser/signin/signin_manager_factory.h"
27 #include "chrome/browser/supervised_user/experimental/supervised_user_filtering_ switches.h" 28 #include "chrome/browser/supervised_user/experimental/supervised_user_filtering_ switches.h"
28 #include "chrome/browser/supervised_user/permission_request_creator.h" 29 #include "chrome/browser/supervised_user/permission_request_creator.h"
29 #include "chrome/browser/supervised_user/supervised_user_constants.h" 30 #include "chrome/browser/supervised_user/supervised_user_constants.h"
31 #include "chrome/browser/supervised_user/supervised_user_features.h"
30 #include "chrome/browser/supervised_user/supervised_user_service_observer.h" 32 #include "chrome/browser/supervised_user/supervised_user_service_observer.h"
31 #include "chrome/browser/supervised_user/supervised_user_settings_service.h" 33 #include "chrome/browser/supervised_user/supervised_user_settings_service.h"
32 #include "chrome/browser/supervised_user/supervised_user_settings_service_factor y.h" 34 #include "chrome/browser/supervised_user/supervised_user_settings_service_factor y.h"
33 #include "chrome/browser/supervised_user/supervised_user_site_list.h" 35 #include "chrome/browser/supervised_user/supervised_user_site_list.h"
34 #include "chrome/browser/supervised_user/supervised_user_whitelist_service.h" 36 #include "chrome/browser/supervised_user/supervised_user_whitelist_service.h"
35 #include "chrome/browser/sync/profile_sync_service_factory.h" 37 #include "chrome/browser/sync/profile_sync_service_factory.h"
36 #include "chrome/browser/ui/browser.h" 38 #include "chrome/browser/ui/browser.h"
37 #include "chrome/browser/ui/browser_list.h" 39 #include "chrome/browser/ui/browser_list.h"
38 #include "chrome/common/chrome_paths.h" 40 #include "chrome/common/chrome_paths.h"
39 #include "chrome/common/chrome_switches.h" 41 #include "chrome/common/chrome_switches.h"
40 #include "chrome/common/pref_names.h" 42 #include "chrome/common/pref_names.h"
41 #include "chrome/grit/generated_resources.h" 43 #include "chrome/grit/generated_resources.h"
42 #include "components/browser_sync/browser/profile_sync_service.h" 44 #include "components/browser_sync/browser/profile_sync_service.h"
43 #include "components/pref_registry/pref_registry_syncable.h" 45 #include "components/pref_registry/pref_registry_syncable.h"
44 #include "components/prefs/pref_service.h" 46 #include "components/prefs/pref_service.h"
45 #include "components/signin/core/browser/profile_oauth2_token_service.h" 47 #include "components/signin/core/browser/profile_oauth2_token_service.h"
46 #include "components/signin/core/browser/signin_manager.h" 48 #include "components/signin/core/browser/signin_manager.h"
47 #include "components/signin/core/browser/signin_manager_base.h" 49 #include "components/signin/core/browser/signin_manager_base.h"
48 #include "components/signin/core/common/signin_switches.h" 50 #include "components/signin/core/common/signin_switches.h"
49 #include "content/public/browser/browser_thread.h" 51 #include "content/public/browser/browser_thread.h"
50 #include "content/public/browser/user_metrics.h" 52 #include "content/public/browser/user_metrics.h"
53 #include "extensions/browser/extension_registry.h"
Marc Treib 2016/06/14 13:53:34 This needs to go into the #ifdef ENABLE_EXTENSIONS
mamir 2016/06/15 09:40:11 Done.
51 #include "ui/base/l10n/l10n_util.h" 54 #include "ui/base/l10n/l10n_util.h"
52 55
53 #if !defined(OS_ANDROID) 56 #if !defined(OS_ANDROID)
54 #include "chrome/browser/supervised_user/legacy/custodian_profile_downloader_ser vice.h" 57 #include "chrome/browser/supervised_user/legacy/custodian_profile_downloader_ser vice.h"
55 #include "chrome/browser/supervised_user/legacy/custodian_profile_downloader_ser vice_factory.h" 58 #include "chrome/browser/supervised_user/legacy/custodian_profile_downloader_ser vice_factory.h"
56 #include "chrome/browser/supervised_user/legacy/permission_request_creator_sync. h" 59 #include "chrome/browser/supervised_user/legacy/permission_request_creator_sync. h"
57 #include "chrome/browser/supervised_user/legacy/supervised_user_pref_mapping_ser vice.h" 60 #include "chrome/browser/supervised_user/legacy/supervised_user_pref_mapping_ser vice.h"
58 #include "chrome/browser/supervised_user/legacy/supervised_user_pref_mapping_ser vice_factory.h" 61 #include "chrome/browser/supervised_user/legacy/supervised_user_pref_mapping_ser vice_factory.h"
59 #include "chrome/browser/supervised_user/legacy/supervised_user_registration_uti lity.h" 62 #include "chrome/browser/supervised_user/legacy/supervised_user_registration_uti lity.h"
60 #include "chrome/browser/supervised_user/legacy/supervised_user_shared_settings_ service_factory.h" 63 #include "chrome/browser/supervised_user/legacy/supervised_user_shared_settings_ service_factory.h"
61 #endif 64 #endif
62 65
63 #if defined(OS_CHROMEOS) 66 #if defined(OS_CHROMEOS)
64 #include "chrome/browser/chromeos/login/users/chrome_user_manager.h" 67 #include "chrome/browser/chromeos/login/users/chrome_user_manager.h"
65 #include "chrome/browser/chromeos/login/users/supervised_user_manager.h" 68 #include "chrome/browser/chromeos/login/users/supervised_user_manager.h"
66 #include "components/user_manager/user_manager.h" 69 #include "components/user_manager/user_manager.h"
67 #endif 70 #endif
68 71
69 #if defined(ENABLE_EXTENSIONS) 72 #if defined(ENABLE_EXTENSIONS)
70 #include "chrome/browser/extensions/extension_service.h" 73 #include "chrome/browser/extensions/extension_service.h"
74 #include "chrome/browser/extensions/extension_util.h"
75 #include "chrome/browser/supervised_user/supervised_user_service_factory.h"
Marc Treib 2016/06/14 13:53:34 This, OTOH, can go out into the regular includes.
mamir 2016/06/15 09:40:11 Done.
