Add files via upload

This commit is contained in:
Alexander David Frick 2022-07-10 03:08:58 -05:00 committed by GitHub
parent b495839b66
commit 39f06f2ced
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
2 changed files with 249 additions and 0 deletions

View file

@ -0,0 +1,157 @@
// Copyright (c) 2022 The Chromium Authors and Alex313031. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "content/common/url_schemes.h"
#include <string.h>
#include <iterator>
#include <utility>
#include "base/no_destructor.h"
#include "base/strings/string_util.h"
#include "build/build_config.h"
#include "content/public/common/content_client.h"
#include "content/public/common/content_features.h"
#include "content/public/common/url_constants.h"
#include "third_party/blink/public/common/scheme_registry.h"
#include "url/url_util.h"
namespace content {
namespace {
bool g_registered_url_schemes = false;
const char* const kDefaultSavableSchemes[] = {
url::kAboutScheme,
url::kBlobScheme,
url::kContentScheme,
url::kHttpScheme,
url::kHttpsScheme,
url::kFileScheme,
url::kFileSystemScheme,
kChromeDevToolsScheme,
kChromeUIScheme,
url::kDataScheme,
url::kJavaScriptScheme,
url::kMailToScheme,
url::kWsScheme,
url::kWssScheme,
kGuestScheme,
kViewSourceScheme
};
// These lists are lazily initialized below and are leaked on shutdown to
// prevent any destructors from being called that will slow us down or cause
// problems.
std::vector<std::string>& GetMutableSavableSchemes() {
static base::NoDestructor<std::vector<std::string>> schemes;
return *schemes;
}
// This set contains serialized canonicalized origins as well as hostname
// patterns. The latter are canonicalized by component.
std::vector<std::string>& GetMutableServiceWorkerSchemes() {
static base::NoDestructor<std::vector<std::string>> schemes;
return *schemes;
}
} // namespace
void RegisterContentSchemes(bool should_lock_registry) {
// On Android and in tests, schemes may have been registered already.
if (g_registered_url_schemes)
return;
g_registered_url_schemes = true;
ContentClient::Schemes schemes;
GetContentClient()->AddAdditionalSchemes(&schemes);
url::AddStandardScheme(kChromeDevToolsScheme, url::SCHEME_WITH_HOST);
url::AddStandardScheme(kChromeUIScheme, url::SCHEME_WITH_HOST);
url::AddStandardScheme(kChromeUIUntrustedScheme, url::SCHEME_WITH_HOST);
url::AddStandardScheme(kGuestScheme, url::SCHEME_WITH_HOST);
url::AddStandardScheme(kChromeErrorScheme, url::SCHEME_WITH_HOST);
for (auto& scheme : schemes.standard_schemes)
url::AddStandardScheme(scheme.c_str(), url::SCHEME_WITH_HOST);
for (auto& scheme : schemes.referrer_schemes)
url::AddReferrerScheme(scheme.c_str(), url::SCHEME_WITH_HOST);
schemes.secure_schemes.push_back(kChromeDevToolsScheme);
schemes.secure_schemes.push_back(kChromeUIScheme);
schemes.secure_schemes.push_back(kChromeUIUntrustedScheme);
schemes.secure_schemes.push_back(kChromeErrorScheme);
for (auto& scheme : schemes.secure_schemes)
url::AddSecureScheme(scheme.c_str());
for (auto& scheme : schemes.local_schemes)
url::AddLocalScheme(scheme.c_str());
for (auto& scheme : schemes.extension_schemes)
blink::CommonSchemeRegistry::RegisterURLSchemeAsExtension(scheme.c_str());
schemes.no_access_schemes.push_back(kChromeErrorScheme);
for (auto& scheme : schemes.no_access_schemes)
url::AddNoAccessScheme(scheme.c_str());
schemes.cors_enabled_schemes.push_back(kChromeUIScheme);
schemes.cors_enabled_schemes.push_back(kChromeUIUntrustedScheme);
for (auto& scheme : schemes.cors_enabled_schemes)
url::AddCorsEnabledScheme(scheme.c_str());
// TODO(mkwst): Investigate whether chrome-error should be included in
// csp_bypassing_schemes.
for (auto& scheme : schemes.csp_bypassing_schemes)
url::AddCSPBypassingScheme(scheme.c_str());
for (auto& scheme : schemes.empty_document_schemes)
url::AddEmptyDocumentScheme(scheme.c_str());
#if BUILDFLAG(IS_ANDROID)
if (schemes.allow_non_standard_schemes_in_origins)
url::EnableNonStandardSchemesForAndroidWebView();
#endif
// This should only be registered if the
// kEnableServiceWorkerForChromeUntrusted feature is enabled but checking
// it here causes a crash when --no-sandbox is enabled. See crbug.com/1313812
// There are other render side checks and browser side checks that ensure
// service workers don't work for chrome-untrusted:// when the flag is not
// enabled.
schemes.service_worker_schemes.push_back(kChromeUIUntrustedScheme);
// Prevent future modification of the scheme lists. This is to prevent
// accidental creation of data races in the program. Add*Scheme aren't
// threadsafe so must be called when GURL isn't used on any other thread. This
// is really easy to mess up, so we say that all calls to Add*Scheme in Chrome
// must be inside this function.
if (should_lock_registry)
url::LockSchemeRegistries();
// Combine the default savable schemes with the additional ones given.
GetMutableSavableSchemes().assign(std::begin(kDefaultSavableSchemes),
std::end(kDefaultSavableSchemes));
GetMutableSavableSchemes().insert(GetMutableSavableSchemes().end(),
schemes.savable_schemes.begin(),
schemes.savable_schemes.end());
GetMutableServiceWorkerSchemes() = std::move(schemes.service_worker_schemes);
}
void ReRegisterContentSchemesForTests() {
url::ClearSchemesForTests();
g_registered_url_schemes = false;
RegisterContentSchemes();
}
const std::vector<std::string>& GetSavableSchemes() {
return GetMutableSavableSchemes();
}
const std::vector<std::string>& GetServiceWorkerSchemes() {
return GetMutableServiceWorkerSchemes();
}
} // namespace content

