OLD | NEW |
(Empty) | |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. |
| 4 |
| 5 #include "content/browser/renderer_host/pepper/pepper_flash_file_host.h" |
| 6 |
| 7 #include "base/bind.h" |
| 8 #include "base/file_util.h" |
| 9 #include "base/task_runner.h" |
| 10 #include "base/threading/sequenced_worker_pool.h" |
| 11 #include "content/browser/child_process_security_policy_impl.h" |
| 12 #include "content/public/browser/browser_ppapi_host.h" |
| 13 #include "content/public/browser/browser_thread.h" |
| 14 #include "content/public/common/content_constants.h" |
| 15 #include "ipc/ipc_platform_file.h" |
| 16 #include "ppapi/c/pp_errors.h" |
| 17 #include "ppapi/host/dispatch_host_message.h" |
| 18 #include "ppapi/host/host_message_context.h" |
| 19 #include "ppapi/host/ppapi_host.h" |
| 20 #include "ppapi/proxy/ppapi_messages.h" |
| 21 #include "ppapi/shared_impl/file_path.h" |
| 22 #include "ppapi/shared_impl/file_type_conversion.h" |
| 23 |
| 24 namespace content { |
| 25 |
| 26 namespace { |
| 27 // Used to check if the renderer has permission for the requested operation. |
| 28 // TODO(viettrungluu): Verify these. They don't necessarily quite make sense, |
| 29 // but it seems to be approximately what the file system code does. |
| 30 const int kReadPermissions = base::PLATFORM_FILE_OPEN | |
| 31 base::PLATFORM_FILE_READ | |
| 32 base::PLATFORM_FILE_EXCLUSIVE_READ; |
| 33 const int kWritePermissions = base::PLATFORM_FILE_OPEN | |
| 34 base::PLATFORM_FILE_CREATE | |
| 35 base::PLATFORM_FILE_CREATE_ALWAYS | |
| 36 base::PLATFORM_FILE_OPEN_TRUNCATED | |
| 37 base::PLATFORM_FILE_WRITE | |
| 38 base::PLATFORM_FILE_EXCLUSIVE_WRITE | |
| 39 base::PLATFORM_FILE_WRITE_ATTRIBUTES; |
| 40 |
| 41 // All file messages are handled by BrowserThread's blocking pool. |
| 42 class FileMessageFilter : public ppapi::host::ResourceMessageFilter { |
| 43 public: |
| 44 FileMessageFilter(const std::string& plugin_name, |
| 45 const FilePath& profile_data_directory, |
| 46 int render_process_id, |
| 47 base::ProcessHandle plugin_process_handle); |
| 48 protected: |
| 49 // ppapi::host::ResourceMessageFilter implementation. |
| 50 virtual scoped_refptr<base::TaskRunner> OverrideTaskRunnerForMessage( |
| 51 const IPC::Message& msg) OVERRIDE; |
| 52 virtual int32_t OnResourceMessageReceived( |
| 53 const IPC::Message& msg, |
| 54 ppapi::host::HostMessageContext* context) OVERRIDE; |
| 55 |
| 56 private: |
| 57 virtual ~FileMessageFilter(); |
| 58 |
| 59 int32_t OnOpenFile(ppapi::host::HostMessageContext* context, |
| 60 const ppapi::PepperFilePath& path, |
| 61 int flags); |
| 62 int32_t OnRenameFile(ppapi::host::HostMessageContext* context, |
| 63 const ppapi::PepperFilePath& from_path, |
| 64 const ppapi::PepperFilePath& to_path); |
| 65 int32_t OnDeleteFileOrDir(ppapi::host::HostMessageContext* context, |
| 66 const ppapi::PepperFilePath& path, |
| 67 bool recursive); |
| 68 int32_t OnCreateDir(ppapi::host::HostMessageContext* context, |
| 69 const ppapi::PepperFilePath& path); |
| 70 int32_t OnQueryFile(ppapi::host::HostMessageContext* context, |
| 71 const ppapi::PepperFilePath& path); |
