Upstream version 10.39.225.0
[platform/framework/web/crosswalk.git] / src / chrome / common / extensions / chrome_extensions_client.cc
index 913b0cd..f9ce7e7 100644 (file)
@@ -5,35 +5,76 @@
 #include "chrome/common/extensions/chrome_extensions_client.h"
 
 #include "base/command_line.h"
+#include "base/strings/string_util.h"
+#include "chrome/common/chrome_switches.h"
+#include "chrome/common/chrome_version_info.h"
 #include "chrome/common/extensions/chrome_manifest_handlers.h"
 #include "chrome/common/extensions/extension_constants.h"
-#include "chrome/common/extensions/features/base_feature_provider.h"
+#include "chrome/common/extensions/features/chrome_channel_feature_filter.h"
+#include "chrome/common/extensions/features/feature_channel.h"
 #include "chrome/common/url_constants.h"
+#include "chrome/grit/chromium_strings.h"
+#include "chrome/grit/common_resources.h"
+#include "chrome/grit/generated_resources.h"
 #include "content/public/common/url_constants.h"
 #include "extensions/common/common_manifest_handlers.h"
 #include "extensions/common/extension.h"
+#include "extensions/common/extension_api.h"
+#include "extensions/common/extension_urls.h"
+#include "extensions/common/features/api_feature.h"
+#include "extensions/common/features/base_feature_provider.h"
+#include "extensions/common/features/feature_provider.h"
+#include "extensions/common/features/json_feature_provider_source.h"
+#include "extensions/common/features/manifest_feature.h"
+#include "extensions/common/features/permission_feature.h"
+#include "extensions/common/features/simple_feature.h"
 #include "extensions/common/manifest_constants.h"
 #include "extensions/common/manifest_handler.h"
 #include "extensions/common/permissions/api_permission_set.h"
 #include "extensions/common/permissions/permission_message.h"
-#include "extensions/common/switches.h"
+#include "extensions/common/permissions/permissions_info.h"
 #include "extensions/common/url_pattern.h"
 #include "extensions/common/url_pattern_set.h"
-#include "grit/generated_resources.h"
+#include "extensions/grit/extensions_resources.h"
 #include "ui/base/l10n/l10n_util.h"
 #include "url/gurl.h"
 
+// TODO(thestig): Remove these #defines. This file should not be built when
+// extensions are disabled.
+#if defined(ENABLE_EXTENSIONS)
+#include "chrome/common/extensions/api/generated_schemas.h"
+#include "chrome/grit/extensions_api_resources.h"
+#include "extensions/common/api/generated_schemas.h"
+#endif
+
+namespace extensions {
+
 namespace {
+
+// TODO(battre): Delete the HTTP URL once the blacklist is downloaded via HTTPS.
+const char kExtensionBlocklistUrlPrefix[] =
+    "http://www.gstatic.com/chrome/extensions/blacklist";
+const char kExtensionBlocklistHttpsUrlPrefix[] =
+    "https://www.gstatic.com/chrome/extensions/blacklist";
+
 const char kThumbsWhiteListedExtension[] = "khopmbdjffemhegeeobelklnbglcdgfh";
-}  // namespace
 
-namespace extensions {
+template <class FeatureClass>
+SimpleFeature* CreateFeature() {
+  SimpleFeature* feature = new FeatureClass;
+  feature->AddFilter(
+      scoped_ptr<SimpleFeatureFilter>(new ChromeChannelFeatureFilter(feature)));
+  return feature;
+}
+
+}  // namespace
 
 static base::LazyInstance<ChromeExtensionsClient> g_client =
     LAZY_INSTANCE_INITIALIZER;
 
 ChromeExtensionsClient::ChromeExtensionsClient()
-    :  chrome_api_permissions_(ChromeAPIPermissions()) {
+    : chrome_api_permissions_(ChromeAPIPermissions()),
+      extensions_api_permissions_(ExtensionsAPIPermissions()) {
 }
 
 ChromeExtensionsClient::~ChromeExtensionsClient() {
@@ -44,10 +85,16 @@ void ChromeExtensionsClient::Initialize() {
   // thread runs in-process.
   if (!ManifestHandler::IsRegistrationFinalized()) {
     RegisterCommonManifestHandlers();
+#if defined(ENABLE_EXTENSIONS)
     RegisterChromeManifestHandlers();
+#endif
     ManifestHandler::FinalizeRegistration();
   }
 
+  // Set up permissions.
+  PermissionsInfo::GetInstance()->AddProvider(chrome_api_permissions_);
+  PermissionsInfo::GetInstance()->AddProvider(extensions_api_permissions_);
+
   // Set up the scripting whitelist.
   // Whitelist ChromeVox, an accessibility extension from Google that needs
   // the ability to script webui pages. This is temporary and is not
@@ -63,19 +110,54 @@ void ChromeExtensionsClient::Initialize() {
   scripting_whitelist_.push_back("angkfkebojeancgemegoedelbnjgcgme");
 }
 
