OLD | NEW |
---|---|
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/extensions/extension_protocols.h" | 5 #include "extensions/browser/extension_protocols.h" |
6 | 6 |
7 #include <algorithm> | 7 #include <algorithm> |
8 | 8 |
9 #include "base/base64.h" | 9 #include "base/base64.h" |
10 #include "base/compiler_specific.h" | 10 #include "base/compiler_specific.h" |
11 #include "base/file_util.h" | 11 #include "base/file_util.h" |
12 #include "base/files/file_path.h" | 12 #include "base/files/file_path.h" |
13 #include "base/format_macros.h" | 13 #include "base/format_macros.h" |
14 #include "base/logging.h" | 14 #include "base/logging.h" |
15 #include "base/memory/weak_ptr.h" | 15 #include "base/memory/weak_ptr.h" |
16 #include "base/message_loop/message_loop.h" | 16 #include "base/message_loop/message_loop.h" |
17 #include "base/metrics/histogram.h" | 17 #include "base/metrics/histogram.h" |
18 #include "base/path_service.h" | 18 #include "base/path_service.h" |
19 #include "base/sha1.h" | 19 #include "base/sha1.h" |
20 #include "base/strings/string_number_conversions.h" | |
21 #include "base/strings/string_util.h" | |
22 #include "base/strings/stringprintf.h" | 20 #include "base/strings/stringprintf.h" |
23 #include "base/strings/utf_string_conversions.h" | 21 #include "base/strings/utf_string_conversions.h" |
24 #include "base/threading/sequenced_worker_pool.h" | 22 #include "base/threading/sequenced_worker_pool.h" |
25 #include "base/threading/thread_restrictions.h" | 23 #include "base/threading/thread_restrictions.h" |
26 #include "base/timer/elapsed_timer.h" | 24 #include "base/timer/elapsed_timer.h" |
27 #include "build/build_config.h" | 25 #include "build/build_config.h" |
28 #include "chrome/browser/extensions/extension_renderer_state.h" | |
29 #include "chrome/browser/extensions/image_loader.h" | |
30 #include "chrome/common/chrome_paths.h" | |
31 #include "chrome/common/extensions/manifest_url_handler.h" | |
32 #include "chrome/common/url_constants.h" | |
33 #include "content/public/browser/browser_thread.h" | 26 #include "content/public/browser/browser_thread.h" |
34 #include "content/public/browser/resource_request_info.h" | 27 #include "content/public/browser/resource_request_info.h" |
28 #include "extensions/browser/extensions_browser_client.h" | |
35 #include "extensions/browser/info_map.h" | 29 #include "extensions/browser/info_map.h" |
36 #include "extensions/common/constants.h" | 30 #include "extensions/common/constants.h" |
37 #include "extensions/common/extension.h" | 31 #include "extensions/common/extension.h" |
38 #include "extensions/common/extension_resource.h" | 32 #include "extensions/common/extension_resource.h" |
39 #include "extensions/common/file_util.h" | 33 #include "extensions/common/file_util.h" |
40 #include "extensions/common/manifest_handlers/background_info.h" | 34 #include "extensions/common/manifest_handlers/background_info.h" |
41 #include "extensions/common/manifest_handlers/csp_info.h" | 35 #include "extensions/common/manifest_handlers/csp_info.h" |
42 #include "extensions/common/manifest_handlers/icons_handler.h" | 36 #include "extensions/common/manifest_handlers/icons_handler.h" |
43 #include "extensions/common/manifest_handlers/incognito_info.h" | 37 #include "extensions/common/manifest_handlers/incognito_info.h" |
44 #include "extensions/common/manifest_handlers/shared_module_info.h" | 38 #include "extensions/common/manifest_handlers/shared_module_info.h" |
45 #include "extensions/common/manifest_handlers/web_accessible_resources_info.h" | 39 #include "extensions/common/manifest_handlers/web_accessible_resources_info.h" |
46 #include "extensions/common/manifest_handlers/webview_info.h" | |
47 #include "grit/component_extension_resources_map.h" | |
48 #include "net/base/mime_util.h" | |
49 #include "net/base/net_errors.h" | 40 #include "net/base/net_errors.h" |
