2019-04-23 21:39:21 +00:00
|
|
|
// Copyright (c) 2019 GitHub, Inc.
|
|
|
|
// Use of this source code is governed by the MIT license that can be
|
|
|
|
// found in the LICENSE file.
|
|
|
|
|
2019-06-19 20:46:59 +00:00
|
|
|
#include "shell/browser/api/atom_api_protocol_ns.h"
|
2019-04-23 21:39:21 +00:00
|
|
|
|
|
|
|
#include <memory>
|
2019-05-24 02:28:00 +00:00
|
|
|
#include <utility>
|
2019-08-02 23:56:46 +00:00
|
|
|
#include <vector>
|
2019-04-23 21:39:21 +00:00
|
|
|
|
|
|
|
#include "base/stl_util.h"
|
2019-08-02 23:56:46 +00:00
|
|
|
#include "content/public/browser/child_process_security_policy.h"
|
2019-06-19 20:46:59 +00:00
|
|
|
#include "shell/browser/atom_browser_context.h"
|
2019-08-02 23:56:46 +00:00
|
|
|
#include "shell/browser/browser.h"
|
2019-06-28 07:25:30 +00:00
|
|
|
#include "shell/common/deprecate_util.h"
|
2019-06-19 20:46:59 +00:00
|
|
|
#include "shell/common/native_mate_converters/net_converter.h"
|
|
|
|
#include "shell/common/native_mate_converters/once_callback.h"
|
2019-08-02 23:56:46 +00:00
|
|
|
#include "shell/common/options_switches.h"
|
2019-06-19 20:46:59 +00:00
|
|
|
#include "shell/common/promise_util.h"
|
2019-04-23 21:39:21 +00:00
|
|
|
|
2019-08-02 23:56:46 +00:00
|
|
|
namespace {
|
|
|
|
|
|
|
|
// List of registered custom standard schemes.
|
|
|
|
std::vector<std::string> g_standard_schemes;
|
|
|
|
|
|
|
|
struct SchemeOptions {
|
|
|
|
bool standard = false;
|
|
|
|
bool secure = false;
|
|
|
|
bool bypassCSP = false;
|
|
|
|
bool allowServiceWorkers = false;
|
|
|
|
bool supportFetchAPI = false;
|
|
|
|
bool corsEnabled = false;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct CustomScheme {
|
|
|
|
std::string scheme;
|
|
|
|
SchemeOptions options;
|
|
|
|
};
|
|
|
|
|
|
|
|
} // namespace
|
|
|
|
|
|
|
|
namespace mate {
|
|
|
|
|
|
|
|
template <>
|
|
|
|
struct Converter<CustomScheme> {
|
|
|
|
static bool FromV8(v8::Isolate* isolate,
|
|
|
|
v8::Local<v8::Value> val,
|
|
|
|
CustomScheme* out) {
|
|
|
|
mate::Dictionary dict;
|
|
|
|
if (!ConvertFromV8(isolate, val, &dict))
|
|
|
|
return false;
|
|
|
|
if (!dict.Get("scheme", &(out->scheme)))
|
|
|
|
return false;
|
|
|
|
mate::Dictionary opt;
|
|
|
|
// options are optional. Default values specified in SchemeOptions are used
|
|
|
|
if (dict.Get("privileges", &opt)) {
|
|
|
|
opt.Get("standard", &(out->options.standard));
|
|
|
|
opt.Get("supportFetchAPI", &(out->options.supportFetchAPI));
|
|
|
|
opt.Get("secure", &(out->options.secure));
|
|
|
|
opt.Get("bypassCSP", &(out->options.bypassCSP));
|
|
|
|
opt.Get("allowServiceWorkers", &(out->options.allowServiceWorkers));
|
|
|
|
opt.Get("supportFetchAPI", &(out->options.supportFetchAPI));
|
|
|
|
opt.Get("corsEnabled", &(out->options.corsEnabled));
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
} // namespace mate
|
|
|
|
|
2019-06-19 21:23:04 +00:00
|
|
|
namespace electron {
|
2019-04-23 21:39:21 +00:00
|
|
|
namespace api {
|
|
|
|
|
2019-08-02 23:56:46 +00:00
|
|
|
std::vector<std::string> GetStandardSchemes() {
