blob: 7a7e9eef72835a5c2d73190eab45cfc66ae54b4a [file]
// Copyright 2013 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "extensions/browser/unpacked_installer.h"
#include <string>
#include <utility>
#include "base/files/file_util.h"
#include "base/functional/bind.h"
#include "base/functional/callback.h"
#include "base/path_service.h"
#include "base/strings/string_util.h"
#include "base/strings/utf_string_conversions.h"
#include "base/threading/thread_restrictions.h"
#include "build/branding_buildflags.h"
#include "build/build_config.h"
#include "components/crx_file/id_util.h"
#include "components/keyed_service/content/browser_context_keyed_service_shutdown_notifier_factory.h"
#include "components/keyed_service/core/keyed_service_shutdown_notifier.h"
#include "components/sync/model/string_ordinal.h"
#include "content/public/browser/browser_context.h"
#include "content/public/browser/browser_task_traits.h"
#include "content/public/browser/browser_thread.h"
#include "extensions/browser/api/declarative_net_request/install_index_helper.h"
#include "extensions/browser/event_router_factory.h"
#include "extensions/browser/extension_file_task_runner.h"
#include "extensions/browser/extension_management_client.h"
#include "extensions/browser/extension_prefs.h"
#include "extensions/browser/extension_registrar.h"
#include "extensions/browser/extension_registry.h"
#include "extensions/browser/extension_registry_factory.h"
#include "extensions/browser/extension_system.h"
#include "extensions/browser/extension_util.h"
#include "extensions/browser/extensions_browser_client.h"
#include "extensions/browser/install_flag.h"
#include "extensions/browser/install_prefs_helper.h"
#include "extensions/browser/load_error_reporter.h"
#include "extensions/browser/path_util.h"
#include "extensions/browser/permissions/permissions_updater.h"
#include "extensions/browser/policy_check.h"
#include "extensions/browser/preload_check_group.h"
#include "extensions/browser/requirements_checker.h"
#include "extensions/browser/ruleset_parse_result.h"
#include "extensions/buildflags/buildflags.h"
#include "extensions/common/constants.h"
#include "extensions/common/extension.h"
#include "extensions/common/extension_features.h"
#include "extensions/common/extension_l10n_util.h"
#include "extensions/common/file_util.h"
#include "extensions/common/manifest.h"
#include "extensions/common/manifest_constants.h"
#include "extensions/common/manifest_handlers/shared_module_info.h"
#include "extensions/common/mojom/manifest.mojom-shared.h"
#include "extensions/common/permissions/permissions_data.h"
static_assert(BUILDFLAG(ENABLE_EXTENSIONS_CORE));
using content::BrowserThread;
using extensions::Extension;
using extensions::SharedModuleInfo;
namespace extensions {
namespace {
const char16_t kUnpackedExtensionsBlocklistedError[] =
u"Loading of unpacked extensions is disabled by the administrator.";
const char16_t kImportMinVersionNewer[] =
u"'import' version requested is newer than what is installed.";
const char16_t kImportMissing[] = u"'import' extension is not installed.";
const char16_t kImportNotSharedModule[] = u"'import' is not a shared module.";
const char16_t kFilePathResolvedError[] = u"File path cannot be resolved.";
class BrowserContextShutdownNotifierFactory
: public BrowserContextKeyedServiceShutdownNotifierFactory {
public:
static BrowserContextShutdownNotifierFactory* GetInstance() {
static base::NoDestructor<BrowserContextShutdownNotifierFactory> s_factory;
return s_factory.get();
}
// No copying.
BrowserContextShutdownNotifierFactory(
const BrowserContextShutdownNotifierFactory&) = delete;
BrowserContextShutdownNotifierFactory& operator=(
const BrowserContextShutdownNotifierFactory&) = delete;
private:
friend class base::NoDestructor<BrowserContextShutdownNotifierFactory>;
BrowserContextShutdownNotifierFactory()
: BrowserContextKeyedServiceShutdownNotifierFactory("UnpackedInstaller") {
DependsOn(ExtensionRegistryFactory::GetInstance());
DependsOn(EventRouterFactory::GetInstance());
}
content::BrowserContext* GetBrowserContextToUse(
content::BrowserContext* context) const override {
return ExtensionsBrowserClient::Get()->GetContextOwnInstance(context);
}
};
} // namespace
// static
void UnpackedInstaller::EnsureShutdownNotifierFactoryBuilt() {
BrowserContextShutdownNotifierFactory::GetInstance();
}
// static
scoped_refptr<UnpackedInstaller> UnpackedInstaller::Create(
content::BrowserContext* context) {
CHECK(context);
return scoped_refptr<UnpackedInstaller>(new UnpackedInstaller(context));
}
UnpackedInstaller::UnpackedInstaller(content::BrowserContext* context)
: browser_context_(context),
require_modern_manifest_version_(true),
be_noisy_on_failure_(true) {
DCHECK_CURRENTLY_ON(BrowserThread::UI);
// Observe for BrowserContext shutdown. Unretained is safe because the
// callback subscription is owned by this object.