50 #include "net/http/http_request_headers.h" | 41 #include "net/http/http_request_headers.h" |
51 #include "net/http/http_response_headers.h" | 42 #include "net/http/http_response_headers.h" |
52 #include "net/http/http_response_info.h" | 43 #include "net/http/http_response_info.h" |
53 #include "net/url_request/url_request_error_job.h" | 44 #include "net/url_request/url_request_error_job.h" |
54 #include "net/url_request/url_request_file_job.h" | 45 #include "net/url_request/url_request_file_job.h" |
55 #include "net/url_request/url_request_simple_job.h" | 46 #include "net/url_request/url_request_simple_job.h" |
56 #include "ui/base/resource/resource_bundle.h" | |
57 #include "url/url_util.h" | 47 #include "url/url_util.h" |
58 | 48 |
59 using content::BrowserThread; | 49 using content::BrowserThread; |
60 using content::ResourceRequestInfo; | 50 using content::ResourceRequestInfo; |
61 using extensions::Extension; | 51 using extensions::Extension; |
62 using extensions::SharedModuleInfo; | 52 using extensions::SharedModuleInfo; |
63 | 53 |
54 namespace extensions { | |
64 namespace { | 55 namespace { |
65 | 56 |
66 net::HttpResponseHeaders* BuildHttpHeaders( | |
67 const std::string& content_security_policy, bool send_cors_header, | |
68 const base::Time& last_modified_time) { | |
69 std::string raw_headers; | |
70 raw_headers.append("HTTP/1.1 200 OK"); | |
71 if (!content_security_policy.empty()) { | |
72 raw_headers.append(1, '\0'); | |
73 raw_headers.append("Content-Security-Policy: "); | |
74 raw_headers.append(content_security_policy); | |
75 } | |
76 | |
77 if (send_cors_header) { | |
78 raw_headers.append(1, '\0'); | |
79 raw_headers.append("Access-Control-Allow-Origin: *"); | |
80 } | |
81 | |
82 if (!last_modified_time.is_null()) { | |
83 // Hash the time and make an etag to avoid exposing the exact | |
84 // user installation time of the extension. | |
85 std::string hash = base::StringPrintf("%" PRId64, | |
86 last_modified_time.ToInternalValue()); | |
87 hash = base::SHA1HashString(hash); | |
88 std::string etag; | |
89 base::Base64Encode(hash, &etag); | |
90 raw_headers.append(1, '\0'); | |
91 raw_headers.append("ETag: \""); | |
92 raw_headers.append(etag); | |
93 raw_headers.append("\""); | |
94 // Also force revalidation. | |
95 raw_headers.append(1, '\0'); | |
96 raw_headers.append("cache-control: no-cache"); | |
97 } | |
98 | |
99 raw_headers.append(2, '\0'); | |
100 return new net::HttpResponseHeaders(raw_headers); | |
101 } | |
102 | |
103 class URLRequestResourceBundleJob : public net::URLRequestSimpleJob { | |
104 public: | |
105 URLRequestResourceBundleJob(net::URLRequest* request, | |
106 net::NetworkDelegate* network_delegate, | |
107 const base::FilePath& filename, | |
108 int resource_id, | |
109 const std::string& content_security_policy, | |
110 bool send_cors_header) | |
111 : net::URLRequestSimpleJob(request, network_delegate), | |
112 filename_(filename), | |
113 resource_id_(resource_id), | |
114 weak_factory_(this) { | |
115 // Leave cache headers out of resource bundle requests. | |
116 response_info_.headers = BuildHttpHeaders(content_security_policy, | |
117 send_cors_header, | |
118 base::Time()); | |
119 } | |
120 | |
121 // Overridden from URLRequestSimpleJob: | |
122 virtual int GetData(std::string* mime_type, | |
123 std::string* charset, | |
124 std::string* data, | |
125 const net::CompletionCallback& callback) const OVERRIDE { | |
126 const ResourceBundle& rb = ResourceBundle::GetSharedInstance(); | |
127 *data = rb.GetRawDataResource(resource_id_).as_string(); | |
128 | |
129 // Add the Content-Length header now that we know the resource length. | |
130 response_info_.headers->AddHeader(base::StringPrintf( | |
131 "%s: %s", net::HttpRequestHeaders::kContentLength, | |
132 base::UintToString(data->size()).c_str())); | |
133 | |
134 std::string* read_mime_type = new std::string; | |
135 bool posted = base::PostTaskAndReplyWithResult( | |
