blob: 05144f53954d5bab22ab77223744f0cd9600239e [file] [log] [blame]
// Copyright 2014 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "extensions/common/manifest_handlers/content_capabilities_handler.h"
#include "base/command_line.h"
#include "base/lazy_instance.h"
#include "base/memory/scoped_ptr.h"
#include "base/strings/string_number_conversions.h"
#include "base/strings/utf_string_conversions.h"
#include "base/values.h"
#include "content/public/common/content_switches.h"
#include "extensions/common/api/extensions_manifest_types.h"
#include "extensions/common/error_utils.h"
#include "extensions/common/install_warning.h"
#include "extensions/common/manifest_constants.h"
#include "extensions/common/permissions/permissions_info.h"
#include "extensions/common/url_pattern.h"
namespace extensions {
namespace keys = manifest_keys;
namespace errors = manifest_errors;
using core_api::extensions_manifest_types::ContentCapabilities;
ContentCapabilitiesInfo::ContentCapabilitiesInfo() {
}
ContentCapabilitiesInfo::~ContentCapabilitiesInfo() {
}
static base::LazyInstance<ContentCapabilitiesInfo>
g_empty_content_capabilities_info = LAZY_INSTANCE_INITIALIZER;
// static
const ContentCapabilitiesInfo& ContentCapabilitiesInfo::Get(
const Extension* extension) {
ContentCapabilitiesInfo* info = static_cast<ContentCapabilitiesInfo*>(
extension->GetManifestData(keys::kContentCapabilities));
return info ? *info : g_empty_content_capabilities_info.Get();
}
ContentCapabilitiesHandler::ContentCapabilitiesHandler() {
}
ContentCapabilitiesHandler::~ContentCapabilitiesHandler() {
}
bool ContentCapabilitiesHandler::Parse(Extension* extension,
base::string16* error) {
scoped_ptr<ContentCapabilitiesInfo> info(new ContentCapabilitiesInfo);
const base::Value* value = NULL;
if (!extension->manifest()->Get(keys::kContentCapabilities, &value)) {
*error = base::ASCIIToUTF16(errors::kInvalidContentCapabilities);
return false;
}
scoped_ptr<ContentCapabilities> capabilities(ContentCapabilities::FromValue(
*value, error));
if (!capabilities)
return false;
int supported_schemes = URLPattern::SCHEME_HTTPS;
if (base::CommandLine::ForCurrentProcess()->HasSwitch(switches::kTestType)) {
// We don't have a suitable HTTPS test server, so this will have to do.
supported_schemes |= URLPattern::SCHEME_HTTP;
}
std::string url_error;
URLPatternSet potential_url_patterns;
if (!potential_url_patterns.Populate(capabilities->matches, supported_schemes,
false /* allow_file_access */,
&url_error)) {
*error = ErrorUtils::FormatErrorMessageUTF16(
errors::kInvalidContentCapabilitiesMatch, url_error);
return false;
}
// Filter wildcard URL patterns and emit warnings for them.
std::set<URLPattern> valid_url_patterns;
for (const URLPattern& pattern : potential_url_patterns) {
if (pattern.match_subdomains() || pattern.ImpliesAllHosts()) {
extension->AddInstallWarning(InstallWarning(
errors::kInvalidContentCapabilitiesMatchOrigin));
} else {
valid_url_patterns.insert(pattern);
}
}
info->url_patterns = URLPatternSet(valid_url_patterns);
// Filter invalid permissions and emit warnings for them.
for (const std::string& permission_name : capabilities->permissions) {
const APIPermissionInfo* permission_info = PermissionsInfo::GetInstance()
->GetByName(permission_name);
if (!permission_info || !permission_info->supports_content_capabilities()) {
extension->AddInstallWarning(InstallWarning(
errors::kInvalidContentCapabilitiesPermission,
keys::kContentCapabilities,
permission_name));
} else {
info->permissions.insert(permission_info->CreateAPIPermission());
}
}
extension->SetManifestData(keys::kContentCapabilities, info.release());
return true;
}
const std::vector<std::string> ContentCapabilitiesHandler::Keys()
const {
return SingleKey(keys::kContentCapabilities);
}
} // namespace extensions