| // Copyright 2013 The Chromium Authors |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "extensions/browser/unpacked_installer.h" |
| |
| #include <string> |
| #include <utility> |
| |
| #include "base/files/file_util.h" |
| #include "base/functional/bind.h" |
| #include "base/functional/callback.h" |
| #include "base/path_service.h" |
| #include "base/strings/string_util.h" |
| #include "base/strings/utf_string_conversions.h" |
| #include "base/threading/thread_restrictions.h" |
| #include "build/branding_buildflags.h" |
| #include "build/build_config.h" |
| #include "components/crx_file/id_util.h" |
| #include "components/keyed_service/content/browser_context_keyed_service_shutdown_notifier_factory.h" |
| #include "components/keyed_service/core/keyed_service_shutdown_notifier.h" |
| #include "components/sync/model/string_ordinal.h" |
| #include "content/public/browser/browser_context.h" |
| #include "content/public/browser/browser_task_traits.h" |
| #include "content/public/browser/browser_thread.h" |
| #include "extensions/browser/api/declarative_net_request/install_index_helper.h" |
| #include "extensions/browser/event_router_factory.h" |
| #include "extensions/browser/extension_file_task_runner.h" |
| #include "extensions/browser/extension_management_client.h" |
| #include "extensions/browser/extension_prefs.h" |
| #include "extensions/browser/extension_registrar.h" |
| #include "extensions/browser/extension_registry.h" |
| #include "extensions/browser/extension_registry_factory.h" |
| #include "extensions/browser/extension_system.h" |
| #include "extensions/browser/extension_util.h" |
| #include "extensions/browser/extensions_browser_client.h" |
| #include "extensions/browser/install_flag.h" |
| #include "extensions/browser/install_prefs_helper.h" |
| #include "extensions/browser/load_error_reporter.h" |
| #include "extensions/browser/path_util.h" |
| #include "extensions/browser/permissions/permissions_updater.h" |
| #include "extensions/browser/policy_check.h" |
| #include "extensions/browser/preload_check_group.h" |
| #include "extensions/browser/requirements_checker.h" |
| #include "extensions/browser/ruleset_parse_result.h" |
| #include "extensions/buildflags/buildflags.h" |
| #include "extensions/common/constants.h" |
| #include "extensions/common/extension.h" |
| #include "extensions/common/extension_features.h" |
| #include "extensions/common/extension_l10n_util.h" |
| #include "extensions/common/file_util.h" |
| #include "extensions/common/manifest.h" |
| #include "extensions/common/manifest_constants.h" |
| #include "extensions/common/manifest_handlers/shared_module_info.h" |
| #include "extensions/common/mojom/manifest.mojom-shared.h" |
| #include "extensions/common/permissions/permissions_data.h" |
| |
| static_assert(BUILDFLAG(ENABLE_EXTENSIONS_CORE)); |
| |
| using content::BrowserThread; |
| using extensions::Extension; |
| using extensions::SharedModuleInfo; |
| |
| namespace extensions { |
| |
| namespace { |
| |
| const char16_t kUnpackedExtensionsBlocklistedError[] = |
| u"Loading of unpacked extensions is disabled by the administrator."; |
| |
| const char16_t kImportMinVersionNewer[] = |
| u"'import' version requested is newer than what is installed."; |
| const char16_t kImportMissing[] = u"'import' extension is not installed."; |
| const char16_t kImportNotSharedModule[] = u"'import' is not a shared module."; |
| const char16_t kFilePathResolvedError[] = u"File path cannot be resolved."; |
| |