| 72 int32_t OnGetDirContents(ppapi::host::HostMessageContext* context, |
| 73 const ppapi::PepperFilePath& path); |
| 74 int32_t OnCreateTemporaryFile(ppapi::host::HostMessageContext* context); |
| 75 |
| 76 FilePath ValidateAndConvertPepperFilePath( |
| 77 const ppapi::PepperFilePath& pepper_path, |
| 78 int flags); |
| 79 |
| 80 FilePath plugin_data_directory_; |
| 81 int render_process_id_; |
| 82 base::ProcessHandle plugin_process_handle_; |
| 83 }; |
| 84 |
| 85 FileMessageFilter::FileMessageFilter( |
| 86 const std::string& plugin_name, |
| 87 const FilePath& profile_data_directory, |
| 88 int render_process_id, |
| 89 base::ProcessHandle plugin_process_handle) |
| 90 : render_process_id_(render_process_id), |
| 91 plugin_process_handle_(plugin_process_handle) { |
| 92 if (profile_data_directory.empty() || plugin_name.empty()) { |
| 93 // These are used to construct the path. If they are not set it means we |
| 94 // will construct a bad path and could provide access to the wrong files. |
| 95 // In this case, |plugin_data_directory_| will remain unset and |
| 96 // |ValidateAndConvertPepperFilePath| will fail. |
| 97 NOTREACHED(); |
| 98 } else { |
| 99 plugin_data_directory_ = PepperFlashFileHost::GetDataDirName( |
| 100 profile_data_directory).Append(FilePath::FromUTF8Unsafe(plugin_name)); |
| 101 } |
| 102 } |
| 103 |
| 104 FileMessageFilter::~FileMessageFilter() { |
| 105 } |
| 106 |
| 107 scoped_refptr<base::TaskRunner> |
| 108 FileMessageFilter::OverrideTaskRunnerForMessage(const IPC::Message& msg) { |
| 109 // The blocking pool provides a pool of threads to run file |
| 110 // operations, instead of a single thread which might require |
| 111 // queuing time. Since these messages are synchronous as sent from |
| 112 // the plugin, the sending thread cannot send a new message until |
| 113 // this one returns, so there is no need to sequence tasks here. If |
| 114 // the plugin has multiple threads, it cannot make assumptions about |
| 115 // ordering of IPC message sends, so it cannot make assumptions |
| 116 // about ordering of operations caused by those IPC messages. |
| 117 return scoped_refptr<base::TaskRunner>(BrowserThread::GetBlockingPool()); |
| 118 } |
| 119 |
| 120 int32_t FileMessageFilter::OnResourceMessageReceived( |
| 121 const IPC::Message& msg, |
| 122 ppapi::host::HostMessageContext* context) { |
| 123 IPC_BEGIN_MESSAGE_MAP(FileMessageFilter, msg) |
| 124 PPAPI_DISPATCH_HOST_RESOURCE_CALL(PpapiHostMsg_FlashFile_OpenFile, |
| 125 OnOpenFile) |
| 126 PPAPI_DISPATCH_HOST_RESOURCE_CALL(PpapiHostMsg_FlashFile_RenameFile, |
| 127 OnRenameFile) |
| 128 PPAPI_DISPATCH_HOST_RESOURCE_CALL(PpapiHostMsg_FlashFile_DeleteFileOrDir, |
| 129 OnDeleteFileOrDir) |
| 130 PPAPI_DISPATCH_HOST_RESOURCE_CALL(PpapiHostMsg_FlashFile_CreateDir, |
| 131 OnCreateDir) |
| 132 PPAPI_DISPATCH_HOST_RESOURCE_CALL(PpapiHostMsg_FlashFile_QueryFile, |
| 133 OnQueryFile) |
| 134 PPAPI_DISPATCH_HOST_RESOURCE_CALL(PpapiHostMsg_FlashFile_GetDirContents, |
| 135 OnGetDirContents) |
| 136 PPAPI_DISPATCH_HOST_RESOURCE_CALL_0( |
| 137 PpapiHostMsg_FlashFile_CreateTemporaryFile, |
| 138 OnCreateTemporaryFile) |
| 139 IPC_END_MESSAGE_MAP() |
