| // Copyright 2014 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "extensions/common/features/simple_feature.h" |
| |
| #include <map> |
| #include <vector> |
| |
| #include "base/command_line.h" |
| #include "base/debug/alias.h" |
| #include "base/lazy_instance.h" |
| #include "base/sha1.h" |
| #include "base/strings/string_number_conversions.h" |
| #include "base/strings/string_util.h" |
| #include "base/strings/stringprintf.h" |
| #include "extensions/common/switches.h" |
| |
| namespace extensions { |
| |
| namespace { |
| |
| struct Mappings { |
| Mappings() { |
| extension_types["extension"] = Manifest::TYPE_EXTENSION; |
| extension_types["theme"] = Manifest::TYPE_THEME; |
| extension_types["legacy_packaged_app"] = Manifest::TYPE_LEGACY_PACKAGED_APP; |
| extension_types["hosted_app"] = Manifest::TYPE_HOSTED_APP; |
| extension_types["platform_app"] = Manifest::TYPE_PLATFORM_APP; |
| extension_types["shared_module"] = Manifest::TYPE_SHARED_MODULE; |
| |
| contexts["blessed_extension"] = Feature::BLESSED_EXTENSION_CONTEXT; |
| contexts["unblessed_extension"] = Feature::UNBLESSED_EXTENSION_CONTEXT; |
| contexts["content_script"] = Feature::CONTENT_SCRIPT_CONTEXT; |
| contexts["web_page"] = Feature::WEB_PAGE_CONTEXT; |
| contexts["blessed_web_page"] = Feature::BLESSED_WEB_PAGE_CONTEXT; |
| |
| locations["component"] = SimpleFeature::COMPONENT_LOCATION; |
| locations["policy"] = SimpleFeature::POLICY_LOCATION; |
| |
| platforms["chromeos"] = Feature::CHROMEOS_PLATFORM; |
| platforms["linux"] = Feature::LINUX_PLATFORM; |
| platforms["mac"] = Feature::MACOSX_PLATFORM; |
| platforms["win"] = Feature::WIN_PLATFORM; |
| } |
| |
| std::map<std::string, Manifest::Type> extension_types; |
| std::map<std::string, Feature::Context> contexts; |
| std::map<std::string, SimpleFeature::Location> locations; |
| std::map<std::string, Feature::Platform> platforms; |
| }; |
| |
| base::LazyInstance<Mappings> g_mappings = LAZY_INSTANCE_INITIALIZER; |
| |
| // TODO(aa): Can we replace all this manual parsing with JSON schema stuff? |
| |
| void ParseSet(const base::DictionaryValue* value, |
| const std::string& property, |
| std::set<std::string>* set) { |
| const base::ListValue* list_value = NULL; |
| if (!value->GetList(property, &list_value)) |
| return; |
| |
| set->clear(); |
| for (size_t i = 0; i < list_value->GetSize(); ++i) { |
| std::string str_val; |
| CHECK(list_value->GetString(i, &str_val)) << property << " " << i; |
| set->insert(str_val); |
| } |
| } |
| |
| template<typename T> |
| void ParseEnum(const std::string& string_value, |
| T* enum_value, |
| const std::map<std::string, T>& mapping) { |
| typename std::map<std::string, T>::const_iterator iter = |
| mapping.find(string_value); |
| if (iter == mapping.end()) { |
| // For http://crbug.com/365192. |
| char minidump[256]; |
| base::debug::Alias(&minidump); |
| base::snprintf(minidump, arraysize(minidump), |
| "e::simple_feature.cc:%d:\"%s\"", __LINE__, string_value.c_str()); |
| CHECK(false) << string_value; |
| } |
| *enum_value = iter->second; |
| } |
| |
| template<typename T> |
| void ParseEnum(const base::DictionaryValue* value, |
| const std::string& property, |
| T* enum_value, |
| const std::map<std::string, T>& mapping) { |
| std::string string_value; |
| if (!value->GetString(property, &string_value)) |
| return; |
| |
| ParseEnum(string_value, enum_value, mapping); |
| } |
| |
| template<typename T> |
| void ParseEnumSet(const base::DictionaryValue* value, |
| const std::string& property, |
| std::set<T>* enum_set, |
| const std::map<std::string, T>& mapping) { |
