• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4 
5 #ifndef CHROME_BROWSER_EXTENSIONS_SANDBOXED_EXTENSION_UNPACKER_H_
6 #define CHROME_BROWSER_EXTENSIONS_SANDBOXED_EXTENSION_UNPACKER_H_
7 #pragma once
8 
9 #include <string>
10 
11 #include "base/file_path.h"
12 #include "base/memory/ref_counted.h"
13 #include "base/memory/scoped_temp_dir.h"
14 #include "chrome/browser/utility_process_host.h"
15 
16 class DictionaryValue;
17 class Extension;
18 class ResourceDispatcherHost;
19 
20 class SandboxedExtensionUnpackerClient
21     : public base::RefCountedThreadSafe<SandboxedExtensionUnpackerClient> {
22  public:
23   // temp_dir - A temporary directory containing the results of the extension
24   // unpacking. The client is responsible for deleting this directory.
25   //
26   // extension_root - The path to the extension root inside of temp_dir.
27   //
28   // extension - The extension that was unpacked. The client is responsible
29   // for deleting this memory.
30   virtual void OnUnpackSuccess(const FilePath& temp_dir,
31                                const FilePath& extension_root,
32                                const Extension* extension) = 0;
33   virtual void OnUnpackFailure(const std::string& error) = 0;
34 
35  protected:
36   friend class base::RefCountedThreadSafe<SandboxedExtensionUnpackerClient>;
37 
~SandboxedExtensionUnpackerClient()38   virtual ~SandboxedExtensionUnpackerClient() {}
39 };
40 
41 // SandboxedExtensionUnpacker unpacks extensions from the CRX format into a
42 // directory. This is done in a sandboxed subprocess to protect the browser
43 // process from parsing complex formats like JPEG or JSON from untrusted
44 // sources.
45 //
46 // Unpacking an extension using this class makes minor changes to its source,
47 // such as transcoding all images to PNG, parsing all message catalogs
48 // and rewriting the manifest JSON. As such, it should not be used when the
49 // output is not intended to be given back to the author.
50 //
51 //
52 // Lifetime management:
53 //
54 // This class is ref-counted by each call it makes to itself on another thread,
55 // and by UtilityProcessHost.
56 //
57 // Additionally, we hold a reference to our own client so that it lives at least
58 // long enough to receive the result of unpacking.
59 //
60 //
61 // NOTE: This class should only be used on the file thread.
62 class SandboxedExtensionUnpacker : public UtilityProcessHost::Client {
63  public:
64   // The size of the magic character sequence at the beginning of each crx
65   // file, in bytes. This should be a multiple of 4.
66   static const size_t kExtensionHeaderMagicSize = 4;
67 
68   // This header is the first data at the beginning of an extension. Its
69   // contents are purposely 32-bit aligned so that it can just be slurped into
70   // a struct without manual parsing.
71   struct ExtensionHeader {
72     char magic[kExtensionHeaderMagicSize];
73     uint32 version;
74     uint32 key_size;  // The size of the public key, in bytes.
75     uint32 signature_size;  // The size of the signature, in bytes.
76     // An ASN.1-encoded PublicKeyInfo structure follows.
77     // The signature follows.
78   };
79 
80   // The maximum size the crx parser will tolerate for a public key.
81   static const uint32 kMaxPublicKeySize = 1 << 16;
82 
83   // The maximum size the crx parser will tolerate for a signature.
84   static const uint32 kMaxSignatureSize = 1 << 16;
85 
86   // The magic character sequence at the beginning of each crx file.
87   static const char kExtensionHeaderMagic[];
88 
89   // The current version of the crx format.
90   static const uint32 kCurrentVersion = 2;
91 
92   // Unpacks the extension in |crx_path| into a temporary directory and calls
93   // |client| with the result. If |rdh| is provided, unpacking is done in a
94   // sandboxed subprocess. Otherwise, it is done in-process.
95   SandboxedExtensionUnpacker(const FilePath& crx_path,
96                              ResourceDispatcherHost* rdh,
97                              SandboxedExtensionUnpackerClient* cilent);
98 
99   // Start unpacking the extension. The client is called with the results.
100   void Start();
101 
102  private:
103   class ProcessHostClient;
104 
105   // Enumerate all the ways unpacking can fail.  Calls to ReportFailure()
106   // take a failure reason as an argument, and put it in histogram
107   // Extensions.SandboxUnpackFailureReason.