|
|
|
|
return g_standard_schemes;
|
|
|
|
}
|
|
|
|
|
|
|
|
void RegisterSchemesAsPrivileged(v8::Local<v8::Value> val,
|
|
|
|
mate::Arguments* args) {
|
|
|
|
std::vector<CustomScheme> custom_schemes;
|
|
|
|
if (!mate::ConvertFromV8(args->isolate(), val, &custom_schemes)) {
|
|
|
|
args->ThrowError("Argument must be an array of custom schemes.");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
std::vector<std::string> secure_schemes, cspbypassing_schemes, fetch_schemes,
|
|
|
|
service_worker_schemes, cors_schemes;
|
|
|
|
for (const auto& custom_scheme : custom_schemes) {
|
|
|
|
// Register scheme to privileged list (https, wss, data, chrome-extension)
|
|
|
|
if (custom_scheme.options.standard) {
|
|
|
|
auto* policy = content::ChildProcessSecurityPolicy::GetInstance();
|
|
|
|
url::AddStandardScheme(custom_scheme.scheme.c_str(),
|
|
|
|
url::SCHEME_WITH_HOST);
|
|
|
|
g_standard_schemes.push_back(custom_scheme.scheme);
|
|
|
|
policy->RegisterWebSafeScheme(custom_scheme.scheme);
|
|
|
|
}
|
|
|
|
if (custom_scheme.options.secure) {
|
|
|
|
secure_schemes.push_back(custom_scheme.scheme);
|
|
|
|
url::AddSecureScheme(custom_scheme.scheme.c_str());
|
|
|
|
}
|
|
|
|
if (custom_scheme.options.bypassCSP) {
|
|
|
|
cspbypassing_schemes.push_back(custom_scheme.scheme);
|
|
|
|
url::AddCSPBypassingScheme(custom_scheme.scheme.c_str());
|
|
|
|
}
|
|
|
|
if (custom_scheme.options.corsEnabled) {
|
|
|
|
cors_schemes.push_back(custom_scheme.scheme);
|
|
|
|
url::AddCorsEnabledScheme(custom_scheme.scheme.c_str());
|
|
|
|
}
|
|
|
|
if (custom_scheme.options.supportFetchAPI) {
|
|
|
|
fetch_schemes.push_back(custom_scheme.scheme);
|
|
|
|
}
|
|
|
|
if (custom_scheme.options.allowServiceWorkers) {
|
|
|
|
service_worker_schemes.push_back(custom_scheme.scheme);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
const auto AppendSchemesToCmdLine = [](const char* switch_name,
|
|
|
|
std::vector<std::string> schemes) {
|
|
|
|
// Add the schemes to command line switches, so child processes can also
|
|
|
|
// register them.
|
|
|
|
base::CommandLine::ForCurrentProcess()->AppendSwitchASCII(
|
|
|
|
switch_name, base::JoinString(schemes, ","));
|
|
|
|
};
|
|
|
|
|
|
|
|
AppendSchemesToCmdLine(electron::switches::kSecureSchemes, secure_schemes);
|
|
|
|
AppendSchemesToCmdLine(electron::switches::kBypassCSPSchemes,
|
|
|
|
cspbypassing_schemes);
|
|
|
|
AppendSchemesToCmdLine(electron::switches::kCORSSchemes, cors_schemes);
|
|
|
|
AppendSchemesToCmdLine(electron::switches::kFetchSchemes, fetch_schemes);
|
|
|
|
AppendSchemesToCmdLine(electron::switches::kServiceWorkerSchemes,
|
|
|
|
service_worker_schemes);
|
|
|
|
AppendSchemesToCmdLine(electron::switches::kStandardSchemes,
|
|
|
|
g_standard_schemes);
|
|
|
|
}
|
|
|
|
|
2019-04-23 21:39:21 +00:00
|
|
|
namespace {
|
|
|
|
|
2019-05-14 23:29:58 +00:00
|
|
|
const char* kBuiltinSchemes[] = {
|
|
|
|
"about", "file", "http", "https", "data", "filesystem",
|
|
|
|
};
|
|
|
|
|
2019-04-23 21:39:21 +00:00
|
|
|
// Convert error code to string.
