1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4 
5 #include "extensions/browser/api/messaging/native_message_host.h"
6 
7 #include <memory>
8 #include <string>
9 #include <utility>
10 
11 #include "base/bind.h"
12 #include "base/bind_helpers.h"
13 #include "base/json/json_reader.h"
14 #include "base/json/json_writer.h"
15 #include "base/location.h"
16 #include "base/single_thread_task_runner.h"
17 #include "base/stl_util.h"
18 #include "base/task/post_task.h"
19 #include "base/threading/thread_task_runner_handle.h"
20 #include "base/values.h"
21 #include "chrome/browser/browser_process.h"
22 #include "chrome/browser/chromeos/arc/extensions/arc_support_message_host.h"
23 #include "chrome/browser/chromeos/drive/drivefs_native_message_host.h"
24 #include "chrome/browser/chromeos/wilco_dtc_supportd/wilco_dtc_supportd_messaging.h"
25 #include "content/public/browser/browser_task_traits.h"
26 #include "content/public/browser/browser_thread.h"
27 #include "extensions/common/constants.h"
28 #include "extensions/common/url_pattern.h"
29 #include "remoting/host/it2me/it2me_native_messaging_host_chromeos.h"
30 #include "ui/gfx/native_widget_types.h"
31 #include "url/gurl.h"
32 
33 namespace extensions {
34 
35 namespace {
36 
37 // A simple NativeMessageHost that mimics the implementation of
38 // chrome/test/data/native_messaging/native_hosts/echo.py. It is currently
39 // used for testing by ExtensionApiTest::NativeMessagingBasic.
40 
41 const char* const kEchoHostOrigins[] = {
42     // ScopedTestNativeMessagingHost::kExtensionId
43     "chrome-extension://knldjmfmopnpolahpmmgbagdohdnhkik/"};
44 
45 class EchoHost : public NativeMessageHost {
46  public:
Create(content::BrowserContext * browser_context)47   static std::unique_ptr<NativeMessageHost> Create(
48       content::BrowserContext* browser_context) {
49     return std::unique_ptr<NativeMessageHost>(new EchoHost());
50   }
51 
EchoHost()52   EchoHost() : message_number_(0), client_(NULL) {}
53 
Start(Client * client)54   void Start(Client* client) override { client_ = client; }
55 
OnMessage(const std::string & request_string)56   void OnMessage(const std::string& request_string) override {
57     std::unique_ptr<base::Value> request_value =
58         base::JSONReader::ReadDeprecated(request_string);
59     std::unique_ptr<base::DictionaryValue> request(
60         static_cast<base::DictionaryValue*>(request_value.release()));
61     if (request_string.find("stopHostTest") != std::string::npos) {
62       client_->CloseChannel(kNativeHostExited);
63     } else if (request_string.find("bigMessageTest") != std::string::npos) {
64       client_->CloseChannel(kHostInputOutputError);
65     } else {
66       ProcessEcho(*request);
67     }
68   }
69 
task_runner() const70   scoped_refptr<base::SingleThreadTaskRunner> task_runner() const override {
71     return base::ThreadTaskRunnerHandle::Get();
72   }
73 
74  private:
ProcessEcho(const base::DictionaryValue & request)75   void ProcessEcho(const base::DictionaryValue& request) {
76     base::DictionaryValue response;
77     response.SetInteger("id", ++message_number_);
78     response.Set("echo", request.CreateDeepCopy());
79     response.SetString("caller_url", kEchoHostOrigins[0]);
80     std::string response_string;
81     base::JSONWriter::Write(response, &response_string);
82     client_->PostMessageFromNativeHost(response_string);
83   }
84 
85   int message_number_;
86   Client* client_;
87 
88   DISALLOW_COPY_AND_ASSIGN(EchoHost);
89 };
90 
91 struct BuiltInHost {
92   const char* const name;
93   const char* const* const allowed_origins;
94   int allowed_origins_count;
95   std::unique_ptr<NativeMessageHost> (*create_function)(
96       content::BrowserContext*);
97 };
98 
CreateIt2MeHost(content::BrowserContext * browser_context)99 std::unique_ptr<NativeMessageHost> CreateIt2MeHost(
100     content::BrowserContext* browser_context) {
101   return remoting::CreateIt2MeNativeMessagingHostForChromeOS(
102       base::CreateSingleThreadTaskRunner({content::BrowserThread::IO}),
103       base::CreateSingleThreadTaskRunner({content::BrowserThread::UI}),
104       g_browser_process->policy_service());
105 }
106 
107 // If you modify the list of allowed_origins, don't forget to update
108 // remoting/host/it2me/com.google.chrome.remote_assistance.json.jinja2
109 // to keep the two lists in sync.
