// Copyright 2014 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "extensions/browser/url_request_util.h" #include #include "content/public/browser/resource_request_info.h" #include "extensions/browser/extension_navigation_ui_data.h" #include "extensions/browser/extensions_browser_client.h" #include "extensions/browser/guest_view/web_view/web_view_renderer_state.h" #include "extensions/browser/process_map.h" #include "extensions/common/extension.h" #include "extensions/common/extension_set.h" #include "extensions/common/manifest_handlers/icons_handler.h" #include "extensions/common/manifest_handlers/web_accessible_resources_info.h" #include "extensions/common/manifest_handlers/webview_info.h" #include "net/url_request/url_request.h" namespace extensions { namespace url_request_util { bool AllowCrossRendererResourceLoad(const GURL& url, content::ResourceType resource_type, ui::PageTransition page_transition, int child_id, bool is_incognito, const Extension* extension, const ExtensionSet& extensions, const ProcessMap& process_map, bool* allowed) { std::string resource_path = url.path(); // This logic is performed for main frame requests in // ExtensionNavigationThrottle::WillStartRequest. if (child_id != -1 || resource_type != content::RESOURCE_TYPE_MAIN_FRAME) { // Extensions with webview: allow loading certain resources by guest // renderers with privileged partition IDs as specified in owner's extension // the manifest file. std::string owner_extension_id; int owner_process_id; WebViewRendererState::GetInstance()->GetOwnerInfo( child_id, &owner_process_id, &owner_extension_id); const Extension* owner_extension = extensions.GetByID(owner_extension_id); std::string partition_id; bool is_guest = WebViewRendererState::GetInstance()->GetPartitionID( child_id, &partition_id); if (AllowCrossRendererResourceLoadHelper( is_guest, extension, owner_extension, partition_id, resource_path, page_transition, allowed)) { return true; } } // The following checks require that we have an actual extension object. If we // don't have it, allow the request handling to continue with the rest of the // checks. if (!extension) { *allowed = true; return true; } // Disallow loading of packaged resources for hosted apps. We don't allow // hybrid hosted/packaged apps. The one exception is access to icons, since // some extensions want to be able to do things like create their own // launchers. base::StringPiece resource_root_relative_path = url.path_piece().empty() ? base::StringPiece() : url.path_piece().substr(1); if (extension->is_hosted_app() && !IconsInfo::GetIcons(extension) .ContainsPath(resource_root_relative_path)) { LOG(ERROR) << "Denying load of " << url.spec() << " from hosted app."; *allowed = false; return true; } DCHECK_EQ(extension->url(), url.GetWithEmptyPath()); // Navigating the main frame to an extension URL is allowed, even if not // explicitly listed as web_accessible_resource. if (resource_type == content::RESOURCE_TYPE_MAIN_FRAME) { *allowed = true; return true; } else if (resource_type == content::RESOURCE_TYPE_SUB_FRAME) { // When navigating in subframe, allow if it is the same origin // as the top-level frame. This can only be the case if the subframe // request is coming from the extension process. if (process_map.Contains(child_id)) { *allowed = true; return true; } // Also allow if the file is explicitly listed as a web_accessible_resource. if (WebAccessibleResourcesInfo::IsResourceWebAccessible(extension, resource_path)) { *allowed = true; return true; } } // Since not all subresources are required to be listed in a v2 // manifest, we must allow all subresource loads if there are any web // accessible resources. See http://crbug.com/179127. if (!content::IsResourceTypeFrame(resource_type) && WebAccessibleResourcesInfo::HasWebAccessibleResources(extension)) { *allowed = true; return true; } if (!ui::PageTransitionIsWebTriggerable(page_transition)) { *allowed = false; return true; } // Couldn't determine if the resource is allowed or not. return false; } bool AllowCrossRendererResourceLoadHelper(bool is_guest, const Extension* extension, const Extension* owner_extension, const std::string& partition_id, const std::string& resource_path, ui::PageTransition page_transition, bool* allowed) { if (is_guest) { // Exceptionally, the resource at path "/success.html" that belongs to the // sign-in extension (loaded by chrome://chrome-signin) is accessible to // WebViews that are not owned by that extension. // This exception is required as in order to mark the end of the the sign-in // flow, Gaia redirects to the following continue URL: // "chrome-extension://mfffpogegjflfpflabcdkioaeobkgjik/success.html". // // TODO(http://crbug.com/688565) Remove this check once the sign-in // extension is deprecated and removed. bool is_signin_extension = extension && extension->id() == "mfffpogegjflfpflabcdkioaeobkgjik"; if (is_signin_extension && resource_path == "/success.html") { *allowed = true; return true; } // Allow mobile setup web UI (chrome://mobilesetup) to embed resources from // the component mobile activation extension in a webview. This is needed // because the activation web UI relies on the activation extension to // provide parts of its UI, and to redirect POST requests to the network // payment URL during mobile device initialization. // // TODO(http://crbug.com/778021): Fix mobile activation UI not to require // this workaround. bool is_mobile_activation_extension = extension && extension->id() == "iadeocfgjdjdmpenejdbfeaocpbikmab"; if (is_mobile_activation_extension && (resource_path == "/activation.html" || resource_path == "/portal_offline.html" || resource_path == "/invalid_device_info.html")) { *allowed = true; return true; } // An extension's resources should only be accessible to WebViews owned by // that extension. if (owner_extension != extension) { *allowed = false; return true; } *allowed = WebviewInfo::IsResourceWebviewAccessible(extension, partition_id, resource_path); return true; } return false; } } // namespace url_request_util } // namespace extensions