76 #include "extensions/browser/extension_prefs.h"
71 #include "extensions/browser/extension_system.h" 77 #include "extensions/browser/extension_system.h"
72 #endif 78 #endif
73 79
74 #if defined(ENABLE_THEMES) 80 #if defined(ENABLE_THEMES)
75 #include "chrome/browser/themes/theme_service.h" 81 #include "chrome/browser/themes/theme_service.h"
76 #include "chrome/browser/themes/theme_service_factory.h" 82 #include "chrome/browser/themes/theme_service_factory.h"
77 #endif 83 #endif
78 84
79 using base::DictionaryValue; 85 using base::DictionaryValue;
80 using base::UserMetricsAction; 86 using base::UserMetricsAction;
81 using content::BrowserThread; 87 using content::BrowserThread;
88 using extensions::Extension;
89 using extensions::ExtensionPrefs;
90 using extensions::ExtensionSystem;
Marc Treib 2016/06/14 13:53:34 These also need to go into an #ifdef
mamir 2016/06/15 09:40:11 Done.
82 91
83 namespace { 92 namespace {
84 93
85 // The URL from which to download a host blacklist if no local one exists yet. 94 // The URL from which to download a host blacklist if no local one exists yet.
86 const char kBlacklistURL[] = 95 const char kBlacklistURL[] =
87 "https://www.gstatic.com/chrome/supervised_user/blacklist-20141001-1k.bin"; 96 "https://www.gstatic.com/chrome/supervised_user/blacklist-20141001-1k.bin";
88 // The filename under which we'll store the blacklist (in the user data dir). 97 // The filename under which we'll store the blacklist (in the user data dir).
89 const char kBlacklistFilename[] = "su-blacklist.bin"; 98 const char kBlacklistFilename[] = "su-blacklist.bin";
90 99
91 const char* const kCustodianInfoPrefs[] = { 100 const char* const kCustodianInfoPrefs[] = {
92 prefs::kSupervisedUserCustodianName, 101 prefs::kSupervisedUserCustodianName,
93 prefs::kSupervisedUserCustodianEmail, 102 prefs::kSupervisedUserCustodianEmail,
94 prefs::kSupervisedUserCustodianProfileImageURL, 103 prefs::kSupervisedUserCustodianProfileImageURL,
95 prefs::kSupervisedUserCustodianProfileURL, 104 prefs::kSupervisedUserCustodianProfileURL,
96 prefs::kSupervisedUserSecondCustodianName, 105 prefs::kSupervisedUserSecondCustodianName,
97 prefs::kSupervisedUserSecondCustodianEmail, 106 prefs::kSupervisedUserSecondCustodianEmail,
98 prefs::kSupervisedUserSecondCustodianProfileImageURL, 107 prefs::kSupervisedUserSecondCustodianProfileImageURL,
99 prefs::kSupervisedUserSecondCustodianProfileURL, 108 prefs::kSupervisedUserSecondCustodianProfileURL,
100 }; 109 };
101 110
102 void CreateURLAccessRequest( 111 void CreateURLAccessRequest(
103 const GURL& url, 112 const GURL& url,
104 PermissionRequestCreator* creator, 113 PermissionRequestCreator* creator,
105 const SupervisedUserService::SuccessCallback& callback) { 114 const SupervisedUserService::SuccessCallback& callback) {
106 creator->CreateURLAccessRequest(url, callback); 115 creator->CreateURLAccessRequest(url, callback);
107 } 116 }
108 117
118 void CreateExtensionInstallRequest(
119 const std::string& id,
120 PermissionRequestCreator* creator,
121 const SupervisedUserService::SuccessCallback& callback) {
122 creator->CreateExtensionInstallRequest(id, callback);
123 }
124
109 void CreateExtensionUpdateRequest( 125 void CreateExtensionUpdateRequest(
110 const std::string& id, 126 const std::string& id,
111 PermissionRequestCreator* creator, 127 PermissionRequestCreator* creator,
112 const SupervisedUserService::SuccessCallback& callback) { 128 const SupervisedUserService::SuccessCallback& callback) {
113 creator->CreateExtensionUpdateRequest(id, callback); 129 creator->CreateExtensionUpdateRequest(id, callback);
114 } 130 }
115 131
132 // Default callback for AddExtensionInstallRequest.
133 void ExtensionInstallRequestSent(const std::string& id, bool success) {
134 VLOG_IF(1, !success) << "Failed sending install request for " << id;
135 }
136
116 // Default callback for AddExtensionUpdateRequest. 137 // Default callback for AddExtensionUpdateRequest.