| 140 return PP_ERROR_FAILED; |
| 141 } |
| 142 |
| 143 int32_t FileMessageFilter::OnOpenFile( |
| 144 ppapi::host::HostMessageContext* context, |
| 145 const ppapi::PepperFilePath& path, |
| 146 int flags) { |
| 147 FilePath full_path = ValidateAndConvertPepperFilePath(path, flags); |
| 148 if (full_path.empty()) { |
| 149 return ppapi::PlatformFileErrorToPepperError( |
| 150 base::PLATFORM_FILE_ERROR_ACCESS_DENIED); |
| 151 } |
| 152 |
| 153 base::PlatformFileError error = base::PLATFORM_FILE_ERROR_FAILED; |
| 154 base::PlatformFile file_handle = base::CreatePlatformFile( |
| 155 full_path, flags, NULL, &error); |
| 156 if (error != base::PLATFORM_FILE_OK) { |
| 157 DCHECK_EQ(file_handle, base::kInvalidPlatformFileValue); |
| 158 return ppapi::PlatformFileErrorToPepperError(error); |
| 159 } |
| 160 |
| 161 // Make sure we didn't try to open a directory: directory fd shouldn't be |
| 162 // passed to untrusted processes because they open security holes. |
| 163 base::PlatformFileInfo info; |
| 164 if (!base::GetPlatformFileInfo(file_handle, &info) || info.is_directory) { |
| 165 // When in doubt, throw it out. |
| 166 base::ClosePlatformFile(file_handle); |
| 167 return ppapi::PlatformFileErrorToPepperError( |
| 168 base::PLATFORM_FILE_ERROR_ACCESS_DENIED); |
| 169 } |
| 170 |
| 171 IPC::PlatformFileForTransit file = IPC::GetFileHandleForProcess(file_handle, |
| 172 plugin_process_handle_, true); |
| 173 ppapi::host::ReplyMessageContext reply_context = |
| 174 context->MakeReplyMessageContext(); |
| 175 reply_context.params.AppendHandle(ppapi::proxy::SerializedHandle( |
| 176 ppapi::proxy::SerializedHandle::FILE, file)); |
| 177 SendReply(reply_context, IPC::Message()); |
| 178 return PP_OK_COMPLETIONPENDING; |
| 179 } |
| 180 |
| 181 int32_t FileMessageFilter::OnRenameFile( |
| 182 ppapi::host::HostMessageContext* context, |
| 183 const ppapi::PepperFilePath& from_path, |
| 184 const ppapi::PepperFilePath& to_path) { |
| 185 FilePath from_full_path = ValidateAndConvertPepperFilePath(from_path, |
| 186 kWritePermissions); |
| 187 FilePath to_full_path = ValidateAndConvertPepperFilePath(to_path, |
| 188 kWritePermissions); |
| 189 if (from_full_path.empty() || to_full_path.empty()) { |
| 190 return ppapi::PlatformFileErrorToPepperError( |
| 191 base::PLATFORM_FILE_ERROR_ACCESS_DENIED); |
| 192 } |
| 193 |
| 194 bool result = file_util::Move(from_full_path, to_full_path); |
| 195 return ppapi::PlatformFileErrorToPepperError(result ? |
| 196 base::PLATFORM_FILE_OK : base::PLATFORM_FILE_ERROR_ACCESS_DENIED); |
| 197 } |
| 198 |
| 199 int32_t FileMessageFilter::OnDeleteFileOrDir( |
| 200 ppapi::host::HostMessageContext* context, |
| 201 const ppapi::PepperFilePath& path, |
| 202 bool recursive) { |
| 203 FilePath full_path = ValidateAndConvertPepperFilePath(path, |
| 204 kWritePermissions); |
| 205 if (full_path.empty()) { |
| 206 return ppapi::PlatformFileErrorToPepperError( |
| 207 base::PLATFORM_FILE_ERROR_ACCESS_DENIED); |
| 208 } |
| 209 |
| 210 bool result = file_util::Delete(full_path, recursive); |
| 211 return ppapi::PlatformFileErrorToPepperError(result ? |
| 212 base::PLATFORM_FILE_OK : base::PLATFORM_FILE_ERROR_ACCESS_DENIED); |
