1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143
|
// Copyright 2017 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "chrome/browser/component_updater/ssl_error_assistant_component_installer.h"
#include <memory>
#include <utility>
#include "base/files/file_util.h"
#include "base/functional/bind.h"
#include "base/functional/callback.h"
#include "base/logging.h"
#include "base/memory/ref_counted.h"
#include "base/task/thread_pool.h"
#include "components/security_interstitials/content/ssl_error_assistant.h"
#include "components/security_interstitials/content/ssl_error_handler.h"
#include "content/public/browser/browser_task_traits.h"
#include "content/public/browser/browser_thread.h"
namespace {
const base::FilePath::CharType kConfigBinaryPbFileName[] =
FILE_PATH_LITERAL("ssl_error_assistant.pb");
// The SHA256 of the SubjectPublicKeyInfo used to sign the extension.
// The extension id is: giekcmmlnklenlaomppkphknjmnnpneh
const uint8_t kSslErrorAssistantPublicKeySHA256[32] = {
0x68, 0x4a, 0x2c, 0xcb, 0xda, 0xb4, 0xdb, 0x0e, 0xcf, 0xfa, 0xf7,
0xad, 0x9c, 0xdd, 0xfd, 0x47, 0x97, 0xe4, 0x73, 0x24, 0x67, 0x93,
0x9c, 0xb1, 0x14, 0xcd, 0x3f, 0x54, 0x66, 0x25, 0x99, 0x3f};
void LoadProtoFromDisk(const base::FilePath& pb_path) {
if (pb_path.empty()) {
return;
}
std::string binary_pb;
if (!base::ReadFileToString(pb_path, &binary_pb)) {
// The file won't exist on new installations, so this is not always an
// error.
DVLOG(1) << "Failed reading from " << pb_path.value();
return;
}
auto proto = std::make_unique<chrome_browser_ssl::SSLErrorAssistantConfig>();
if (!proto->ParseFromString(binary_pb)) {
DVLOG(1) << "Failed parsing proto " << pb_path.value();
return;
}
// Retrieve the default proto from the resource bundle and keep the most
// recent version. This is required since the component updater may still have
// an older version.
std::unique_ptr<chrome_browser_ssl::SSLErrorAssistantConfig> default_proto =
SSLErrorAssistant::GetErrorAssistantProtoFromResourceBundle();
if (default_proto && default_proto->version_id() > proto->version_id()) {
proto = std::move(default_proto);
}
content::GetUIThreadTaskRunner({})->PostTask(
FROM_HERE, base::BindOnce(&SSLErrorHandler::SetErrorAssistantProto,
std::move(proto)));
}
} // namespace
namespace component_updater {
bool SSLErrorAssistantComponentInstallerPolicy::
SupportsGroupPolicyEnabledComponentUpdates() const {
return true;
}
bool SSLErrorAssistantComponentInstallerPolicy::RequiresNetworkEncryption()
const {
return false;
}
update_client::CrxInstaller::Result
SSLErrorAssistantComponentInstallerPolicy::OnCustomInstall(
const base::Value::Dict& manifest,
const base::FilePath& install_dir) {
return update_client::CrxInstaller::Result(0); // Nothing custom here.
}
void SSLErrorAssistantComponentInstallerPolicy::OnCustomUninstall() {}
base::FilePath SSLErrorAssistantComponentInstallerPolicy::GetInstalledPath(
const base::FilePath& base) {
return base.Append(kConfigBinaryPbFileName);
}
void SSLErrorAssistantComponentInstallerPolicy::ComponentReady(
const base::Version& version,
const base::FilePath& install_dir,
base::Value::Dict manifest) {
DVLOG(1) << "Component ready, version " << version.GetString() << " in "
<< install_dir.value();
base::ThreadPool::PostTask(
FROM_HERE, {base::MayBlock(), base::TaskPriority::BEST_EFFORT},
base::BindOnce(&LoadProtoFromDisk, GetInstalledPath(install_dir)));
}
// Called during startup and installation before ComponentReady().
bool SSLErrorAssistantComponentInstallerPolicy::VerifyInstallation(
const base::Value::Dict& manifest,
const base::FilePath& install_dir) const {
// No need to actually validate the proto here, since we'll do the checking
// in PopulateFromDynamicUpdate().
return base::PathExists(GetInstalledPath(install_dir));
}
base::FilePath
SSLErrorAssistantComponentInstallerPolicy::GetRelativeInstallDir() const {
return base::FilePath(FILE_PATH_LITERAL("SSLErrorAssistant"));
}
void SSLErrorAssistantComponentInstallerPolicy::GetHash(
std::vector<uint8_t>* hash) const {
hash->assign(std::begin(kSslErrorAssistantPublicKeySHA256),
std::end(kSslErrorAssistantPublicKeySHA256));
}
std::string SSLErrorAssistantComponentInstallerPolicy::GetName() const {
// This is a user visible string, so using something other than SSL and TLS.
return "Certificate Error Assistant";
}
update_client::InstallerAttributes
SSLErrorAssistantComponentInstallerPolicy::GetInstallerAttributes() const {
return update_client::InstallerAttributes();
}
void RegisterSSLErrorAssistantComponent(ComponentUpdateService* cus) {
DVLOG(1) << "Registering SSL Error Assistant component.";
auto installer = base::MakeRefCounted<ComponentInstaller>(
std::make_unique<SSLErrorAssistantComponentInstallerPolicy>());
installer->Register(cus, base::OnceClosure());
}
} // namespace component_updater
|