| class BrowserContextShutdownNotifierFactory |
| : public BrowserContextKeyedServiceShutdownNotifierFactory { |
| public: |
| static BrowserContextShutdownNotifierFactory* GetInstance() { |
| static base::NoDestructor<BrowserContextShutdownNotifierFactory> s_factory; |
| return s_factory.get(); |
| } |
| |
| // No copying. |
| BrowserContextShutdownNotifierFactory( |
| const BrowserContextShutdownNotifierFactory&) = delete; |
| BrowserContextShutdownNotifierFactory& operator=( |
| const BrowserContextShutdownNotifierFactory&) = delete; |
| |
| private: |
| friend class base::NoDestructor<BrowserContextShutdownNotifierFactory>; |
| BrowserContextShutdownNotifierFactory() |
| : BrowserContextKeyedServiceShutdownNotifierFactory("UnpackedInstaller") { |
| DependsOn(ExtensionRegistryFactory::GetInstance()); |
| DependsOn(EventRouterFactory::GetInstance()); |
| } |
| |
| content::BrowserContext* GetBrowserContextToUse( |
| content::BrowserContext* context) const override { |
| return ExtensionsBrowserClient::Get()->GetContextOwnInstance(context); |
| } |
| }; |
| |
| } // namespace |
| |
| // static |
| void UnpackedInstaller::EnsureShutdownNotifierFactoryBuilt() { |
| BrowserContextShutdownNotifierFactory::GetInstance(); |
| } |
| |
| // static |
| scoped_refptr<UnpackedInstaller> UnpackedInstaller::Create( |
| content::BrowserContext* context) { |
| CHECK(context); |
| return scoped_refptr<UnpackedInstaller>(new UnpackedInstaller(context)); |
| } |
| |
| UnpackedInstaller::UnpackedInstaller(content::BrowserContext* context) |
| : browser_context_(context), |
| require_modern_manifest_version_(true), |
| be_noisy_on_failure_(true) { |
| DCHECK_CURRENTLY_ON(BrowserThread::UI); |
| |
| // Observe for BrowserContext shutdown. Unretained is safe because the |
| // callback subscription is owned by this object. |
| browser_context_shutdown_subscription_ = |
| BrowserContextShutdownNotifierFactory::GetInstance() |
| ->Get(browser_context_) |
| ->Subscribe(base::BindRepeating(&UnpackedInstaller::Shutdown, |
| base::Unretained(this))); |
| } |
| |
| UnpackedInstaller::~UnpackedInstaller() { |
| DCHECK_CURRENTLY_ON(BrowserThread::UI); |
| } |
| |
| void UnpackedInstaller::Load(const base::FilePath& path_in) { |
| DCHECK(extension_path_.empty()); |
| extension_path_ = path_in; |
| if (!browser_context_) { |
| return; |
| } |
| GetExtensionFileTaskRunner()->PostTask( |
| FROM_HERE, |
| base::BindOnce(&UnpackedInstaller::GetAbsolutePathOnFileThread, this)); |
| } |
| |
| bool UnpackedInstaller::LoadFromCommandLine(const base::FilePath& path_in, |
| std::string* extension_id, |
| bool only_allow_apps) { |
| DCHECK_CURRENTLY_ON(BrowserThread::UI); |
| DCHECK(extension_path_.empty()); |
| |
| if (!browser_context_) { |
| return false; |
| } |
| // Load extensions from the command line synchronously to avoid a race |
| // between extension loading and loading an URL from the command line. |
| base::ScopedAllowBlocking allow_blocking; |
| |
| extension_path_ = |
| base::MakeAbsoluteFilePath(path_util::ResolveHomeDirectory(path_in)); |
| |
| if (!IsLoadingUnpackedAllowed()) { |
| ReportExtensionLoadError(kUnpackedExtensionsBlocklistedError); |
| return false; |
| } |
| |
| std::u16string error; |
| if (!LoadExtension(mojom::ManifestLocation::kCommandLine, GetFlags(), |
| &error)) { |
| ReportExtensionLoadError(error); |
| return false; |
| } |
| |
| if (only_allow_apps && !extension()->is_platform_app()) { |
| #if BUILDFLAG(GOOGLE_CHROME_BRANDING) |
