// Copyright (c) 2012 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #ifndef EXTENSIONS_BROWSER_SANDBOXED_UNPACKER_H_ #define EXTENSIONS_BROWSER_SANDBOXED_UNPACKER_H_ #include #include #include "base/files/file_path.h" #include "base/files/scoped_temp_dir.h" #include "base/macros.h" #include "base/memory/ref_counted_delete_on_sequence.h" #include "base/memory/weak_ptr.h" #include "base/optional.h" #include "base/strings/string_piece.h" #include "base/time/time.h" #include "extensions/browser/crx_file_info.h" #include "extensions/browser/image_sanitizer.h" #include "extensions/browser/install/crx_install_error.h" #include "extensions/browser/json_file_sanitizer.h" #include "extensions/common/manifest.h" #include "services/data_decoder/public/mojom/json_parser.mojom.h" #include "services/service_manager/public/cpp/identity.h" class SkBitmap; namespace base { class DictionaryValue; class ListValue; class SequencedTaskRunner; } namespace service_manager { class Connector; } namespace extensions { class Extension; class SandboxedUnpackerClient : public base::RefCountedDeleteOnSequence { public: // Initialize the ref-counted base to always delete on the UI thread. Note // the constructor call must also happen on the UI thread. SandboxedUnpackerClient(); // temp_dir - A temporary directory containing the results of the extension // unpacking. The client is responsible for deleting this directory. // // extension_root - The path to the extension root inside of temp_dir. // // original_manifest - The parsed but unmodified version of the manifest, // with no modifications such as localization, etc. // // extension - The extension that was unpacked. The client is responsible // for deleting this memory. // // install_icon - The icon we will display in the installation UI, if any. // // dnr_ruleset_checksum - Checksum for the indexed ruleset corresponding to // the Declarative Net Request API. Optional since it's only valid for // extensions which provide a declarative ruleset. virtual void OnUnpackSuccess( const base::FilePath& temp_dir, const base::FilePath& extension_root, std::unique_ptr original_manifest, const Extension* extension, const SkBitmap& install_icon, const base::Optional& dnr_ruleset_checksum) = 0; virtual void OnUnpackFailure(const CrxInstallError& error) = 0; protected: friend class base::RefCountedDeleteOnSequence; friend class base::DeleteHelper; virtual ~SandboxedUnpackerClient() = default; }; // SandboxedUnpacker does work to optionally unpack and then validate/sanitize // an extension, either starting from a crx file, or else an already unzipped // directory (eg., from a differential update). The parsing of complex data // formats like JPEG or JSON is performed in specific, sandboxed services. // // Unpacking an extension using this class makes changes to its source, such as // transcoding all images to PNG, parsing all message catalogs, and rewriting // the manifest JSON. As such, it should not be used when the output is not // intended to be given back to the author. // // Lifetime management: // // This class is ref-counted by each call it makes to itself on another thread. // // Additionally, we hold a reference to our own client so that the client lives // long enough to receive the result of unpacking. // // NOTE: This class should only be used on the FILE thread. // class SandboxedUnpacker : public base::RefCountedThreadSafe { public: // Creates a SanboxedUnpacker that will do work to unpack an extension, // passing the |location| and |creation_flags| to Extension::Create. The // |extensions_dir| parameter should specify the directory under which we'll // create a subdirectory to write the unpacked extension contents. // |connector| must be a fresh connector (not yet associated to any thread) to // the service manager. // Note: Because this requires disk I/O, the task runner passed should use // TaskShutdownBehavior::SKIP_ON_SHUTDOWN to ensure that either the task is // fully run (if initiated before shutdown) or not run at all (if shutdown is // initiated first). See crbug.com/235525. // TODO(devlin): We should probably just have