117 void ExtensionUpdateRequestSent(const std::string& id, bool success) { 138 void ExtensionUpdateRequestSent(const std::string& id, bool success) {
118 VLOG_IF(1, !success) << "Failed sending update request for " << id; 139 VLOG_IF(1, !success) << "Failed sending update request for " << id;
119 } 140 }
120 141
121 base::FilePath GetBlacklistPath() { 142 base::FilePath GetBlacklistPath() {
122 base::FilePath blacklist_dir; 143 base::FilePath blacklist_dir;
123 PathService::Get(chrome::DIR_USER_DATA, &blacklist_dir); 144 PathService::Get(chrome::DIR_USER_DATA, &blacklist_dir);
124 return blacklist_dir.AppendASCII(kBlacklistFilename); 145 return blacklist_dir.AppendASCII(kBlacklistFilename);
125 } 146 }
126
127 #if defined(ENABLE_EXTENSIONS)
128 enum ExtensionState {
129 EXTENSION_FORCED,
130 EXTENSION_BLOCKED,
131 EXTENSION_ALLOWED
132 };
133
134 ExtensionState GetExtensionState(const extensions::Extension* extension) {
135 bool was_installed_by_default = extension->was_installed_by_default();
136 #if defined(OS_CHROMEOS)
137 // On Chrome OS all external sources are controlled by us so it means that
138 // they are "default". Method was_installed_by_default returns false because
139 // extensions creation flags are ignored in case of default extensions with
140 // update URL(the flags aren't passed to OnExternalExtensionUpdateUrlFound).
141 // TODO(dpolukhin): remove this Chrome OS specific code as soon as creation
142 // flags are not ignored.
143 was_installed_by_default =
144 extensions::Manifest::IsExternalLocation(extension->location());
145 #endif
146 // Note: Component extensions are protected from modification/uninstallation
147 // anyway, so there's no need to enforce them again for supervised users.
148 // Also, leave policy-installed extensions alone - they have their own
149 // management; in particular we don't want to override the force-install list.
150 if (extensions::Manifest::IsComponentLocation(extension->location()) ||
151 extensions::Manifest::IsPolicyLocation(extension->location()) ||
152 extension->is_theme() ||
153 extension->from_bookmark() ||
154 extension->is_shared_module() ||
155 was_installed_by_default) {
156 return EXTENSION_ALLOWED;
157 }
158
159 if (extension->was_installed_by_custodian())
160 return EXTENSION_FORCED;
161
162 return EXTENSION_BLOCKED;
163 }
164 #endif
165
166 } // namespace 147 } // namespace
167 148
168 SupervisedUserService::~SupervisedUserService() { 149 SupervisedUserService::~SupervisedUserService() {
169 DCHECK(!did_init_ || did_shutdown_); 150 DCHECK(!did_init_ || did_shutdown_);
170 url_filter_context_.ui_url_filter()->RemoveObserver(this); 151 url_filter_context_.ui_url_filter()->RemoveObserver(this);
171 } 152 }
172 153
173 // static 154 // static
174 void SupervisedUserService::RegisterProfilePrefs( 155 void SupervisedUserService::RegisterProfilePrefs(
175 user_prefs::PrefRegistrySyncable* registry) { 156 user_prefs::PrefRegistrySyncable* registry) {
157 registry->RegisterDictionaryPref(prefs::kSupervisedUserApprovedExtensions);
176 registry->RegisterDictionaryPref(prefs::kSupervisedUserManualHosts); 158 registry->RegisterDictionaryPref(prefs::kSupervisedUserManualHosts);
177 registry->RegisterDictionaryPref(prefs::kSupervisedUserManualURLs); 159 registry->RegisterDictionaryPref(prefs::kSupervisedUserManualURLs);
178 registry->RegisterIntegerPref(prefs::kDefaultSupervisedUserFilteringBehavior, 160 registry->RegisterIntegerPref(prefs::kDefaultSupervisedUserFilteringBehavior,
179 SupervisedUserURLFilter::ALLOW); 161 SupervisedUserURLFilter::ALLOW);
180 registry->RegisterBooleanPref(prefs::kSupervisedUserCreationAllowed, true); 162 registry->RegisterBooleanPref(prefs::kSupervisedUserCreationAllowed, true);
181 registry->RegisterBooleanPref(prefs::kSupervisedUserSafeSites, true); 163 registry->RegisterBooleanPref(prefs::kSupervisedUserSafeSites, true);
182 for (const char* pref : kCustodianInfoPrefs) { 164 for (const char* pref : kCustodianInfoPrefs) {
183 registry->RegisterStringPref(pref, std::string()); 165 registry->RegisterStringPref(pref, std::string());
184 } 166 }
185 } 167 }
(...skipping 70 matching lines...) Expand 10 before | Expand all | Expand 10 after
256 } 238 }
257 239
258 void SupervisedUserService::ReportURL(const GURL& url, 240 void SupervisedUserService::ReportURL(const GURL& url,
259 const SuccessCallback& callback) { 241 const SuccessCallback& callback) {
260 if (url_reporter_) 242 if (url_reporter_)
261 url_reporter_->ReportUrl(url, callback); 243 url_reporter_->ReportUrl(url, callback);
262 else 244 else