| // Avoid crashing for users with hijacked shortcuts. |
| return true; |
| #else |
| // Defined here to avoid unused variable errors in official builds. |
| const char16_t extension_instead_of_app_error[] = |
| u"App loading flags cannot be used to load extensions. Please use " |
| "--load-extension instead."; |
| ReportExtensionLoadError(extension_instead_of_app_error); |
| return false; |
| #endif |
| } |
| |
| extension()->permissions_data()->BindToCurrentThread(); |
| PermissionsUpdater(browser_context_, PermissionsUpdater::InitFlag::kTransient) |
| .InitializePermissions(extension()); |
| StartInstallChecks(); |
| |
| *extension_id = extension()->id(); |
| return true; |
| } |
| |
| void UnpackedInstaller::StartInstallChecks() { |
| DCHECK_CURRENTLY_ON(BrowserThread::UI); |
| if (!browser_context_) { |
| return; |
| } |
| |
| // TODO(crbug.com/40388034): Enable these checks all the time. The reason |
| // they are disabled for extensions loaded from the command-line is that |
| // installing unpacked extensions is asynchronous, but there can be |
| // dependencies between the extensions loaded by the command line. |
| if (extension()->manifest()->location() != |
| mojom::ManifestLocation::kCommandLine) { |
| // TODO(crbug.com/40387578): Move this code to a utility class to avoid |
| // duplication of SharedModuleService::CheckImports code. |
| if (SharedModuleInfo::ImportsModules(extension())) { |
| const std::vector<SharedModuleInfo::ImportInfo>& imports = |
| SharedModuleInfo::GetImports(extension()); |
| std::vector<SharedModuleInfo::ImportInfo>::const_iterator i; |
| ExtensionRegistry* registry = ExtensionRegistry::Get(browser_context_); |
| for (i = imports.begin(); i != imports.end(); ++i) { |
| base::Version version_required(i->minimum_version); |
| const Extension* imported_module = registry->GetExtensionById( |
| i->extension_id, ExtensionRegistry::EVERYTHING); |
| if (!imported_module) { |
| ReportExtensionLoadError(kImportMissing); |
| return; |
| } else if (imported_module && |
| !SharedModuleInfo::IsSharedModule(imported_module)) { |
| ReportExtensionLoadError(kImportNotSharedModule); |
| return; |
| } else if (imported_module && (version_required.IsValid() && |
| imported_module->version().CompareTo( |
| version_required) < 0)) { |
| ReportExtensionLoadError(kImportMinVersionNewer); |
| return; |
| } |
| } |
| } |
| } |
| |
| policy_check_ = std::make_unique<PolicyCheck>(browser_context_, extension_); |
| requirements_check_ = std::make_unique<RequirementsChecker>(extension_); |
| |
| check_group_ = std::make_unique<PreloadCheckGroup>(); |
| check_group_->set_stop_on_first_error(true); |
| |
| check_group_->AddCheck(policy_check_.get()); |
| check_group_->AddCheck(requirements_check_.get()); |
| check_group_->Start( |
| base::BindOnce(&UnpackedInstaller::OnInstallChecksComplete, this)); |
| } |
| |
| void UnpackedInstaller::OnInstallChecksComplete( |
| const PreloadCheck::Errors& errors) { |
| DCHECK_CURRENTLY_ON(BrowserThread::UI); |
| if (!browser_context_) { |
| return; |
| } |
| |
| if (errors.empty()) { |
| InstallExtension(); |
| return; |
| } |
| |
| std::u16string error_message; |
| if (errors.count(PreloadCheck::Error::kDisallowedByPolicy)) { |
| error_message = policy_check_->GetErrorMessage(); |
| } else { |
| error_message = requirements_check_->GetErrorMessage(); |
| } |
| |
| DCHECK(!error_message.empty()); |
| ReportExtensionLoadError(error_message); |
| } |
| |
| int UnpackedInstaller::GetFlags() { |
| DCHECK_CURRENTLY_ON(BrowserThread::UI); |