| if (!value->HasKey(property)) |
| return; |
| |
| enum_set->clear(); |
| |
| std::string property_string; |
| if (value->GetString(property, &property_string)) { |
| if (property_string == "all") { |
| for (typename std::map<std::string, T>::const_iterator j = |
| mapping.begin(); j != mapping.end(); ++j) { |
| enum_set->insert(j->second); |
| } |
| } |
| return; |
| } |
| |
| std::set<std::string> string_set; |
| ParseSet(value, property, &string_set); |
| for (std::set<std::string>::iterator iter = string_set.begin(); |
| iter != string_set.end(); ++iter) { |
| T enum_value = static_cast<T>(0); |
| ParseEnum(*iter, &enum_value, mapping); |
| enum_set->insert(enum_value); |
| } |
| } |
| |
| void ParseURLPatterns(const base::DictionaryValue* value, |
| const std::string& key, |
| URLPatternSet* set) { |
| const base::ListValue* matches = NULL; |
| if (value->GetList(key, &matches)) { |
| set->ClearPatterns(); |
| for (size_t i = 0; i < matches->GetSize(); ++i) { |
| std::string pattern; |
| CHECK(matches->GetString(i, &pattern)); |
| set->AddPattern(URLPattern(URLPattern::SCHEME_ALL, pattern)); |
| } |
| } |
| } |
| |
| // Gets a human-readable name for the given extension type, suitable for giving |
| // to developers in an error message. |
| std::string GetDisplayName(Manifest::Type type) { |
| switch (type) { |
| case Manifest::TYPE_UNKNOWN: |
| return "unknown"; |
| case Manifest::TYPE_EXTENSION: |
| return "extension"; |
| case Manifest::TYPE_HOSTED_APP: |
| return "hosted app"; |
| case Manifest::TYPE_LEGACY_PACKAGED_APP: |
| return "legacy packaged app"; |
| case Manifest::TYPE_PLATFORM_APP: |
| return "packaged app"; |
| case Manifest::TYPE_THEME: |
| return "theme"; |
| case Manifest::TYPE_USER_SCRIPT: |
| return "user script"; |
| case Manifest::TYPE_SHARED_MODULE: |
| return "shared module"; |
| case Manifest::NUM_LOAD_TYPES: |
| NOTREACHED(); |
| } |
| NOTREACHED(); |
| return ""; |
| } |
| |
| // Gets a human-readable name for the given context type, suitable for giving |
| // to developers in an error message. |
| std::string GetDisplayName(Feature::Context context) { |
| switch (context) { |
| case Feature::UNSPECIFIED_CONTEXT: |
| return "unknown"; |
| case Feature::BLESSED_EXTENSION_CONTEXT: |
| // "privileged" is vague but hopefully the developer will understand that |
| // means background or app window. |
| return "privileged page"; |
| case Feature::UNBLESSED_EXTENSION_CONTEXT: |
| // "iframe" is a bit of a lie/oversimplification, but that's the most |
| // common unblessed context. |
| return "extension iframe"; |
| case Feature::CONTENT_SCRIPT_CONTEXT: |
| return "content script"; |
| case Feature::WEB_PAGE_CONTEXT: |
| return "web page"; |
| case Feature::BLESSED_WEB_PAGE_CONTEXT: |
| return "hosted app"; |
| } |
| NOTREACHED(); |
| return ""; |
| } |
| |
| // Gets a human-readable list of the display names (pluralized, comma separated |
| // with the "and" in the correct place) for each of |enum_types|. |
| template <typename EnumType> |
| std::string ListDisplayNames(const std::vector<EnumType> enum_types) { |
| std::string display_name_list; |
| for (size_t i = 0; i < enum_types.size(); ++i) { |
| // Pluralize type name. |
| display_name_list += GetDisplayName(enum_types[i]) + "s"; |
| // Comma-separate entries, with an Oxford comma if there is more than 2 |
| // total entries. |
| if (enum_types.size() > 2) { |
| if (i < enum_types.size() - 2) |
| display_name_list += ", "; |
| else if (i == enum_types.size() - 2) |
| display_name_list += ", and "; |
| } else if (enum_types.size() == 2 && i == 0) { |
| display_name_list += " and "; |
