blob: 3b247985cb183a633726b029fcf7baa470cde29e [file] [log] [blame]
// Copyright 2014 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "extensions/browser/api/messaging/native_message_host.h"
#include <memory>
#include <string>
#include <utility>
#include "base/bind.h"
#include "base/bind_helpers.h"
#include "base/json/json_reader.h"
#include "base/json/json_writer.h"
#include "base/lazy_instance.h"
#include "base/location.h"
#include "base/macros.h"
#include "base/single_thread_task_runner.h"
#include "base/task_scheduler/post_task.h"
#include "base/task_scheduler/task_traits.h"
#include "base/threading/thread_task_runner_handle.h"
#include "base/values.h"
#include "chrome/browser/browser_process.h"
#include "chrome/browser/chromeos/arc/extensions/arc_support_message_host.h"
#include "content/public/browser/browser_thread.h"
#include "extensions/common/constants.h"
#include "extensions/common/url_pattern.h"
#include "net/url_request/url_request_context_getter.h"
#include "remoting/base/auto_thread_task_runner.h"
#include "remoting/host/chromoting_host_context.h"
#include "remoting/host/it2me/it2me_native_messaging_host.h"
#include "remoting/host/policy_watcher.h"
#include "ui/events/system_input_injector.h"
#include "ui/gfx/native_widget_types.h"
#include "url/gurl.h"
#if defined(USE_OZONE)
#include "ui/ozone/public/ozone_platform.h"
#endif
namespace extensions {
namespace {
// A simple NativeMessageHost that mimics the implementation of
// chrome/test/data/native_messaging/native_hosts/echo.py. It is currently
// used for testing by ExtensionApiTest::NativeMessagingBasic.
const char* const kEchoHostOrigins[] = {
// ScopedTestNativeMessagingHost::kExtensionId
"chrome-extension://knldjmfmopnpolahpmmgbagdohdnhkik/"};
class EchoHost : public NativeMessageHost {
public:
static std::unique_ptr<NativeMessageHost> Create() {
return std::unique_ptr<NativeMessageHost>(new EchoHost());
}
EchoHost() : message_number_(0), client_(NULL) {}
void Start(Client* client) override { client_ = client; }
void OnMessage(const std::string& request_string) override {
std::unique_ptr<base::Value> request_value =
base::JSONReader::Read(request_string);
std::unique_ptr<base::DictionaryValue> request(
static_cast<base::DictionaryValue*>(request_value.release()));
if (request_string.find("stopHostTest") != std::string::npos) {
client_->CloseChannel(kNativeHostExited);
} else if (request_string.find("bigMessageTest") != std::string::npos) {
client_->CloseChannel(kHostInputOutputError);
} else {
ProcessEcho(*request);
}
};
scoped_refptr<base::SingleThreadTaskRunner> task_runner() const override {
return base::ThreadTaskRunnerHandle::Get();
};
private:
void ProcessEcho(const base::DictionaryValue& request) {
base::DictionaryValue response;
response.SetInteger("id", ++message_number_);
response.Set("echo", request.CreateDeepCopy());
response.SetString("caller_url", kEchoHostOrigins[0]);
std::string response_string;
base::JSONWriter::Write(response, &response_string);
client_->PostMessageFromNativeHost(response_string);
}
int message_number_;
Client* client_;
DISALLOW_COPY_AND_ASSIGN(EchoHost);
};
struct BuiltInHost {
const char* const name;
const char* const* const allowed_origins;
int allowed_origins_count;
std::unique_ptr<NativeMessageHost> (*create_function)();
};
#if defined(USE_OZONE)
class OzoneSystemInputInjectorAdaptor : public ui::SystemInputInjectorFactory {
public:
std::unique_ptr<ui::SystemInputInjector> CreateSystemInputInjector()
override {
return ui::OzonePlatform::GetInstance()->CreateSystemInputInjector();
}
};
base::LazyInstance<OzoneSystemInputInjectorAdaptor>::Leaky
