Add files via upload
This commit is contained in:
parent
b495839b66
commit
39f06f2ced
2 changed files with 249 additions and 0 deletions
157
src/content/common/url_schemes.cc
Normal file
157
src/content/common/url_schemes.cc
Normal file
|
@ -0,0 +1,157 @@
|
|||
// Copyright (c) 2022 The Chromium Authors and Alex313031. All rights reserved.
|
||||
// Use of this source code is governed by a BSD-style license that can be
|
||||
// found in the LICENSE file.
|
||||
|
||||
#include "content/common/url_schemes.h"
|
||||
|
||||
#include <string.h>
|
||||
|
||||
#include <iterator>
|
||||
#include <utility>
|
||||
|
||||
#include "base/no_destructor.h"
|
||||
#include "base/strings/string_util.h"
|
||||
#include "build/build_config.h"
|
||||
#include "content/public/common/content_client.h"
|
||||
#include "content/public/common/content_features.h"
|
||||
#include "content/public/common/url_constants.h"
|
||||
#include "third_party/blink/public/common/scheme_registry.h"
|
||||
#include "url/url_util.h"
|
||||
|
||||
namespace content {
|
||||
namespace {
|
||||
|
||||
bool g_registered_url_schemes = false;
|
||||
|
||||
const char* const kDefaultSavableSchemes[] = {
|
||||
url::kAboutScheme,
|
||||
url::kBlobScheme,
|
||||
url::kContentScheme,
|
||||
url::kHttpScheme,
|
||||
url::kHttpsScheme,
|
||||
url::kFileScheme,
|
||||
url::kFileSystemScheme,
|
||||
kChromeDevToolsScheme,
|
||||
kChromeUIScheme,
|
||||
url::kDataScheme,
|
||||
url::kJavaScriptScheme,
|
||||
url::kMailToScheme,
|
||||
url::kWsScheme,
|
||||
url::kWssScheme,
|
||||
kGuestScheme,
|
||||
kViewSourceScheme
|
||||
};
|
||||
|
||||
// These lists are lazily initialized below and are leaked on shutdown to
|
||||
// prevent any destructors from being called that will slow us down or cause
|
||||
// problems.
|
||||
std::vector<std::string>& GetMutableSavableSchemes() {
|
||||
static base::NoDestructor<std::vector<std::string>> schemes;
|
||||
return *schemes;
|
||||
}
|
||||
|
||||
// This set contains serialized canonicalized origins as well as hostname
|
||||
// patterns. The latter are canonicalized by component.
|
||||
std::vector<std::string>& GetMutableServiceWorkerSchemes() {
|
||||
static base::NoDestructor<std::vector<std::string>> schemes;
|
||||
return *schemes;
|
||||
}
|
||||
|
||||
} // namespace
|
||||
|
||||
void RegisterContentSchemes(bool should_lock_registry) {
|
||||
// On Android and in tests, schemes may have been registered already.
|
||||
if (g_registered_url_schemes)
|
||||
return;
|
||||
g_registered_url_schemes = true;
|
||||
ContentClient::Schemes schemes;
|
||||
GetContentClient()->AddAdditionalSchemes(&schemes);
|
||||
|
||||
url::AddStandardScheme(kChromeDevToolsScheme, url::SCHEME_WITH_HOST);
|
||||
url::AddStandardScheme(kChromeUIScheme, url::SCHEME_WITH_HOST);
|
||||
url::AddStandardScheme(kChromeUIUntrustedScheme, url::SCHEME_WITH_HOST);
|
||||
url::AddStandardScheme(kGuestScheme, url::SCHEME_WITH_HOST);
|
||||
url::AddStandardScheme(kChromeErrorScheme, url::SCHEME_WITH_HOST);
|
||||
|
||||
for (auto& scheme : schemes.standard_schemes)
|
||||
url::AddStandardScheme(scheme.c_str(), url::SCHEME_WITH_HOST);
|
||||
|
||||
for (auto& scheme : schemes.referrer_schemes)
|
||||
url::AddReferrerScheme(scheme.c_str(), url::SCHEME_WITH_HOST);
|
||||
|
||||
schemes.secure_schemes.push_back(kChromeDevToolsScheme);
|
||||
schemes.secure_schemes.push_back(kChromeUIScheme);
|
||||