136 BrowserThread::GetBlockingPool(), | |
137 FROM_HERE, | |
138 base::Bind(&net::GetMimeTypeFromFile, filename_, | |
139 base::Unretained(read_mime_type)), | |
140 base::Bind(&URLRequestResourceBundleJob::OnMimeTypeRead, | |
141 weak_factory_.GetWeakPtr(), | |
142 mime_type, charset, data, | |
143 base::Owned(read_mime_type), | |
144 callback)); | |
145 DCHECK(posted); | |
146 | |
147 return net::ERR_IO_PENDING; | |
148 } | |
149 | |
150 virtual void GetResponseInfo(net::HttpResponseInfo* info) OVERRIDE { | |
151 *info = response_info_; | |
152 } | |
153 | |
154 private: | |
155 virtual ~URLRequestResourceBundleJob() { } | |
156 | |
157 void OnMimeTypeRead(std::string* out_mime_type, | |
158 std::string* charset, | |
159 std::string* data, | |
160 std::string* read_mime_type, | |
161 const net::CompletionCallback& callback, | |
162 bool read_result) { | |
163 *out_mime_type = *read_mime_type; | |
164 if (StartsWithASCII(*read_mime_type, "text/", false)) { | |
165 // All of our HTML files should be UTF-8 and for other resource types | |
166 // (like images), charset doesn't matter. | |
167 DCHECK(IsStringUTF8(*data)); | |
168 *charset = "utf-8"; | |
169 } | |
170 int result = read_result ? net::OK : net::ERR_INVALID_URL; | |
171 callback.Run(result); | |
172 } | |
173 | |
174 // We need the filename of the resource to determine the mime type. | |
175 base::FilePath filename_; | |
176 | |
177 // The resource bundle id to load. | |
178 int resource_id_; | |
179 | |
180 net::HttpResponseInfo response_info_; | |
181 | |
182 mutable base::WeakPtrFactory<URLRequestResourceBundleJob> weak_factory_; | |
183 }; | |
184 | |
185 class GeneratedBackgroundPageJob : public net::URLRequestSimpleJob { | 57 class GeneratedBackgroundPageJob : public net::URLRequestSimpleJob { |
186 public: | 58 public: |
187 GeneratedBackgroundPageJob(net::URLRequest* request, | 59 GeneratedBackgroundPageJob(net::URLRequest* request, |
188 net::NetworkDelegate* network_delegate, | 60 net::NetworkDelegate* network_delegate, |
189 const scoped_refptr<const Extension> extension, | 61 const scoped_refptr<const Extension> extension, |
190 const std::string& content_security_policy) | 62 const std::string& content_security_policy) |
191 : net::URLRequestSimpleJob(request, network_delegate), | 63 : net::URLRequestSimpleJob(request, network_delegate), |
192 extension_(extension) { | 64 extension_(extension) { |
193 const bool send_cors_headers = false; | 65 const bool send_cors_headers = false; |
194 // Leave cache headers out of generated background page jobs. | 66 // Leave cache headers out of generated background page jobs. |
(...skipping 159 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
354 if (info->GetResourceType() == ResourceType::MAIN_FRAME) { | 226 if (info->GetResourceType() == ResourceType::MAIN_FRAME) { |
355 const Extension* extension = | 227 const Extension* extension = |
356 extension_info_map->extensions().GetByID(extension_id); | 228 extension_info_map->extensions().GetByID(extension_id); |
357 return extension && extensions::IncognitoInfo::IsSplitMode(extension); | 229 return extension && extensions::IncognitoInfo::IsSplitMode(extension); |
358 } | 230 } |
359 | 231 |
360 return true; | 232 return true; |
361 } | 233 } |
362 | 234 |
363 // Returns true if an chrome-extension:// resource should be allowed to load. | 235 // Returns true if an chrome-extension:// resource should be allowed to load. |
236 // Pass true for |is_incognito| only for incognito profiles and not Chrome OS | |
237 // guest mode profiles. | |
364 // TODO(aa): This should be moved into ExtensionResourceRequestPolicy, but we | 238 // TODO(aa): This should be moved into ExtensionResourceRequestPolicy, but we |
365 // first need to find a way to get CanLoadInIncognito state into the renderers. | 239 // first need to find a way to get CanLoadInIncognito state into the renderers. |