|
|
|
|
std::string ErrorCodeToString(ProtocolError error) {
|
|
|
|
switch (error) {
|
2019-05-03 18:11:41 +00:00
|
|
|
case ProtocolError::REGISTERED:
|
2019-04-23 21:39:21 +00:00
|
|
|
return "The scheme has been registered";
|
2019-05-03 18:11:41 +00:00
|
|
|
case ProtocolError::NOT_REGISTERED:
|
2019-04-23 21:39:21 +00:00
|
|
|
return "The scheme has not been registered";
|
2019-05-03 18:11:41 +00:00
|
|
|
case ProtocolError::INTERCEPTED:
|
2019-04-23 21:39:21 +00:00
|
|
|
return "The scheme has been intercepted";
|
2019-05-03 18:11:41 +00:00
|
|
|
case ProtocolError::NOT_INTERCEPTED:
|
2019-04-23 21:39:21 +00:00
|
|
|
return "The scheme has not been intercepted";
|
|
|
|
default:
|
|
|
|
return "Unexpected error";
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
} // namespace
|
|
|
|
|
|
|
|
ProtocolNS::ProtocolNS(v8::Isolate* isolate,
|
|
|
|
AtomBrowserContext* browser_context) {
|
|
|
|
Init(isolate);
|
|
|
|
AttachAsUserData(browser_context);
|
|
|
|
}
|
|
|
|
|
|
|
|
ProtocolNS::~ProtocolNS() = default;
|
|
|
|
|
|
|
|
void ProtocolNS::RegisterURLLoaderFactories(
|
|
|
|
content::ContentBrowserClient::NonNetworkURLLoaderFactoryMap* factories) {
|
2019-04-29 02:37:45 +00:00
|
|
|
for (const auto& it : handlers_) {
|
|
|
|
factories->emplace(it.first, std::make_unique<AtomURLLoaderFactory>(
|
|
|
|
it.second.first, it.second.second));
|
|
|
|
}
|
2019-04-23 21:39:21 +00:00
|
|
|
}
|
|
|
|
|
2019-04-29 02:37:45 +00:00
|
|
|
ProtocolError ProtocolNS::RegisterProtocol(ProtocolType type,
|
|
|
|
const std::string& scheme,
|
|
|
|
const ProtocolHandler& handler) {
|
2019-05-03 18:11:41 +00:00
|
|
|
ProtocolError error = ProtocolError::OK;
|
2019-07-03 01:22:09 +00:00
|
|
|
if (!base::Contains(handlers_, scheme))
|
2019-04-29 02:37:45 +00:00
|
|
|
handlers_[scheme] = std::make_pair(type, handler);
|
2019-04-23 21:39:21 +00:00
|
|
|
else
|
2019-05-03 18:11:41 +00:00
|
|
|
error = ProtocolError::REGISTERED;
|
2019-04-23 21:39:21 +00:00
|
|
|
return error;
|
|
|
|
}
|
|
|
|
|
|
|
|
void ProtocolNS::UnregisterProtocol(const std::string& scheme,
|
|
|
|
mate::Arguments* args) {
|
2019-05-03 18:11:41 +00:00
|
|
|
ProtocolError error = ProtocolError::OK;
|
2019-07-03 01:22:09 +00:00
|
|
|
if (base::Contains(handlers_, scheme))
|
2019-04-23 21:39:21 +00:00
|
|
|
handlers_.erase(scheme);
|
|
|
|
else
|
2019-05-03 18:11:41 +00:00
|
|
|
error = ProtocolError::NOT_REGISTERED;
|
2019-04-23 21:39:21 +00:00
|
|
|
HandleOptionalCallback(args, error);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool ProtocolNS::IsProtocolRegistered(const std::string& scheme) {
|
2019-07-03 01:22:09 +00:00
|
|
|
return base::Contains(handlers_, scheme);
|
2019-04-23 21:39:21 +00:00
|
|
|
}
|
|
|
|
|
2019-05-24 02:28:00 +00:00
|
|
|
ProtocolError ProtocolNS::InterceptProtocol(ProtocolType type,
|
|
|
|
const std::string& scheme,
|
|
|
|
const ProtocolHandler& handler) {
|
|
|
|
ProtocolError error = ProtocolError::OK;
|
2019-07-03 01:22:09 +00:00
|
|
|
if (!base::Contains(intercept_handlers_, scheme))
|
2019-05-24 02:28:00 +00:00
|
|
|
intercept_handlers_[scheme] = std::make_pair(type, handler);