263 callback.Run(false); 245 callback.Run(false);
264 } 246 }
265 247
248 void SupervisedUserService::AddExtensionInstallRequest(
249 const std::string& extension_id,
250 const base::Version& version,
251 const SuccessCallback& callback) {
252 std::string id = GetExtensionRequestId(extension_id, version);
253 AddPermissionRequestInternal(base::Bind(CreateExtensionInstallRequest, id),
254 callback, 0);
255 }
256
257 void SupervisedUserService::AddExtensionInstallRequest(
258 const std::string& extension_id,
259 const base::Version& version) {
260 std::string id = GetExtensionRequestId(extension_id, version);
261 AddPermissionRequestInternal(base::Bind(CreateExtensionInstallRequest, id),
262 base::Bind(ExtensionInstallRequestSent, id), 0);
263 }
264
266 void SupervisedUserService::AddExtensionUpdateRequest( 265 void SupervisedUserService::AddExtensionUpdateRequest(
267 const std::string& extension_id, 266 const std::string& extension_id,
268 const base::Version& version, 267 const base::Version& version,
269 const SuccessCallback& callback) { 268 const SuccessCallback& callback) {
270 std::string id = GetExtensionUpdateRequestId(extension_id, version); 269 std::string id = GetExtensionRequestId(extension_id, version);
271 AddPermissionRequestInternal( 270 AddPermissionRequestInternal(
272 base::Bind(CreateExtensionUpdateRequest, id), callback, 0); 271 base::Bind(CreateExtensionUpdateRequest, id), callback, 0);
273 } 272 }
274 273
275 void SupervisedUserService::AddExtensionUpdateRequest( 274 void SupervisedUserService::AddExtensionUpdateRequest(
276 const std::string& extension_id, 275 const std::string& extension_id,
277 const base::Version& version) { 276 const base::Version& version) {
278 std::string id = GetExtensionUpdateRequestId(extension_id, version); 277 std::string id = GetExtensionRequestId(extension_id, version);
279 AddExtensionUpdateRequest(extension_id, version, 278 AddExtensionUpdateRequest(extension_id, version,
280 base::Bind(ExtensionUpdateRequestSent, id)); 279 base::Bind(ExtensionUpdateRequestSent, id));
281 } 280 }
282 281
282 void SupervisedUserService::EnableExtensionIfPossible(
283 const std::string& extension_id) {
284 extensions::ExtensionRegistry* registry_ =
285 extensions::ExtensionRegistry::Get(profile_);
286 const Extension* extension = registry_->GetInstalledExtension(extension_id);
Marc Treib 2016/06/14 13:53:34 Can extension be null? Seems like it could be, if
mamir 2016/06/15 09:40:11 Fixed and added a proper unit test ;-) Done!
287
288 ExtensionState state = GetExtensionState(*extension);
289
290 if (state == ExtensionState::BLOCKED ||
291 state == ExtensionState::REQUIRE_APPROVAL) {
292 return; // Extension must remain disabled.
293 }
294
295 ExtensionPrefs* extension_prefs = ExtensionPrefs::Get(profile_);
296 if (!extension_prefs->HasDisableReason(
297 extension_id, Extension::DISABLE_CUSTODIAN_APPROVAL_REQUIRED)) {
298 return; // Extension is disabled for other reasons.
299 }
300 extension_prefs->RemoveDisableReason(
301 extension_id, Extension::DISABLE_CUSTODIAN_APPROVAL_REQUIRED);
302 // If no other disable reasons, enable it.
303 if (extension_prefs->GetDisableReasons(extension_id)
304 == Extension::DISABLE_NONE) {
Marc Treib 2016/06/14 13:53:34 Is this correctly aligned?
mamir 2016/06/15 09:40:11 Done.
Marc Treib 2016/06/15 12:31:07 git cl formatted now? Still looks weird, but oh we
mamir 2016/06/15 17:30:02 Yup :-)
305 // Try to enable the extension, this will call the ManagmentPolicy and
306 // properly enable the extension if possible.
Marc Treib 2016/06/14 13:53:34 This comment seems out of place now - we've alread
mamir 2016/06/15 09:40:11 The comment is intended to refer to other Manageme
Marc Treib 2016/06/15 12:31:07 Yes, because it's not really relevant - we don't e
mamir 2016/06/15 17:30:02 Done.
307 ExtensionService* service =
308 ExtensionSystem::Get(profile_)->extension_service();
309 service->EnableExtension(extension_id);
310 }
311 }
312
283 // static 313 // static
284 std::string SupervisedUserService::GetExtensionUpdateRequestId( 314 std::string SupervisedUserService::GetExtensionRequestId(
285 const std::string& extension_id, 315 const std::string& extension_id,
286 const base::Version& version) { 316 const base::Version& version) {
287 return base::StringPrintf("%s:%s", extension_id.c_str(), 317 return base::StringPrintf("%s:%s", extension_id.c_str(),
288 version.GetString().c_str()); 318 version.GetString().c_str());
289 } 319 }
290 320
291 std::string SupervisedUserService::GetCustodianEmailAddress() const { 321 std::string SupervisedUserService::GetCustodianEmailAddress() const {
