123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408 |
- // Copyright (c) 2014 GitHub, Inc.
- // Use of this source code is governed by the MIT license that can be
- // found in the LICENSE file.
- #include "shell/common/asar/archive.h"
- #include <string>
- #include <utility>
- #include <vector>
- #include "base/check.h"
- #include "base/files/file.h"
- #include "base/files/file_util.h"
- #include "base/json/json_reader.h"
- #include "base/logging.h"
- #include "base/pickle.h"
- #include "base/strings/string_number_conversions.h"
- #include "base/values.h"
- #include "electron/fuses.h"
- #include "shell/common/asar/asar_util.h"
- #include "shell/common/asar/scoped_temporary_file.h"
- #include "shell/common/thread_restrictions.h"
- #if BUILDFLAG(IS_WIN)
- #include <io.h>
- #endif
- namespace asar {
- namespace {
- #if BUILDFLAG(IS_WIN)
- const char kSeparators[] = "\\/";
- #else
- const char kSeparators[] = "/";
- #endif
- const base::Value::Dict* GetNodeFromPath(std::string path,
- const base::Value::Dict& root);
- // Gets the "files" from "dir".
- const base::Value::Dict* GetFilesNode(const base::Value::Dict& root,
- const base::Value::Dict& dir) {
- // Test for symbol linked directory.
- const std::string* link = dir.FindString("link");
- if (link != nullptr) {
- const base::Value::Dict* linked_node = GetNodeFromPath(*link, root);
- if (!linked_node)
- return nullptr;
- return linked_node->FindDict("files");
- }
- return dir.FindDict("files");
- }
- // Gets sub-file "name" from "dir".
- const base::Value::Dict* GetChildNode(const base::Value::Dict& root,
- const std::string& name,
- const base::Value::Dict& dir) {
- if (name.empty())
- return &root;
- const base::Value::Dict* files = GetFilesNode(root, dir);
- return files ? files->FindDict(name) : nullptr;
- }
- // Gets the node of "path" from "root".
- const base::Value::Dict* GetNodeFromPath(std::string path,
- const base::Value::Dict& root) {
- if (path.empty())
- return &root;
- const base::Value::Dict* dir = &root;
- for (size_t delimiter_position = path.find_first_of(kSeparators);
- delimiter_position != std::string::npos;
- delimiter_position = path.find_first_of(kSeparators)) {
- const base::Value::Dict* child =
- GetChildNode(root, path.substr(0, delimiter_position), *dir);
- if (!child)
- return nullptr;
- dir = child;
- path.erase(0, delimiter_position + 1);
- }
- return GetChildNode(root, path, *dir);
- }
- bool FillFileInfoWithNode(Archive::FileInfo* info,
- uint32_t header_size,
- bool load_integrity,
- const base::Value::Dict* node) {
- if (absl::optional<int> size = node->FindInt("size")) {
- info->size = static_cast<uint32_t>(*size);
- } else {
- return false;
- }
- if (absl::optional<bool> unpacked = node->FindBool("unpacked")) {
- info->unpacked = *unpacked;
- if (info->unpacked) {
- return true;
- }
- }
- const std::string* offset = node->FindString("offset");
- if (offset &&
- base::StringToUint64(base::StringPiece(*offset), &info->offset)) {
- info->offset += header_size;
- } else {
- return false;
- }
- if (absl::optional<bool> executable = node->FindBool("executable")) {
- info->executable = *executable;
- }
- #if BUILDFLAG(IS_MAC)
- if (load_integrity &&
- electron::fuses::IsEmbeddedAsarIntegrityValidationEnabled()) {
- if (const base::Value::Dict* integrity = node->FindDict("integrity")) {
- const std::string* algorithm = integrity->FindString("algorithm");
- const std::string* hash = integrity->FindString("hash");
- absl::optional<int> block_size = integrity->FindInt("blockSize");
- const base::Value::List* blocks = integrity->FindList("blocks");