366 bool AllowExtensionResourceLoad(net::URLRequest* request, | 240 bool AllowExtensionResourceLoad(net::URLRequest* request, |
367 Profile::ProfileType profile_type, | 241 bool is_incognito, |
368 const Extension* extension, | 242 const Extension* extension, |
369 extensions::InfoMap* extension_info_map) { | 243 extensions::InfoMap* extension_info_map) { |
370 const ResourceRequestInfo* info = ResourceRequestInfo::ForRequest(request); | 244 const ResourceRequestInfo* info = ResourceRequestInfo::ForRequest(request); |
371 | 245 |
372 // We have seen crashes where info is NULL: crbug.com/52374. | 246 // We have seen crashes where info is NULL: crbug.com/52374. |
373 if (!info) { | 247 if (!info) { |
374 LOG(ERROR) << "Allowing load of " << request->url().spec() | 248 LOG(ERROR) << "Allowing load of " << request->url().spec() |
375 << "from unknown origin. Could not find user data for " | 249 << "from unknown origin. Could not find user data for " |
376 << "request."; | 250 << "request."; |
377 return true; | 251 return true; |
378 } | 252 } |
379 | 253 |
380 if (profile_type == Profile::INCOGNITO_PROFILE && | 254 if (is_incognito && !ExtensionCanLoadInIncognito( |
381 !ExtensionCanLoadInIncognito(info, request->url().host(), | 255 info, request->url().host(), extension_info_map)) { |
382 extension_info_map)) { | |
383 return false; | 256 return false; |
384 } | 257 } |
385 | 258 |
386 // The following checks are meant to replicate similar set of checks in the | 259 // The following checks are meant to replicate similar set of checks in the |
387 // renderer process, performed by ResourceRequestPolicy::CanRequestResource. | 260 // renderer process, performed by ResourceRequestPolicy::CanRequestResource. |
388 // These are not exactly equivalent, because we don't have the same bits of | 261 // These are not exactly equivalent, because we don't have the same bits of |
389 // information. The two checks need to be kept in sync as much as possible, as | 262 // information. The two checks need to be kept in sync as much as possible, as |
390 // an exploited renderer can bypass the checks in ResourceRequestPolicy. | 263 // an exploited renderer can bypass the checks in ResourceRequestPolicy. |
391 | 264 |
392 // Check if the extension for which this request is made is indeed loaded in | 265 // Check if the extension for which this request is made is indeed loaded in |
393 // the process sending the request. If not, we need to explicitly check if | 266 // the process sending the request. If not, we need to explicitly check if |
394 // the resource is explicitly accessible or fits in a set of exception cases. | 267 // the resource is explicitly accessible or fits in a set of exception cases. |
395 // Note: This allows a case where two extensions execute in the same renderer | 268 // Note: This allows a case where two extensions execute in the same renderer |
396 // process to request each other's resources. We can't do a more precise | 269 // process to request each other's resources. We can't do a more precise |
397 // check, since the renderer can lie about which extension has made the | 270 // check, since the renderer can lie about which extension has made the |
398 // request. | 271 // request. |
399 if (extension_info_map->process_map().Contains( | 272 if (extension_info_map->process_map().Contains( |
400 request->url().host(), info->GetChildID())) { | 273 request->url().host(), info->GetChildID())) { |
401 return true; | 274 return true; |
402 } | 275 } |
403 | 276 |
404 // Check workers so that importScripts works from extension workers. | 277 // Allow the extension module embedder to grant permission for loads. |
405 if (extension_info_map->worker_process_map().Contains( | 278 if (ExtensionsBrowserClient::Get()->AllowCrossRendererResourceLoad( |
406 request->url().host(), info->GetChildID())) { | 279 request, is_incognito, extension, extension_info_map)) { |