292 std::string email = profile_->GetPrefs()->GetString( 322 std::string email = profile_->GetPrefs()->GetString(
293 prefs::kSupervisedUserCustodianEmail); 323 prefs::kSupervisedUserCustodianEmail);
294 #if defined(OS_CHROMEOS) 324 #if defined(OS_CHROMEOS)
(...skipping 219 matching lines...) Expand 10 before | Expand all | Expand 10 after
514 SupervisedUserService::SupervisedUserService(Profile* profile) 544 SupervisedUserService::SupervisedUserService(Profile* profile)
515 : includes_sync_sessions_type_(true), 545 : includes_sync_sessions_type_(true),
516 profile_(profile), 546 profile_(profile),
517 active_(false), 547 active_(false),
518 delegate_(NULL), 548 delegate_(NULL),
519 waiting_for_sync_initialization_(false), 549 waiting_for_sync_initialization_(false),
520 is_profile_active_(false), 550 is_profile_active_(false),
521 did_init_(false), 551 did_init_(false),
522 did_shutdown_(false), 552 did_shutdown_(false),
523 blacklist_state_(BlacklistLoadState::NOT_LOADED), 553 blacklist_state_(BlacklistLoadState::NOT_LOADED),
554 registry_observer_(this),
524 weak_ptr_factory_(this) { 555 weak_ptr_factory_(this) {
525 url_filter_context_.ui_url_filter()->AddObserver(this); 556 url_filter_context_.ui_url_filter()->AddObserver(this);
557 registry_observer_.Add(extensions::ExtensionRegistry::Get(profile));
526 } 558 }
527 559
528 void SupervisedUserService::SetActive(bool active) { 560 void SupervisedUserService::SetActive(bool active) {
529 if (active_ == active) 561 if (active_ == active)
530 return; 562 return;
531 active_ = active; 563 active_ = active;
532 564
533 if (!delegate_ || !delegate_->SetActive(active_)) { 565 if (!delegate_ || !delegate_->SetActive(active_)) {
534 if (active_) { 566 if (active_) {
535 #if !defined(OS_ANDROID) 567 #if !defined(OS_ANDROID)
(...skipping 44 matching lines...) Expand 10 before | Expand all | Expand 10 after
580 612
581 #if defined(ENABLE_EXTENSIONS) 613 #if defined(ENABLE_EXTENSIONS)
582 SetExtensionsActive(); 614 SetExtensionsActive();
583 #endif 615 #endif
584 616
585 if (active_) { 617 if (active_) {
586 pref_change_registrar_.Add( 618 pref_change_registrar_.Add(
587 prefs::kDefaultSupervisedUserFilteringBehavior, 619 prefs::kDefaultSupervisedUserFilteringBehavior,
588 base::Bind(&SupervisedUserService::OnDefaultFilteringBehaviorChanged, 620 base::Bind(&SupervisedUserService::OnDefaultFilteringBehaviorChanged,
589 base::Unretained(this))); 621 base::Unretained(this)));
622 pref_change_registrar_.Add(
623 prefs::kSupervisedUserApprovedExtensions,
624 base::Bind(&SupervisedUserService::UpdateApprovedExtensions,
625 base::Unretained(this)));
590 pref_change_registrar_.Add(prefs::kSupervisedUserSafeSites, 626 pref_change_registrar_.Add(prefs::kSupervisedUserSafeSites,
591 base::Bind(&SupervisedUserService::OnSafeSitesSettingChanged, 627 base::Bind(&SupervisedUserService::OnSafeSitesSettingChanged,
592 base::Unretained(this))); 628 base::Unretained(this)));
593 pref_change_registrar_.Add(prefs::kSupervisedUserManualHosts, 629 pref_change_registrar_.Add(prefs::kSupervisedUserManualHosts,
594 base::Bind(&SupervisedUserService::UpdateManualHosts, 630 base::Bind(&SupervisedUserService::UpdateManualHosts,
595 base::Unretained(this))); 631 base::Unretained(this)));
596 pref_change_registrar_.Add(prefs::kSupervisedUserManualURLs, 632 pref_change_registrar_.Add(prefs::kSupervisedUserManualURLs,
597 base::Bind(&SupervisedUserService::UpdateManualURLs, 633 base::Bind(&SupervisedUserService::UpdateManualURLs,
598 base::Unretained(this))); 634 base::Unretained(this)));
599 for (const char* pref : kCustodianInfoPrefs) { 635 for (const char* pref : kCustodianInfoPrefs) {
600 pref_change_registrar_.Add(pref, 636 pref_change_registrar_.Add(pref,
601 base::Bind(&SupervisedUserService::OnCustodianInfoChanged, 637 base::Bind(&SupervisedUserService::OnCustodianInfoChanged,
602 base::Unretained(this))); 638 base::Unretained(this)));
603 } 639 }
604 640
605 // Initialize the filter. 641 // Initialize the filter.
606 OnDefaultFilteringBehaviorChanged(); 642 OnDefaultFilteringBehaviorChanged();
607 OnSafeSitesSettingChanged(); 643 OnSafeSitesSettingChanged();
608 whitelist_service_->Init(); 644 whitelist_service_->Init();
609 UpdateManualHosts(); 645 UpdateManualHosts();
610 UpdateManualURLs(); 646 UpdateManualURLs();
647 UpdateApprovedExtensions();
611 648
612 #if !defined(OS_ANDROID) 649 #if !defined(OS_ANDROID)
613 // TODO(bauerb): Get rid of the platform-specific #ifdef here. 650 // TODO(bauerb): Get rid of the platform-specific #ifdef here.