-const PermissionsProvider&
-ChromeExtensionsClient::GetPermissionsProvider() const {
-  return chrome_api_permissions_;
-}
-
 const PermissionMessageProvider&
 ChromeExtensionsClient::GetPermissionMessageProvider() const {
   return permission_message_provider_;
 }
 
-FeatureProvider* ChromeExtensionsClient::GetFeatureProviderByName(
+const std::string ChromeExtensionsClient::GetProductName() {
+  return l10n_util::GetStringUTF8(IDS_PRODUCT_NAME);
+}
+
+scoped_ptr<FeatureProvider> ChromeExtensionsClient::CreateFeatureProvider(
+    const std::string& name) const {
+  scoped_ptr<FeatureProvider> provider;
+  scoped_ptr<JSONFeatureProviderSource> source(
+      CreateFeatureProviderSource(name));
+  if (name == "api") {
+    provider.reset(new BaseFeatureProvider(source->dictionary(),
+                                           CreateFeature<APIFeature>));
+  } else if (name == "manifest") {
+    provider.reset(new BaseFeatureProvider(source->dictionary(),
+                                           CreateFeature<ManifestFeature>));
+  } else if (name == "permission") {
+    provider.reset(new BaseFeatureProvider(source->dictionary(),
+                                           CreateFeature<PermissionFeature>));
+  } else {
+    NOTREACHED();
+  }
+  return provider.Pass();
+}
+
+scoped_ptr<JSONFeatureProviderSource>
+ChromeExtensionsClient::CreateFeatureProviderSource(
     const std::string& name) const {
-  return BaseFeatureProvider::GetByName(name);
+  scoped_ptr<JSONFeatureProviderSource> source(
+      new JSONFeatureProviderSource(name));
+  if (name == "api") {
+    source->LoadJSON(IDR_EXTENSION_API_FEATURES);
+    source->LoadJSON(IDR_CHROME_EXTENSION_API_FEATURES);
+  } else if (name == "manifest") {
+    source->LoadJSON(IDR_EXTENSION_MANIFEST_FEATURES);
+    source->LoadJSON(IDR_CHROME_EXTENSION_MANIFEST_FEATURES);
+  } else if (name == "permission") {
+    source->LoadJSON(IDR_EXTENSION_PERMISSION_FEATURES);
+    source->LoadJSON(IDR_CHROME_EXTENSION_PERMISSION_FEATURES);
+  } else {
+    NOTREACHED();
+    source.reset();
+  }
+  return source.Pass();
 }
 
 void ChromeExtensionsClient::FilterHostPermissions(
@@ -85,7 +167,7 @@ void ChromeExtensionsClient::FilterHostPermissions(
   for (URLPatternSet::const_iterator i = hosts.begin();
        i != hosts.end(); ++i) {
     // Filters out every URL pattern that matches chrome:// scheme.
-    if (i->scheme() == chrome::kChromeUIScheme) {
+    if (i->scheme() == content::kChromeUIScheme) {
       // chrome://favicon is the only URL for chrome:// scheme that we
       // want to support. We want to deprecate the "chrome" scheme.
       // We should not add any additional "host" here.
@@ -142,10 +224,6 @@ bool ChromeExtensionsClient::IsScriptableURL(
   // TODO(erikkay): This seems like the wrong test.  Shouldn't we we testing
   // against the store app extent?
   GURL store_url(extension_urls::GetWebstoreLaunchURL());
-  if (CommandLine::ForCurrentProcess()->HasSwitch(
-          switches::kAllowScriptingGallery)) {
-    return true;
-  }
   if (url.host() == store_url.host()) {
     if (error)
       *error = manifest_errors::kCannotScriptGallery;
@@ -154,6 +232,98 @@ bool ChromeExtensionsClient::IsScriptableURL(
   return true;
 }
 
