Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(466)

Unified Diff: extensions/common/permissions/permissions_data.h

Issue 2499493004: Communicate ExtensionSettings policy to renderers (Closed)
Patch Set: Fix effective TLD wildcard bug, move to Leaky LazyInstance in PermissionsData, removed unnecessary … Created 3 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: extensions/common/permissions/permissions_data.h
diff --git a/extensions/common/permissions/permissions_data.h b/extensions/common/permissions/permissions_data.h
index 3b87e79bc393161819710e7d8cca9703cc0857e2..a21c9dac231e258e49d8d930bea71e884918907f 100644
--- a/extensions/common/permissions/permissions_data.h
+++ b/extensions/common/permissions/permissions_data.h
@@ -82,6 +82,10 @@ class PermissionsData {
const Extension* extension,
std::string* error);
+ // Is this extension using the default scope for policy_blocked_hosts and
+ // policy_allowed_hosts of the ExtensionSettings policy.
+ bool UsesDefaultPolicyHostRestrictions() const;
+
// Locks the permissions data to the current thread. We don't do this on
// construction, since extensions are initialized across multiple threads.
void BindToCurrentThread() const;
@@ -91,6 +95,22 @@ class PermissionsData {
void SetPermissions(std::unique_ptr<const PermissionSet> active,
std::unique_ptr<const PermissionSet> withheld) const;
+ // Applies restrictions from enterprise policy limiting which URLs this
+ // extension can interact with. The same policy can also define a default set
+ // of URL restrictions using SetDefaultPolicyHostRestrictions. This function
+ // overrides any default host restriction policy.
+ void SetPolicyHostRestrictions(
+ const URLPatternSet& runtime_blocked_hosts,
+ const URLPatternSet& runtime_allowed_hosts,
+ const bool is_default_runtime_blocked_allowed_hosts) const;
Devlin 2017/03/29 21:36:50 To me, it seems like this shouldn't take three par
nrpeter 2017/03/30 00:06:06 Done.
+
+ // Applies restrictions from enterprise policy limiting which URLs all
+ // extensions can interact with. This restriction can be overridden on a
+ // per-extnsion basis with SetPolicyHostRestrictions.
Devlin 2017/03/29 21:36:50 per-extension
nrpeter 2017/03/30 00:06:06 Done.
+ static void SetDefaultPolicyHostRestrictions(
+ const URLPatternSet& default_runtime_blocked_hosts,
+ const URLPatternSet& default_runtime_allowed_hosts);
+
// Sets the active permissions, leaving withheld the same.
void SetActivePermissions(std::unique_ptr<const PermissionSet> active) const;
@@ -201,6 +221,32 @@ class PermissionsData {
return *withheld_permissions_unsafe_;
}
+ // Returns list of hosts this extension may not interact with by policy.
+ // This should only be used for 1. Serialization when initializing renderers
+ // or 2. Called from utility methods above. For all other uses, call utility
+ // methods instead (e.g. CanAccessPage()).
+ static const URLPatternSet& default_policy_blocked_hosts();
+
+ // Returns list of hosts this extension may interact with regardless of
+ // what is defined by policy_blocked_hosts().
+ // This should only be used for 1. Serialization when initializing renderers
+ // or 2. Called from utility methods above. For all other uses, call utility
+ // methods instead (e.g. CanAccessPage()).
+ static const URLPatternSet& default_policy_allowed_hosts();
+
+ // Returns list of hosts this extension may not interact with by policy.
+ // This should only be used for 1. Serialization when initializing renderers
+ // or 2. Called from utility methods above. For all other uses, call utility
+ // methods instead (e.g. CanAccessPage()).
+ const URLPatternSet& policy_blocked_hosts() const;
+
+ // Returns list of hosts this extension may interact with regardless of
+ // what is defined by policy_blocked_hosts().
+ // This should only be used for 1. Serialization when initializing renderers
+ // or 2. Called from utility methods above. For all other uses, call utility
+ // methods instead (e.g. CanAccessPage()).
+ const URLPatternSet& policy_allowed_hosts() const;
+
#if defined(UNIT_TEST)
const PermissionSet* GetTabSpecificPermissionsForTesting(int tab_id) const {
base::AutoLock auto_lock(runtime_lock_);
@@ -233,6 +279,9 @@ class PermissionsData {
const URLPatternSet& withheld_url_patterns,
std::string* error) const;
+ // Check if a specific URL is blocked by policy from extension use at runtime.
+ bool IsRuntimeBlockedHost(const GURL& url) const;
+
// The associated extension's id.
std::string extension_id_;
@@ -255,6 +304,20 @@ class PermissionsData {
// withheld_permissions() accessor.
mutable std::unique_ptr<const PermissionSet> withheld_permissions_unsafe_;
+ // The list of hosts an extension may not interact with by policy.
+ // Unless you need to change |policy_blocked_hosts_unsafe_|, use the (safe)
+ // policy_blocked_hosts() accessor.
+ mutable URLPatternSet policy_blocked_hosts_unsafe;
+
+ // The exclusive list of hosts an extension may interact with by policy.
+ // Unless you need to change |policy_allowed_hosts_unsafe_|, use the (safe)
+ // policy_allowed_hosts() accessor.
+ mutable URLPatternSet policy_allowed_hosts_unsafe;
+
+ // If the ExtensionSettings policy is not being used, or no per-extension
+ // exception to the default policy was declared for this extension.
+ mutable bool uses_default_policy_host_restrictions = true;
+
mutable TabPermissionsMap tab_specific_permissions_;
mutable std::unique_ptr<base::ThreadChecker> thread_checker_;

Powered by Google App Engine
This is Rietveld 408576698