Revert 149610 - Extension resources should only load in contexts the extension...

Revert 149610 - Extension resources should only load in contexts the extension has permission to access.

See http://codereview.chromium.org/10792008/ for background.

BUG=139592

Review URL: https://chromiumcodereview.appspot.com/10828067

TBR=mkwst@chromium.org
Review URL: https://chromiumcodereview.appspot.com/10826134

git-svn-id: svn://svn.chromium.org/chrome/trunk/src@149760 0039d316-1c4b-4281-b951-d872f2087c98
parent dd5287ab
...@@ -54,15 +54,6 @@ IN_PROC_BROWSER_TEST_F(ExtensionResourceRequestPolicyTest, OriginPrivileges) { ...@@ -54,15 +54,6 @@ IN_PROC_BROWSER_TEST_F(ExtensionResourceRequestPolicyTest, OriginPrivileges) {
&result)); &result));
EXPECT_EQ(result, "Loaded"); EXPECT_EQ(result, "Loaded");
// A web host that does not have permission.
ui_test_utils::NavigateToURL(
browser(), web_resource.ReplaceComponents(make_host_b_com));
ASSERT_TRUE(content::ExecuteJavaScriptAndExtractString(
chrome::GetActiveWebContents(browser())->GetRenderViewHost(), L"",
L"window.domAutomationController.send(document.title)",
&result));
EXPECT_EQ(result, "Image failed to load");
// A web host that loads a non-existent extension. // A web host that loads a non-existent extension.
GURL non_existent_extension( GURL non_existent_extension(
test_server()->GetURL( test_server()->GetURL(
......
...@@ -536,27 +536,10 @@ bool Extension::HasWebAccessibleResources() const { ...@@ -536,27 +536,10 @@ bool Extension::HasWebAccessibleResources() const {
return false; return false;
} }
bool Extension::HasNaClModules() const {
if (nacl_modules_.size())
return true;
return false;
}
bool Extension::IsSandboxedPage(const std::string& relative_path) const { bool Extension::IsSandboxedPage(const std::string& relative_path) const {
return ResourceMatches(sandboxed_pages_, relative_path); return ResourceMatches(sandboxed_pages_, relative_path);
} }
bool Extension::IsResourceNaClManifest(const std::string& resource) const {
GURL url = extension_url_.Resolve(resource);
for (std::vector<NaClModuleInfo>::const_iterator it = nacl_modules_.begin();
it != nacl_modules_.end(); it++) {
if (it->url == url)
return true;
}
return false;
}
std::string Extension::GetResourceContentSecurityPolicy( std::string Extension::GetResourceContentSecurityPolicy(
const std::string& relative_path) const { const std::string& relative_path) const {
......
...@@ -356,9 +356,6 @@ class Extension : public base::RefCountedThreadSafe<Extension> { ...@@ -356,9 +356,6 @@ class Extension : public base::RefCountedThreadSafe<Extension> {
// Returns true if the specified resource is web accessible. // Returns true if the specified resource is web accessible.
bool IsResourceWebAccessible(const std::string& relative_path) const; bool IsResourceWebAccessible(const std::string& relative_path) const;
// Returns true if the specified resource is a NaCl manifest.
bool IsResourceNaClManifest(const std::string& resource) const;
// Returns true if the specified page is sandboxed (served in a unique // Returns true if the specified page is sandboxed (served in a unique
// origin). // origin).
bool IsSandboxedPage(const std::string& relative_path) const; bool IsSandboxedPage(const std::string& relative_path) const;
...@@ -371,9 +368,6 @@ class Extension : public base::RefCountedThreadSafe<Extension> { ...@@ -371,9 +368,6 @@ class Extension : public base::RefCountedThreadSafe<Extension> {
// Returns true when 'web_accessible_resources' are defined for the extension. // Returns true when 'web_accessible_resources' are defined for the extension.
bool HasWebAccessibleResources() const; bool HasWebAccessibleResources() const;