110 // TODO(kelvinp): Load the native messaging manifest as a resource file into
111 // chrome and fetch the list of allowed_origins from the manifest (see
112 // crbug/424743).
113 const char* const kRemotingIt2MeOrigins[] = {
114     "chrome-extension://inomeogfingihgjfjlpeplalcfajhgai/",
115     "chrome-extension://hpodccmdligbeohchckkeajbfohibipg/"};
116 
117 static const BuiltInHost kBuiltInHost[] = {
118     {"com.google.chrome.test.echo",  // ScopedTestNativeMessagingHost::kHostName
119      kEchoHostOrigins, base::size(kEchoHostOrigins), &EchoHost::Create},
120     {"com.google.chrome.remote_assistance", kRemotingIt2MeOrigins,
121      base::size(kRemotingIt2MeOrigins), &CreateIt2MeHost},
122     {arc::ArcSupportMessageHost::kHostName,
123      arc::ArcSupportMessageHost::kHostOrigin, 1,
124      &arc::ArcSupportMessageHost::Create},
125     {chromeos::kWilcoDtcSupportdUiMessageHost,
126      chromeos::kWilcoDtcSupportdHostOrigins,
127      chromeos::kWilcoDtcSupportdHostOriginsSize,
128      &chromeos::CreateExtensionOwnedWilcoDtcSupportdMessageHost},
129     {drive::kDriveFsNativeMessageHostName,
130      drive::kDriveFsNativeMessageHostOrigins,
131      drive::kDriveFsNativeMessageHostOriginsSize,
132      &drive::CreateDriveFsNativeMessageHost},
133 };
134 
MatchesSecurityOrigin(const BuiltInHost & host,const std::string & extension_id)135 bool MatchesSecurityOrigin(const BuiltInHost& host,
136                            const std::string& extension_id) {
137   GURL origin(std::string(kExtensionScheme) + "://" + extension_id);
138   for (int i = 0; i < host.allowed_origins_count; i++) {
139     URLPattern allowed_origin(URLPattern::SCHEME_ALL, host.allowed_origins[i]);
140     if (allowed_origin.MatchesSecurityOrigin(origin)) {
141       return true;
142     }
143   }
144   return false;
145 }
146 
147 }  // namespace
148 
Create(content::BrowserContext * browser_context,gfx::NativeView native_view,const std::string & source_extension_id,const std::string & native_host_name,bool allow_user_level,std::string * error)149 std::unique_ptr<NativeMessageHost> NativeMessageHost::Create(
150     content::BrowserContext* browser_context,
151     gfx::NativeView native_view,
152     const std::string& source_extension_id,
153     const std::string& native_host_name,
154     bool allow_user_level,
155     std::string* error) {
156   for (unsigned int i = 0; i < base::size(kBuiltInHost); i++) {
157     const BuiltInHost& host = kBuiltInHost[i];
158     std::string name(host.name);
159     if (name == native_host_name) {
160       if (MatchesSecurityOrigin(host, source_extension_id)) {
161         return (*host.create_function)(browser_context);
162       }
163       *error = kForbiddenError;
164       return nullptr;
165     }
166   }
167   *error = kNotFoundError;
168   return nullptr;
169 }
170 
171 }  // namespace extensions
172