Chromium Code Reviews| OLD | NEW |
|---|---|
| (Empty) | |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "content/browser/renderer_host/pepper/pepper_flash_file_host.h" | |
| 6 | |
| 7 #include "base/bind.h" | |
| 8 #include "base/file_util.h" | |
| 9 #include "base/task_runner.h" | |
| 10 #include "base/threading/sequenced_worker_pool.h" | |
| 11 #include "content/browser/child_process_security_policy_impl.h" | |
| 12 #include "content/public/browser/browser_ppapi_host.h" | |
| 13 #include "content/public/browser/browser_thread.h" | |
| 14 #include "content/public/common/content_constants.h" | |
| 15 #include "ipc/ipc_platform_file.h" | |
| 16 #include "ppapi/c/pp_errors.h" | |
| 17 #include "ppapi/host/dispatch_host_message.h" | |
| 18 #include "ppapi/host/host_message_context.h" | |
| 19 #include "ppapi/host/ppapi_host.h" | |
| 20 #include "ppapi/proxy/ppapi_messages.h" | |
| 21 #include "ppapi/shared_impl/file_path.h" | |
| 22 #include "ppapi/shared_impl/file_type_conversion.h" | |
| 23 | |
| 24 namespace content { | |
| 25 | |
| 26 namespace { | |
| 27 // Used to check if the renderer has permission for the requested operation. | |
| 28 // TODO(viettrungluu): Verify these. They don't necessarily quite make sense, | |
| 29 // but it seems to be approximately what the file system code does. | |
| 30 const int kReadPermissions = base::PLATFORM_FILE_OPEN | | |
| 31 base::PLATFORM_FILE_READ | | |
| 32 base::PLATFORM_FILE_EXCLUSIVE_READ; | |
| 33 const int kWritePermissions = base::PLATFORM_FILE_OPEN | | |
| 34 base::PLATFORM_FILE_CREATE | | |
| 35 base::PLATFORM_FILE_CREATE_ALWAYS | | |
| 36 base::PLATFORM_FILE_OPEN_TRUNCATED | | |
| 37 base::PLATFORM_FILE_WRITE | | |
| 38 base::PLATFORM_FILE_EXCLUSIVE_WRITE | | |
| 39 base::PLATFORM_FILE_WRITE_ATTRIBUTES; | |
| 40 | |
| 41 // All file messages are handled by BrowserThread's blocking pool. | |
| 42 class FileMessageFilter : public ppapi::host::ResourceMessageFilter { | |
| 43 public: | |
| 44 FileMessageFilter(const std::string& plugin_name, | |
| 45 const FilePath& profile_data_directory, | |
|
yzshen1
2012/12/03 18:12:23
wrong indent.
raymes
2012/12/04 20:06:15
Done.
| |
| 46 int plugin_process_id, | |
| 47 base::ProcessHandle plugin_process_handle); | |
| 48 protected: | |
| 49 // ppapi::host::ResourceMessageFilter implementation. | |
| 50 virtual scoped_refptr<base::TaskRunner> OverrideTaskRunnerForMessage( | |
| 51 const IPC::Message& msg) OVERRIDE; | |
| 52 virtual int32_t OnResourceMessageReceived( | |
| 53 const IPC::Message& msg, | |
| 54 ppapi::host::HostMessageContext* context) OVERRIDE; | |
| 55 | |
| 56 private: | |
| 57 virtual ~FileMessageFilter(); | |
| 58 | |
| 59 int32_t OnOpenFile(ppapi::host::HostMessageContext* context, | |
| 60 const ppapi::PepperFilePath& path, | |
| 61 int flags); | |
| 62 int32_t OnRenameFile(ppapi::host::HostMessageContext* context, | |
| 63 const ppapi::PepperFilePath& from_path, | |
| 64 const ppapi::PepperFilePath& to_path); | |
| 65 int32_t OnDeleteFileOrDir(ppapi::host::HostMessageContext* context, | |
| 66 const ppapi::PepperFilePath& path, | |
| 67 bool recursive); | |
| 68 int32_t OnCreateDir(ppapi::host::HostMessageContext* context, | |
| 69 const ppapi::PepperFilePath& path); | |
| 70 int32_t OnQueryFile(ppapi::host::HostMessageContext* context, | |