| 213 } |
| 214 int32_t FileMessageFilter::OnCreateDir( |
| 215 ppapi::host::HostMessageContext* context, |
| 216 const ppapi::PepperFilePath& path) { |
| 217 FilePath full_path = ValidateAndConvertPepperFilePath(path, |
| 218 kWritePermissions); |
| 219 if (full_path.empty()) { |
| 220 return ppapi::PlatformFileErrorToPepperError( |
| 221 base::PLATFORM_FILE_ERROR_ACCESS_DENIED); |
| 222 } |
| 223 |
| 224 bool result = file_util::CreateDirectory(full_path); |
| 225 return ppapi::PlatformFileErrorToPepperError(result ? |
| 226 base::PLATFORM_FILE_OK : base::PLATFORM_FILE_ERROR_ACCESS_DENIED); |
| 227 } |
| 228 |
| 229 int32_t FileMessageFilter::OnQueryFile( |
| 230 ppapi::host::HostMessageContext* context, |
| 231 const ppapi::PepperFilePath& path) { |
| 232 FilePath full_path = ValidateAndConvertPepperFilePath(path, |
| 233 kReadPermissions); |
| 234 if (full_path.empty()) { |
| 235 return ppapi::PlatformFileErrorToPepperError( |
| 236 base::PLATFORM_FILE_ERROR_ACCESS_DENIED); |
| 237 } |
| 238 |
| 239 base::PlatformFileInfo info; |
| 240 bool result = file_util::GetFileInfo(full_path, &info); |
| 241 context->reply_msg = PpapiPluginMsg_FlashFile_QueryFileReply(info); |
| 242 return ppapi::PlatformFileErrorToPepperError(result ? |
| 243 base::PLATFORM_FILE_OK : base::PLATFORM_FILE_ERROR_ACCESS_DENIED); |
| 244 } |
| 245 |
| 246 int32_t FileMessageFilter::OnGetDirContents( |
| 247 ppapi::host::HostMessageContext* context, |
| 248 const ppapi::PepperFilePath& path) { |
| 249 FilePath full_path = ValidateAndConvertPepperFilePath(path, kReadPermissions); |
| 250 if (full_path.empty()) { |
| 251 return ppapi::PlatformFileErrorToPepperError( |
| 252 base::PLATFORM_FILE_ERROR_ACCESS_DENIED); |
| 253 } |
| 254 |
| 255 ppapi::DirContents contents; |
| 256 file_util::FileEnumerator enumerator(full_path, false, |
| 257 file_util::FileEnumerator::FILES | |
| 258 file_util::FileEnumerator::DIRECTORIES | |
| 259 file_util::FileEnumerator::INCLUDE_DOT_DOT); |
| 260 |
| 261 while (!enumerator.Next().empty()) { |
| 262 file_util::FileEnumerator::FindInfo info; |
| 263 enumerator.GetFindInfo(&info); |
| 264 ppapi::DirEntry entry = { |
| 265 file_util::FileEnumerator::GetFilename(info), |
| 266 file_util::FileEnumerator::IsDirectory(info) |
| 267 }; |
| 268 contents.push_back(entry); |
| 269 } |
| 270 |
| 271 context->reply_msg = PpapiPluginMsg_FlashFile_GetDirContentsReply(contents); |
| 272 return PP_OK; |
| 273 } |
| 274 |
| 275 int32_t FileMessageFilter::OnCreateTemporaryFile( |
| 276 ppapi::host::HostMessageContext* context) { |
| 277 ppapi::PepperFilePath dir_path( |
| 278 ppapi::PepperFilePath::DOMAIN_MODULE_LOCAL, FilePath()); |
| 279 FilePath validated_dir_path = ValidateAndConvertPepperFilePath( |
| 280 dir_path, kReadPermissions | kWritePermissions); |
| 281 if (validated_dir_path.empty() || |
| 282 (!file_util::DirectoryExists(validated_dir_path) && |
| 283 !file_util::CreateDirectory(validated_dir_path))) { |
| 284 return ppapi::PlatformFileErrorToPepperError( |
| 285 base::PLATFORM_FILE_ERROR_ACCESS_DENIED); |
| 286 } |
| 287 |
| 288 FilePath file_path; |