browser_context_shutdown_subscription_ =
BrowserContextShutdownNotifierFactory::GetInstance()
->Get(browser_context_)
->Subscribe(base::BindRepeating(&UnpackedInstaller::Shutdown,
base::Unretained(this)));
}
UnpackedInstaller::~UnpackedInstaller() {
DCHECK_CURRENTLY_ON(BrowserThread::UI);
}
void UnpackedInstaller::Load(const base::FilePath& path_in) {
DCHECK(extension_path_.empty());
extension_path_ = path_in;
if (!browser_context_) {
return;
}
GetExtensionFileTaskRunner()->PostTask(
FROM_HERE,
base::BindOnce(&UnpackedInstaller::GetAbsolutePathOnFileThread, this));
}
bool UnpackedInstaller::LoadFromCommandLine(const base::FilePath& path_in,
std::string* extension_id,
bool only_allow_apps) {
DCHECK_CURRENTLY_ON(BrowserThread::UI);
DCHECK(extension_path_.empty());
if (!browser_context_) {
return false;
}
// Load extensions from the command line synchronously to avoid a race
// between extension loading and loading an URL from the command line.
base::ScopedAllowBlocking allow_blocking;
extension_path_ =
base::MakeAbsoluteFilePath(path_util::ResolveHomeDirectory(path_in));
if (!IsLoadingUnpackedAllowed()) {
ReportExtensionLoadError(kUnpackedExtensionsBlocklistedError);
return false;
}
std::u16string error;
if (!LoadExtension(mojom::ManifestLocation::kCommandLine, GetFlags(),
&error)) {
ReportExtensionLoadError(error);
return false;
}
if (only_allow_apps && !extension()->is_platform_app()) {
#if BUILDFLAG(GOOGLE_CHROME_BRANDING)
// Avoid crashing for users with hijacked shortcuts.
return true;
#else
// Defined here to avoid unused variable errors in official builds.
const char16_t extension_instead_of_app_error[] =
u"App loading flags cannot be used to load extensions. Please use "
"--load-extension instead.";
ReportExtensionLoadError(extension_instead_of_app_error);
return false;
#endif
}
extension()->permissions_data()->BindToCurrentThread();
PermissionsUpdater(browser_context_, PermissionsUpdater::InitFlag::kTransient)
.InitializePermissions(extension());
StartInstallChecks();
*extension_id = extension()->id();
return true;
}
void UnpackedInstaller::StartInstallChecks() {
DCHECK_CURRENTLY_ON(BrowserThread::UI);
if (!browser_context_) {
return;
}
// TODO(crbug.com/40388034): Enable these checks all the time. The reason
// they are disabled for extensions loaded from the command-line is that
// installing unpacked extensions is asynchronous, but there can be
// dependencies between the extensions loaded by the command line.
if (extension()->manifest()->location() !=
mojom::ManifestLocation::kCommandLine) {
// TODO(crbug.com/40387578): Move this code to a utility class to avoid
// duplication of SharedModuleService::CheckImports code.