// Returns true when 'nacl_modules' are defined for the extension.
bool HasNaClModules() const;
// Returns an extension resource object. |relative_path| should be UTF8 // Returns an extension resource object. |relative_path| should be UTF8
// encoded. // encoded.
ExtensionResource GetResource(const std::string& relative_path) const; ExtensionResource GetResource(const std::string& relative_path) const;
......
...@@ -7,7 +7,6 @@ ...@@ -7,7 +7,6 @@
#include "base/command_line.h" #include "base/command_line.h"
#include "base/logging.h" #include "base/logging.h"
#include "base/stringprintf.h" #include "base/stringprintf.h"
#include "base/string_util.h"
#include "chrome/common/chrome_switches.h" #include "chrome/common/chrome_switches.h"
#include "chrome/common/url_constants.h" #include "chrome/common/url_constants.h"
#include "chrome/common/extensions/extension.h" #include "chrome/common/extensions/extension.h"
...@@ -48,44 +47,27 @@ bool ExtensionResourceRequestPolicy::CanRequestResource( ...@@ -48,44 +47,27 @@ bool ExtensionResourceRequestPolicy::CanRequestResource(
return false; return false;
} }
GURL frame_url = frame->document().url(); // Disallow loading of extension resources which are not explicitely listed
// as web accessible if the manifest version is 2 or greater.
// In the case of loading a frame, frame* points to the frame being loaded, if (!extension->IsResourceWebAccessible(resource_url.path()) &&
// not the containing frame. This means that frame->document().url() ends up !CommandLine::ForCurrentProcess()->HasSwitch(
// not being useful to us. switches::kDisableExtensionsResourceWhitelist)) {
// GURL frame_url = frame->document().url();
// WebKit doesn't currently pass us enough information to know when we're a GURL page_url = frame->top()->document().url();
// frame, so we hack it by checking for 'about:blank', which should only
// happen in this situation. // Exceptions are:
// // - empty origin (needed for some edge cases when we have empty origins)
// TODO(aa): Fix WebKit to pass the context of the load: crbug.com/139788. bool is_empty_origin = frame_url.is_empty();
if (frame_url == GURL(chrome::kAboutBlankURL) && frame->parent()) // - extensions requesting their own resources (frame_url check is for
frame_url = frame->parent()->document().url(); // images, page_url check is for iframes)
bool is_own_resource = frame_url.GetOrigin() == extension->url() ||
bool extension_has_access_to_frame = page_url.GetOrigin() == extension->url();
extension->GetEffectiveHostPermissions().MatchesURL(frame_url); // - devtools (chrome-extension:// URLs are loaded into frames of devtools
bool frame_has_empty_origin = frame_url.is_empty(); // to support the devtools extension APIs)
bool frame_is_data_url = frame_url.SchemeIs(chrome::kDataScheme); bool is_dev_tools = page_url.SchemeIs(chrome::kChromeDevToolsScheme) &&
bool frame_is_devtools = frame_url.SchemeIs(chrome::kChromeDevToolsScheme) && !extension->devtools_url().is_empty();
!extension->devtools_url().is_empty();
bool frame_is_extension = frame_url.SchemeIs(chrome::kExtensionScheme); if (!is_empty_origin && !is_own_resource && !is_dev_tools) {
bool is_own_resource = frame_url.GetOrigin() == extension->url();
bool is_resource_nacl_manifest =
extension->IsResourceNaClManifest(resource_url.path());
bool is_resource_web_accessible =
extension->IsResourceWebAccessible(resource_url.path()) ||
CommandLine::ForCurrentProcess()->HasSwitch(
switches::kDisableExtensionsResourceWhitelist);
// Given that the goal here is to prevent malicious injection of a benign
// extension's content into a context where it might be damaging, allowing
// unvalidated "nexe" resources is low-risk. If a mechanism for synchronously