- if (algorithm && hash && block_size && block_size > 0 && blocks) {
- IntegrityPayload integrity_payload;
- integrity_payload.hash = *hash;
- integrity_payload.block_size =
- static_cast<uint32_t>(block_size.value());
- for (auto& value : *blocks) {
- if (const std::string* block = value.GetIfString()) {
- integrity_payload.blocks.push_back(*block);
- } else {
- LOG(FATAL)
- << "Invalid block integrity value for file in ASAR archive";
- }
- }
- if (*algorithm == "SHA256") {
- integrity_payload.algorithm = HashAlgorithm::kSHA256;
- info->integrity = std::move(integrity_payload);
- }
- }
- }
- if (!info->integrity.has_value()) {
- LOG(FATAL) << "Failed to read integrity for file in ASAR archive";
- return false;
- }
- }
- #endif
- return true;
- }
- } // namespace
- IntegrityPayload::IntegrityPayload()
- : algorithm(HashAlgorithm::kNone), block_size(0) {}
- IntegrityPayload::~IntegrityPayload() = default;
- IntegrityPayload::IntegrityPayload(const IntegrityPayload& other) = default;
- Archive::FileInfo::FileInfo()
- : unpacked(false), executable(false), size(0), offset(0) {}
- Archive::FileInfo::~FileInfo() = default;
- Archive::Archive(const base::FilePath& path)
- : initialized_(false), path_(path), file_(base::File::FILE_OK) {
- electron::ScopedAllowBlockingForElectron allow_blocking;
- file_.Initialize(path_, base::File::FLAG_OPEN | base::File::FLAG_READ);
- #if BUILDFLAG(IS_WIN)
- fd_ = _open_osfhandle(reinterpret_cast<intptr_t>(file_.GetPlatformFile()), 0);
- #elif BUILDFLAG(IS_POSIX)
- fd_ = file_.GetPlatformFile();
- #endif
- }
- Archive::~Archive() {
- #if BUILDFLAG(IS_WIN)
- if (fd_ != -1) {
- _close(fd_);
- // Don't close the handle since we already closed the fd.
- file_.TakePlatformFile();
- }
- #endif
- electron::ScopedAllowBlockingForElectron allow_blocking;
- file_.Close();
- }
- bool Archive::Init() {
- // Should only be initialized once
- CHECK(!initialized_);
- initialized_ = true;
- if (!file_.IsValid()) {
- if (file_.error_details() != base::File::FILE_ERROR_NOT_FOUND) {
- LOG(WARNING) << "Opening " << path_.value() << ": "
- << base::File::ErrorToString(file_.error_details());
- }
- return false;
- }
- std::vector<char> buf;
- int len;
- buf.resize(8);
- {
- electron::ScopedAllowBlockingForElectron allow_blocking;
- len = file_.ReadAtCurrentPos(buf.data(), buf.size());
- }
- if (len != static_cast<int>(buf.size())) {
- PLOG(ERROR) << "Failed to read header size from " << path_.value();
- return false;
- }
- uint32_t size;
- if (!base::PickleIterator(base::Pickle(buf.data(), buf.size()))
- .ReadUInt32(&size)) {
- LOG(ERROR) << "Failed to parse header size from " << path_.value();
- return false;
- }
- buf.resize(size);
- {
- electron::ScopedAllowBlockingForElectron allow_blocking;
- len = file_.ReadAtCurrentPos(buf.data(), buf.size());
- }
- if (len != static_cast<int>(buf.size())) {
- PLOG(ERROR) << "Failed to read header from " << path_.value();
- return false;
- }
- std::string header;
- if (!base::PickleIterator(base::Pickle(buf.data(), buf.size()))
- .ReadString(&header)) {
- LOG(ERROR) << "Failed to parse header from " << path_.value();
- return false;
- }
- #if BUILDFLAG(IS_MAC)
- // Validate header signature if required and possible
- if (electron::fuses::IsEmbeddedAsarIntegrityValidationEnabled() &&
- RelativePath().has_value()) {
- absl::optional<IntegrityPayload> integrity = HeaderIntegrity();
- if (!integrity.has_value()) {
- LOG(FATAL) << "Failed to get integrity for validatable asar archive: "
- << RelativePath().value();
- return false;
- }
- // Currently we only support the sha256 algorithm, we can add support for