407 return true; | 280 return true; |
408 } | 281 } |
409 | 282 |
410 // Extensions with webview: allow loading certain resources by guest renderers | 283 // No special exceptions for cross-process loading. Block the load. |
411 // with privileged partition IDs as specified in the manifest file. | 284 return false; |
412 ExtensionRendererState* renderer_state = | |
413 ExtensionRendererState::GetInstance(); | |
414 ExtensionRendererState::WebViewInfo webview_info; | |
415 bool is_guest = renderer_state->GetWebViewInfo(info->GetChildID(), | |
416 info->GetRouteID(), | |
417 &webview_info); | |
418 std::string resource_path = request->url().path(); | |
419 if (is_guest && extensions::WebviewInfo::IsResourceWebviewAccessible( | |
420 extension, webview_info.partition_id, resource_path)) { | |
421 return true; | |
422 } | |
423 | |
424 // If the request is for navigations outside of webviews, then it should be | |
425 // allowed. The navigation logic in CrossSiteResourceHandler will properly | |
426 // transfer the navigation to a privileged process before it commits. | |
427 if (ResourceType::IsFrame(info->GetResourceType()) && !is_guest) | |
428 return true; | |
429 | |
430 if (!content::PageTransitionIsWebTriggerable(info->GetPageTransition())) | |
431 return false; | |
432 | |
433 // The following checks require that we have an actual extension object. If we | |
434 // don't have it, allow the request handling to continue with the rest of the | |
435 // checks. | |
436 if (!extension) | |
437 return true; | |
438 | |
439 // Disallow loading of packaged resources for hosted apps. We don't allow | |
440 // hybrid hosted/packaged apps. The one exception is access to icons, since | |
441 // some extensions want to be able to do things like create their own | |
442 // launchers. | |
443 std::string resource_root_relative_path = | |
444 request->url().path().empty() ? std::string() | |
445 : request->url().path().substr(1); | |
446 if (extension->is_hosted_app() && | |
447 !extensions::IconsInfo::GetIcons(extension) | |
448 .ContainsPath(resource_root_relative_path)) { | |
449 LOG(ERROR) << "Denying load of " << request->url().spec() << " from " | |
450 << "hosted app."; | |
451 return false; | |
452 } | |
453 | |
454 // Extensions with web_accessible_resources: allow loading by regular | |
455 // renderers. Since not all subresources are required to be listed in a v2 | |
456 // manifest, we must allow all loads if there are any web accessible | |
457 // resources. See http://crbug.com/179127. | |
458 if (extension->manifest_version() < 2 || | |
459 extensions::WebAccessibleResourcesInfo::HasWebAccessibleResources( | |
460 extension)) { | |
461 return true; | |
462 } | |
463 | |
464 // If there aren't any explicitly marked web accessible resources, the | |
465 // load should be allowed only if it is by DevTools. A close approximation is | |
466 // checking if the extension contains a DevTools page. | |
467 if (extensions::ManifestURL::GetDevToolsPage(extension).is_empty()) | |
468 return false; | |
469 | |
470 return true; | |
471 } | 285 } |
472 | 286 |
473 // Returns true if the given URL references an icon in the given extension. | 287 // Returns true if the given URL references an icon in the given extension. |
474 bool URLIsForExtensionIcon(const GURL& url, const Extension* extension) { | 288 bool URLIsForExtensionIcon(const GURL& url, const Extension* extension) { |
475 DCHECK(url.SchemeIs(extensions::kExtensionScheme)); | 289 DCHECK(url.SchemeIs(extensions::kExtensionScheme)); |
476 | 290 |
477 if (!extension) | 291 if (!extension) |
478 return false; | 292 return false; |
479 | 293 |
480 std::string path = url.path(); | 294 std::string path = url.path(); |
481 DCHECK_EQ(url.host(), extension->id()); | 295 DCHECK_EQ(url.host(), extension->id()); |
482 DCHECK(path.length() > 0 && path[0] == '/'); | 296 DCHECK(path.length() > 0 && path[0] == '/'); |
