// Copyright 2016 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "extensions/browser/extension_navigation_throttle.h" #include #include "components/guest_view/browser/guest_view_base.h" #include "content/public/browser/browser_thread.h" #include "content/public/browser/navigation_handle.h" #include "content/public/browser/render_frame_host.h" #include "content/public/browser/storage_partition_config.h" #include "content/public/browser/web_contents.h" #include "content/public/common/url_constants.h" #include "extensions/browser/app_window/app_window.h" #include "extensions/browser/app_window/app_window_registry.h" #include "extensions/browser/extension_host.h" #include "extensions/browser/extension_registry.h" #include "extensions/browser/extensions_browser_client.h" #include "extensions/browser/guest_view/app_view/app_view_guest.h" #include "extensions/browser/guest_view/mime_handler_view/mime_handler_view_embedder.h" #include "extensions/browser/guest_view/web_view/web_view_guest.h" #include "extensions/browser/process_manager.h" #include "extensions/browser/url_request_util.h" #include "extensions/browser/view_type_utils.h" #include "extensions/common/constants.h" #include "extensions/common/extension.h" #include "extensions/common/extension_set.h" #include "extensions/common/identifiability_metrics.h" #include "extensions/common/manifest_handlers/icons_handler.h" #include "extensions/common/manifest_handlers/web_accessible_resources_info.h" #include "extensions/common/manifest_handlers/webview_info.h" #include "extensions/common/permissions/api_permission.h" #include "extensions/common/permissions/permissions_data.h" #include "services/metrics/public/cpp/ukm_source_id.h" #include "services/network/public/cpp/web_sandbox_flags.h" #include "ui/base/page_transition_types.h" namespace extensions { namespace { // Whether a navigation to the |platform_app| resource should be blocked in the // given |web_contents|. bool ShouldBlockNavigationToPlatformAppResource( const Extension* platform_app, content::WebContents* web_contents) { ViewType view_type = GetViewType(web_contents); DCHECK_NE(VIEW_TYPE_INVALID, view_type); // Navigation to platform app's background page. if (view_type == VIEW_TYPE_EXTENSION_BACKGROUND_PAGE) return false; // Navigation within an extension dialog, e.g. this is used by ChromeOS file // manager. if (view_type == VIEW_TYPE_EXTENSION_DIALOG) return false; // Navigation within an app window. The app window must belong to the // |platform_app|. if (view_type == VIEW_TYPE_APP_WINDOW) { AppWindowRegistry* registry = AppWindowRegistry::Get(web_contents->GetBrowserContext()); DCHECK(registry); AppWindow* app_window = registry->GetAppWindowForWebContents(web_contents); DCHECK(app_window); return app_window->extension_id() != platform_app->id(); } // Navigation within a guest web contents. if (view_type == VIEW_TYPE_EXTENSION_GUEST) { // Platform apps can be embedded by other platform apps using an // tag. AppViewGuest* app_view = AppViewGuest::FromWebContents(web_contents); if (app_view) return false; // Webviews owned by the platform app can embed platform app resources via // "accessible_resources". WebViewGuest* web_view_guest = WebViewGuest::FromWebContents(web_contents); if (web_view_guest) return web_view_guest->owner_host() != platform_app->id(); // Otherwise, it's a guest view that's neither a webview nor an appview // (such as an extensionoptions view). Disallow. return true; } DCHECK(view_type == VIEW_TYPE_BACKGROUND_CONTENTS || view_type == VIEW_TYPE_COMPONENT || view_type == VIEW_TYPE_EXTENSION_POPUP || view_type == VIEW_TYPE_TAB_CONTENTS) << "Unhandled view type: " << view_type; return true; } } // namespace ExtensionNavigationThrottle::ExtensionNavigationThrottle( content::NavigationHandle* navigation_handle) : content::NavigationThrottle(navigation_handle) {} ExtensionNavigationThrottle::~ExtensionNavigationThrottle() {} content::NavigationThrottle::ThrottleCheckResult ExtensionNavigationThrottle::WillStartOrRedirectRequest() { DCHECK_CURRENTLY_ON(content::BrowserThread::UI); content::WebContents* web_contents = navigation_handle()->GetWebContents(); content::BrowserContext* browser_context = web_contents->GetBrowserContext(); // Prevent the extension's background page from being navigated away. See // crbug.com/1130083. if (navigation_handle()->IsInMainFrame()) { ProcessManager* process_manager = ProcessManager::Get(browser_context); DCHECK(process_manager); ExtensionHost* host = process_manager->GetExtensionHostForRenderFrameHost( web_contents->GetMainFrame()); // Navigation throttles don't intercept same document navigations, hence we // can ignore that case. DCHECK(!navigation_handle()->IsSameDocument()); if (host && host->extension_host_type() == VIEW_TYPE_EXTENSION_BACKGROUND_PAGE && host->initial_url() != navigation_handle()->GetURL()) { return content::NavigationThrottle::CANCEL; } } // Is this navigation targeting an extension resource? ExtensionRegistry* registry = ExtensionRegistry::Get(browser_context); const GURL& url = navigation_handle()->GetURL(); bool url_has_extension_scheme = url.SchemeIs(kExtensionScheme); url::Origin target_origin = url::Origin::Create(url); const Extension* target_extension = nullptr; if (url_has_extension_scheme) { // "chrome-extension://" URL. target_extension = registry->enabled_extensions().GetExtensionOrAppByURL(url); } else if (target_origin.scheme() == kExtensionScheme) { // "blob:chrome-extension://" or "filesystem:chrome-extension://" URL. DCHECK(url.SchemeIsFileSystem() || url.SchemeIsBlob()); target_extension = registry->enabled_extensions().GetByID(target_origin.host()); } else { // If the navigation is not to a chrome-extension resource, no need to // perform any more checks; it's outside of the purview of this throttle. return content::NavigationThrottle::PROCEED; } ukm::SourceIdObj source_id = ukm::SourceIdObj::FromInt64( navigation_handle()->GetNextPageUkmSourceId()); // If the navigation is to an unknown or disabled extension, block it. if (!target_extension) { RecordExtensionResourceAccessResult( source_id, url, ExtensionResourceAccessResult::kFailure); // TODO(nick): This yields an unsatisfying error page; use a different error // code once that's supported. https://crbug.com/649869 return content::NavigationThrottle::BLOCK_REQUEST; } // Hosted apps don't have any associated resources outside of icons, so // block any requests to URLs in their extension origin. if (target_extension->is_hosted_app()) { base::StringPiece resource_root_relative_path = url.path_piece().empty() ? base::StringPiece() : url.path_piece().substr(1); if (!IconsInfo::GetIcons(target_extension) .ContainsPath(resource_root_relative_path)) { RecordExtensionResourceAccessResult( source_id, url, ExtensionResourceAccessResult::kFailure); return content::NavigationThrottle::BLOCK_REQUEST; } } // Block all navigations to blob: or filesystem: URLs with extension // origin from non-extension processes. See https://crbug.com/645028 and // https://crbug.com/836858. bool current_frame_is_extension_process = !!registry->enabled_extensions().GetExtensionOrAppByURL( navigation_handle()->GetStartingSiteInstance()->GetSiteURL()); if (!url_has_extension_scheme && !current_frame_is_extension_process) { // Relax this restriction for apps that use . See // https://crbug.com/652077. bool has_webview_permission = target_extension->permissions_data()->HasAPIPermission( APIPermission::kWebView); if (!has_webview_permission) { RecordExtensionResourceAccessResult( source_id, url, ExtensionResourceAccessResult::kCancel); return content::NavigationThrottle::CANCEL; } } if (navigation_handle()->IsInMainFrame()) { guest_view::GuestViewBase* guest = guest_view::GuestViewBase::FromWebContents(web_contents); if (url_has_extension_scheme && guest) { // This only handles top-level navigations. For subresources, is is done // in url_request_util::AllowCrossRendererResourceLoad. const std::string& owner_extension_id = guest->owner_host(); const Extension* owner_extension = registry->enabled_extensions().GetByID(owner_extension_id); content::StoragePartitionConfig storage_partition_config = content::StoragePartitionConfig::CreateDefault(); bool is_guest = WebViewGuest::GetGuestPartitionConfigForSite( navigation_handle()->GetStartingSiteInstance()->GetSiteURL(), &storage_partition_config); bool allowed = true; url_request_util::AllowCrossRendererResourceLoadHelper( is_guest, target_extension, owner_extension, storage_partition_config.partition_name(), url.path(), navigation_handle()->GetPageTransition(), &allowed); if (!allowed) { RecordExtensionResourceAccessResult( source_id, url, ExtensionResourceAccessResult::kFailure); return content::NavigationThrottle::BLOCK_REQUEST; } } } if (target_extension->is_platform_app() && ShouldBlockNavigationToPlatformAppResource(target_extension, web_contents)) { RecordExtensionResourceAccessResult( source_id, url, ExtensionResourceAccessResult::kFailure); return content::NavigationThrottle::BLOCK_REQUEST; } // Navigations with no initiator (e.g. browser-initiated requests) are always // considered trusted, and thus allowed. // // Note that GuestView navigations initiated by the embedder also count as a // browser-initiated navigation. if (!navigation_handle()->GetInitiatorOrigin().has_value()) { DCHECK(!navigation_handle()->IsRendererInitiated()); return content::NavigationThrottle::PROCEED; } // All renderer-initiated navigations must have an initiator. DCHECK(navigation_handle()->GetInitiatorOrigin().has_value()); const url::Origin& initiator_origin = navigation_handle()->GetInitiatorOrigin().value(); // Navigations from chrome://, devtools:// or chrome-search:// pages need to // be allowed, even if the target |url| is not web-accessible. See also: // - https://crbug.com/662602 // - similar checks in extensions::ResourceRequestPolicy::CanRequestResource if (initiator_origin.scheme() == content::kChromeUIScheme || initiator_origin.scheme() == content::kChromeDevToolsScheme || ExtensionsBrowserClient::Get()->ShouldSchemeBypassNavigationChecks( initiator_origin.scheme())) { return content::NavigationThrottle::PROCEED; } // An extension can initiate navigations to any of its resources. if (initiator_origin == target_origin) return content::NavigationThrottle::PROCEED; // Cancel cross-origin-initiator navigations to blob: or filesystem: URLs. if (!url_has_extension_scheme) { RecordExtensionResourceAccessResult(source_id, url, ExtensionResourceAccessResult::kCancel); return content::NavigationThrottle::CANCEL; } // Cross-origin-initiator navigations require that the |url| is in the // manifest's "web_accessible_resources" section. if (!WebAccessibleResourcesInfo::IsResourceWebAccessible(target_extension, url.path())) { RecordExtensionResourceAccessResult( source_id, url, ExtensionResourceAccessResult::kFailure); return content::NavigationThrottle::BLOCK_REQUEST; } // A platform app may not be loaded in an