SandboxedUnpacker use the common // ExtensionFileTaskRunner, and not pass in a separate one. // TODO(devlin): SKIP_ON_SHUTDOWN is also not quite sufficient for this. We // should probably instead be using base::ImportantFileWriter or similar. SandboxedUnpacker( std::unique_ptr connector, Manifest::Location location, int creation_flags, const base::FilePath& extensions_dir, const scoped_refptr& unpacker_io_task_runner, SandboxedUnpackerClient* client); // Start processing the extension, either from a CRX file or already unzipped // in a directory. The client is called with the results. The directory form // requires the id and base64-encoded public key (for insertion into the // 'key' field of the manifest.json file). void StartWithCrx(const CRXFileInfo& crx_info); void StartWithDirectory(const std::string& extension_id, const std::string& public_key_base64, const base::FilePath& directory); private: friend class base::RefCountedThreadSafe; // Enumerate all the ways unpacking can fail. Calls to ReportFailure() // take a failure reason as an argument, and put it in histogram // Extensions.SandboxUnpackFailureReason. enum FailureReason { // SandboxedUnpacker::CreateTempDirectory() COULD_NOT_GET_TEMP_DIRECTORY, COULD_NOT_CREATE_TEMP_DIRECTORY, // SandboxedUnpacker::Start() FAILED_TO_COPY_EXTENSION_FILE_TO_TEMP_DIRECTORY, COULD_NOT_GET_SANDBOX_FRIENDLY_PATH, // SandboxedUnpacker::UnpackExtensionSucceeded() COULD_NOT_LOCALIZE_EXTENSION, INVALID_MANIFEST, // SandboxedUnpacker::UnpackExtensionFailed() UNPACKER_CLIENT_FAILED, // SandboxedUnpacker::UtilityProcessCrashed() UTILITY_PROCESS_CRASHED_WHILE_TRYING_TO_INSTALL, // SandboxedUnpacker::ValidateSignature() CRX_FILE_NOT_READABLE, CRX_HEADER_INVALID, CRX_MAGIC_NUMBER_INVALID, CRX_VERSION_NUMBER_INVALID, CRX_EXCESSIVELY_LARGE_KEY_OR_SIGNATURE, CRX_ZERO_KEY_LENGTH, CRX_ZERO_SIGNATURE_LENGTH, CRX_PUBLIC_KEY_INVALID, CRX_SIGNATURE_INVALID, CRX_SIGNATURE_VERIFICATION_INITIALIZATION_FAILED, CRX_SIGNATURE_VERIFICATION_FAILED, // SandboxedUnpacker::RewriteManifestFile() ERROR_SERIALIZING_MANIFEST_JSON, ERROR_SAVING_MANIFEST_JSON, // SandboxedUnpacker::RewriteImageFiles() COULD_NOT_READ_IMAGE_DATA_FROM_DISK_UNUSED, DECODED_IMAGES_DO_NOT_MATCH_THE_MANIFEST_UNUSED, INVALID_PATH_FOR_BROWSER_IMAGE, ERROR_REMOVING_OLD_IMAGE_FILE, INVALID_PATH_FOR_BITMAP_IMAGE, ERROR_RE_ENCODING_THEME_IMAGE, ERROR_SAVING_THEME_IMAGE, DEPRECATED_ABORTED_DUE_TO_SHUTDOWN, // No longer used; kept for UMA. // SandboxedUnpacker::RewriteCatalogFiles() COULD_NOT_READ_CATALOG_DATA_FROM_DISK_UNUSED, INVALID_CATALOG_DATA, INVALID_PATH_FOR_CATALOG_UNUSED, ERROR_SERIALIZING_CATALOG, ERROR_SAVING_CATALOG, // SandboxedUnpacker::ValidateSignature() CRX_HASH_VERIFICATION_FAILED, UNZIP_FAILED, DIRECTORY_MOVE_FAILED, // SandboxedUnpacker::ValidateSignature() CRX_FILE_IS_DELTA_UPDATE, CRX_EXPECTED_HASH_INVALID, // SandboxedUnpacker::IndexAndPersistRulesIfNeeded() ERROR_PARSING_DNR_RULESET, ERROR_INDEXING_DNR_RULESET, NUM_FAILURE_REASONS }; friend class SandboxedUnpackerTest; ~SandboxedUnpacker(); // Create |temp_dir_| used to unzip or unpack the extension in. bool CreateTempDirectory(); // Helper functions to simplify calling ReportFailure. base::string16 FailureReasonToString16(FailureReason reason); void FailWithPackageError(FailureReason reason); // Validates the signature of the extension and extract the key to // |public_key_|. True if the signature validates, false otherwise. bool ValidateSignature(const base::FilePath& crx_path, const std::string& expected_hash); // Unzips the extension into directory. void Unzip(const base::FilePath& crx_path, const base::FilePath& unzipped_dir); void UnzipDone(const base::FilePath& zip_file, const base::FilePath& unzip_dir, const std::string& error); // Unpacks the extension in directory and returns the manifest. void Unpack(const base::FilePath& directory); void ReadManifestDone(std::unique_ptr manifest, const base::Optional& error); void UnpackExtensionSucceeded( std::unique_ptr manifest); void UnpackExtensionFailed(const base::string16& error); void ReportUnpackingError(base::StringPiece error); void ImageSanitizationDone(std::unique_ptr