g_ozone_system_input_injector_adaptor = LAZY_INSTANCE_INITIALIZER;
#endif
ui::SystemInputInjectorFactory* GetInputInjector() {
ui::SystemInputInjectorFactory* system = ui::GetSystemInputInjectorFactory();
if (system)
return system;
#if defined(USE_OZONE)
return g_ozone_system_input_injector_adaptor.Pointer();
#endif
return nullptr;
}
std::unique_ptr<NativeMessageHost> CreateIt2MeHost() {
std::unique_ptr<remoting::It2MeHostFactory> host_factory(
new remoting::It2MeHostFactory());
std::unique_ptr<remoting::ChromotingHostContext> context =
remoting::ChromotingHostContext::CreateForChromeOS(
base::WrapRefCounted(g_browser_process->system_request_context()),
content::BrowserThread::GetTaskRunnerForThread(
content::BrowserThread::IO),
content::BrowserThread::GetTaskRunnerForThread(
content::BrowserThread::UI),
base::CreateSingleThreadTaskRunnerWithTraits(
{base::MayBlock(), base::TaskPriority::BEST_EFFORT}),
GetInputInjector());
std::unique_ptr<remoting::PolicyWatcher> policy_watcher =
remoting::PolicyWatcher::CreateWithPolicyService(
g_browser_process->policy_service());
std::unique_ptr<NativeMessageHost> host(
new remoting::It2MeNativeMessagingHost(
/*needs_elevation=*/false, std::move(policy_watcher),
std::move(context), std::move(host_factory)));
return host;
}
// If you modify the list of allowed_origins, don't forget to update
// remoting/host/it2me/com.google.chrome.remote_assistance.json.jinja2
// to keep the two lists in sync.
// TODO(kelvinp): Load the native messaging manifest as a resource file into
// chrome and fetch the list of allowed_origins from the manifest (see
// crbug/424743).
const char* const kRemotingIt2MeOrigins[] = {
"chrome-extension://ljacajndfccfgnfohlgkdphmbnpkjflk/",
"chrome-extension://gbchcmhmhahfdphkhkmpfmihenigjmpp/",
"chrome-extension://kgngmbheleoaphbjbaiobfdepmghbfah/",
"chrome-extension://odkaodonbgfohohmklejpjiejmcipmib/",
"chrome-extension://dokpleeekgeeiehdhmdkeimnkmoifgdd/",
"chrome-extension://ajoainacpilcemgiakehflpbkbfipojk/",
"chrome-extension://hmboipgjngjoiaeicfdifdoeacilalgc/",
"chrome-extension://inomeogfingihgjfjlpeplalcfajhgai/",
"chrome-extension://hpodccmdligbeohchckkeajbfohibipg/"};
static const BuiltInHost kBuiltInHost[] = {
{"com.google.chrome.test.echo", // ScopedTestNativeMessagingHost::kHostName
kEchoHostOrigins, arraysize(kEchoHostOrigins), &EchoHost::Create},
{"com.google.chrome.remote_assistance", kRemotingIt2MeOrigins,
arraysize(kRemotingIt2MeOrigins), &CreateIt2MeHost},
{arc::ArcSupportMessageHost::kHostName,
arc::ArcSupportMessageHost::kHostOrigin, 1,
&arc::ArcSupportMessageHost::Create},
};
bool MatchesSecurityOrigin(const BuiltInHost& host,
const std::string& extension_id) {
GURL origin(std::string(kExtensionScheme) + "://" + extension_id);
for (int i = 0; i < host.allowed_origins_count; i++) {
URLPattern allowed_origin(URLPattern::SCHEME_ALL, host.allowed_origins[i]);
if (allowed_origin.MatchesSecurityOrigin(origin)) {
return true;
}
}
return false;
}
} // namespace
std::unique_ptr<NativeMessageHost> NativeMessageHost::Create(
gfx::NativeView native_view,
const std::string& source_extension_id,
const std::string& native_host_name,
bool allow_user_level,
std::string* error) {
for (unsigned int i = 0; i < arraysize(kBuiltInHost); i++) {
const BuiltInHost& host = kBuiltInHost[i];
std::string name(host.name);
if (name == native_host_name) {
if (MatchesSecurityOrigin(host, source_extension_id)) {
return (*host.create_function)();
}
*error = kForbiddenError;
return nullptr;
}
}
*error = kNotFoundError;
return nullptr;
}
} // namespace extensions