if (SharedModuleInfo::ImportsModules(extension())) {
const std::vector<SharedModuleInfo::ImportInfo>& imports =
SharedModuleInfo::GetImports(extension());
std::vector<SharedModuleInfo::ImportInfo>::const_iterator i;
ExtensionRegistry* registry = ExtensionRegistry::Get(browser_context_);
for (i = imports.begin(); i != imports.end(); ++i) {
base::Version version_required(i->minimum_version);
const Extension* imported_module = registry->GetExtensionById(
i->extension_id, ExtensionRegistry::EVERYTHING);
if (!imported_module) {
ReportExtensionLoadError(kImportMissing);
return;
} else if (imported_module &&
!SharedModuleInfo::IsSharedModule(imported_module)) {
ReportExtensionLoadError(kImportNotSharedModule);
return;
} else if (imported_module && (version_required.IsValid() &&
imported_module->version().CompareTo(
version_required) < 0)) {
ReportExtensionLoadError(kImportMinVersionNewer);
return;
}
}
}
}
policy_check_ = std::make_unique<PolicyCheck>(browser_context_, extension_);
requirements_check_ = std::make_unique<RequirementsChecker>(extension_);
check_group_ = std::make_unique<PreloadCheckGroup>();
check_group_->set_stop_on_first_error(true);
check_group_->AddCheck(policy_check_.get());
check_group_->AddCheck(requirements_check_.get());
check_group_->Start(
base::BindOnce(&UnpackedInstaller::OnInstallChecksComplete, this));
}
void UnpackedInstaller::OnInstallChecksComplete(
const PreloadCheck::Errors& errors) {
DCHECK_CURRENTLY_ON(BrowserThread::UI);
if (!browser_context_) {
return;
}
if (errors.empty()) {
InstallExtension();
return;
}
std::u16string error_message;
if (errors.count(PreloadCheck::Error::kDisallowedByPolicy)) {
error_message = policy_check_->GetErrorMessage();
} else {
error_message = requirements_check_->GetErrorMessage();
}
DCHECK(!error_message.empty());
ReportExtensionLoadError(error_message);
}
int UnpackedInstaller::GetFlags() {
DCHECK_CURRENTLY_ON(BrowserThread::UI);
std::string id = crx_file::id_util::GenerateIdForPath(extension_path_);
bool allow_file_access =
Manifest::ShouldAlwaysAllowFileAccess(mojom::ManifestLocation::kUnpacked);
ExtensionPrefs* prefs = ExtensionPrefs::Get(browser_context_);
if (allow_file_access_.has_value()) {
allow_file_access = *allow_file_access_;
} else if (prefs->HasAllowFileAccessSetting(id)) {
allow_file_access = prefs->AllowFileAccess(id);
}
int result = Extension::FOLLOW_SYMLINKS_ANYWHERE;
if (allow_file_access) {
result |= Extension::ALLOW_FILE_ACCESS;
}
if (require_modern_manifest_version_) {
result |= Extension::REQUIRE_MODERN_MANIFEST_VERSION;
}
if (base::FeatureList::IsEnabled(
extensions_features::
kAllowWithholdingExtensionPermissionsOnInstall)) {
result |= Extension::WITHHOLD_PERMISSIONS;
}
if (installed_via_cdp_) {
result |= Extension::INSTALLED_VIA_CDP;
}
return result;
}
bool UnpackedInstaller::LoadExtension(mojom::ManifestLocation location,
int flags,
std::u16string* error) {
// Clean up the kMetadataFolder if necessary. This prevents spurious
// warnings/errors and ensures we don't treat a user provided file as one by
// the Extension system.
file_util::MaybeCleanupMetadataFolder(extension_path_);
// Treat presence of illegal filenames as a hard error for unpacked
// extensions. Don't do so for command line extensions since this breaks
// Chrome OS autotests (crbug.com/40539874).
if (location == mojom::ManifestLocation::kUnpacked &&
!file_util::CheckForIllegalFilenames(extension_path_, error)) {
return false;
}
extension_ =
file_util::LoadExtension(extension_path_, location, flags, error);
return extension() &&
extension_l10n_util::ValidateExtensionLocales(
extension_path_, *extension()->manifest()->value(), error) &&
IndexAndPersistRulesIfNeeded(error);
}
bool UnpackedInstaller::IndexAndPersistRulesIfNeeded(std::u16string* error) {
DCHECK(extension());
base::expected<base::DictValue, std::string> index_result =
declarative_net_request::InstallIndexHelper::
IndexAndPersistRulesOnInstall(*extension_);
if (!index_result.has_value()) {
*error = base::UTF8ToUTF16(index_result.error());
return false;
}
ruleset_install_prefs_ = std::move(index_result.value());
return true;
}
bool UnpackedInstaller::IsLoadingUnpackedAllowed() const {
if (!browser_context_) {
return true;
}
// If there is a "*" in the extension blocklist, then no extensions should be
// allowed at all except packed extensions that are explicitly listed in the
// allowlist.
return !ExtensionsBrowserClient::Get()
->GetExtensionManagementClient(browser_context_)
->BlocklistedByDefault();
}
void UnpackedInstaller::GetAbsolutePathOnFileThread() {
base::FilePath resolved_absolute_path =
base::MakeAbsoluteFilePath(extension_path_);
// If the path doesn't exist, we report the error immediately.