614 // http://crbug.com/313377 651 // http://crbug.com/313377
615 BrowserList::AddObserver(this); 652 BrowserList::AddObserver(this);
616 #endif 653 #endif
617 } else { 654 } else {
618 permissions_creators_.clear(); 655 permissions_creators_.clear();
619 url_reporter_.reset(); 656 url_reporter_.reset();
620 657
621 pref_change_registrar_.Remove( 658 pref_change_registrar_.Remove(
622 prefs::kDefaultSupervisedUserFilteringBehavior); 659 prefs::kDefaultSupervisedUserFilteringBehavior);
660 pref_change_registrar_.Remove(prefs::kSupervisedUserApprovedExtensions);
623 pref_change_registrar_.Remove(prefs::kSupervisedUserManualHosts); 661 pref_change_registrar_.Remove(prefs::kSupervisedUserManualHosts);
624 pref_change_registrar_.Remove(prefs::kSupervisedUserManualURLs); 662 pref_change_registrar_.Remove(prefs::kSupervisedUserManualURLs);
625 for (const char* pref : kCustodianInfoPrefs) { 663 for (const char* pref : kCustodianInfoPrefs) {
626 pref_change_registrar_.Remove(pref); 664 pref_change_registrar_.Remove(pref);
627 } 665 }
628 666
629 url_filter_context_.Clear(); 667 url_filter_context_.Clear();
630 FOR_EACH_OBSERVER( 668 FOR_EACH_OBSERVER(
631 SupervisedUserServiceObserver, observer_list_, OnURLFilterChanged()); 669 SupervisedUserServiceObserver, observer_list_, OnURLFilterChanged());
632 670
(...skipping 275 matching lines...) Expand 10 before | Expand all | Expand 10 after
908 bool result = it.value().GetAsBoolean(&allow); 946 bool result = it.value().GetAsBoolean(&allow);
909 DCHECK(result); 947 DCHECK(result);
910 (*url_map)[GURL(it.key())] = allow; 948 (*url_map)[GURL(it.key())] = allow;
911 } 949 }
912 url_filter_context_.SetManualURLs(std::move(url_map)); 950 url_filter_context_.SetManualURLs(std::move(url_map));
913 951
914 FOR_EACH_OBSERVER( 952 FOR_EACH_OBSERVER(
915 SupervisedUserServiceObserver, observer_list_, OnURLFilterChanged()); 953 SupervisedUserServiceObserver, observer_list_, OnURLFilterChanged());
916 } 954 }
917 955
956 void SupervisedUserService::UpdateApprovedExtensions() {
957 const base::DictionaryValue* dict = profile_->GetPrefs()->GetDictionary(
958 prefs::kSupervisedUserApprovedExtensions);
959 approved_extensions_map_.clear();
960 for (base::DictionaryValue::Iterator it(*dict); !it.IsAtEnd(); it.Advance()) {
961 std::string version_str;
962 bool result = it.value().GetAsString(&version_str);
963 DCHECK(result);
964 base::Version version(version_str);
965 if (version.IsValid())
966 approved_extensions_map_[it.key()] = version;
967 else
968 LOG(WARNING) << "Invalid version number " << version_str;
969 }
970
971 for (const auto& extensions_entry : approved_extensions_map_) {
972 EnableExtensionIfPossible(extensions_entry.first);
973 }
974 }
975
918 std::string SupervisedUserService::GetSupervisedUserName() const { 976 std::string SupervisedUserService::GetSupervisedUserName() const {
919 #if defined(OS_CHROMEOS) 977 #if defined(OS_CHROMEOS)
920 // The active user can be NULL in unit tests. 978 // The active user can be NULL in unit tests.
921 if (user_manager::UserManager::Get()->GetActiveUser()) { 979 if (user_manager::UserManager::Get()->GetActiveUser()) {
922 return UTF16ToUTF8(user_manager::UserManager::Get()->GetUserDisplayName( 980 return UTF16ToUTF8(user_manager::UserManager::Get()->GetUserDisplayName(
923 user_manager::UserManager::Get()->GetActiveUser()->GetAccountId())); 981 user_manager::UserManager::Get()->GetActiveUser()->GetAccountId()));
924 } 982 }
925 return std::string(); 983 return std::string();
926 #else 984 #else
927 return profile_->GetPrefs()->GetString(prefs::kProfileName); 985 return profile_->GetPrefs()->GetString(prefs::kProfileName);
928 #endif 986 #endif
929 } 987 }
930 988
931 void SupervisedUserService::OnForceSessionSyncChanged() { 989 void SupervisedUserService::OnForceSessionSyncChanged() {
932 includes_sync_sessions_type_ = 990 includes_sync_sessions_type_ =
933 profile_->GetPrefs()->GetBoolean(prefs::kForceSessionSync); 991 profile_->GetPrefs()->GetBoolean(prefs::kForceSessionSync);
934 ProfileSyncServiceFactory::GetForProfile(profile_) 992 ProfileSyncServiceFactory::GetForProfile(profile_)
935 ->ReconfigureDatatypeManager(); 993 ->ReconfigureDatatypeManager();
936 } 994 }
937 995
996 void SupervisedUserService::OnExtensionInstalled(
997 content::BrowserContext* browser_context,
998 const extensions::Extension* extension,
999 bool is_update) {
1000 // This callback is responsible only for updating the approved version
1001 // upon extension update if it doesn't require extra permission.
1002 if (!is_update)
1003 return;
1004
1005 ExtensionPrefs* extension_prefs = ExtensionPrefs::Get(profile_);
1006 const std::string& id = extension->id();
1007 const base::Version& version = *extension->version();
1008
1009 // If an already approved extension is updated without requiring
1010 // new permissions, we update the approved_version and re-enable it.
1011 if (!extension_prefs->HasDisableReason(
1012 id, Extension::DISABLE_PERMISSIONS_INCREASE) &&
1013 approved_extensions_map_.count(id) > 0 &&
1014 approved_extensions_map_[id] < version) {
1015 approved_extensions_map_[id] = version;
1016
1017 std::string key = SupervisedUserSettingsService::MakeSplitSettingKey(
1018 supervised_users::kApprovedExtensions, id);
1019 std::unique_ptr<base::Value> version_value(
1020 new base::StringValue(version.GetString()));
1021 GetSettingsService()->UpdateSetting(key, std::move(version_value));
1022
1023 EnableExtensionIfPossible(id);
1024 }
1025 }
1026
938 void SupervisedUserService::Shutdown() { 1027 void SupervisedUserService::Shutdown() {
939 if (!did_init_) 1028 if (!did_init_)
940 return; 1029 return;
941 DCHECK(!did_shutdown_); 1030 DCHECK(!did_shutdown_);
942 did_shutdown_ = true; 1031 did_shutdown_ = true;
943 if (ProfileIsSupervised()) { 1032 if (ProfileIsSupervised()) {
944 content::RecordAction(UserMetricsAction("ManagedUsers_QuitBrowser")); 1033 content::RecordAction(UserMetricsAction("ManagedUsers_QuitBrowser"));
945 } 1034 }
946 SetActive(false); 1035 SetActive(false);
947 1036
948 ProfileSyncService* sync_service = 1037 ProfileSyncService* sync_service =
949 ProfileSyncServiceFactory::GetForProfile(profile_); 1038 ProfileSyncServiceFactory::GetForProfile(profile_);
950 1039
951 // Can be null in tests. 1040 // Can be null in tests.