483 path = path.substr(1); | 297 path = path.substr(1); |
484 return extensions::IconsInfo::GetIcons(extension).ContainsPath(path); | 298 return extensions::IconsInfo::GetIcons(extension).ContainsPath(path); |
485 } | 299 } |
486 | 300 |
487 class ExtensionProtocolHandler | 301 class ExtensionProtocolHandler |
488 : public net::URLRequestJobFactory::ProtocolHandler { | 302 : public net::URLRequestJobFactory::ProtocolHandler { |
489 public: | 303 public: |
490 ExtensionProtocolHandler(Profile::ProfileType profile_type, | 304 ExtensionProtocolHandler(bool is_incognito, |
491 extensions::InfoMap* extension_info_map) | 305 extensions::InfoMap* extension_info_map) |
492 : profile_type_(profile_type), extension_info_map_(extension_info_map) {} | 306 : is_incognito_(is_incognito), extension_info_map_(extension_info_map) {} |
493 | 307 |
494 virtual ~ExtensionProtocolHandler() {} | 308 virtual ~ExtensionProtocolHandler() {} |
495 | 309 |
496 virtual net::URLRequestJob* MaybeCreateJob( | 310 virtual net::URLRequestJob* MaybeCreateJob( |
497 net::URLRequest* request, | 311 net::URLRequest* request, |
498 net::NetworkDelegate* network_delegate) const OVERRIDE; | 312 net::NetworkDelegate* network_delegate) const OVERRIDE; |
499 | 313 |
500 private: | 314 private: |
501 const Profile::ProfileType profile_type_; | 315 const bool is_incognito_; |
502 extensions::InfoMap* const extension_info_map_; | 316 extensions::InfoMap* const extension_info_map_; |
503 DISALLOW_COPY_AND_ASSIGN(ExtensionProtocolHandler); | 317 DISALLOW_COPY_AND_ASSIGN(ExtensionProtocolHandler); |
504 }; | 318 }; |
505 | 319 |
506 // Creates URLRequestJobs for extension:// URLs. | 320 // Creates URLRequestJobs for extension:// URLs. |
507 net::URLRequestJob* | 321 net::URLRequestJob* |
508 ExtensionProtocolHandler::MaybeCreateJob( | 322 ExtensionProtocolHandler::MaybeCreateJob( |
509 net::URLRequest* request, net::NetworkDelegate* network_delegate) const { | 323 net::URLRequest* request, net::NetworkDelegate* network_delegate) const { |
510 // chrome-extension://extension-id/resource/path.js | 324 // chrome-extension://extension-id/resource/path.js |
511 std::string extension_id = request->url().host(); | 325 std::string extension_id = request->url().host(); |
512 const Extension* extension = | 326 const Extension* extension = |
513 extension_info_map_->extensions().GetByID(extension_id); | 327 extension_info_map_->extensions().GetByID(extension_id); |
514 | 328 |
515 // TODO(mpcomplete): better error code. | 329 // TODO(mpcomplete): better error code. |
516 if (!AllowExtensionResourceLoad( | 330 if (!AllowExtensionResourceLoad( |
517 request, profile_type_, extension, extension_info_map_)) { | 331 request, is_incognito_, extension, extension_info_map_)) { |
518 return new net::URLRequestErrorJob( | 332 return new net::URLRequestErrorJob( |
519 request, network_delegate, net::ERR_ADDRESS_UNREACHABLE); | 333 request, network_delegate, net::ERR_ADDRESS_UNREACHABLE); |
520 } | 334 } |
521 | 335 |
336 // If this is a disabled extension only allow the icon to load. | |
522 base::FilePath directory_path; | 337 base::FilePath directory_path; |
523 if (extension) | 338 if (extension) |
524 directory_path = extension->path(); | 339 directory_path = extension->path(); |
525 if (directory_path.value().empty()) { | 340 if (directory_path.value().empty()) { |
526 const Extension* disabled_extension = | 341 const Extension* disabled_extension = |
527 extension_info_map_->disabled_extensions().GetByID(extension_id); | 342 extension_info_map_->disabled_extensions().GetByID(extension_id); |
528 if (URLIsForExtensionIcon(request->url(), disabled_extension)) | 343 if (URLIsForExtensionIcon(request->url(), disabled_extension)) |
529 directory_path = disabled_extension->path(); | 344 directory_path = disabled_extension->path(); |
530 if (directory_path.value().empty()) { | 345 if (directory_path.value().empty()) { |