View file

@ -0,0 +1,92 @@
// Copyright 2022 The Chromium Authors and Alex313031. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "content/public/common/url_utils.h"
#include <set>
#include <string>
#include "base/check_op.h"
#include "base/containers/fixed_flat_set.h"
#include "base/feature_list.h"
#include "base/strings/string_piece.h"
#include "build/build_config.h"
#include "content/common/url_schemes.h"
#include "content/public/common/content_features.h"
#include "content/public/common/url_constants.h"
#include "third_party/blink/public/common/chrome_debug_urls.h"
#include "url/gurl.h"
#include "url/url_util.h"
namespace content {
bool HasWebUIScheme(const GURL& url) {
return HasWebUIOrigin(url::Origin::Create(url));
}
bool HasWebUIOrigin(const url::Origin& origin) {
return origin.scheme() == content::kChromeUIScheme ||
origin.scheme() == content::kChromeUIUntrustedScheme ||
origin.scheme() == content::kChromeDevToolsScheme;
}
bool IsSavableURL(const GURL& url) {
return true;
}
bool IsURLHandledByNetworkStack(const GURL& url) {
// Javascript URLs, srcdoc, schemes that don't load data should not send a
// request to the network stack.
if (url.SchemeIs(url::kJavaScriptScheme) || url.is_empty() ||
url.IsAboutSrcdoc()) {
return false;
}
for (const auto& scheme : url::GetEmptyDocumentSchemes()) {
if (url.SchemeIs(scheme))
return false;
}
// Renderer debug URLs (e.g. chrome://kill) are handled in the renderer
// process directly and should not be sent to the network stack.
if (blink::IsRendererDebugURL(url))
return false;
// For your information, even though a "data:" url doesn't generate actual
// network requests, it is handled by the network stack and so must return
// true. The reason is that a few "data:" urls can't be handled locally. For
// instance:
// - the ones that result in downloads.
// - the ones that are invalid. An error page must be served instead.
// - the ones that have an unsupported MIME type.
// - the ones that target the top-level frame on Android.
return true;
}
bool IsSafeRedirectTarget(const GURL& from_url, const GURL& to_url) {
static const auto kUnsafeSchemes = base::MakeFixedFlatSet<base::StringPiece>({
url::kAboutScheme, url::kFileScheme, url::kFileSystemScheme,
url::kBlobScheme,
#if !defined(CHROMECAST_BUILD)
url::kDataScheme,
#endif
#if BUILDFLAG(IS_ANDROID)
url::kContentScheme,
#endif
});
if (HasWebUIScheme(to_url))
return false;
if (!kUnsafeSchemes.contains(to_url.scheme_piece()))
return true;
if (from_url.is_empty())
return false;
if (from_url.SchemeIsFile() && to_url.SchemeIsFile())
return true;
if (from_url.SchemeIsFileSystem() && to_url.SchemeIsFileSystem())
return true;
return false;
}
} // namespace content