// We're not overwriting extension_path_, so the error message will contain
// the path we attempted to load.
if (resolved_absolute_path.empty() ||
!base::PathExists(resolved_absolute_path)) {
// Set priority explicitly to avoid unwanted task priority inheritance.
content::GetUIThreadTaskRunner({base::TaskPriority::USER_BLOCKING})
->PostTask(FROM_HERE,
base::BindOnce(&UnpackedInstaller::ReportExtensionLoadError,
this, kFilePathResolvedError));
return;
}
extension_path_ = resolved_absolute_path;
// Set priority explicitly to avoid unwanted task priority inheritance.
content::GetUIThreadTaskRunner({base::TaskPriority::USER_BLOCKING})
->PostTask(
FROM_HERE,
base::BindOnce(&UnpackedInstaller::CheckExtensionFileAccess, this));
}
void UnpackedInstaller::CheckExtensionFileAccess() {
DCHECK_CURRENTLY_ON(BrowserThread::UI);
if (!browser_context_) {
return;
}
if (!IsLoadingUnpackedAllowed()) {
ReportExtensionLoadError(kUnpackedExtensionsBlocklistedError);
return;
}
GetExtensionFileTaskRunner()->PostTask(
FROM_HERE,
base::BindOnce(&UnpackedInstaller::LoadWithFileAccessOnFileThread, this,
GetFlags()));
}
void UnpackedInstaller::LoadWithFileAccessOnFileThread(int flags) {
std::u16string error;
if (!LoadExtension(mojom::ManifestLocation::kUnpacked, flags, &error)) {
// Set priority explicitly to avoid unwanted task priority inheritance.
content::GetUIThreadTaskRunner({base::TaskPriority::USER_BLOCKING})
->PostTask(FROM_HERE,
base::BindOnce(&UnpackedInstaller::ReportExtensionLoadError,
this, error));
return;
}
// Set priority explicitly to avoid unwanted task priority inheritance.
content::GetUIThreadTaskRunner({base::TaskPriority::USER_BLOCKING})
->PostTask(FROM_HERE,
base::BindOnce(&UnpackedInstaller::StartInstallChecks, this));
}
void UnpackedInstaller::ReportExtensionLoadError(const std::u16string& error) {
DCHECK_CURRENTLY_ON(BrowserThread::UI);
if (browser_context_) {
LoadErrorReporter::GetInstance()->ReportLoadError(
extension_path_, error, browser_context_, be_noisy_on_failure_);
}
if (!callback_.is_null()) {
std::move(callback_).Run(nullptr, extension_path_, error);
}
}
void UnpackedInstaller::InstallExtension() {
DCHECK_CURRENTLY_ON(BrowserThread::UI);
if (!browser_context_) {
callback_.Reset();
return;
}
// Force file access and/or incognito state and set install param if
// requested.
ExtensionPrefs* prefs = ExtensionPrefs::Get(browser_context_);
if (allow_file_access_.has_value()) {
prefs->SetAllowFileAccess(extension()->id(), *allow_file_access_);
}
if (allow_incognito_access_.has_value()) {
prefs->SetIsIncognitoEnabled(extension()->id(), *allow_incognito_access_);
}
if (install_param_.has_value()) {
SetInstallParam(prefs, extension()->id(), *install_param_);
}
PermissionsUpdater perms_updater(browser_context_);
perms_updater.InitializePermissions(extension());
perms_updater.GrantActivePermissions(extension());
ExtensionRegistrar::Get(browser_context_)
->OnExtensionInstalled(extension(), syncer::StringOrdinal(),
kInstallFlagInstallImmediately,
std::move(ruleset_install_prefs_));
// Record metrics here since the registry would contain the extension by now.
ExtensionsBrowserClient::Get()
->RecordCommandLineMetricsOnUnpackedInstallation(browser_context_,
extension());
if (!callback_.is_null()) {
std::move(callback_).Run(extension(), extension_path_, std::u16string());
}
}
void UnpackedInstaller::Shutdown() {
browser_context_ = nullptr;
}
} // namespace extensions