531 LOG(WARNING) << "Failed to GetPathForExtension: " << extension_id; | 346 LOG(WARNING) << "Failed to GetPathForExtension: " << extension_id; |
532 return NULL; | 347 return NULL; |
533 } | 348 } |
534 } | 349 } |
535 | 350 |
351 // Set up content security policy. | |
536 std::string content_security_policy; | 352 std::string content_security_policy; |
537 bool send_cors_header = false; | 353 bool send_cors_header = false; |
538 bool follow_symlinks_anywhere = false; | 354 bool follow_symlinks_anywhere = false; |
539 if (extension) { | 355 if (extension) { |
540 std::string resource_path = request->url().path(); | 356 std::string resource_path = request->url().path(); |
541 content_security_policy = | 357 content_security_policy = |
542 extensions::CSPInfo::GetResourceContentSecurityPolicy(extension, | 358 extensions::CSPInfo::GetResourceContentSecurityPolicy(extension, |
543 resource_path); | 359 resource_path); |
544 if ((extension->manifest_version() >= 2 || | 360 if ((extension->manifest_version() >= 2 || |
545 extensions::WebAccessibleResourcesInfo::HasWebAccessibleResources( | 361 extensions::WebAccessibleResourcesInfo::HasWebAccessibleResources( |
546 extension)) && | 362 extension)) && |
547 extensions::WebAccessibleResourcesInfo::IsResourceWebAccessible( | 363 extensions::WebAccessibleResourcesInfo::IsResourceWebAccessible( |
548 extension, resource_path)) | 364 extension, resource_path)) |
549 send_cors_header = true; | 365 send_cors_header = true; |
550 | 366 |
551 follow_symlinks_anywhere = | 367 follow_symlinks_anywhere = |
552 (extension->creation_flags() & Extension::FOLLOW_SYMLINKS_ANYWHERE) | 368 (extension->creation_flags() & Extension::FOLLOW_SYMLINKS_ANYWHERE) |
553 != 0; | 369 != 0; |
554 } | 370 } |
555 | 371 |
372 // Create a job for a generated background page. | |
556 std::string path = request->url().path(); | 373 std::string path = request->url().path(); |
557 if (path.size() > 1 && | 374 if (path.size() > 1 && |
558 path.substr(1) == extensions::kGeneratedBackgroundPageFilename) { | 375 path.substr(1) == extensions::kGeneratedBackgroundPageFilename) { |
559 return new GeneratedBackgroundPageJob( | 376 return new GeneratedBackgroundPageJob( |
560 request, network_delegate, extension, content_security_policy); | 377 request, network_delegate, extension, content_security_policy); |
561 } | 378 } |
562 | 379 |
563 base::FilePath resources_path; | 380 // Component extension resources may be part of the embedder's resource files, |
564 base::FilePath relative_path; | 381 // for example component_extension_resources.pak in Chrome. |
565 // Try to load extension resources from chrome resource file if | 382 net::URLRequestJob* resource_bundle_job = |
566 // directory_path is a descendant of resources_path. resources_path | 383 extensions::ExtensionsBrowserClient::Get() |
567 // corresponds to src/chrome/browser/resources in source tree. | 384 ->MaybeCreateResourceBundleRequestJob(request, |
568 if (PathService::Get(chrome::DIR_RESOURCES, &resources_path) && | 385 network_delegate, |
569 // Since component extension resources are included in | 386 directory_path, |
570 // component_extension_resources.pak file in resources_path, calculate | 387 content_security_policy, |
571 // extension relative path against resources_path. | 388 send_cors_header); |
572 resources_path.AppendRelativePath(directory_path, &relative_path)) { | 389 if (resource_bundle_job) |
573 base::FilePath request_path = | 390 return resource_bundle_job; |
574 extensions::file_util::ExtensionURLToRelativeFilePath(request->url()); | |
575 int resource_id; | |
576 if (extensions::ImageLoader::IsComponentExtensionResource( | |
577 directory_path, request_path, &resource_id)) { | |
578 relative_path = relative_path.Append(request_path); | |
579 relative_path = relative_path.NormalizePathSeparators(); | |
