1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
|
// Copyright (c) 2012 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "chrome/browser/extensions/api/messaging/native_process_launcher.h"
#include <utility>
#include "base/command_line.h"
#include "base/files/file_util.h"
#include "base/files/scoped_file.h"
#include "base/logging.h"
#include "base/path_service.h"
#include "base/posix/eintr_wrapper.h"
#include "base/process/launch.h"
#include "build/build_config.h"
#include "chrome/common/chrome_paths.h"
namespace extensions {
namespace {
base::FilePath FindManifestInDir(int dir_key, const std::string& host_name) {
base::FilePath base_path;
if (PathService::Get(dir_key, &base_path)) {
base::FilePath path = base_path.Append(host_name + ".json");
if (base::PathExists(path))
return path;
}
return base::FilePath();
}
} // namespace
// static
base::FilePath NativeProcessLauncher::FindManifest(
const std::string& host_name,
bool allow_user_level_hosts,
std::string* error_message) {
base::FilePath result;
if (allow_user_level_hosts)
result = FindManifestInDir(chrome::DIR_USER_NATIVE_MESSAGING, host_name);
if (result.empty())
result = FindManifestInDir(chrome::DIR_NATIVE_MESSAGING, host_name);
if (result.empty())
*error_message = "Can't find native messaging host " + host_name;
return result;
}
// static
bool NativeProcessLauncher::LaunchNativeProcess(
const base::CommandLine& command_line,
base::Process* process,
base::File* read_file,
base::File* write_file) {
base::FileHandleMappingVector fd_map;
int read_pipe_fds[2] = {0};
if (HANDLE_EINTR(pipe(read_pipe_fds)) != 0) {
LOG(ERROR) << "Bad read pipe";
return false;
}
base::ScopedFD read_pipe_read_fd(read_pipe_fds[0]);
base::ScopedFD read_pipe_write_fd(read_pipe_fds[1]);
fd_map.push_back(std::make_pair(read_pipe_write_fd.get(), STDOUT_FILENO));
int write_pipe_fds[2] = {0};
if (HANDLE_EINTR(pipe(write_pipe_fds)) != 0) {
LOG(ERROR) << "Bad write pipe";
return false;
}
base::ScopedFD write_pipe_read_fd(write_pipe_fds[0]);
base::ScopedFD write_pipe_write_fd(write_pipe_fds[1]);
fd_map.push_back(std::make_pair(write_pipe_read_fd.get(), STDIN_FILENO));
base::LaunchOptions options;
options.fds_to_remap = &fd_map;
#if defined(OS_LINUX) && !defined(OS_CHROMEOS)
// Don't use no_new_privs mode, e.g. in case the host needs to use sudo.
options.allow_new_privs = true;
#endif
base::Process local_process = base::LaunchProcess(command_line, options);
if (!local_process.IsValid()) {
LOG(ERROR) << "Error launching process";
return false;
}
// We will not be reading from the write pipe, nor writing from the read pipe.
write_pipe_read_fd.reset();
read_pipe_write_fd.reset();
*process = std::move(local_process);
*read_file = base::File(read_pipe_read_fd.release());
*write_file = base::File(write_pipe_write_fd.release());
return true;
}
} // namespace extensions
|