| 71 const ppapi::PepperFilePath& path); | |
| 72 int32_t OnGetDirContents(ppapi::host::HostMessageContext* context, | |
| 73 const ppapi::PepperFilePath& path); | |
| 74 int32_t OnCreateTemporaryFile(ppapi::host::HostMessageContext* context); | |
| 75 | |
| 76 FilePath ValidateAndConvertPepperFilePath( | |
| 77 const ppapi::PepperFilePath& pepper_path, | |
| 78 int flags); | |
| 79 | |
| 80 FilePath plugin_data_directory_; | |
| 81 int plugin_process_id_; | |
| 82 base::ProcessHandle plugin_process_handle_; | |
| 83 }; | |
| 84 | |
| 85 } // namespace | |
| 86 | |
| 87 PepperFlashFileHost::PepperFlashFileHost( | |
| 88 BrowserPpapiHost* host, | |
| 89 PP_Instance instance, | |
| 90 PP_Resource resource) | |
| 91 : ResourceHost(host->GetPpapiHost(), instance, resource) { | |
| 92 AddFilter(scoped_refptr<ppapi::host::ResourceMessageFilter>( | |
| 93 new FileMessageFilter(host->GetPluginName(), | |
| 94 host->GetProfileDataDirectory(), | |
| 95 host->GetPluginProcessID(), | |
| 96 host->GetPluginProcessHandle()))); | |
| 97 } | |
| 98 | |
| 99 PepperFlashFileHost::~PepperFlashFileHost() { | |
| 100 } | |
| 101 | |
| 102 // static | |
| 103 FilePath PepperFlashFileHost::GetDataDirName(const FilePath& profile_path) { | |
| 104 return profile_path.Append(kPepperDataDirname); | |
| 105 } | |
| 106 | |
| 107 FileMessageFilter::FileMessageFilter( | |
|
yzshen1
2012/12/03 18:12:23
It looks weird to have the implementation outside
raymes
2012/12/04 20:06:15
Done.
| |
| 108 const std::string& plugin_name, | |
| 109 const FilePath& profile_data_directory, | |
| 110 int plugin_process_id, | |
| 111 base::ProcessHandle plugin_process_handle) | |
| 112 : plugin_process_id_(plugin_process_id), | |
| 113 plugin_process_handle_(plugin_process_handle) { | |
| 114 if (profile_data_directory.empty() || plugin_name.empty()) { | |
| 115 // These are used to construct the path. If they are not set it means we | |
| 116 // will construct a bad path and could provide access to the wrong files. | |
| 117 // In this case, |plugin_data_directory_| will remain unset and | |
| 118 // |ValidateAndConvertPepperFilePath| will fail. | |
| 119 NOTREACHED(); | |
| 120 } else { | |
| 121 plugin_data_directory_ = PepperFlashFileHost::GetDataDirName( | |
| 122 profile_data_directory).Append(FilePath::FromUTF8Unsafe(plugin_name)); | |
| 123 } | |
| 124 } | |
| 125 | |
| 126 FileMessageFilter::~FileMessageFilter() { | |
| 127 } | |
| 128 | |
| 129 scoped_refptr<base::TaskRunner> | |
| 130 FileMessageFilter::OverrideTaskRunnerForMessage(const IPC::Message& msg) { | |
| 131 // The blocking pool provides a pool of threads to run file | |
| 132 // operations, instead of a single thread which might require | |
| 133 // queuing time. Since these messages are synchronous as sent from | |
| 134 // the plugin, the sending thread cannot send a new message until | |
| 135 // this one returns, so there is no need to sequence tasks here. If | |
| 136 // the plugin has multiple threads, it cannot make assumptions about | |
| 137 // ordering of IPC message sends, so it cannot make assumptions | |
| 138 // about ordering of operations caused by those IPC messages. | |
| 139 return scoped_refptr<base::TaskRunner>(BrowserThread::GetBlockingPool()); | |
| 140 } | |
| 141 | |
| 142 int32_t FileMessageFilter::OnResourceMessageReceived( | |
