OLD | NEW |
---|---|
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/extensions/api/web_request/web_request_permissions.h" | 5 #include "chrome/browser/extensions/api/web_request/web_request_permissions.h" |
6 | 6 |
7 #include "base/strings/string_util.h" | 7 #include "base/strings/string_util.h" |
8 #include "base/strings/stringprintf.h" | 8 #include "base/strings/stringprintf.h" |
9 #include "chrome/common/extensions/extension_constants.h" | |
10 #include "chrome/common/url_constants.h" | |
11 #include "content/public/browser/resource_request_info.h" | 9 #include "content/public/browser/resource_request_info.h" |
10 #include "extensions/browser/api/extensions_api_client.h" | |
11 #include "extensions/browser/api/web_request/web_request_permissions_delegate.h" | |
12 #include "extensions/browser/guest_view/web_view/web_view_renderer_state.h" | 12 #include "extensions/browser/guest_view/web_view/web_view_renderer_state.h" |
13 #include "extensions/browser/info_map.h" | 13 #include "extensions/browser/info_map.h" |
14 #include "extensions/common/constants.h" | 14 #include "extensions/common/constants.h" |
15 #include "extensions/common/extension.h" | 15 #include "extensions/common/extension.h" |
16 #include "extensions/common/permissions/permissions_data.h" | 16 #include "extensions/common/permissions/permissions_data.h" |
17 #include "net/url_request/url_request.h" | 17 #include "net/url_request/url_request.h" |
18 #include "url/gurl.h" | 18 #include "url/gurl.h" |
19 | 19 |
20 using content::ResourceRequestInfo; | 20 using content::ResourceRequestInfo; |
21 | 21 |
22 namespace { | 22 namespace { |
23 | 23 |
24 extensions::WebRequestPermissionsDelegate* GetWebRequestPermissionsDelegate() { | |
Fady Samuel
2014/08/27 21:49:17
This is VERY bad. You're creating a new delegate e
| |
25 return extensions::ExtensionsAPIClient::Get()-> | |
26 CreateWebRequestPermissionsDelegate(); | |
27 } | |
28 | |
24 // Returns true if the URL is sensitive and requests to this URL must not be | 29 // Returns true if the URL is sensitive and requests to this URL must not be |
25 // modified/canceled by extensions, e.g. because it is targeted to the webstore | 30 // modified/canceled by extensions, e.g. because it is targeted to the webstore |
26 // to check for updates, extension blacklisting, etc. | 31 // to check for updates, extension blacklisting, etc. |
27 bool IsSensitiveURL(const GURL& url) { | 32 bool IsSensitiveURL(const GURL& url) { |
28 // TODO(battre) Merge this, CanExtensionAccessURL and | 33 // TODO(battre) Merge this, CanExtensionAccessURL and |
29 // PermissionsData::CanAccessPage into one function. | 34 // PermissionsData::CanAccessPage into one function. |
30 bool sensitive_chrome_url = false; | 35 bool sensitive_chrome_url = false; |
31 const std::string host = url.host(); | 36 const std::string host = url.host(); |
32 const char kGoogleCom[] = ".google.com"; | 37 const char kGoogleCom[] = ".google.com"; |
33 const char kClient[] = "clients"; | 38 const char kClient[] = "clients"; |
(...skipping 19 matching lines...) Expand all Loading... | |
53 EndsWith(url.host(), ".clients.google.com", true) || | 58 EndsWith(url.host(), ".clients.google.com", true) || |
54 url.host() == "sb-ssl.google.com" || | 59 url.host() == "sb-ssl.google.com" || |
55 (url.host() == "chrome.google.com" && | 60 (url.host() == "chrome.google.com" && |
56 StartsWithASCII(url.path(), "/webstore", true)); | 61 StartsWithASCII(url.path(), "/webstore", true)); |
57 } | 62 } |
58 GURL::Replacements replacements; | 63 GURL::Replacements replacements; |
59 replacements.ClearQuery(); | 64 replacements.ClearQuery(); |
60 replacements.ClearRef(); | 65 replacements.ClearRef(); |
61 GURL url_without_query = url.ReplaceComponents(replacements); | 66 GURL url_without_query = url.ReplaceComponents(replacements); |
62 return sensitive_chrome_url || | 67 return sensitive_chrome_url || |
63 extension_urls::IsWebstoreUpdateUrl(url_without_query) || | 68 (GetWebRequestPermissionsDelegate() && |
64 extension_urls::IsBlacklistUpdateUrl(url); | 69 GetWebRequestPermissionsDelegate()->IsUpdateURL(url)); |
Fady Samuel
2014/08/27 21:49:17
Indent off.