580 return new URLRequestResourceBundleJob( | |
581 request, | |
582 network_delegate, | |
583 relative_path, | |
584 resource_id, | |
585 content_security_policy, | |
586 send_cors_header); | |
587 } | |
588 } | |
589 | 391 |
590 relative_path = | 392 base::FilePath relative_path = |
591 extensions::file_util::ExtensionURLToRelativeFilePath(request->url()); | 393 extensions::file_util::ExtensionURLToRelativeFilePath(request->url()); |
592 | 394 |
395 // Handle shared resources (extension A loading resources out of extension B). | |
593 if (SharedModuleInfo::IsImportedPath(path)) { | 396 if (SharedModuleInfo::IsImportedPath(path)) { |
594 std::string new_extension_id; | 397 std::string new_extension_id; |
595 std::string new_relative_path; | 398 std::string new_relative_path; |
596 SharedModuleInfo::ParseImportedPath(path, &new_extension_id, | 399 SharedModuleInfo::ParseImportedPath(path, &new_extension_id, |
597 &new_relative_path); | 400 &new_relative_path); |
598 const Extension* new_extension = | 401 const Extension* new_extension = |
599 extension_info_map_->extensions().GetByID(new_extension_id); | 402 extension_info_map_->extensions().GetByID(new_extension_id); |
600 | 403 |
601 bool first_party_in_import = false; | 404 bool first_party_in_import = false; |
602 // NB: This first_party_for_cookies call is not for security, it is only | 405 // NB: This first_party_for_cookies call is not for security, it is only |
(...skipping 28 matching lines...) Expand all Loading... | |
631 extension_id, | 434 extension_id, |
632 directory_path, | 435 directory_path, |
633 relative_path, | 436 relative_path, |
634 content_security_policy, | 437 content_security_policy, |
635 send_cors_header, | 438 send_cors_header, |
636 follow_symlinks_anywhere); | 439 follow_symlinks_anywhere); |
637 } | 440 } |
638 | 441 |
639 } // namespace | 442 } // namespace |
640 | 443 |
444 net::HttpResponseHeaders* BuildHttpHeaders( | |
James Cook
2014/04/09 22:54:41
Moved unchanged from above to let the Chrome code
| |
445 const std::string& content_security_policy, | |
446 bool send_cors_header, | |
447 const base::Time& last_modified_time) { | |
448 std::string raw_headers; | |
449 raw_headers.append("HTTP/1.1 200 OK"); | |
450 if (!content_security_policy.empty()) { | |
451 raw_headers.append(1, '\0'); | |
452 raw_headers.append("Content-Security-Policy: "); | |
453 raw_headers.append(content_security_policy); | |
454 } | |
455 | |
456 if (send_cors_header) { | |
457 raw_headers.append(1, '\0'); | |
458 raw_headers.append("Access-Control-Allow-Origin: *"); | |
459 } | |
460 | |
461 if (!last_modified_time.is_null()) { | |
462 // Hash the time and make an etag to avoid exposing the exact | |
463 // user installation time of the extension. | |
464 std::string hash = | |
465 base::StringPrintf("%" PRId64, last_modified_time.ToInternalValue()); | |
466 hash = base::SHA1HashString(hash); | |
467 std::string etag; | |
468 base::Base64Encode(hash, &etag); | |
469 raw_headers.append(1, '\0'); | |
470 raw_headers.append("ETag: \""); | |
471 raw_headers.append(etag); | |
472 raw_headers.append("\""); | |
473 // Also force revalidation. | |
474 raw_headers.append(1, '\0'); | |
475 raw_headers.append("cache-control: no-cache"); | |
476 } | |
477 | |
478 raw_headers.append(2, '\0'); | |
479 return new net::HttpResponseHeaders(raw_headers); | |
480 } | |
481 | |
641 net::URLRequestJobFactory::ProtocolHandler* CreateExtensionProtocolHandler( | 482 net::URLRequestJobFactory::ProtocolHandler* CreateExtensionProtocolHandler( |
642 Profile::ProfileType profile_type, | 483 bool is_incognito, |
643 extensions::InfoMap* extension_info_map) { | 484 extensions::InfoMap* extension_info_map) { |
644 return new ExtensionProtocolHandler(profile_type, extension_info_map); | 485 return new ExtensionProtocolHandler(is_incognito, extension_info_map); |
645 } | 486 } |
487 | |
488 } // namespace extensions | |
OLD | NEW |