952 if (sync_service) 1041 if (sync_service)
953 sync_service->RemovePreferenceProvider(this); 1042 sync_service->RemovePreferenceProvider(this);
954 } 1043 }
955 1044
956 #if defined(ENABLE_EXTENSIONS) 1045 #if defined(ENABLE_EXTENSIONS)
1046 SupervisedUserService::ExtensionState SupervisedUserService::GetExtensionState(
1047 const Extension& extension) const {
1048 bool was_installed_by_default = extension.was_installed_by_default();
1049 #if defined(OS_CHROMEOS)
1050 // On Chrome OS all external sources are controlled by us so it means that
1051 // they are "default". Method was_installed_by_default returns false because
1052 // extensions creation flags are ignored in case of default extensions with
1053 // update URL(the flags aren't passed to OnExternalExtensionUpdateUrlFound).
1054 // TODO(dpolukhin): remove this Chrome OS specific code as soon as creation
1055 // flags are not ignored.
1056 was_installed_by_default =
1057 extensions::Manifest::IsExternalLocation(extension->location());
1058 #endif
1059 // Note: Component extensions are protected from modification/uninstallation
1060 // anyway, so there's no need to enforce them again for supervised users.
1061 // Also, leave policy-installed extensions alone - they have their own
1062 // management; in particular we don't want to override the force-install list.
1063 if (extensions::Manifest::IsComponentLocation(extension.location()) ||
1064 extensions::Manifest::IsPolicyLocation(extension.location()) ||
1065 extension.is_theme() || extension.from_bookmark() ||
1066 extension.is_shared_module() || was_installed_by_default) {
1067 return ExtensionState::ALLOWED;
1068 }
1069
1070 if (extension.was_installed_by_custodian())
1071 return ExtensionState::FORCED;
1072
1073 if (!base::FeatureList::IsEnabled(
1074 supervised_users::kSupervisedUserInitiatedExtensionInstall)) {
1075 return ExtensionState::BLOCKED;
1076 }
1077
1078 const std::string& id = extension.id();
1079
1080 auto extension_it = approved_extensions_map_.find(id);
1081 if (extension_it == approved_extensions_map_.end() ||
1082 extension_it->second != *(extension.version())) {
Marc Treib 2016/06/14 13:53:34 nit: parens around extension.version() aren't nece
mamir 2016/06/15 09:40:11 Done.
1083 return ExtensionState::REQUIRE_APPROVAL;
1084 }
1085
1086 if (ExtensionPrefs::Get(profile_)->HasDisableReason(
1087 id, Extension::DISABLE_PERMISSIONS_INCREASE)) {
1088 return ExtensionState::REQUIRE_APPROVAL;
1089 }
1090
1091 return ExtensionState::ALLOWED;
1092 }
1093
957 std::string SupervisedUserService::GetDebugPolicyProviderName() const { 1094 std::string SupervisedUserService::GetDebugPolicyProviderName() const {
958 // Save the string space in official builds. 1095 // Save the string space in official builds.
959 #ifdef NDEBUG 1096 #ifdef NDEBUG
960 NOTREACHED(); 1097 NOTREACHED();
961 return std::string(); 1098 return std::string();
962 #else 1099 #else
963 return "Supervised User Service"; 1100 return "Supervised User Service";
964 #endif 1101 #endif
965 } 1102 }
966 1103
967 bool SupervisedUserService::UserMayLoad(const extensions::Extension* extension, 1104 bool SupervisedUserService::UserMayLoad(const Extension* extension,
968 base::string16* error) const { 1105 base::string16* error) const {
969 DCHECK(ProfileIsSupervised()); 1106 DCHECK(ProfileIsSupervised());
970 ExtensionState result = GetExtensionState(extension); 1107 ExtensionState result = GetExtensionState(*extension);
971 bool may_load = (result != EXTENSION_BLOCKED); 1108 bool may_load = (result != ExtensionState::BLOCKED);
972 if (!may_load && error) 1109 if (!may_load && error)
973 *error = GetExtensionsLockedMessage(); 1110 *error = GetExtensionsLockedMessage();
974 return may_load; 1111 return may_load;
975 } 1112 }
976 1113
977 bool SupervisedUserService::UserMayModifySettings( 1114 bool SupervisedUserService::UserMayModifySettings(const Extension* extension,
978 const extensions::Extension* extension, 1115 base::string16* error) const {
979 base::string16* error) const {
980 DCHECK(ProfileIsSupervised()); 1116 DCHECK(ProfileIsSupervised());
981 ExtensionState result = GetExtensionState(extension); 1117 ExtensionState result = GetExtensionState(*extension);
982 bool may_modify = (result == EXTENSION_ALLOWED); 1118 // While the following check allows the supervised user to modify the settings
1119 // and enable or disable the extension, MustRemainDisabled properly takes care
1120 // of keeping an extension disabled when required.
1121 // For custodian-installed extensions, the state is always FORCED, even if
1122 // it's waiting for an update approval.