| } |
| } |
| return display_name_list; |
| } |
| |
| std::string HashExtensionId(const std::string& extension_id) { |
| const std::string id_hash = base::SHA1HashString(extension_id); |
| DCHECK(id_hash.length() == base::kSHA1Length); |
| return base::HexEncode(id_hash.c_str(), id_hash.length()); |
| } |
| |
| } // namespace |
| |
| SimpleFeature::SimpleFeature() |
| : location_(UNSPECIFIED_LOCATION), |
| min_manifest_version_(0), |
| max_manifest_version_(0), |
| has_parent_(false), |
| component_extensions_auto_granted_(true) {} |
| |
| SimpleFeature::~SimpleFeature() {} |
| |
| void SimpleFeature::AddFilter(scoped_ptr<SimpleFeatureFilter> filter) { |
| filters_.push_back(make_linked_ptr(filter.release())); |
| } |
| |
| std::string SimpleFeature::Parse(const base::DictionaryValue* value) { |
| ParseURLPatterns(value, "matches", &matches_); |
| ParseSet(value, "blacklist", &blacklist_); |
| ParseSet(value, "whitelist", &whitelist_); |
| ParseSet(value, "dependencies", &dependencies_); |
| ParseEnumSet<Manifest::Type>(value, "extension_types", &extension_types_, |
| g_mappings.Get().extension_types); |
| ParseEnumSet<Context>(value, "contexts", &contexts_, |
| g_mappings.Get().contexts); |
| ParseEnum<Location>(value, "location", &location_, |
| g_mappings.Get().locations); |
| ParseEnumSet<Platform>(value, "platforms", &platforms_, |
| g_mappings.Get().platforms); |
| value->GetInteger("min_manifest_version", &min_manifest_version_); |
| value->GetInteger("max_manifest_version", &max_manifest_version_); |
| |
| no_parent_ = false; |
| value->GetBoolean("noparent", &no_parent_); |
| |
| component_extensions_auto_granted_ = true; |
| value->GetBoolean("component_extensions_auto_granted", |
| &component_extensions_auto_granted_); |
| |
| if (matches_.is_empty() && contexts_.count(WEB_PAGE_CONTEXT) != 0) { |
| return name() + ": Allowing web_page contexts requires supplying a value " + |
| "for matches."; |
| } |
| |
| for (FilterList::iterator filter_iter = filters_.begin(); |
| filter_iter != filters_.end(); |
| ++filter_iter) { |
| std::string result = (*filter_iter)->Parse(value); |
| if (!result.empty()) { |
| return result; |
| } |
| } |
| |
| return std::string(); |
| } |
| |
| Feature::Availability SimpleFeature::IsAvailableToManifest( |
| const std::string& extension_id, |
| Manifest::Type type, |
| Manifest::Location location, |
| int manifest_version, |
| Platform platform) const { |
| // Check extension type first to avoid granting platform app permissions |
| // to component extensions. |
| // HACK(kalman): user script -> extension. Solve this in a more generic way |
| // when we compile feature files. |
| Manifest::Type type_to_check = (type == Manifest::TYPE_USER_SCRIPT) ? |
| Manifest::TYPE_EXTENSION : type; |
| if (!extension_types_.empty() && |
| extension_types_.find(type_to_check) == extension_types_.end()) { |
| return CreateAvailability(INVALID_TYPE, type); |
| } |
| |
| if (IsIdInBlacklist(extension_id)) |
| return CreateAvailability(FOUND_IN_BLACKLIST, type); |
| |
| // TODO(benwells): don't grant all component extensions. |
| // See http://crbug.com/370375 for more details. |
| // Component extensions can access any feature. |
| // NOTE: Deliberately does not match EXTERNAL_COMPONENT. |
| if (component_extensions_auto_granted_ && location == Manifest::COMPONENT) |
| return CreateAvailability(IS_AVAILABLE, type); |
| |
| if (!whitelist_.empty()) { |
| if (!IsIdInWhitelist(extension_id)) { |
| // TODO(aa): This is gross. There should be a better way to test the |
| // whitelist. |