108   enum FailureReason {
109     // SandboxedExtensionUnpacker::CreateTempDirectory()
110     COULD_NOT_GET_TEMP_DIRECTORY,
111     COULD_NOT_CREATE_TEMP_DIRECTORY,
112 
113     // SandboxedExtensionUnpacker::Start()
114     FAILED_TO_COPY_EXTENSION_FILE_TO_TEMP_DIRECTORY,
115     COULD_NOT_GET_SANDBOX_FRIENDLY_PATH,
116 
117     // SandboxedExtensionUnpacker::OnUnpackExtensionSucceeded()
118     COULD_NOT_LOCALIZE_EXTENSION,
119     INVALID_MANIFEST,
120 
121     //SandboxedExtensionUnpacker::OnUnpackExtensionFailed()
122     UNPACKER_CLIENT_FAILED,
123 
124     // SandboxedExtensionUnpacker::OnProcessCrashed()
125     UTILITY_PROCESS_CRASHED_WHILE_TRYING_TO_INSTALL,
126 
127     // SandboxedExtensionUnpacker::ValidateSignature()
128     CRX_FILE_NOT_READABLE,
129     CRX_HEADER_INVALID,
130     CRX_MAGIC_NUMBER_INVALID,
131     CRX_VERSION_NUMBER_INVALID,
132     CRX_EXCESSIVELY_LARGE_KEY_OR_SIGNATURE,
133     CRX_ZERO_KEY_LENGTH,
134     CRX_ZERO_SIGNATURE_LENGTH,
135     CRX_PUBLIC_KEY_INVALID,
136     CRX_SIGNATURE_INVALID,
137     CRX_SIGNATURE_VERIFICATION_INITIALIZATION_FAILED,
138     CRX_SIGNATURE_VERIFICATION_FAILED,
139 
140     // SandboxedExtensionUnpacker::RewriteManifestFile()
141     ERROR_SERIALIZING_MANIFEST_JSON,
142     ERROR_SAVING_MANIFEST_JSON,
143 
144     // SandboxedExtensionUnpacker::RewriteImageFiles()
145     COULD_NOT_READ_IMAGE_DATA_FROM_DISK,
146     DECODED_IMAGES_DO_NOT_MATCH_THE_MANIFEST,
147     INVALID_PATH_FOR_BROWSER_IMAGE,
148     ERROR_REMOVING_OLD_IMAGE_FILE,
149     INVALID_PATH_FOR_BITMAP_IMAGE,
150     ERROR_RE_ENCODING_THEME_IMAGE,
151     ERROR_SAVING_THEME_IMAGE,
152 
153     // SandboxedExtensionUnpacker::RewriteCatalogFiles()
154     COULD_NOT_READ_CATALOG_DATA_FROM_DISK,
155     INVALID_CATALOG_DATA,
156     INVALID_PATH_FOR_CATALOG,
157     ERROR_SERIALIZING_CATALOG,
158     ERROR_SAVING_CATALOG,
159 
160     NUM_FAILURE_REASONS
161   };
162 
163   friend class ProcessHostClient;
164   friend class SandboxedExtensionUnpackerTest;
165 
166   virtual ~SandboxedExtensionUnpacker();
167 
168   // Set |temp_dir_| as a temporary directory to unpack the extension in.
169   // Return true on success.
170   virtual bool CreateTempDirectory();
171 
172   // Validates the signature of the extension and extract the key to
173   // |public_key_|. Returns true if the signature validates, false otherwise.
174   //
175   // NOTE: Having this method here is a bit ugly. This code should really live
176   // in ExtensionUnpacker as it is not specific to sandboxed unpacking. It was
177   // put here because we cannot run windows crypto code in the sandbox. But we
178   // could still have this method statically on ExtensionUnpacker so that code
179   // just for unpacking is there and code just for sandboxing of unpacking is
180   // here.
181   bool ValidateSignature();
182 
183   // Starts the utility process that unpacks our extension.
184   void StartProcessOnIOThread(const FilePath& temp_crx_path);
185 
186   // SandboxedExtensionUnpacker
187   virtual void OnUnpackExtensionSucceeded(const DictionaryValue& manifest);
188   virtual void OnUnpackExtensionFailed(const std::string& error_message);
189   virtual void OnProcessCrashed(int exit_code);
190 
191   void ReportFailure(FailureReason reason, const std::string& message);
192   void ReportSuccess();
193 
194   // Overwrites original manifest with safe result from utility process.
195   // Returns NULL on error. Caller owns the returned object.
196   DictionaryValue* RewriteManifestFile(const DictionaryValue& manifest);
197 
198   // Overwrites original files with safe results from utility process.
199   // Reports error and returns false if it fails.
200   bool RewriteImageFiles();
201   bool RewriteCatalogFiles();
202 
203   // The path to the CRX to unpack.
204   FilePath crx_path_;
205 
206   // Our client's thread. This is the thread we respond on.
207   BrowserThread::ID thread_identifier_;
208 
209   // ResourceDispatcherHost to pass to the utility process.
210   ResourceDispatcherHost* rdh_;
211 
212   // Our client.
213   scoped_refptr<SandboxedExtensionUnpackerClient> client_;
214 
215   // A temporary directory to use for unpacking.
216   ScopedTempDir temp_dir_;
217 
218   // The root directory of the unpacked extension. This is a child of temp_dir_.
219   FilePath extension_root_;
220 
221   // Represents the extension we're unpacking.
222   scoped_refptr<Extension> extension_;
223 
224   // Whether we've received a response from the utility process yet.
225   bool got_response_;
226 
227   // The public key that was extracted from the CRX header.
228   std::string public_key_;
229 };
230 
231 #endif  // CHROME_BROWSER_EXTENSIONS_SANDBOXED_EXTENSION_UNPACKER_H_
232