manifest, ImageSanitizer::Status status, const base::FilePath& path); void ImageSanitizerDecodedImage(const base::FilePath& path, SkBitmap image); void ReadMessageCatalogs(std::unique_ptr manifest); void SanitizeMessageCatalogs( std::unique_ptr manifest, const std::set& message_catalog_paths); void MessageCatalogsSanitized(std::unique_ptr manifest, JsonFileSanitizer::Status status, const std::string& error_msg); void ReadJSONRulesetIfNeeded(std::unique_ptr manifest); void ReadJSONRulesetDone(std::unique_ptr manifest, std::unique_ptr json_ruleset, const base::Optional& error); // Reports unpack success or failure, or unzip failure. void ReportSuccess(std::unique_ptr original_manifest, const base::Optional& dnr_ruleset_checksum); void ReportFailure(FailureReason reason, const base::string16& error); // Overwrites original manifest with safe result from utility process. // Returns NULL on error. Caller owns the returned object. base::DictionaryValue* RewriteManifestFile( const base::DictionaryValue& manifest); // Cleans up temp directory artifacts. void Cleanup(); // Indexes |json_ruleset| if it is non-null and persists the corresponding // indexed file for the Declarative Net Request API. Also, returns the // checksum of the indexed ruleset file if the ruleset was persisted. Returns // false and reports failure in case of an error. bool IndexAndPersistRulesIfNeeded( std::unique_ptr json_ruleset, base::Optional* dnr_ruleset_checksum); // Returns a JsonParser that can be used on the |unpacker_io_task_runner|. data_decoder::mojom::JsonParser* GetJsonParserPtr(); // Parses the JSON file at |path| and invokes |callback| when done. |callback| // is called with a null parameter if parsing failed. // This must be called from the |unpacker_io_task_runner_|. void ParseJsonFile(const base::FilePath& path, data_decoder::mojom::JsonParser::ParseCallback callback); // Connector to the ServiceManager required by the Unzip API. std::unique_ptr connector_; // If we unpacked a CRX file, we hold on to the path name for use // in various histograms. base::FilePath crx_path_for_histograms_; // Our unpacker client. scoped_refptr client_; // The Extensions directory inside the profile. base::FilePath extensions_dir_; // Temporary directory to use for unpacking. base::ScopedTempDir temp_dir_; // Root directory of the unpacked extension (a child of temp_dir_). base::FilePath extension_root_; // Represents the extension we're unpacking. scoped_refptr extension_; // The public key that was extracted from the CRX header. std::string public_key_; // The extension's ID. This will be calculated from the public key // in the CRX header. std::string extension_id_; // If we unpacked a CRX file, the time at which unpacking started. // Used to compute the time unpacking takes. base::TimeTicks crx_unpack_start_time_; // Location to use for the unpacked extension. Manifest::Location location_; // Creation flags to use for the extension. These flags will be used // when calling Extenion::Create() by the CRX installer. int creation_flags_; // Sequenced task runner where file I/O operations will be performed. scoped_refptr unpacker_io_task_runner_; // The normalized path of the install icon path, retrieved from the manifest. base::FilePath install_icon_path_; // The decoded install icon. SkBitmap install_icon_; // The identity used to connect to the data decoder service. It is unique to // this SandboxedUnpacker instance so that data decoder operations for // unpacking this extension share the same process, and so that no unrelated // data decoder operation use that process. service_manager::Identity data_decoder_identity_; // The JSONParser interface pointer from the data decoder service. data_decoder::mojom::JsonParserPtr json_parser_ptr_; // The ImageSanitizer used to clean-up images. std::unique_ptr image_sanitizer_; // Used during the message catalog rewriting phase to sanitize the extension // provided message catalogs. std::unique_ptr json_file_sanitizer_; DISALLOW_COPY_AND_ASSIGN(SandboxedUnpacker); }; } // namespace extensions #endif // EXTENSIONS_BROWSER_SANDBOXED_UNPACKER_H_