| 143 const IPC::Message& msg, | |
| 144 ppapi::host::HostMessageContext* context) { | |
| 145 IPC_BEGIN_MESSAGE_MAP(FileMessageFilter, msg) | |
| 146 PPAPI_DISPATCH_HOST_RESOURCE_CALL(PpapiHostMsg_FlashFile_OpenFile, | |
| 147 OnOpenFile) | |
| 148 PPAPI_DISPATCH_HOST_RESOURCE_CALL(PpapiHostMsg_FlashFile_RenameFile, | |
| 149 OnRenameFile) | |
| 150 PPAPI_DISPATCH_HOST_RESOURCE_CALL(PpapiHostMsg_FlashFile_DeleteFileOrDir, | |
| 151 OnDeleteFileOrDir) | |
| 152 PPAPI_DISPATCH_HOST_RESOURCE_CALL(PpapiHostMsg_FlashFile_CreateDir, | |
| 153 OnCreateDir) | |
| 154 PPAPI_DISPATCH_HOST_RESOURCE_CALL(PpapiHostMsg_FlashFile_QueryFile, | |
| 155 OnQueryFile) | |
| 156 PPAPI_DISPATCH_HOST_RESOURCE_CALL(PpapiHostMsg_FlashFile_GetDirContents, | |
| 157 OnGetDirContents) | |
| 158 PPAPI_DISPATCH_HOST_RESOURCE_CALL_0( | |
| 159 PpapiHostMsg_FlashFile_CreateTemporaryFile, | |
| 160 OnCreateTemporaryFile) | |
| 161 IPC_END_MESSAGE_MAP() | |
| 162 return PP_ERROR_FAILED; | |
| 163 } | |
| 164 | |
| 165 int32_t FileMessageFilter::OnOpenFile( | |
| 166 ppapi::host::HostMessageContext* context, | |
| 167 const ppapi::PepperFilePath& path, | |
| 168 int flags) { | |
| 169 FilePath full_path = ValidateAndConvertPepperFilePath(path, flags); | |
| 170 if (full_path.empty()) { | |
| 171 return ppapi::PlatformFileErrorToPepperError( | |
| 172 base::PLATFORM_FILE_ERROR_ACCESS_DENIED); | |
| 173 } | |
| 174 | |
| 175 base::PlatformFileError error = base::PLATFORM_FILE_ERROR_FAILED; | |
| 176 base::PlatformFile file_handle = base::CreatePlatformFile( | |
| 177 full_path, flags, NULL, &error); | |
| 178 if (error != base::PLATFORM_FILE_OK) { | |
| 179 DCHECK_EQ(file_handle, base::kInvalidPlatformFileValue); | |
| 180 return ppapi::PlatformFileErrorToPepperError(error); | |
| 181 } | |
| 182 | |
| 183 // Make sure we didn't try to open a directory: directory fd shouldn't be | |
| 184 // passed to untrusted processes because they open security holes. | |
| 185 base::PlatformFileInfo info; | |
| 186 if (!base::GetPlatformFileInfo(file_handle, &info) || info.is_directory) { | |
| 187 // When in doubt, throw it out. | |
| 188 base::ClosePlatformFile(file_handle); | |
| 189 return ppapi::PlatformFileErrorToPepperError( | |
| 190 base::PLATFORM_FILE_ERROR_ACCESS_DENIED); | |
| 191 } | |
| 192 | |
| 193 IPC::PlatformFileForTransit file = IPC::GetFileHandleForProcess(file_handle, | |
| 194 plugin_process_handle_, true); | |
| 195 ppapi::host::ReplyMessageContext reply_context = | |
| 196 context->MakeReplyMessageContext(); | |
| 197 reply_context.params.AppendHandle(ppapi::proxy::SerializedHandle( | |
| 198 ppapi::proxy::SerializedHandle::FILE, file)); | |
| 199 SendReply(reply_context, IPC::Message()); | |
| 200 return PP_OK_COMPLETIONPENDING; | |
| 201 } | |
| 202 | |
| 203 int32_t FileMessageFilter::OnRenameFile( | |
| 204 ppapi::host::HostMessageContext* context, | |
| 205 const ppapi::PepperFilePath& from_path, | |
| 206 const ppapi::PepperFilePath& to_path) { | |
| 207 FilePath from_full_path = ValidateAndConvertPepperFilePath(from_path, | |
| 208 kWritePermissions); | |
| 209 FilePath to_full_path = ValidateAndConvertPepperFilePath(to_path, | |
| 210 kWritePermissions); | |
| 211 if (from_full_path.empty() || to_full_path.empty()) { | |
| 212 return ppapi::PlatformFileErrorToPepperError( | |