| |
65 } | 70 } |
66 | 71 |
67 // Returns true if the scheme is one we want to allow extensions to have access | 72 // Returns true if the scheme is one we want to allow extensions to have access |
68 // to. Extensions still need specific permissions for a given URL, which is | 73 // to. Extensions still need specific permissions for a given URL, which is |
69 // covered by CanExtensionAccessURL. | 74 // covered by CanExtensionAccessURL. |
70 bool HasWebRequestScheme(const GURL& url) { | 75 bool HasWebRequestScheme(const GURL& url) { |
71 return (url.SchemeIs(url::kAboutScheme) || url.SchemeIs(url::kFileScheme) || | 76 return (url.SchemeIs(url::kAboutScheme) || url.SchemeIs(url::kFileScheme) || |
72 url.SchemeIs(url::kFileSystemScheme) || | 77 url.SchemeIs(url::kFileSystemScheme) || |
73 url.SchemeIs(url::kFtpScheme) || url.SchemeIs(url::kHttpScheme) || | 78 url.SchemeIs(url::kFtpScheme) || url.SchemeIs(url::kHttpScheme) || |
74 url.SchemeIs(url::kHttpsScheme) || | 79 url.SchemeIs(url::kHttpsScheme) || |
75 url.SchemeIs(extensions::kExtensionScheme)); | 80 url.SchemeIs(extensions::kExtensionScheme)); |
76 } | 81 } |
77 | 82 |
78 } // namespace | 83 } // namespace |
79 | 84 |
80 // static | 85 // static |
81 bool WebRequestPermissions::HideRequest( | 86 bool WebRequestPermissions::HideRequest( |
82 const extensions::InfoMap* extension_info_map, | 87 const extensions::InfoMap* extension_info_map, |
83 const net::URLRequest* request) { | 88 const net::URLRequest* request) { |
84 // Hide requests from the Chrome WebStore App or signin process. | 89 // Hide requests from the Chrome WebStore App or signin process. |
85 const ResourceRequestInfo* info = ResourceRequestInfo::ForRequest(request); | 90 const ResourceRequestInfo* info = ResourceRequestInfo::ForRequest(request); |
86 if (info) { | 91 if (info) { |
87 int process_id = info->GetChildID(); | 92 int process_id = info->GetChildID(); |
88 // Never hide requests from guest processes. | 93 // Never hide requests from guest processes. |
89 if (extensions::WebViewRendererState::GetInstance()->IsGuest(process_id)) | 94 if (extensions::WebViewRendererState::GetInstance()->IsGuest(process_id)) |
90 return false; | 95 return false; |
91 | 96 |
92 if (extension_info_map && ( | 97 if (extension_info_map && ( |
93 extension_info_map->IsSigninProcess(process_id) || | 98 extension_info_map->IsSigninProcess(process_id) || |
94 extension_info_map->process_map().Contains( | 99 (GetWebRequestPermissionsDelegate() && |
95 extension_misc::kWebStoreAppId, process_id))) { | 100 GetWebRequestPermissionsDelegate()->ContainsWebStoreAppId( |
Fady Samuel
2014/08/27 21:49:17
Indent off.
| |
101 extension_info_map->process_map(), process_id)))) { | |
96 return true; | 102 return true; |
97 } | 103 } |
98 } | 104 } |
99 | 105 |
100 const GURL& url = request->url(); | 106 const GURL& url = request->url(); |
101 return IsSensitiveURL(url) || !HasWebRequestScheme(url); | 107 return IsSensitiveURL(url) || !HasWebRequestScheme(url); |
102 } | 108 } |
103 | 109 |
104 // static | 110 // static |
105 bool WebRequestPermissions::CanExtensionAccessURL( | 111 bool WebRequestPermissions::CanExtensionAccessURL( |
(...skipping 28 matching lines...) Expand all Loading... | |
134 } | 140 } |
135 break; | 141 break; |
136 case REQUIRE_ALL_URLS: | 142 case REQUIRE_ALL_URLS: |
137 if (!extension->permissions_data()->HasEffectiveAccessToAllHosts()) | 143 if (!extension->permissions_data()->HasEffectiveAccessToAllHosts()) |
138 return false; | 144 return false; |
139 break; | 145 break; |
140 } | 146 } |
141 | 147 |
142 return true; | 148 return true; |
143 } | 149 } |
OLD | NEW |