| 289 if (!file_util::CreateTemporaryFileInDir(validated_dir_path, &file_path)) { |
| 290 return ppapi::PlatformFileErrorToPepperError( |
| 291 base::PLATFORM_FILE_ERROR_FAILED); |
| 292 } |
| 293 |
| 294 base::PlatformFileError error = base::PLATFORM_FILE_ERROR_FAILED; |
| 295 base::PlatformFile file_handle = base::CreatePlatformFile( |
| 296 file_path, |
| 297 base::PLATFORM_FILE_CREATE_ALWAYS | base::PLATFORM_FILE_READ | |
| 298 base::PLATFORM_FILE_WRITE | base::PLATFORM_FILE_TEMPORARY | |
| 299 base::PLATFORM_FILE_DELETE_ON_CLOSE, |
| 300 NULL, &error); |
| 301 |
| 302 if (error != base::PLATFORM_FILE_OK) { |
| 303 DCHECK_EQ(file_handle, base::kInvalidPlatformFileValue); |
| 304 return ppapi::PlatformFileErrorToPepperError(error); |
| 305 } |
| 306 |
| 307 IPC::PlatformFileForTransit file = IPC::GetFileHandleForProcess(file_handle, |
| 308 plugin_process_handle_, true); |
| 309 ppapi::host::ReplyMessageContext reply_context = |
| 310 context->MakeReplyMessageContext(); |
| 311 reply_context.params.AppendHandle(ppapi::proxy::SerializedHandle( |
| 312 ppapi::proxy::SerializedHandle::FILE, file)); |
| 313 SendReply(reply_context, IPC::Message()); |
| 314 return PP_OK_COMPLETIONPENDING; |
| 315 } |
| 316 |
| 317 FilePath FileMessageFilter::ValidateAndConvertPepperFilePath( |
| 318 const ppapi::PepperFilePath& pepper_path, |
| 319 int flags) { |
| 320 FilePath file_path; // Empty path returned on error. |
| 321 switch (pepper_path.domain()) { |
| 322 case ppapi::PepperFilePath::DOMAIN_ABSOLUTE: |
| 323 if (pepper_path.path().IsAbsolute() && |
| 324 ChildProcessSecurityPolicyImpl::GetInstance()->HasPermissionsForFile( |
| 325 render_process_id_, pepper_path.path(), flags)) |
| 326 file_path = pepper_path.path(); |
| 327 break; |
| 328 case ppapi::PepperFilePath::DOMAIN_MODULE_LOCAL: |
| 329 // This filter provides the module name portion of the path to prevent |
| 330 // plugins from accessing each other's data. |
| 331 if (!plugin_data_directory_.empty() && |
| 332 !pepper_path.path().IsAbsolute() && |
| 333 !pepper_path.path().ReferencesParent()) |
| 334 file_path = plugin_data_directory_.Append(pepper_path.path()); |
| 335 break; |
| 336 default: |
| 337 NOTREACHED(); |
| 338 break; |
| 339 } |
| 340 return file_path; |
| 341 } |
| 342 |
| 343 } // namespace |
| 344 |
| 345 PepperFlashFileHost::PepperFlashFileHost( |
| 346 BrowserPpapiHost* host, |
| 347 PP_Instance instance, |
| 348 PP_Resource resource) |
| 349 : ResourceHost(host->GetPpapiHost(), instance, resource) { |
| 350 int render_process_id, unused; |
| 351 host->GetRenderViewIDsForInstance(instance, &render_process_id, &unused); |
| 352 AddFilter(scoped_refptr<ppapi::host::ResourceMessageFilter>( |
| 353 new FileMessageFilter(host->GetPluginName(), |
| 354 host->GetProfileDataDirectory(), |
| 355 render_process_id, |
| 356 host->GetPluginProcessHandle()))); |
| 357 } |
| 358 |
| 359 PepperFlashFileHost::~PepperFlashFileHost() { |
| 360 } |
| 361 |
| 362 // static |
| 363 FilePath PepperFlashFileHost::GetDataDirName(const FilePath& profile_path) { |
| 364 return profile_path.Append(kPepperDataDirname); |
| 365 } |
| 366 |
| 367 } // namespace content |
OLD | NEW |