| 213 base::PLATFORM_FILE_ERROR_ACCESS_DENIED); | |
| 214 } | |
| 215 | |
| 216 bool result = file_util::Move(from_full_path, to_full_path); | |
| 217 return ppapi::PlatformFileErrorToPepperError(result ? | |
| 218 base::PLATFORM_FILE_OK : base::PLATFORM_FILE_ERROR_ACCESS_DENIED); | |
| 219 } | |
| 220 | |
| 221 int32_t FileMessageFilter::OnDeleteFileOrDir( | |
| 222 ppapi::host::HostMessageContext* context, | |
| 223 const ppapi::PepperFilePath& path, | |
| 224 bool recursive) { | |
| 225 FilePath full_path = ValidateAndConvertPepperFilePath(path, | |
| 226 kWritePermissions); | |
| 227 if (full_path.empty()) { | |
| 228 return ppapi::PlatformFileErrorToPepperError( | |
| 229 base::PLATFORM_FILE_ERROR_ACCESS_DENIED); | |
| 230 } | |
| 231 | |
| 232 bool result = file_util::Delete(full_path, recursive); | |
| 233 return ppapi::PlatformFileErrorToPepperError(result ? | |
| 234 base::PLATFORM_FILE_OK : base::PLATFORM_FILE_ERROR_ACCESS_DENIED); | |
| 235 } | |
| 236 int32_t FileMessageFilter::OnCreateDir( | |
| 237 ppapi::host::HostMessageContext* context, | |
| 238 const ppapi::PepperFilePath& path) { | |
| 239 FilePath full_path = ValidateAndConvertPepperFilePath(path, | |
| 240 kWritePermissions); | |
| 241 if (full_path.empty()) { | |
| 242 return ppapi::PlatformFileErrorToPepperError( | |
| 243 base::PLATFORM_FILE_ERROR_ACCESS_DENIED); | |
| 244 } | |
| 245 | |
| 246 bool result = file_util::CreateDirectory(full_path); | |
| 247 return ppapi::PlatformFileErrorToPepperError(result ? | |
| 248 base::PLATFORM_FILE_OK : base::PLATFORM_FILE_ERROR_ACCESS_DENIED); | |
| 249 } | |
| 250 | |
| 251 int32_t FileMessageFilter::OnQueryFile( | |
| 252 ppapi::host::HostMessageContext* context, | |
| 253 const ppapi::PepperFilePath& path) { | |
| 254 FilePath full_path = ValidateAndConvertPepperFilePath(path, | |
| 255 kReadPermissions); | |
| 256 if (full_path.empty()) { | |
| 257 return ppapi::PlatformFileErrorToPepperError( | |
| 258 base::PLATFORM_FILE_ERROR_ACCESS_DENIED); | |
| 259 } | |
| 260 | |
| 261 base::PlatformFileInfo info; | |
| 262 bool result = file_util::GetFileInfo(full_path, &info); | |
| 263 context->reply_msg = PpapiPluginMsg_FlashFile_QueryFileReply(info); | |
| 264 return ppapi::PlatformFileErrorToPepperError(result ? | |
| 265 base::PLATFORM_FILE_OK : base::PLATFORM_FILE_ERROR_ACCESS_DENIED); | |
| 266 } | |
| 267 | |
| 268 int32_t FileMessageFilter::OnGetDirContents( | |
| 269 ppapi::host::HostMessageContext* context, | |
| 270 const ppapi::PepperFilePath& path) { | |
| 271 FilePath full_path = ValidateAndConvertPepperFilePath(path, kReadPermissions); | |
| 272 if (full_path.empty()) { | |
| 273 return ppapi::PlatformFileErrorToPepperError( | |
| 274 base::PLATFORM_FILE_ERROR_ACCESS_DENIED); | |
| 275 } | |
| 276 | |
| 277 ppapi::DirContents contents; | |
| 278 file_util::FileEnumerator enumerator(full_path, false, | |
| 279 file_util::FileEnumerator::FILES | | |
| 280 file_util::FileEnumerator::DIRECTORIES | | |
| 281 file_util::FileEnumerator::INCLUDE_DOT_DOT); | |
| 282 | |
| 283 while (!enumerator.Next().empty()) { | |
| 284 file_util::FileEnumerator::FindInfo info; | |
| 285 enumerator.GetFindInfo(&info); | |
| 286 ppapi::DirEntry entry = { | |
| 287 file_util::FileEnumerator::GetFilename(info), | |
| 288 file_util::FileEnumerator::IsDirectory(info) | |