schemes.secure_schemes.push_back(kChromeUIUntrustedScheme);
|
||||
schemes.secure_schemes.push_back(kChromeErrorScheme);
|
||||
for (auto& scheme : schemes.secure_schemes)
|
||||
url::AddSecureScheme(scheme.c_str());
|
||||
|
||||
for (auto& scheme : schemes.local_schemes)
|
||||
url::AddLocalScheme(scheme.c_str());
|
||||
|
||||
for (auto& scheme : schemes.extension_schemes)
|
||||
blink::CommonSchemeRegistry::RegisterURLSchemeAsExtension(scheme.c_str());
|
||||
|
||||
schemes.no_access_schemes.push_back(kChromeErrorScheme);
|
||||
for (auto& scheme : schemes.no_access_schemes)
|
||||
url::AddNoAccessScheme(scheme.c_str());
|
||||
|
||||
schemes.cors_enabled_schemes.push_back(kChromeUIScheme);
|
||||
schemes.cors_enabled_schemes.push_back(kChromeUIUntrustedScheme);
|
||||
for (auto& scheme : schemes.cors_enabled_schemes)
|
||||
url::AddCorsEnabledScheme(scheme.c_str());
|
||||
|
||||
// TODO(mkwst): Investigate whether chrome-error should be included in
|
||||
// csp_bypassing_schemes.
|
||||
for (auto& scheme : schemes.csp_bypassing_schemes)
|
||||
url::AddCSPBypassingScheme(scheme.c_str());
|
||||
|
||||
for (auto& scheme : schemes.empty_document_schemes)
|
||||
url::AddEmptyDocumentScheme(scheme.c_str());
|
||||
|
||||
#if BUILDFLAG(IS_ANDROID)
|
||||
if (schemes.allow_non_standard_schemes_in_origins)
|
||||
url::EnableNonStandardSchemesForAndroidWebView();
|
||||
#endif
|
||||
|
||||
// This should only be registered if the
|
||||
// kEnableServiceWorkerForChromeUntrusted feature is enabled but checking
|
||||
// it here causes a crash when --no-sandbox is enabled. See crbug.com/1313812
|
||||
// There are other render side checks and browser side checks that ensure
|
||||
// service workers don't work for chrome-untrusted:// when the flag is not
|
||||
// enabled.
|
||||
schemes.service_worker_schemes.push_back(kChromeUIUntrustedScheme);
|
||||
|
||||
// Prevent future modification of the scheme lists. This is to prevent
|
||||
// accidental creation of data races in the program. Add*Scheme aren't
|
||||
// threadsafe so must be called when GURL isn't used on any other thread. This
|
||||
// is really easy to mess up, so we say that all calls to Add*Scheme in Chrome
|
||||
// must be inside this function.
|
||||
if (should_lock_registry)
|
||||
url::LockSchemeRegistries();
|
||||
|
||||
// Combine the default savable schemes with the additional ones given.
|
||||
GetMutableSavableSchemes().assign(std::begin(kDefaultSavableSchemes),
|
||||
std::end(kDefaultSavableSchemes));
|
||||
GetMutableSavableSchemes().insert(GetMutableSavableSchemes().end(),
|
||||
schemes.savable_schemes.begin(),
|
||||
schemes.savable_schemes.end());
|
||||
|
||||
GetMutableServiceWorkerSchemes() = std::move(schemes.service_worker_schemes);
|
||||
}
|
||||
|
||||
void ReRegisterContentSchemesForTests() {
|
||||
url::ClearSchemesForTests();
|
||||
g_registered_url_schemes = false;
|
||||
RegisterContentSchemes();
|
||||
}
|
||||
|
||||
const std::vector<std::string>& GetSavableSchemes() {
|
||||
return GetMutableSavableSchemes();
|
||||
}
|
||||
|
||||
const std::vector<std::string>& GetServiceWorkerSchemes() {
|
||||
return GetMutableServiceWorkerSchemes();
|
||||
}
|
||||
|
||||
} // namespace content
|
92
src/content/public/common/url_utils.cc
Normal file
92
src/content/public/common/url_utils.cc
Normal file
|
@ -0,0 +1,92 @@
|
|||
// Copyright 2022 The Chromium Authors and Alex313031. All rights reserved.