|
|
|
|
else
|
|
|
|
error = ProtocolError::INTERCEPTED;
|
|
|
|
return error;
|
|
|
|
}
|
|
|
|
|
2019-05-07 02:33:05 +00:00
|
|
|
void ProtocolNS::UninterceptProtocol(const std::string& scheme,
|
|
|
|
mate::Arguments* args) {
|
2019-05-24 02:28:00 +00:00
|
|
|
ProtocolError error = ProtocolError::OK;
|
2019-07-03 01:22:09 +00:00
|
|
|
if (base::Contains(intercept_handlers_, scheme))
|
2019-05-24 02:28:00 +00:00
|
|
|
intercept_handlers_.erase(scheme);
|
|
|
|
else
|
|
|
|
error = ProtocolError::NOT_INTERCEPTED;
|
|
|
|
HandleOptionalCallback(args, error);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool ProtocolNS::IsProtocolIntercepted(const std::string& scheme) {
|
2019-07-03 01:22:09 +00:00
|
|
|
return base::Contains(intercept_handlers_, scheme);
|
2019-05-07 02:33:05 +00:00
|
|
|
}
|
|
|
|
|
2019-06-28 07:25:30 +00:00
|
|
|
v8::Local<v8::Promise> ProtocolNS::IsProtocolHandled(const std::string& scheme,
|
|
|
|
mate::Arguments* args) {
|
|
|
|
node::Environment* env = node::Environment::GetCurrent(args->isolate());
|
|
|
|
EmitDeprecationWarning(
|
|
|
|
env,
|
|
|
|
"The protocol.isProtocolHandled API is deprecated, use "
|
|
|
|
"protocol.isProtocolRegistered or protocol.isProtocolIntercepted "
|
|
|
|
"instead.",
|
|
|
|
"ProtocolDeprecateIsProtocolHandled");
|
2019-08-23 00:03:28 +00:00
|
|
|
return util::Promise<bool>::ResolvedPromise(
|
|
|
|
isolate(), IsProtocolRegistered(scheme) ||
|
|
|
|
IsProtocolIntercepted(scheme) ||
|
|
|
|
// The |isProtocolHandled| should return true for builtin
|
|
|
|
// schemes, however with NetworkService it is impossible to
|
|
|
|
// know which schemes are registered until a real network
|
|
|
|
// request is sent.
|
|
|
|
// So we have to test against a hard-coded builtin schemes
|
|
|
|
// list make it work with old code. We should deprecate
|
|
|
|
// this API with the new |isProtocolRegistered| API.
|
|
|
|
base::Contains(kBuiltinSchemes, scheme));
|
2019-04-23 21:39:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void ProtocolNS::HandleOptionalCallback(mate::Arguments* args,
|
|
|
|
ProtocolError error) {
|
|
|
|
CompletionCallback callback;
|
|
|
|
if (args->GetNext(&callback)) {
|
2019-06-28 07:25:30 +00:00
|
|
|
node::Environment* env = node::Environment::GetCurrent(args->isolate());
|
|
|
|
EmitDeprecationWarning(
|
|
|
|
env,
|
|
|
|
"The callback argument of protocol module APIs is no longer needed.",
|
|
|
|
"ProtocolDeprecateCallback");
|
2019-05-03 18:11:41 +00:00
|
|
|
if (error == ProtocolError::OK)
|
2019-04-23 21:39:21 +00:00
|
|
|
callback.Run(v8::Null(args->isolate()));
|
|
|
|
else
|
|
|
|
callback.Run(v8::Exception::Error(
|
|
|
|
mate::StringToV8(isolate(), ErrorCodeToString(error))));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// static
|
|
|
|
mate::Handle<ProtocolNS> ProtocolNS::Create(
|
|
|
|
v8::Isolate* isolate,
|
|
|
|
AtomBrowserContext* browser_context) {
|
|
|
|
return mate::CreateHandle(isolate, new ProtocolNS(isolate, browser_context));
|
|
|
|
}
|
|
|
|
|
|
|
|
// static
|
|
|
|
void ProtocolNS::BuildPrototype(v8::Isolate* isolate,
|
|
|
|