| std::string id = crx_file::id_util::GenerateIdForPath(extension_path_); |
| bool allow_file_access = |
| Manifest::ShouldAlwaysAllowFileAccess(mojom::ManifestLocation::kUnpacked); |
| ExtensionPrefs* prefs = ExtensionPrefs::Get(browser_context_); |
| if (allow_file_access_.has_value()) { |
| allow_file_access = *allow_file_access_; |
| } else if (prefs->HasAllowFileAccessSetting(id)) { |
| allow_file_access = prefs->AllowFileAccess(id); |
| } |
| |
| int result = Extension::FOLLOW_SYMLINKS_ANYWHERE; |
| if (allow_file_access) { |
| result |= Extension::ALLOW_FILE_ACCESS; |
| } |
| if (require_modern_manifest_version_) { |
| result |= Extension::REQUIRE_MODERN_MANIFEST_VERSION; |
| } |
| |
| if (base::FeatureList::IsEnabled( |
| extensions_features:: |
| kAllowWithholdingExtensionPermissionsOnInstall)) { |
| result |= Extension::WITHHOLD_PERMISSIONS; |
| } |
| |
| if (installed_via_cdp_) { |
| result |= Extension::INSTALLED_VIA_CDP; |
| } |
| |
| return result; |
| } |
| |
| bool UnpackedInstaller::LoadExtension(mojom::ManifestLocation location, |
| int flags, |
| std::u16string* error) { |
| // Clean up the kMetadataFolder if necessary. This prevents spurious |
| // warnings/errors and ensures we don't treat a user provided file as one by |
| // the Extension system. |
| file_util::MaybeCleanupMetadataFolder(extension_path_); |
| |
| // Treat presence of illegal filenames as a hard error for unpacked |
| // extensions. Don't do so for command line extensions since this breaks |
| // Chrome OS autotests (crbug.com/40539874). |
| if (location == mojom::ManifestLocation::kUnpacked && |
| !file_util::CheckForIllegalFilenames(extension_path_, error)) { |
| return false; |
| } |
| |
| extension_ = |
| file_util::LoadExtension(extension_path_, location, flags, error); |
| |
| return extension() && |
| extension_l10n_util::ValidateExtensionLocales( |
| extension_path_, *extension()->manifest()->value(), error) && |
| IndexAndPersistRulesIfNeeded(error); |
| } |
| |
| bool UnpackedInstaller::IndexAndPersistRulesIfNeeded(std::u16string* error) { |
| DCHECK(extension()); |
| |
| base::expected<base::DictValue, std::string> index_result = |
| declarative_net_request::InstallIndexHelper:: |
| IndexAndPersistRulesOnInstall(*extension_); |
| |
| if (!index_result.has_value()) { |
| *error = base::UTF8ToUTF16(index_result.error()); |
| return false; |
| } |
| |
| ruleset_install_prefs_ = std::move(index_result.value()); |
| return true; |
| } |
| |
| bool UnpackedInstaller::IsLoadingUnpackedAllowed() const { |
| if (!browser_context_) { |
| return true; |
| } |
| // If there is a "*" in the extension blocklist, then no extensions should be |
| // allowed at all except packed extensions that are explicitly listed in the |
| // allowlist. |
| return !ExtensionsBrowserClient::Get() |
| ->GetExtensionManagementClient(browser_context_) |
| ->BlocklistedByDefault(); |
| } |
| |
| void UnpackedInstaller::GetAbsolutePathOnFileThread() { |
| base::FilePath resolved_absolute_path = |
| base::MakeAbsoluteFilePath(extension_path_); |
| |
| // If the path doesn't exist, we report the error immediately. |
| // We're not overwriting extension_path_, so the error message will contain |
| // the path we attempted to load. |
| if (resolved_absolute_path.empty() || |
| !base::PathExists(resolved_absolute_path)) { |
| // Set priority explicitly to avoid unwanted task priority inheritance. |
| content::GetUIThreadTaskRunner({base::TaskPriority::USER_BLOCKING}) |
