// Copyright 2013 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "chrome/common/pepper_permission_util.h" #include <vector> #include "base/command_line.h" #include "base/sha1.h" #include "base/strings/string_number_conversions.h" #include "base/strings/string_tokenizer.h" #include "extensions/common/constants.h" #include "extensions/common/extension.h" #include "extensions/common/extension_set.h" #include "extensions/common/manifest_handlers/shared_module_info.h" using extensions::Extension; using extensions::Manifest; using extensions::SharedModuleInfo; namespace chrome { namespace { std::string HashHost(const std::string& host) { const std::string id_hash = base::SHA1HashString(host); DCHECK_EQ(id_hash.length(), base::kSHA1Length); return base::HexEncode(id_hash.c_str(), id_hash.length()); } bool HostIsInSet(const std::string& host, const std::set<std::string>& set) { return set.count(host) > 0 || set.count(HashHost(host)) > 0; } } // namespace bool IsExtensionOrSharedModuleWhitelisted( const GURL& url, const extensions::ExtensionSet* extension_set, const std::set<std::string>& whitelist) { if (!url.is_valid() || !url.SchemeIs(extensions::kExtensionScheme)) return false; const std::string host = url.host(); if (HostIsInSet(host, whitelist)) return true; // Check the modules that are imported by this extension to see if any of them // is whitelisted. const Extension* extension = extension_set ? extension_set->GetByID(host) : NULL; if (!extension) return false; typedef std::vector<SharedModuleInfo::ImportInfo> ImportInfoVector; const ImportInfoVector& imports = SharedModuleInfo::GetImports(extension); for (ImportInfoVector::const_iterator it = imports.begin(); it != imports.end(); ++it) { const Extension* imported_extension = extension_set->GetByID(it->extension_id); if (imported_extension && SharedModuleInfo::IsSharedModule(imported_extension) && // We check the whitelist explicitly even though the extension should // never have been allowed to be installed in the first place if this // fails. See SharedModuleService::CheckImports for details. SharedModuleInfo::IsExportAllowedByWhitelist(imported_extension, host) && HostIsInSet(it->extension_id, whitelist)) { return true; } } return false; } bool IsHostAllowedByCommandLine(const GURL& url, const extensions::ExtensionSet* extension_set, const char* command_line_switch) { if (!url.is_valid()) return false; const CommandLine& command_line = *CommandLine::ForCurrentProcess(); const std::string allowed_list = command_line.GetSwitchValueASCII(command_line_switch); if (allowed_list.empty()) return false; const std::string host = url.host(); if (allowed_list == "*") { // For now, we only allow packaged and platform apps in this wildcard. if (!extension_set || !url.SchemeIs(extensions::kExtensionScheme)) return false; const Extension* extension = extension_set->GetByID(host); return extension && (extension->GetType() == Manifest::TYPE_LEGACY_PACKAGED_APP || extension->GetType() == Manifest::TYPE_PLATFORM_APP); } base::StringTokenizer t(allowed_list, ","); while (t.GetNext()) { if (t.token() == host) return true; } return false; } } // namespace chrome