|
||||
// Use of this source code is governed by a BSD-style license that can be
|
||||
// found in the LICENSE file.
|
||||
|
||||
#include "content/public/common/url_utils.h"
|
||||
|
||||
#include <set>
|
||||
#include <string>
|
||||
|
||||
#include "base/check_op.h"
|
||||
#include "base/containers/fixed_flat_set.h"
|
||||
#include "base/feature_list.h"
|
||||
#include "base/strings/string_piece.h"
|
||||
#include "build/build_config.h"
|
||||
#include "content/common/url_schemes.h"
|
||||
#include "content/public/common/content_features.h"
|
||||
#include "content/public/common/url_constants.h"
|
||||
#include "third_party/blink/public/common/chrome_debug_urls.h"
|
||||
#include "url/gurl.h"
|
||||
#include "url/url_util.h"
|
||||
|
||||
namespace content {
|
||||
|
||||
bool HasWebUIScheme(const GURL& url) {
|
||||
return HasWebUIOrigin(url::Origin::Create(url));
|
||||
}
|
||||
|
||||
bool HasWebUIOrigin(const url::Origin& origin) {
|
||||
return origin.scheme() == content::kChromeUIScheme ||
|
||||
origin.scheme() == content::kChromeUIUntrustedScheme ||
|
||||
origin.scheme() == content::kChromeDevToolsScheme;
|
||||
}
|
||||
|
||||
bool IsSavableURL(const GURL& url) {
|
||||
return true;
|
||||
}
|
||||
|
||||
bool IsURLHandledByNetworkStack(const GURL& url) {
|
||||
// Javascript URLs, srcdoc, schemes that don't load data should not send a
|
||||
// request to the network stack.
|
||||
if (url.SchemeIs(url::kJavaScriptScheme) || url.is_empty() ||
|
||||
url.IsAboutSrcdoc()) {
|
||||
return false;
|
||||
}
|
||||
|
||||
for (const auto& scheme : url::GetEmptyDocumentSchemes()) {
|
||||
if (url.SchemeIs(scheme))
|
||||
return false;
|
||||
}
|
||||
|
||||
// Renderer debug URLs (e.g. chrome://kill) are handled in the renderer
|
||||
// process directly and should not be sent to the network stack.
|
||||
if (blink::IsRendererDebugURL(url))
|
||||
return false;
|
||||
|
||||
// For your information, even though a "data:" url doesn't generate actual
|
||||
// network requests, it is handled by the network stack and so must return
|
||||
// true. The reason is that a few "data:" urls can't be handled locally. For
|
||||
// instance:
|
||||
// - the ones that result in downloads.
|
||||
// - the ones that are invalid. An error page must be served instead.
|
||||
// - the ones that have an unsupported MIME type.
|
||||
// - the ones that target the top-level frame on Android.
|
||||
|
||||
return true;
|
||||
}
|
||||
|
||||
bool IsSafeRedirectTarget(const GURL& from_url, const GURL& to_url) {
|
||||
static const auto kUnsafeSchemes = base::MakeFixedFlatSet<base::StringPiece>({
|
||||
url::kAboutScheme, url::kFileScheme, url::kFileSystemScheme,
|
||||
url::kBlobScheme,
|
||||
#if !defined(CHROMECAST_BUILD)
|
||||
url::kDataScheme,
|
||||
#endif
|
||||
#if BUILDFLAG(IS_ANDROID)
|
||||
url::kContentScheme,
|
||||
#endif
|
||||
});
|
||||
if (HasWebUIScheme(to_url))
|
||||
return false;
|
||||
if (!kUnsafeSchemes.contains(to_url.scheme_piece()))
|
||||
return true;
|
||||
if (from_url.is_empty())
|
||||
return false;
|
||||
if (from_url.SchemeIsFile() && to_url.SchemeIsFile())
|
||||
return true;
|
||||
if (from_url.SchemeIsFileSystem() && to_url.SchemeIsFileSystem())
|
||||
return true;
|
||||
return false;
|
||||
}
|
||||
|
||||
} // namespace content
|
Loading…
Reference in a new issue