| ->PostTask(FROM_HERE, |
| base::BindOnce(&UnpackedInstaller::ReportExtensionLoadError, |
| this, kFilePathResolvedError)); |
| return; |
| } |
| |
| extension_path_ = resolved_absolute_path; |
| // Set priority explicitly to avoid unwanted task priority inheritance. |
| content::GetUIThreadTaskRunner({base::TaskPriority::USER_BLOCKING}) |
| ->PostTask( |
| FROM_HERE, |
| base::BindOnce(&UnpackedInstaller::CheckExtensionFileAccess, this)); |
| } |
| |
| void UnpackedInstaller::CheckExtensionFileAccess() { |
| DCHECK_CURRENTLY_ON(BrowserThread::UI); |
| if (!browser_context_) { |
| return; |
| } |
| |
| if (!IsLoadingUnpackedAllowed()) { |
| ReportExtensionLoadError(kUnpackedExtensionsBlocklistedError); |
| return; |
| } |
| |
| GetExtensionFileTaskRunner()->PostTask( |
| FROM_HERE, |
| base::BindOnce(&UnpackedInstaller::LoadWithFileAccessOnFileThread, this, |
| GetFlags())); |
| } |
| |
| void UnpackedInstaller::LoadWithFileAccessOnFileThread(int flags) { |
| std::u16string error; |
| if (!LoadExtension(mojom::ManifestLocation::kUnpacked, flags, &error)) { |
| // Set priority explicitly to avoid unwanted task priority inheritance. |
| content::GetUIThreadTaskRunner({base::TaskPriority::USER_BLOCKING}) |
| ->PostTask(FROM_HERE, |
| base::BindOnce(&UnpackedInstaller::ReportExtensionLoadError, |
| this, error)); |
| return; |
| } |
| |
| // Set priority explicitly to avoid unwanted task priority inheritance. |
| content::GetUIThreadTaskRunner({base::TaskPriority::USER_BLOCKING}) |
| ->PostTask(FROM_HERE, |
| base::BindOnce(&UnpackedInstaller::StartInstallChecks, this)); |
| } |
| |
| void UnpackedInstaller::ReportExtensionLoadError(const std::u16string& error) { |
| DCHECK_CURRENTLY_ON(BrowserThread::UI); |
| |
| if (browser_context_) { |
| LoadErrorReporter::GetInstance()->ReportLoadError( |
| extension_path_, error, browser_context_, be_noisy_on_failure_); |
| } |
| |
| if (!callback_.is_null()) { |
| std::move(callback_).Run(nullptr, extension_path_, error); |
| } |
| } |
| |
| void UnpackedInstaller::InstallExtension() { |
| DCHECK_CURRENTLY_ON(BrowserThread::UI); |
| |
| if (!browser_context_) { |
| callback_.Reset(); |
| return; |
| } |
| |
| // Force file access and/or incognito state and set install param if |
| // requested. |
| ExtensionPrefs* prefs = ExtensionPrefs::Get(browser_context_); |
| if (allow_file_access_.has_value()) { |
| prefs->SetAllowFileAccess(extension()->id(), *allow_file_access_); |
| } |
| if (allow_incognito_access_.has_value()) { |
| prefs->SetIsIncognitoEnabled(extension()->id(), *allow_incognito_access_); |
| } |
| if (install_param_.has_value()) { |
| SetInstallParam(prefs, extension()->id(), *install_param_); |
| } |
| |
| PermissionsUpdater perms_updater(browser_context_); |
| perms_updater.InitializePermissions(extension()); |
| perms_updater.GrantActivePermissions(extension()); |
| |
| ExtensionRegistrar::Get(browser_context_) |
| ->OnExtensionInstalled(extension(), syncer::StringOrdinal(), |
| kInstallFlagInstallImmediately, |
| std::move(ruleset_install_prefs_)); |
| |
| // Record metrics here since the registry would contain the extension by now. |
| ExtensionsBrowserClient::Get() |
| ->RecordCommandLineMetricsOnUnpackedInstallation(browser_context_, |
| extension()); |
| |
| if (!callback_.is_null()) { |
| std::move(callback_).Run(extension(), extension_path_, std::u16string()); |
| } |
| } |
| |
| void UnpackedInstaller::Shutdown() { |
| browser_context_ = nullptr; |
| } |
| |
| } // namespace extensions |