| CommandLine* command_line = CommandLine::ForCurrentProcess(); |
| if (!command_line->HasSwitch(switches::kWhitelistedExtensionID)) |
| return CreateAvailability(NOT_FOUND_IN_WHITELIST, type); |
| |
| std::string whitelist_switch_value = |
| CommandLine::ForCurrentProcess()->GetSwitchValueASCII( |
| switches::kWhitelistedExtensionID); |
| if (extension_id != whitelist_switch_value) |
| return CreateAvailability(NOT_FOUND_IN_WHITELIST, type); |
| } |
| } |
| |
| if (!MatchesManifestLocation(location)) |
| return CreateAvailability(INVALID_LOCATION, type); |
| |
| if (!platforms_.empty() && |
| platforms_.find(platform) == platforms_.end()) |
| return CreateAvailability(INVALID_PLATFORM, type); |
| |
| if (min_manifest_version_ != 0 && manifest_version < min_manifest_version_) |
| return CreateAvailability(INVALID_MIN_MANIFEST_VERSION, type); |
| |
| if (max_manifest_version_ != 0 && manifest_version > max_manifest_version_) |
| return CreateAvailability(INVALID_MAX_MANIFEST_VERSION, type); |
| |
| for (FilterList::const_iterator filter_iter = filters_.begin(); |
| filter_iter != filters_.end(); |
| ++filter_iter) { |
| Availability availability = (*filter_iter)->IsAvailableToManifest( |
| extension_id, type, location, manifest_version, platform); |
| if (!availability.is_available()) |
| return availability; |
| } |
| |
| return CreateAvailability(IS_AVAILABLE, type); |
| } |
| |
| Feature::Availability SimpleFeature::IsAvailableToContext( |
| const Extension* extension, |
| SimpleFeature::Context context, |
| const GURL& url, |
| SimpleFeature::Platform platform) const { |
| if (extension) { |
| Availability result = IsAvailableToManifest(extension->id(), |
| extension->GetType(), |
| extension->location(), |
| extension->manifest_version(), |
| platform); |
| if (!result.is_available()) |
| return result; |
| } |
| |
| if (!contexts_.empty() && contexts_.find(context) == contexts_.end()) |
| return CreateAvailability(INVALID_CONTEXT, context); |
| |
| if (!matches_.is_empty() && !matches_.MatchesURL(url)) |
| return CreateAvailability(INVALID_URL, url); |
| |
| for (FilterList::const_iterator filter_iter = filters_.begin(); |
| filter_iter != filters_.end(); |
| ++filter_iter) { |
| Availability availability = |
| (*filter_iter)->IsAvailableToContext(extension, context, url, platform); |
| if (!availability.is_available()) |
| return availability; |
| } |
| |
| return CreateAvailability(IS_AVAILABLE); |
| } |
| |
| std::string SimpleFeature::GetAvailabilityMessage( |
| AvailabilityResult result, |
| Manifest::Type type, |
| const GURL& url, |
| Context context) const { |
| switch (result) { |
| case IS_AVAILABLE: |
| return std::string(); |
| case NOT_FOUND_IN_WHITELIST: |
| case FOUND_IN_BLACKLIST: |
| return base::StringPrintf( |
| "'%s' is not allowed for specified extension ID.", |
| name().c_str()); |
| case INVALID_URL: |
| return base::StringPrintf("'%s' is not allowed on %s.", |
| name().c_str(), url.spec().c_str()); |
| case INVALID_TYPE: |
| return base::StringPrintf( |
| "'%s' is only allowed for %s, but this is a %s.", |
| name().c_str(), |
| ListDisplayNames(std::vector<Manifest::Type>( |
| extension_types_.begin(), extension_types_.end())).c_str(), |
| GetDisplayName(type).c_str()); |
| case INVALID_CONTEXT: |
| return base::StringPrintf( |
| "'%s' is only allowed to run in %s, but this is a %s", |
| name().c_str(), |
| ListDisplayNames(std::vector<Context>( |
| contexts_.begin(), contexts_.end())).c_str(), |
| GetDisplayName(context).c_str()); |
| case INVALID_LOCATION: |
| return base::StringPrintf( |
| "'%s' is not allowed for specified install location.", |