// validating that the "nexe" is a NaCl executable appears, we should use it.
bool is_resource_nexe = extension->HasNaClModules() &&
EndsWith(resource_url.path(), ".nexe", true);
if (!frame_has_empty_origin && !frame_is_devtools && !is_own_resource) {
if (!is_resource_web_accessible) {
std::string message = base::StringPrintf( std::string message = base::StringPrintf(
"Denying load of %s. Resources must be listed in the " "Denying load of %s. Resources must be listed in the "
"web_accessible_resources manifest key in order to be loaded by " "web_accessible_resources manifest key in order to be loaded by "
...@@ -96,18 +78,6 @@ bool ExtensionResourceRequestPolicy::CanRequestResource( ...@@ -96,18 +78,6 @@ bool ExtensionResourceRequestPolicy::CanRequestResource(
WebKit::WebString::fromUTF8(message))); WebKit::WebString::fromUTF8(message)));
return false; return false;
} }
if (!extension_has_access_to_frame && !frame_is_extension &&
!frame_is_data_url && !is_resource_nacl_manifest && !is_resource_nexe) {
std::string message = base::StringPrintf(
"Denying load of %s. An extension's resources can only be loaded "
"into a page for which the extension has explicit host permissions.",
resource_url.spec().c_str());
frame->addMessageToConsole(
WebKit::WebConsoleMessage(WebKit::WebConsoleMessage::LevelError,
WebKit::WebString::fromUTF8(message)));
return false;
}
} }
return true; return true;
......
...@@ -2,6 +2,6 @@ ...@@ -2,6 +2,6 @@
"description": "Extension 1", "description": "Extension 1",
"key": "MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDPOziAf8MbTjdUo6DysZ4nAU/2f/kwYnftyKkxI1GyTlbStprGy+Y2ek4/59QbE3xEE+dIIuYeObM4QTptpcFMg956ZLFoeDg41Pg3tzUrbltgG8hXTbBxN852FJx2kdaqa/MKUUsJKGSD5hkUmvZRADGGWhMWzvz64ao1h02xJQIDAQAB", "key": "MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDPOziAf8MbTjdUo6DysZ4nAU/2f/kwYnftyKkxI1GyTlbStprGy+Y2ek4/59QbE3xEE+dIIuYeObM4QTptpcFMg956ZLFoeDg41Pg3tzUrbltgG8hXTbBxN852FJx2kdaqa/MKUUsJKGSD5hkUmvZRADGGWhMWzvz64ao1h02xJQIDAQAB",
"name": "test", "name": "test",
"permissions": [ "http://a.com/*", "http://127.0.0.1/*" ], "permissions": [ "http://a.com/*" ],
"version": "0.1" "version": "0.1"
} }
...@@ -2,6 +2,5 @@ ...@@ -2,6 +2,5 @@
"description": "Extension 2", "description": "Extension 2",
"key": "MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDPOziAf8MbTjdUo6DysZ4nAU/2f/kwYnftyKkxI1GyTlbStprGy+Y2ek4/59QbE3xEE+dIIuYeObM4QTptpcFMg956ZLFoeDg41Pg3tzUrbltgG8hXTbBxN852FJx2kdaqa/MKUUsJKGSD5hkUmvZRADGGWhMWzvz64ao1h02xJQIDAQAC", "key": "MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDPOziAf8MbTjdUo6DysZ4nAU/2f/kwYnftyKkxI1GyTlbStprGy+Y2ek4/59QbE3xEE+dIIuYeObM4QTptpcFMg956ZLFoeDg41Pg3tzUrbltgG8hXTbBxN852FJx2kdaqa/MKUUsJKGSD5hkUmvZRADGGWhMWzvz64ao1h02xJQIDAQAC",
"name": "test", "name": "test",
"version": "0.1", "version": "0.1"
"permissions": [ "http://a.com/*", "http://127.0.0.1/*" ]
} }
{ {
"manifest_version": 2, "manifest_version": 2,
"name": "web_accessible", "name": "web_accessible",
"version": "0.1", "version": "0.1",
"permissions": [ "http://a.com/*", "http://127.0.0.1/*" ], "key": "MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDPOziAf8MbTjdUo6DysZ4nAU/2f/kwYnftyKkxI1GyTlbStprGy+Y2ek4/59QbE3xEE+dIIuYeObM4QTptpcFMg956ZLFoeDg41Pg3tzUrbltgG8hXTbBxN852FJx2kdaqa/MKUUsJKGSD5hkUmvZRADGGWhMWzvz64ao1h02xJQIDAQAD",
"key": "MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDPOziAf8MbTjdUo6DysZ4nAU/2f/kwYnftyKkxI1GyTlbStprGy+Y2ek4/59QbE3xEE+dIIuYeObM4QTptpcFMg956ZLFoeDg41Pg3tzUrbltgG8hXTbBxN852FJx2kdaqa/MKUUsJKGSD5hkUmvZRADGGWhMWzvz64ao1h02xJQIDAQAD", "web_accessible_resources": [
"web_accessible_resources": [ "test.png",
"test.png", "nonexistent.png"
"nonexistent.png" ]
] }
}
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment