| // Copyright 2017 The Chromium Authors |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "extensions/renderer/api/messaging/messaging_util.h" |
| |
| #include <string> |
| |
| #include "base/check.h" |
| #include "base/notimplemented.h" |
| #include "base/notreached.h" |
| #include "base/strings/stringprintf.h" |
| #include "components/crx_file/id_util.h" |
| #include "extensions/common/api/messaging/message.h" |
| #include "extensions/common/api/messaging/messaging_endpoint.h" |
| #include "extensions/common/extension.h" |
| #include "extensions/common/extension_features.h" |
| #include "extensions/common/manifest.h" |
| #include "extensions/common/manifest_handlers/background_info.h" |
| #include "extensions/common/mojom/context_type.mojom.h" |
| #include "extensions/common/mojom/message_port.mojom-shared.h" |
| #include "extensions/renderer/extension_interaction_provider.h" |
| #include "extensions/renderer/get_script_context.h" |
| #include "extensions/renderer/script_context.h" |
| #include "extensions/renderer/worker_thread_util.h" |
| #include "gin/converter.h" |
| #include "gin/dictionary.h" |
| #include "third_party/blink/public/web/web_local_frame.h" |
| #include "v8/include/v8-context.h" |
| #include "v8/include/v8-exception.h" |
| #include "v8/include/v8-json.h" |
| #include "v8/include/v8-object.h" |
| #include "v8/include/v8-primitive.h" |
| |
| namespace extensions::messaging_util { |
| |
| namespace { |
| |
| constexpr char kExtensionIdRequiredErrorTemplate[] = |
| "chrome.%s() called from a webpage must specify an " |
| "Extension ID (string) for its first argument."; |
| |
| constexpr char kErrorCouldNotSerialize[] = "Could not serialize message."; |
| |
| constexpr char kErrorMalformedJSONMessage[] = |
| "The sender sent an invalid JSON message; message ignored."; |
| |
| // Serializes the given `value` into a JSON string and returns it wrapped in a |
| // Message object. This also populates user gesture and context privilege |
| // information. Returns `nullptr` on failure, and populates `error` with the |
| // failure reason. |
| std::unique_ptr<Message> MessageFromV8UsingJSON(v8::Local<v8::Context> context, |
| v8::Local<v8::Value> value, |
| std::string* error) { |
| v8::Isolate* isolate = v8::Isolate::GetCurrent(); |
| // TODO(devlin): For some reason, we don't use the signature for |
| // Port.postMessage when evaluating the parameters. We probably should, but |
| // we don't know how many extensions that may break. It would be good to |
| // investigate, and, ideally, use the signature. |
| |
| if (value->IsUndefined()) { |
| // JSON.stringify won't serialized undefined (it returns undefined), but it |
| // will serialized null. We've always converted undefined to null in JS |
| // bindings, so preserve this behavior for now. |
| value = v8::Null(isolate); |
| } |
| |
| bool success = false; |
| v8::Local<v8::String> stringified; |
| { |
| v8::TryCatch try_catch(isolate); |
| success = v8::JSON::Stringify(context, value).ToLocal(&stringified); |
| } |
| |
| if (!success) { |
| *error = kErrorCouldNotSerialize; |
| return nullptr; |
| } |
| |
| std::string message; |
| message = gin::V8ToString(isolate, stringified); |
| // JSON.stringify can fail to produce a string value in one of two ways: it |
| // can throw an exception (as with unserializable objects), or it can return |
| // `undefined` (as with e.g. passing a function). If JSON.stringify returns |
| // `undefined`, the v8 API then coerces it to the string value "undefined". |
| // Check for this, and consider it a failure (since we didn't properly |
| // serialize a value). |
| if (message == "undefined") { |
| *error = kErrorCouldNotSerialize; |
| return nullptr; |
| } |
| |
| size_t message_length = message.length(); |
| |
| // IPC messages will fail at > 128 MB. Restrict extension messages to 64 MB. |
| // A 64 MB JSON-ifiable object is scary enough as is. |
| static constexpr size_t kMaxMessageLength = 1024 * 1024 * 64; |
| if (message_length > kMaxMessageLength) { |
| *error = "Message length exceeded maximum allowed length of 64MB."; |
| return nullptr; |
| } |
| |
| // Determine if the message came from a privileged context. |
| ScriptContext* script_context = GetScriptContextFromV8Context(context); |
| blink::WebLocalFrame* web_frame = |
| script_context ? script_context->web_frame() : nullptr; |
| bool is_message_from_privileged_context = |
| script_context && script_context->context_type() == |
| mojom::ContextType::kPrivilegedExtension; |
| |
| // Check if there's an active user gesture. |
| // For service workers, use the ExtensionInteractionProvider, since there is |
| // no associated render frame (and we synthesize user gestures). Otherwise, |
| // check the render frame. |
| // TODO(https://crbug.com/326889650): Ideally, we'd just check |
| // ExtensionInteractionProvider here, because that also knows how to look for |
| // user gestures on frame-based contexts. However, one additional check was |
| // added here, `LastActivationWasRestricted()`, that isn't in |
| // ExtensionInteractionProvider. We should move that check to |
| // ExtensionInteractionProvider and then just use that for all gestures |
| // checks. |
| bool has_unrestricted_user_activation = false; |
| if (worker_thread_util::IsWorkerThread()) { |
| has_unrestricted_user_activation = |
| ExtensionInteractionProvider::HasActiveExtensionInteraction(context); |
| } else { |
| // The message should carry user activation information only if the last |
| // activation in |web_frame| was triggered by a real user interaction. See |
| // |UserActivationState::LastActivationWasRestricted()|. |
| has_unrestricted_user_activation = |
| web_frame && web_frame->HasTransientUserActivation() && |
| !web_frame->LastActivationWasRestricted(); |
| } |
| return std::make_unique<Message>(message, mojom::SerializationFormat::kJson, |
| has_unrestricted_user_activation, |
| is_message_from_privileged_context); |
| } |
| |
| // Serializes the given `value` using structured cloning and returns it wrapped |
| // in a `Message object`. This also populates user gesture and context privilege |
| // information. Returns nullptr on failure, and populates `error` with the |
| // failure reason |
| std::unique_ptr<Message> MessageFromV8UsingStructuredCloning( |
| v8::Local<v8::Context> context, |
| v8::Local<v8::Value> value, |
| std::string* error) { |
| // TODO(crbug.com/40321352): Implement structured cloning from v8. |
| NOTIMPLEMENTED(); |
| return nullptr; |
| } |
| |
| } // namespace |
| |
| const char kSendMessageChannel[] = "chrome.runtime.sendMessage"; |
| const char kSendRequestChannel[] = "chrome.extension.sendRequest"; |
| |
| const char kOnMessageEvent[] = "runtime.onMessage"; |
| const char kOnUserScriptMessageEvent[] = "runtime.onUserScriptMessage"; |
| const char kOnMessageExternalEvent[] = "runtime.onMessageExternal"; |
| const char kOnRequestEvent[] = "extension.onRequest"; |
| const char kOnRequestExternalEvent[] = "extension.onRequestExternal"; |
| const char kOnConnectEvent[] = "runtime.onConnect"; |
| const char kOnUserScriptConnectEvent[] = "runtime.onUserScriptConnect"; |
| const char kOnConnectExternalEvent[] = "runtime.onConnectExternal"; |
| const char kOnConnectNativeEvent[] = "runtime.onConnectNative"; |
| |
| std::unique_ptr<Message> MessageFromV8(v8::Local<v8::Context> context, |
| v8::Local<v8::Value> value, |
| mojom::SerializationFormat format, |
| std::string* error) { |
| DCHECK(!value.IsEmpty()); |
| |
| switch (format) { |
| case mojom::SerializationFormat::kStructuredCloned: |
| return MessageFromV8UsingStructuredCloning(context, value, error); |
| case mojom::SerializationFormat::kJson: |
| return MessageFromV8UsingJSON(context, value, error); |
| } |
| |
| // We only support JSON or structured cloning serialization formats. |
| NOTREACHED(); |
| } |
| |
| // Deserializes the given `message` using structured cloning and returns it as a |
| // v8::Value. Returns an empty handle on failure, and populates `error`. |
| v8::Local<v8::Value> MessageToV8UsingStructuredCloning( |
| v8::Local<v8::Context> context, |
| const Message& message, |
| std::string* error) { |
| // TODO(crbug.com/40321352): Implement structured cloning to v8. |
| NOTIMPLEMENTED(); |
| return v8::Local<v8::Value>(); |
| } |
| |
| // Deserializes the given JSON string `message` and returns it as a v8::Value. |
| // For well-formed inputs, this will always return a valid value. For malformed |
| // inputs, the behavior is: |
| // |
| // If `is_parsing_fail_safe` is true, this function will return an empty handle |
| // and populate `error`. |
| // |
| // If `is_parsing_fail_safe` is false, this function will CHECK() and cause a |
| // crash. |
| v8::Local<v8::Value> MessageToV8UsingJSON(v8::Local<v8::Context> context, |
| const Message& message, |
| bool is_parsing_fail_safe, |
| std::string* error) { |
| v8::Isolate* isolate = v8::Isolate::GetCurrent(); |
| v8::Local<v8::String> v8_message_string = |
| gin::StringToV8(isolate, message.data); |
| v8::Local<v8::Value> parsed_message; |
| if (!v8::JSON::Parse(context, v8_message_string).ToLocal(&parsed_message)) { |
| CHECK(is_parsing_fail_safe); |
| if (error) { |
| *error = kErrorMalformedJSONMessage; |
| } |
| return v8::Local<v8::Value>(); |
| } |
| return parsed_message; |
| } |
| |
| v8::Local<v8::Value> MessageToV8(v8::Local<v8::Context> context, |
| const Message& message, |
| bool is_parsing_fail_safe, |
| std::string* error) { |
| switch (message.format) { |
| case mojom::SerializationFormat::kStructuredCloned: |
| return MessageToV8UsingStructuredCloning(context, message, error); |
| case mojom::SerializationFormat::kJson: |
| return MessageToV8UsingJSON(context, message, is_parsing_fail_safe, |
| error); |
| } |
| // We only support JSON or structured cloning serialization formats. |
| NOTREACHED(); |
| } |
| |
| int ExtractIntegerId(v8::Local<v8::Value> value) { |
| if (value->IsInt32()) |
| return value.As<v8::Int32>()->Value(); |
| |
| // Account for -0, which is a valid integer, but is stored as a number in v8. |
| DCHECK(value->IsNumber() && value.As<v8::Number>()->Value() == 0.0); |
| return 0; |
| } |
| |
| mojom::SerializationFormat GetSerializationFormat( |
| const ScriptContext& script_context) { |
| if (!base::FeatureList::IsEnabled( |
| extensions_features::kStructuredCloningForMessaging)) { |
| return mojom::SerializationFormat::kJson; |
| } |
| |
| return script_context.extension() |
| ? mojom::SerializationFormat::kStructuredCloned |
| : mojom::SerializationFormat::kJson; |
| } |
| |
| MessageOptions ParseMessageOptions(v8::Local<v8::Context> context, |
| v8::Local<v8::Object> v8_options, |
| int flags) { |
| DCHECK(!v8_options.IsEmpty()); |
| DCHECK(!v8_options->IsNull()); |
| |
| v8::Isolate* isolate = v8::Isolate::GetCurrent(); |
| |
| MessageOptions options; |
| |
| gin::Dictionary options_dict(isolate, v8_options); |
| if ((flags & PARSE_CHANNEL_NAME) != 0) { |
| v8::Local<v8::Value> v8_channel_name; |
| bool success = options_dict.Get("name", &v8_channel_name); |
| DCHECK(success); |
| |
| if (!v8_channel_name->IsUndefined()) { |
| DCHECK(v8_channel_name->IsString()); |
| options.channel_name = gin::V8ToString(isolate, v8_channel_name); |
| } |
| } |
| |
| if ((flags & PARSE_FRAME_ID) != 0) { |
| v8::Local<v8::Value> v8_frame_id; |
| bool success = options_dict.Get("frameId", &v8_frame_id); |
| DCHECK(success); |
| |
| if (!v8_frame_id->IsUndefined()) { |
| DCHECK(v8_frame_id->IsInt32()); |
| int frame_id = v8_frame_id.As<v8::Int32>()->Value(); |
| // NOTE(devlin): JS bindings coerce any negative value to -1. For |
| // backwards compatibility, we do the same here. |
| options.frame_id = frame_id < 0 ? -1 : frame_id; |
| } |
| |
| v8::Local<v8::Value> v8_document_id; |
| success = options_dict.Get("documentId", &v8_document_id); |
| DCHECK(success); |
| |
| if (!v8_document_id->IsUndefined()) { |
| DCHECK(v8_document_id->IsString()); |
| options.document_id = gin::V8ToString(isolate, v8_document_id); |
| } |
| } |
| |
| // Note: the options object may also include an includeTlsChannelId property. |
| // That property has been a no-op since M72. See crbug.com/1045232. |
| return options; |
| } |
| |
| bool GetTargetExtensionId(ScriptContext* script_context, |
| v8::Local<v8::Value> v8_target_id, |
| const char* method_name, |
| std::string* target_out, |
| std::string* error_out) { |
| DCHECK(!v8_target_id.IsEmpty()); |
| // Argument parsing should guarantee this is null or a string before we reach |
| // this point. |
| DCHECK(v8_target_id->IsNull() || v8_target_id->IsString()); |
| |
| std::string target_id; |
| // If omitted, we use the extension associated with the context. |
| // Note: we deliberately treat the empty string as omitting the id, even |
| // though it's not strictly correct. See https://crbug.com/823577. |
| if (v8_target_id->IsNull() || |
| (v8_target_id->IsString() && |
| v8_target_id.As<v8::String>()->Length() == 0)) { |
| if (!script_context->extension()) { |
| *error_out = |
| base::StringPrintf(kExtensionIdRequiredErrorTemplate, method_name); |
| return false; |
| } |
| |
| target_id = script_context->extension()->id(); |
| // An extension should never have an invalid id. |
| DCHECK(crx_file::id_util::IdIsValid(target_id)); |
| } else { |
| DCHECK(v8_target_id->IsString()); |
| target_id = gin::V8ToString(script_context->isolate(), v8_target_id); |
| // NOTE(devlin): JS bindings only validate that the extension id is present, |
| // rather than validating its content. This seems better. Let's see how this |
| // goes. |
| if (!crx_file::id_util::IdIsValid(target_id)) { |
| *error_out = |
| base::StringPrintf("Invalid extension id: '%s'", target_id.c_str()); |
| return false; |
| } |
| } |
| |
| if (script_context->context_type() == mojom::ContextType::kUserScript) { |
| // User scripts should *always* have an associated extension. |
| CHECK(script_context->extension()); |
| if (script_context->extension()->id() != target_id) { |
| *error_out = "User scripts may not message external extensions."; |
| return false; |
| } |
| } |
| |
| *target_out = std::move(target_id); |
| return true; |
| } |
| |
| void MassageSendMessageArguments(v8::Isolate* isolate, |
| bool allow_options_argument, |
| v8::LocalVector<v8::Value>* arguments_out) { |
| base::span<const v8::Local<v8::Value>> arguments = *arguments_out; |
| size_t max_size = allow_options_argument ? 4u : 3u; |
| if (arguments.empty() || arguments.size() > max_size) |
| return; |
| |
| v8::Local<v8::Value> target_id = v8::Null(isolate); |
| v8::Local<v8::Value> message = v8::Null(isolate); |
| v8::Local<v8::Value> options; |
| if (allow_options_argument) |
| options = v8::Null(isolate); |
| v8::Local<v8::Value> response_callback = v8::Null(isolate); |
| |
| // If the last argument is a function, it is the response callback. |
| // Ignore it for the purposes of further argument parsing. |
| if ((*arguments.rbegin())->IsFunction()) { |
| response_callback = *arguments.rbegin(); |
| arguments = arguments.first(arguments.size() - 1); |
| } |
| |
| // Re-check for too many arguments after looking for the callback. If there |
| // are, early-out and rely on normal signature parsing to report the error. |
| if (arguments.size() >= max_size) |
| return; |
| |
| switch (arguments.size()) { |
| case 0: |
| // Required argument (message) is missing. |
| // Early-out and rely on normal signature parsing to report this error. |
| return; |
| case 1: |
| // Argument must be the message. |
| message = arguments[0]; |
| break; |
| case 2: { |
| // Assume the first argument is the ID if we don't expect options, or if |
| // the argument could match the ID parameter. |
| // ID could be either a string, or null/undefined (since it's optional). |
| bool could_match_id = |
| arguments[0]->IsString() || arguments[0]->IsNullOrUndefined(); |
| if (!allow_options_argument || could_match_id) { |
| target_id = arguments[0]; |
| message = arguments[1]; |
| } else { // Otherwise, the meaning is (message, options). |
| message = arguments[0]; |
| options = arguments[1]; |
| } |
| break; |
| } |
| case 3: |
| DCHECK(allow_options_argument); |
| // The meaning in this case is unambiguous. |
| target_id = arguments[0]; |
| message = arguments[1]; |
| options = arguments[2]; |
| break; |
| default: |
| NOTREACHED(); |
| } |
| |
| if (allow_options_argument) |
| *arguments_out = {target_id, message, options, response_callback}; |
| else |
| *arguments_out = {target_id, message, response_callback}; |
| } |
| |
| bool IsSendRequestDisabled(ScriptContext* script_context) { |
| const Extension* extension = script_context->extension(); |
| return extension && Manifest::IsUnpackedLocation(extension->location()) && |
| BackgroundInfo::HasLazyBackgroundPage(extension); |
| } |
| |
| std::string GetEventForChannel(const MessagingEndpoint& source_endpoint, |
| const ExtensionId& target_extension_id, |
| mojom::ChannelType channel_type) { |
| bool is_external_event = |
| MessagingEndpoint::IsExternal(source_endpoint, target_extension_id); |
| bool is_user_script_event = |
| source_endpoint.type == MessagingEndpoint::Type::kUserScript; |
| // We (deliberately) do not support external user script events. |
| CHECK(!is_user_script_event || !is_external_event); |
| |
| std::string event_name; |
| switch (channel_type) { |
| case mojom::ChannelType::kSendRequest: |
| CHECK(!is_user_script_event); |
| event_name = is_external_event ? messaging_util::kOnRequestExternalEvent |
| : messaging_util::kOnRequestEvent; |
| break; |
| case mojom::ChannelType::kSendMessage: |
| if (is_external_event) { |
| event_name = messaging_util::kOnMessageExternalEvent; |
| } else if (is_user_script_event) { |
| event_name = messaging_util::kOnUserScriptMessageEvent; |
| } else { |
| event_name = messaging_util::kOnMessageEvent; |
| } |
| break; |
| case mojom::ChannelType::kConnect: |
| if (is_external_event) { |
| event_name = messaging_util::kOnConnectExternalEvent; |
| } else if (is_user_script_event) { |
| event_name = messaging_util::kOnUserScriptConnectEvent; |
| } else { |
| event_name = messaging_util::kOnConnectEvent; |
| } |
| break; |
| case mojom::ChannelType::kNative: |
| CHECK(!is_user_script_event); |
| event_name = messaging_util::kOnConnectNativeEvent; |
| break; |
| } |
| |
| return event_name; |
| } |
| |
| } // namespace extensions::messaging_util |