| 289 }; | |
| 290 contents.push_back(entry); | |
| 291 } | |
| 292 | |
| 293 context->reply_msg = PpapiPluginMsg_FlashFile_GetDirContentsReply(contents); | |
| 294 return PP_OK; | |
| 295 } | |
| 296 | |
| 297 int32_t FileMessageFilter::OnCreateTemporaryFile( | |
| 298 ppapi::host::HostMessageContext* context) { | |
| 299 ppapi::PepperFilePath dir_path( | |
| 300 ppapi::PepperFilePath::DOMAIN_MODULE_LOCAL, FilePath()); | |
| 301 FilePath validated_dir_path = ValidateAndConvertPepperFilePath( | |
| 302 dir_path, kReadPermissions | kWritePermissions); | |
| 303 if (validated_dir_path.empty() || | |
| 304 (!file_util::DirectoryExists(validated_dir_path) && | |
| 305 !file_util::CreateDirectory(validated_dir_path))) { | |
| 306 return ppapi::PlatformFileErrorToPepperError( | |
| 307 base::PLATFORM_FILE_ERROR_ACCESS_DENIED); | |
| 308 } | |
| 309 | |
| 310 FilePath file_path; | |
| 311 if (!file_util::CreateTemporaryFileInDir(validated_dir_path, &file_path)) { | |
| 312 return ppapi::PlatformFileErrorToPepperError( | |
| 313 base::PLATFORM_FILE_ERROR_FAILED); | |
| 314 } | |
| 315 | |
| 316 base::PlatformFileError error = base::PLATFORM_FILE_ERROR_FAILED; | |
| 317 base::PlatformFile file_handle = base::CreatePlatformFile( | |
| 318 file_path, | |
| 319 base::PLATFORM_FILE_CREATE_ALWAYS | base::PLATFORM_FILE_READ | | |
| 320 base::PLATFORM_FILE_WRITE | base::PLATFORM_FILE_TEMPORARY | | |
| 321 base::PLATFORM_FILE_DELETE_ON_CLOSE, | |
| 322 NULL, &error); | |
| 323 | |
| 324 if (error != base::PLATFORM_FILE_OK) { | |
| 325 DCHECK_EQ(file_handle, base::kInvalidPlatformFileValue); | |
| 326 return ppapi::PlatformFileErrorToPepperError(error); | |
| 327 } | |
| 328 | |
| 329 IPC::PlatformFileForTransit file = IPC::GetFileHandleForProcess(file_handle, | |
| 330 plugin_process_handle_, true); | |
| 331 ppapi::host::ReplyMessageContext reply_context = | |
| 332 context->MakeReplyMessageContext(); | |
| 333 reply_context.params.AppendHandle(ppapi::proxy::SerializedHandle( | |
| 334 ppapi::proxy::SerializedHandle::FILE, file)); | |
| 335 SendReply(reply_context, IPC::Message()); | |
| 336 return PP_OK_COMPLETIONPENDING; | |
| 337 } | |
| 338 | |
| 339 FilePath FileMessageFilter::ValidateAndConvertPepperFilePath( | |
| 340 const ppapi::PepperFilePath& pepper_path, | |
| 341 int flags) { | |
| 342 FilePath file_path; // Empty path returned on error. | |
| 343 switch (pepper_path.domain()) { | |
| 344 case ppapi::PepperFilePath::DOMAIN_ABSOLUTE: | |
| 345 if (pepper_path.path().IsAbsolute() && | |
| 346 ChildProcessSecurityPolicyImpl::GetInstance()->HasPermissionsForFile( | |
| 347 plugin_process_id_, pepper_path.path(), flags)) | |
| 348 file_path = pepper_path.path(); | |
| 349 break; | |
| 350 case ppapi::PepperFilePath::DOMAIN_MODULE_LOCAL: | |
| 351 // This filter provides the module name portion of the path to prevent | |
| 352 // plugins from accessing each other's data. | |
| 353 if (!plugin_data_directory_.empty() && | |
| 354 !pepper_path.path().IsAbsolute() && | |
| 355 !pepper_path.path().ReferencesParent()) | |
| 356 file_path = plugin_data_directory_.Append(pepper_path.path()); | |
| 357 break; | |
| 358 default: | |
| 359 NOTREACHED(); | |
| 360 break; | |
| 361 } | |
| 362 return file_path; | |
| 363 } | |
| 364 | |
| 365 } // namespace content | |
| OLD | NEW |