+bool ChromeExtensionsClient::IsAPISchemaGenerated(
+    const std::string& name) const {
+#if defined(ENABLE_EXTENSIONS)
+  // Test from most common to least common.
+  return api::GeneratedSchemas::IsGenerated(name) ||
+         core_api::GeneratedSchemas::IsGenerated(name);
+#else
+  return false;
+#endif
+}
+
+base::StringPiece ChromeExtensionsClient::GetAPISchema(
+    const std::string& name) const {
+#if defined(ENABLE_EXTENSIONS)
+  // Test from most common to least common.
+  if (api::GeneratedSchemas::IsGenerated(name))
+    return api::GeneratedSchemas::Get(name);
+
+  return core_api::GeneratedSchemas::Get(name);
+#else
+  return base::StringPiece();
+#endif
+}
+
+void ChromeExtensionsClient::RegisterAPISchemaResources(
+    ExtensionAPI* api) const {
+#if defined(ENABLE_EXTENSIONS)
+  api->RegisterSchemaResource("accessibilityPrivate",
+                              IDR_EXTENSION_API_JSON_ACCESSIBILITYPRIVATE);
+  api->RegisterSchemaResource("app", IDR_EXTENSION_API_JSON_APP);
+  api->RegisterSchemaResource("browserAction",
+                              IDR_EXTENSION_API_JSON_BROWSERACTION);
+  api->RegisterSchemaResource("commands", IDR_EXTENSION_API_JSON_COMMANDS);
+  api->RegisterSchemaResource("declarativeContent",
+                              IDR_EXTENSION_API_JSON_DECLARATIVE_CONTENT);
+  api->RegisterSchemaResource("declarativeWebRequest",
+                              IDR_EXTENSION_API_JSON_DECLARATIVE_WEBREQUEST);
+  api->RegisterSchemaResource("fileBrowserHandler",
+                              IDR_EXTENSION_API_JSON_FILEBROWSERHANDLER);
+  api->RegisterSchemaResource("inputMethodPrivate",
+                              IDR_EXTENSION_API_JSON_INPUTMETHODPRIVATE);
+  api->RegisterSchemaResource("pageAction", IDR_EXTENSION_API_JSON_PAGEACTION);
+  api->RegisterSchemaResource("privacy", IDR_EXTENSION_API_JSON_PRIVACY);
+  api->RegisterSchemaResource("processes", IDR_EXTENSION_API_JSON_PROCESSES);
+  api->RegisterSchemaResource("proxy", IDR_EXTENSION_API_JSON_PROXY);
+  api->RegisterSchemaResource("scriptBadge",
+                              IDR_EXTENSION_API_JSON_SCRIPTBADGE);
+  api->RegisterSchemaResource("ttsEngine", IDR_EXTENSION_API_JSON_TTSENGINE);
+  api->RegisterSchemaResource("tts", IDR_EXTENSION_API_JSON_TTS);
+  api->RegisterSchemaResource("types", IDR_EXTENSION_API_JSON_TYPES);
+  api->RegisterSchemaResource("types.private",
+                              IDR_EXTENSION_API_JSON_TYPES_PRIVATE);
+  api->RegisterSchemaResource("webstore", IDR_EXTENSION_API_JSON_WEBSTORE);
+  api->RegisterSchemaResource("webViewRequest",
+                              IDR_EXTENSION_API_JSON_WEB_VIEW_REQUEST);
+#endif  // defined(ENABLE_EXTENSIONS)
+}
+
+bool ChromeExtensionsClient::ShouldSuppressFatalErrors() const {
+  // Suppress fatal errors only on beta and stable channels.
+  return GetCurrentChannel() > chrome::VersionInfo::CHANNEL_DEV;
+}
+
+std::string ChromeExtensionsClient::GetWebstoreBaseURL() const {
+  std::string gallery_prefix = extension_urls::kChromeWebstoreBaseURL;
+  if (CommandLine::ForCurrentProcess()->HasSwitch(switches::kAppsGalleryURL))
+    gallery_prefix = CommandLine::ForCurrentProcess()->GetSwitchValueASCII(
+        switches::kAppsGalleryURL);
+  if (EndsWith(gallery_prefix, "/", true))
+    gallery_prefix = gallery_prefix.substr(0, gallery_prefix.length() - 1);
+  return gallery_prefix;
+}
+
+std::string ChromeExtensionsClient::GetWebstoreUpdateURL() const {
+  CommandLine* cmdline = CommandLine::ForCurrentProcess();
+  if (cmdline->HasSwitch(switches::kAppsGalleryUpdateURL))
+    return cmdline->GetSwitchValueASCII(switches::kAppsGalleryUpdateURL);
+  else
+    return extension_urls::GetDefaultWebstoreUpdateUrl().spec();
+}
+
+bool ChromeExtensionsClient::IsBlacklistUpdateURL(const GURL& url) const {
+  // The extension blacklist URL is returned from the update service and
+  // therefore not determined by Chromium. If the location of the blacklist file
+  // ever changes, we need to update this function. A DCHECK in the
+  // ExtensionUpdater ensures that we notice a change. This is the full URL
+  // of a blacklist:
+  // http://www.gstatic.com/chrome/extensions/blacklist/l_0_0_0_7.txt
+  return StartsWithASCII(url.spec(), kExtensionBlocklistUrlPrefix, true) ||
+         StartsWithASCII(url.spec(), kExtensionBlocklistHttpsUrlPrefix, true);
+}
+
 // static
 ChromeExtensionsClient* ChromeExtensionsClient::GetInstance() {
   return g_client.Pointer();