Chromium Code Reviews| OLD | NEW |
|---|---|
| (Empty) | |
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "chrome/browser/plugins/chrome_content_browser_client_plugins_part.h" | |
| 6 | |
| 7 #include "base/command_line.h" | |
| 8 #include "chrome/browser/extensions/extension_service.h" | |
| 9 #include "chrome/browser/plugins/plugin_info_message_filter.h" | |
| 10 #include "chrome/browser/profiles/profile.h" | |
| 11 #include "chrome/browser/renderer_host/pepper/chrome_browser_pepper_host_factory .h" | |
| 12 #include "chrome/common/chrome_switches.h" | |
| 13 #include "chrome/common/chrome_version_info.h" | |
| 14 #include "chrome/common/pepper_permission_util.h" | |
| 15 #include "content/public/browser/render_process_host.h" | |
| 16 #include "extensions/browser/extension_registry.h" | |
| 17 #include "extensions/common/constants.h" | |
| 18 #include "extensions/common/permissions/permissions_data.h" | |
| 19 #include "extensions/common/permissions/socket_permission.h" | |
| 20 #include "ppapi/host/ppapi_host.h" | |
| 21 #include "ppapi/shared_impl/ppapi_switches.h" | |
| 22 | |
| 23 namespace plugins { | |
| 24 | |
| 25 ChromeContentBrowserClientPluginsPart::ChromeContentBrowserClientPluginsPart() { | |
| 26 } | |
| 27 | |
| 28 ChromeContentBrowserClientPluginsPart:: | |
| 29 ~ChromeContentBrowserClientPluginsPart() { | |
| 30 } | |
| 31 | |
| 32 void ChromeContentBrowserClientPluginsPart::RenderProcessWillLaunch( | |
| 33 content::RenderProcessHost* host) { | |
| 34 Profile* profile = Profile::FromBrowserContext(host->GetBrowserContext()); | |
| 35 host->AddFilter(new PluginInfoMessageFilter(host->GetID(), profile)); | |
| 36 } | |
| 37 | |
| 38 bool ChromeContentBrowserClientPluginsPart:: | |
| 39 IsPluginAllowedToCallRequestOSFileHandle( | |
| 40 content::BrowserContext* browser_context, | |
| 41 const GURL& url, | |
| 42 const std::set<std::string>& allowed_file_handle_origins) { | |
| 43 #if defined(ENABLE_EXTENSIONS) | |
| 44 Profile* profile = Profile::FromBrowserContext(browser_context); | |
| 45 const extensions::ExtensionSet* extension_set = NULL; | |
| 46 if (profile) { | |
| 47 extension_set = | |
| 48 &extensions::ExtensionRegistry::Get(profile)->enabled_extensions(); | |
| 49 } | |
| 50 | |
| 51 return chrome::IsExtensionOrSharedModuleWhitelisted( | |
| 52 url, extension_set, allowed_file_handle_origins) || | |
| 53 chrome::IsHostAllowedByCommandLine( | |
| 54 url, extension_set, ::switches::kAllowNaClFileHandleAPI); | |
| 55 #endif | |
|
Lei Zhang
2014/12/05 05:45:47
#else
return false;
#endif
Otherwise I worry th
| |
| 56 return false; | |
| 57 } | |
| 58 | |
| 59 bool ChromeContentBrowserClientPluginsPart::AllowPepperSocketAPI( | |
| 60 content::BrowserContext* browser_context, | |
| 61 const GURL& url, | |
| 62 bool private_api, | |
| 63 const content::SocketPermissionRequest* params, | |
| 64 const std::set<std::string>& allowed_socket_origin) { | |
| 65 Profile* profile = Profile::FromBrowserContext(browser_context); | |
| 66 const extensions::ExtensionSet* extension_set = NULL; | |
| 67 if (profile) { | |
| 68 extension_set = | |
| 69 &extensions::ExtensionRegistry::Get(profile)->enabled_extensions(); | |
| 70 } | |
| 71 | |
| 72 if (private_api) { | |
| 73 // Access to private socket APIs is controlled by the whitelist. | |
| 74 if (chrome::IsExtensionOrSharedModuleWhitelisted(url, extension_set, | |
| 75 allowed_socket_origin)) { | |
| 76 return true; | |
| 77 } | |
| 78 } else { | |
| 79 // Access to public socket APIs is controlled by extension permissions. | |
| 80 if (url.is_valid() && url.SchemeIs(extensions::kExtensionScheme) && | |
| 81 extension_set) { | |
| 82 const extensions::Extension* extension = | |
| 83 extension_set->GetByID(url.host()); | |
| 84 if (extension) { | |
| 85 const extensions::PermissionsData* permissions_data = | |
| 86 extension->permissions_data(); | |
| 87 if (params) { | |
| 88 extensions::SocketPermission::CheckParam check_params( | |
| 89 params->type, params->host, params->port); | |
| 90 if (permissions_data->CheckAPIPermissionWithParam( | |
| 91 extensions::APIPermission::kSocket, &check_params)) { | |
| 92 return true; | |
| 93 } | |
| 94 } else if (permissions_data->HasAPIPermission( | |
| 95 extensions::APIPermission::kSocket)) { | |
| 96 return true; | |
| 97 } | |
| 98 } | |
| 99 } | |
| 100 } | |
| 101 | |
| 102 // Allow both public and private APIs if the command line says so. | |
| 103 return chrome::IsHostAllowedByCommandLine(url, extension_set, | |
| 104 ::switches::kAllowNaClSocketAPI); | |
| 105 } | |
| 106 | |
| 107 bool ChromeContentBrowserClientPluginsPart::IsPluginAllowedToUseDevChannelAPIs( | |
| 108 content::BrowserContext* browser_context, | |
| 109 const GURL& url, | |
| 110 const std::set<std::string>& allowed_dev_channel_origins) { | |
| 111 // Allow access for tests. | |
| 112 if (CommandLine::ForCurrentProcess()->HasSwitch( | |
| 113 switches::kEnablePepperTesting)) { | |
| 114 return true; | |
| 115 } | |
| 116 | |
| 117 Profile* profile = Profile::FromBrowserContext(browser_context); | |
| 118 const extensions::ExtensionSet* extension_set = NULL; | |
| 119 if (profile) { | |
| 120 extension_set = | |
| 121 &extensions::ExtensionRegistry::Get(profile)->enabled_extensions(); | |
| 122 } | |
| 123 | |
| 124 // Allow access for whitelisted applications. | |
| 125 if (chrome::IsExtensionOrSharedModuleWhitelisted( | |
| 126 url, extension_set, allowed_dev_channel_origins)) { | |
| 127 return true; | |
| 128 } | |
| 129 | |
| 130 chrome::VersionInfo::Channel channel = chrome::VersionInfo::GetChannel(); | |
| 131 // Allow dev channel APIs to be used on "Canary", "Dev", and "Unknown" | |
| 132 // releases of Chrome. Permitting "Unknown" allows these APIs to be used on | |
| 133 // Chromium builds as well. | |
| 134 return channel <= chrome::VersionInfo::CHANNEL_DEV; | |
| 135 } | |
| 136 | |
| 137 void ChromeContentBrowserClientPluginsPart::DidCreatePpapiPlugin( | |
| 138 content::BrowserPpapiHost* browser_host) { | |
| 139 browser_host->GetPpapiHost()->AddHostFactoryFilter( | |
| 140 scoped_ptr<ppapi::host::HostFactory>( | |
| 141 new chrome::ChromeBrowserPepperHostFactory(browser_host))); | |
| 142 } | |
| 143 | |
| 144 } // namespace plugins | |
| OLD | NEW |