| Index: chrome/browser/extensions/extension_management.h
|
| diff --git a/chrome/browser/extensions/extension_management.h b/chrome/browser/extensions/extension_management.h
|
| index 879cffb910c77f6f77335e41ba86eb6adbf7aa5e..5de7462bc4061fb79d93b9fdc6cfd899fe0a9b79 100644
|
| --- a/chrome/browser/extensions/extension_management.h
|
| +++ b/chrome/browser/extensions/extension_management.h
|
| @@ -5,9 +5,13 @@
|
| #ifndef CHROME_BROWSER_EXTENSIONS_EXTENSION_MANAGEMENT_H_
|
| #define CHROME_BROWSER_EXTENSIONS_EXTENSION_MANAGEMENT_H_
|
|
|
| +#include <vector>
|
| +
|
| #include "base/containers/scoped_ptr_hash_map.h"
|
| #include "base/macros.h"
|
| +#include "base/memory/ref_counted.h"
|
| #include "base/memory/scoped_ptr.h"
|
| +#include "base/memory/scoped_vector.h"
|
| #include "base/memory/singleton.h"
|
| #include "base/observer_list.h"
|
| #include "base/prefs/pref_change_registrar.h"
|
| @@ -34,6 +38,9 @@ struct GlobalSettings;
|
|
|
| } // namespace internal
|
|
|
| +class APIPermissionSet;
|
| +class PermissionSet;
|
| +
|
| // Tracks the management policies that affect extensions and provides interfaces
|
| // for observing and obtaining the global settings for all extensions, as well
|
| // as per-extension settings.
|
| @@ -65,12 +72,15 @@ class ExtensionManagement : public KeyedService {
|
| explicit ExtensionManagement(PrefService* pref_service);
|
| ~ExtensionManagement() override;
|
|
|
| + // KeyedService implementations:
|
| + void Shutdown() override;
|
| +
|
| void AddObserver(Observer* observer);
|
| void RemoveObserver(Observer* observer);
|
|
|
| - // Get the ManagementPolicy::Provider controlled by extension management
|
| - // policy settings.
|
| - ManagementPolicy::Provider* GetProvider() const;
|
| + // Get the list of ManagementPolicy::Provider controlled by extension
|
| + // management policy settings.
|
| + std::vector<ManagementPolicy::Provider*> GetProviders() const;
|
|
|
| // Checks if extensions are blacklisted by default, by policy. When true,
|
| // this means that even extensions without an ID should be blacklisted (e.g.
|
| @@ -99,6 +109,17 @@ class ExtensionManagement : public KeyedService {
|
| // allowed to be installed.
|
| bool IsAllowedManifestType(Manifest::Type manifest_type) const;
|
|
|
| + // Returns the list of blocked API permissions for the extension |id|.
|
| + const APIPermissionSet& GetBlockedAPIPermissions(const ExtensionId& id) const;
|
| +
|
| + // Returns blocked permission set for extension |id|.
|
| + scoped_refptr<const PermissionSet> GetBlockedPermissions(
|
| + const ExtensionId& id) const;
|
| +
|
| + // Returns true if every permission in |perms| is allowed for extension |id|.
|
| + bool IsPermissionSetAllowed(const ExtensionId& id,
|
| + scoped_refptr<const PermissionSet> perms) const;
|
| +
|
| private:
|
| typedef base::ScopedPtrHashMap<ExtensionId, internal::IndividualSettings>
|
| SettingsIdMap;
|
| @@ -153,7 +174,7 @@ class ExtensionManagement : public KeyedService {
|
|
|
| ObserverList<Observer, true> observer_list_;
|
| PrefChangeRegistrar pref_change_registrar_;
|
| - scoped_ptr<ManagementPolicy::Provider> provider_;
|
| + ScopedVector<ManagementPolicy::Provider> providers_;
|
|
|
| DISALLOW_COPY_AND_ASSIGN(ExtensionManagement);
|
| };
|
|
|