| name().c_str()); |
| case INVALID_PLATFORM: |
| return base::StringPrintf( |
| "'%s' is not allowed for specified platform.", |
| name().c_str()); |
| case INVALID_MIN_MANIFEST_VERSION: |
| return base::StringPrintf( |
| "'%s' requires manifest version of at least %d.", |
| name().c_str(), |
| min_manifest_version_); |
| case INVALID_MAX_MANIFEST_VERSION: |
| return base::StringPrintf( |
| "'%s' requires manifest version of %d or lower.", |
| name().c_str(), |
| max_manifest_version_); |
| case NOT_PRESENT: |
| return base::StringPrintf( |
| "'%s' requires a different Feature that is not present.", |
| name().c_str()); |
| case UNSUPPORTED_CHANNEL: |
| return base::StringPrintf( |
| "'%s' is unsupported in this version of the platform.", |
| name().c_str()); |
| } |
| |
| NOTREACHED(); |
| return std::string(); |
| } |
| |
| Feature::Availability SimpleFeature::CreateAvailability( |
| AvailabilityResult result) const { |
| return Availability( |
| result, GetAvailabilityMessage(result, Manifest::TYPE_UNKNOWN, GURL(), |
| UNSPECIFIED_CONTEXT)); |
| } |
| |
| Feature::Availability SimpleFeature::CreateAvailability( |
| AvailabilityResult result, Manifest::Type type) const { |
| return Availability(result, GetAvailabilityMessage(result, type, GURL(), |
| UNSPECIFIED_CONTEXT)); |
| } |
| |
| Feature::Availability SimpleFeature::CreateAvailability( |
| AvailabilityResult result, |
| const GURL& url) const { |
| return Availability( |
| result, GetAvailabilityMessage(result, Manifest::TYPE_UNKNOWN, url, |
| UNSPECIFIED_CONTEXT)); |
| } |
| |
| Feature::Availability SimpleFeature::CreateAvailability( |
| AvailabilityResult result, |
| Context context) const { |
| return Availability( |
| result, GetAvailabilityMessage(result, Manifest::TYPE_UNKNOWN, GURL(), |
| context)); |
| } |
| |
| std::set<Feature::Context>* SimpleFeature::GetContexts() { |
| return &contexts_; |
| } |
| |
| bool SimpleFeature::IsInternal() const { |
| return false; |
| } |
| |
| bool SimpleFeature::IsBlockedInServiceWorker() const { return false; } |
| |
| bool SimpleFeature::IsIdInBlacklist(const std::string& extension_id) const { |
| return IsIdInList(extension_id, blacklist_); |
| } |
| |
| bool SimpleFeature::IsIdInWhitelist(const std::string& extension_id) const { |
| return IsIdInList(extension_id, whitelist_); |
| } |
| |
| // static |
| bool SimpleFeature::IsIdInList(const std::string& extension_id, |
| const std::set<std::string>& list) { |
| // Belt-and-suspenders philosophy here. We should be pretty confident by this |
| // point that we've validated the extension ID format, but in case something |
| // slips through, we avoid a class of attack where creative ID manipulation |
| // leads to hash collisions. |
| if (extension_id.length() != 32) // 128 bits / 4 = 32 mpdecimal characters |
| return false; |
| |
| if (list.find(extension_id) != list.end() || |
| list.find(HashExtensionId(extension_id)) != list.end()) { |
| return true; |
| } |
| |
| return false; |
| } |
| |
| bool SimpleFeature::MatchesManifestLocation( |
| Manifest::Location manifest_location) const { |
| switch (location_) { |
| case SimpleFeature::UNSPECIFIED_LOCATION: |
| return true; |
| case SimpleFeature::COMPONENT_LOCATION: |
| // TODO(kalman/asargent): Should this include EXTERNAL_COMPONENT too? |
| return manifest_location == Manifest::COMPONENT; |
| case SimpleFeature::POLICY_LOCATION: |
| return manifest_location == Manifest::EXTERNAL_POLICY || |
| manifest_location == Manifest::EXTERNAL_POLICY_DOWNLOAD; |
| } |
| NOTREACHED(); |
| return false; |
| } |
| |
| } // namespace extensions |