1123 bool may_modify = result != ExtensionState::FORCED;
983 if (!may_modify && error) 1124 if (!may_modify && error)
984 *error = GetExtensionsLockedMessage(); 1125 *error = GetExtensionsLockedMessage();
985 return may_modify; 1126 return may_modify;
986 } 1127 }
987 1128
988 // Note: Having MustRemainInstalled always say "true" for custodian-installed 1129 // Note: Having MustRemainInstalled always say "true" for custodian-installed
989 // extensions does NOT prevent remote uninstalls (which is a bit unexpected, but 1130 // extensions does NOT prevent remote uninstalls (which is a bit unexpected, but
990 // exactly what we want). 1131 // exactly what we want).
991 bool SupervisedUserService::MustRemainInstalled( 1132 bool SupervisedUserService::MustRemainInstalled(const Extension* extension,
992 const extensions::Extension* extension, 1133 base::string16* error) const {
993 base::string16* error) const {
994 DCHECK(ProfileIsSupervised()); 1134 DCHECK(ProfileIsSupervised());
995 ExtensionState result = GetExtensionState(extension); 1135 ExtensionState result = GetExtensionState(*extension);
996 bool may_not_uninstall = (result == EXTENSION_FORCED); 1136 bool may_not_uninstall = (result == ExtensionState::FORCED);
997 if (may_not_uninstall && error) 1137 if (may_not_uninstall && error)
998 *error = GetExtensionsLockedMessage(); 1138 *error = GetExtensionsLockedMessage();
999 return may_not_uninstall; 1139 return may_not_uninstall;
1000 } 1140 }
1001 1141
1142 bool SupervisedUserService::MustRemainDisabled(const Extension* extension,
1143 Extension::DisableReason* reason,
1144 base::string16* error) const {
1145 DCHECK(ProfileIsSupervised());
1146 ExtensionState state = GetExtensionState(*extension);
1147 bool must_remain_disabled = state == ExtensionState::BLOCKED ||
1148 state == ExtensionState::REQUIRE_APPROVAL;
1149
1150 if (must_remain_disabled) {
1151 // If the extension must remain disabled due to permission increase,
1152 // then the update request has been already sent at update time.
1153 // We do nothing and we don't add an extra disable reason.
1154 ExtensionPrefs* extension_prefs = ExtensionPrefs::Get(profile_);
1155 if (extension_prefs->HasDisableReason(
1156 extension->id(), Extension::DISABLE_PERMISSIONS_INCREASE)) {
1157 if (reason)
1158 *reason = Extension::DISABLE_PERMISSIONS_INCREASE;
Marc Treib 2016/06/14 13:53:34 You probably also need to set error here?
mamir 2016/06/15 09:40:11 Done.
1159 return true;
1160 }
1161 if (reason)
1162 *reason = Extension::DISABLE_CUSTODIAN_APPROVAL_REQUIRED;
Marc Treib 2016/06/14 13:53:34 Hm, this is confusing. Can we ever get here if SU-
mamir 2016/06/15 09:40:11 Not really, because if SU-initiated installs are n
Marc Treib 2016/06/15 12:31:07 If it can't happen, then the code shouldn't handle
mamir 2016/06/15 17:30:02 Sorry, I was wrong. It can actually reach this par
1163 if (error)
1164 *error = l10n_util::GetStringUTF16(IDS_EXTENSIONS_LOCKED_SUPERVISED_USER);
1165 if (base::FeatureList::IsEnabled(
1166 supervised_users::kSupervisedUserInitiatedExtensionInstall)) {
1167 // If the Extension isn't pending a custodian approval already, send
1168 // an approval request.
1169 if (!extension_prefs->HasDisableReason(
1170 extension->id(),
1171 Extension::DISABLE_CUSTODIAN_APPROVAL_REQUIRED)) {
1172 // MustRemainDisabled is a const method and hence cannot call
1173 // AddExtensionInstallRequest directly.
1174 SupervisedUserService* supervised_user_service =
1175 SupervisedUserServiceFactory::GetForProfile(profile_);
1176 supervised_user_service->AddExtensionInstallRequest(
1177 extension->id(), *extension->version());
1178 }
1179 }
1180 }
1181 return must_remain_disabled;
1182 }
1183
1002 void SupervisedUserService::SetExtensionsActive() { 1184 void SupervisedUserService::SetExtensionsActive() {
1003 extensions::ExtensionSystem* extension_system = 1185 extensions::ExtensionSystem* extension_system =
1004 extensions::ExtensionSystem::Get(profile_); 1186 extensions::ExtensionSystem::Get(profile_);
1005 extensions::ManagementPolicy* management_policy = 1187 extensions::ManagementPolicy* management_policy =
1006 extension_system->management_policy(); 1188 extension_system->management_policy();
1007 1189
1008 if (management_policy) { 1190 if (management_policy) {
1009 if (active_) 1191 if (active_)
1010 management_policy->RegisterProvider(this); 1192 management_policy->RegisterProvider(this);
1011 else 1193 else
(...skipping 45 matching lines...) Expand 10 before | Expand all | Expand 10 after
1057 content::RecordAction(UserMetricsAction("ManagedUsers_SwitchProfile")); 1239 content::RecordAction(UserMetricsAction("ManagedUsers_SwitchProfile"));
1058 1240
1059 is_profile_active_ = profile_became_active; 1241 is_profile_active_ = profile_became_active;
1060 } 1242 }
1061 #endif // !defined(OS_ANDROID) 1243 #endif // !defined(OS_ANDROID)
1062 1244
1063 void SupervisedUserService::OnSiteListUpdated() { 1245 void SupervisedUserService::OnSiteListUpdated() {
1064 FOR_EACH_OBSERVER( 1246 FOR_EACH_OBSERVER(
1065 SupervisedUserServiceObserver, observer_list_, OnURLFilterChanged()); 1247 SupervisedUserServiceObserver, observer_list_, OnURLFilterChanged());
1066 } 1248 }
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698