v8::Local<v8::FunctionTemplate> prototype) {
|
|
|
|
prototype->SetClassName(mate::StringToV8(isolate, "Protocol"));
|
|
|
|
mate::ObjectTemplateBuilder(isolate, prototype->PrototypeTemplate())
|
2019-04-29 02:37:45 +00:00
|
|
|
.SetMethod("registerStringProtocol",
|
|
|
|
&ProtocolNS::RegisterProtocolFor<ProtocolType::kString>)
|
|
|
|
.SetMethod("registerBufferProtocol",
|
|
|
|
&ProtocolNS::RegisterProtocolFor<ProtocolType::kBuffer>)
|
|
|
|
.SetMethod("registerFileProtocol",
|
|
|
|
&ProtocolNS::RegisterProtocolFor<ProtocolType::kFile>)
|
|
|
|
.SetMethod("registerHttpProtocol",
|
|
|
|
&ProtocolNS::RegisterProtocolFor<ProtocolType::kHttp>)
|
|
|
|
.SetMethod("registerStreamProtocol",
|
|
|
|
&ProtocolNS::RegisterProtocolFor<ProtocolType::kStream>)
|
2019-05-03 00:48:51 +00:00
|
|
|
.SetMethod("registerProtocol",
|
|
|
|
&ProtocolNS::RegisterProtocolFor<ProtocolType::kFree>)
|
2019-04-23 21:39:21 +00:00
|
|
|
.SetMethod("unregisterProtocol", &ProtocolNS::UnregisterProtocol)
|
|
|
|
.SetMethod("isProtocolRegistered", &ProtocolNS::IsProtocolRegistered)
|
|
|
|
.SetMethod("isProtocolHandled", &ProtocolNS::IsProtocolHandled)
|
2019-05-24 02:28:00 +00:00
|
|
|
.SetMethod("interceptStringProtocol",
|
|
|
|
&ProtocolNS::InterceptProtocolFor<ProtocolType::kString>)
|
|
|
|
.SetMethod("interceptBufferProtocol",
|
|
|
|
&ProtocolNS::InterceptProtocolFor<ProtocolType::kBuffer>)
|
|
|
|
.SetMethod("interceptFileProtocol",
|
|
|
|
&ProtocolNS::InterceptProtocolFor<ProtocolType::kFile>)
|
|
|
|
.SetMethod("interceptHttpProtocol",
|
|
|
|
&ProtocolNS::InterceptProtocolFor<ProtocolType::kHttp>)
|
|
|
|
.SetMethod("interceptStreamProtocol",
|
|
|
|
&ProtocolNS::InterceptProtocolFor<ProtocolType::kStream>)
|
|
|
|
.SetMethod("interceptProtocol",
|
|
|
|
&ProtocolNS::InterceptProtocolFor<ProtocolType::kFree>)
|
|
|
|
.SetMethod("uninterceptProtocol", &ProtocolNS::UninterceptProtocol)
|
|
|
|
.SetMethod("isProtocolIntercepted", &ProtocolNS::IsProtocolIntercepted);
|
2019-04-23 21:39:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
} // namespace api
|
2019-06-19 21:23:04 +00:00
|
|
|
} // namespace electron
|
2019-08-02 23:56:46 +00:00
|
|
|
|
|
|
|
namespace {
|
|
|
|
|
|
|
|
void RegisterSchemesAsPrivileged(v8::Local<v8::Value> val,
|
|
|
|
mate::Arguments* args) {
|
|
|
|
if (electron::Browser::Get()->is_ready()) {
|
|
|
|
args->ThrowError(
|
|
|
|
"protocol.registerSchemesAsPrivileged should be called before "
|
|
|
|
"app is ready");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
electron::api::RegisterSchemesAsPrivileged(val, args);
|
|
|
|
}
|
|
|
|
|
|
|
|
void Initialize(v8::Local<v8::Object> exports,
|
|
|
|
v8::Local<v8::Value> unused,
|
|
|
|
v8::Local<v8::Context> context,
|
|
|
|
void* priv) {
|
|
|
|
v8::Isolate* isolate = context->GetIsolate();
|
|
|
|
mate::Dictionary dict(isolate, exports);
|
|
|
|
dict.SetMethod("registerSchemesAsPrivileged", &RegisterSchemesAsPrivileged);
|
|
|
|
dict.SetMethod("getStandardSchemes", &electron::api::GetStandardSchemes);
|
|
|
|
}
|
|
|
|
|
|
|
|
} // namespace
|
|
|
|
|
|
|
|
NODE_LINKED_MODULE_CONTEXT_AWARE(atom_browser_protocol, Initialize)
|