- // more below ensure we read them in preference order from most secure to
- // least
- if (integrity.value().algorithm != HashAlgorithm::kNone) {
- ValidateIntegrityOrDie(header.c_str(), header.length(),
- integrity.value());
- } else {
- LOG(FATAL) << "No eligible hash for validatable asar archive: "
- << RelativePath().value();
- }
- header_validated_ = true;
- }
- #endif
- absl::optional<base::Value> value = base::JSONReader::Read(header);
- if (!value || !value->is_dict()) {
- LOG(ERROR) << "Failed to parse header";
- return false;
- }
- header_size_ = 8 + size;
- header_ = std::move(value->GetDict());
- return true;
- }
- #if !BUILDFLAG(IS_MAC)
- absl::optional<IntegrityPayload> Archive::HeaderIntegrity() const {
- return absl::nullopt;
- }
- absl::optional<base::FilePath> Archive::RelativePath() const {
- return absl::nullopt;
- }
- #endif
- bool Archive::GetFileInfo(const base::FilePath& path, FileInfo* info) const {
- if (!header_)
- return false;
- const base::Value::Dict* node =
- GetNodeFromPath(path.AsUTF8Unsafe(), *header_);
- if (!node)
- return false;
- const std::string* link = node->FindString("link");
- if (link)
- return GetFileInfo(base::FilePath::FromUTF8Unsafe(*link), info);
- return FillFileInfoWithNode(info, header_size_, header_validated_, node);
- }
- bool Archive::Stat(const base::FilePath& path, Stats* stats) const {
- if (!header_)
- return false;
- const base::Value::Dict* node =
- GetNodeFromPath(path.AsUTF8Unsafe(), *header_);
- if (!node)
- return false;
- if (node->Find("link")) {
- stats->type = FileType::kLink;
- return true;
- }
- if (node->Find("files")) {
- stats->type = FileType::kDirectory;
- return true;
- }
- return FillFileInfoWithNode(stats, header_size_, header_validated_, node);
- }
- bool Archive::Readdir(const base::FilePath& path,
- std::vector<base::FilePath>* files) const {
- if (!header_)
- return false;
- const base::Value::Dict* node =
- GetNodeFromPath(path.AsUTF8Unsafe(), *header_);
- if (!node)
- return false;
- const base::Value::Dict* files_node = GetFilesNode(*header_, *node);
- if (!files_node)
- return false;
- for (const auto iter : *files_node)
- files->push_back(base::FilePath::FromUTF8Unsafe(iter.first));
- return true;
- }
- bool Archive::Realpath(const base::FilePath& path,
- base::FilePath* realpath) const {
- if (!header_)
- return false;
- const base::Value::Dict* node =
- GetNodeFromPath(path.AsUTF8Unsafe(), *header_);
- if (!node)
- return false;
- const std::string* link = node->FindString("link");
- if (link) {
- *realpath = base::FilePath::FromUTF8Unsafe(*link);
- return true;
- }
- *realpath = path;
- return true;
- }
- bool Archive::CopyFileOut(const base::FilePath& path, base::FilePath* out) {
- if (!header_)
- return false;
- base::AutoLock auto_lock(external_files_lock_);
- auto it = external_files_.find(path.value());
- if (it != external_files_.end()) {
- *out = it->second->path();
- return true;
- }
- FileInfo info;
- if (!GetFileInfo(path, &info))
- return false;
- if (info.unpacked) {
- *out = path_.AddExtension(FILE_PATH_LITERAL("unpacked")).Append(path);
- return true;
- }
- auto temp_file = std::make_unique<ScopedTemporaryFile>();
- base::FilePath::StringType ext = path.Extension();
- if (!temp_file->InitFromFile(&file_, ext, info.offset, info.size,
- info.integrity))
- return false;
- #if BUILDFLAG(IS_POSIX)
- if (info.executable) {
- // chmod a+x temp_file;
- base::SetPosixFilePermissions(temp_file->path(), 0755);
- }
- #endif
- *out = temp_file->path();
- external_files_[path.value()] = std::move(temp_file);
- return true;
- }
- int Archive::GetUnsafeFD() const {
- return fd_;
- }
- } // namespace asar
|