1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
|
// Copyright (c) 2012 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "chrome/browser/extensions/api/web_request/web_request_permissions.h"
#include "base/string_util.h"
#include "base/stringprintf.h"
#include "chrome/browser/extensions/extension_info_map.h"
#include "chrome/common/extensions/extension.h"
#include "chrome/common/extensions/extension_constants.h"
#include "chrome/common/url_constants.h"
#include "content/public/browser/resource_request_info.h"
#include "googleurl/src/gurl.h"
#include "net/url_request/url_request.h"
using content::ResourceRequestInfo;
namespace {
// Returns true if the URL is sensitive and requests to this URL must not be
// modified/canceled by extensions, e.g. because it is targeted to the webstore
// to check for updates, extension blacklisting, etc.
bool IsSensitiveURL(const GURL& url) {
// TODO(battre) Merge this, CanExtensionAccessURL and
// Extension::CanExecuteScriptOnPage into one function.
bool sensitive_chrome_url = false;
const std::string host = url.host();
const char kGoogleCom[] = ".google.com";
const char kClient[] = "clients";
if (EndsWith(host, kGoogleCom, true)) {
// Check for "clients[0-9]*.google.com" hosts.
// This protects requests to several internal services such as sync,
// extension update pings, captive portal detection, fraudulent certificate
// reporting, autofill and others.
if (StartsWithASCII(host, kClient, true)) {
bool match = true;
for (std::string::const_iterator i = host.begin() + strlen(kClient),
end = host.end() - strlen(kGoogleCom); i != end; ++i) {
if (!isdigit(*i))
match = false;
}
sensitive_chrome_url = sensitive_chrome_url || match;
}
// This protects requests to safe browsing, link doctor, and possibly
// others.
sensitive_chrome_url = sensitive_chrome_url ||
EndsWith(url.host(), ".clients.google.com", true) ||
url.host() == "sb-ssl.google.com";
}
GURL::Replacements replacements;
replacements.ClearQuery();
replacements.ClearRef();
GURL url_without_query = url.ReplaceComponents(replacements);
return sensitive_chrome_url ||
extension_urls::IsWebstoreUpdateUrl(url_without_query) ||
extension_urls::IsBlacklistUpdateUrl(url);
}
// Returns true if the scheme is one we want to allow extensions to have access
// to. Extensions still need specific permissions for a given URL, which is
// covered by CanExtensionAccessURL.
bool HasWebRequestScheme(const GURL& url) {
return (url.SchemeIs(chrome::kAboutScheme) ||
url.SchemeIs(chrome::kFileScheme) ||
url.SchemeIs(chrome::kFileSystemScheme) ||
url.SchemeIs(chrome::kFtpScheme) ||
url.SchemeIs(chrome::kHttpScheme) ||
url.SchemeIs(chrome::kHttpsScheme) ||
url.SchemeIs(chrome::kExtensionScheme));
}
} // namespace
// static
bool WebRequestPermissions::HideRequest(
const ExtensionInfoMap* extension_info_map,
const net::URLRequest* request) {
// Hide requests from the Chrome WebStore App.
const ResourceRequestInfo* info = ResourceRequestInfo::ForRequest(request);
if (info && extension_info_map) {
int process_id = info->GetChildID();
const extensions::ProcessMap& process_map =
extension_info_map->process_map();
if (process_map.Contains(extension_misc::kWebStoreAppId, process_id))
return true;
}
const GURL& url = request->url();
return IsSensitiveURL(url) || !HasWebRequestScheme(url);
}
// static
bool WebRequestPermissions::CanExtensionAccessURL(
const ExtensionInfoMap* extension_info_map,
const std::string& extension_id,
const GURL& url,
bool crosses_incognito,
bool enforce_host_permissions) {
// extension_info_map can be NULL in testing.
if (!extension_info_map)
return true;
const extensions::Extension* extension =
extension_info_map->extensions().GetByID(extension_id);
if (!extension)
return false;
// Check if this event crosses incognito boundaries when it shouldn't.
if (crosses_incognito && !extension_info_map->CanCrossIncognito(extension))
return false;
if (enforce_host_permissions) {
// about: URLs are not covered in host permissions, but are allowed anyway.
bool host_permissions_ok = (url.SchemeIs(chrome::kAboutScheme) ||
extension->HasHostPermission(url) ||
url.GetOrigin() == extension->url());
if (!host_permissions_ok)
return false;
}
return true;
}
|