2014-10-31 18:17:05 +00:00
|
|
|
// Copyright (c) 2013 GitHub, Inc.
|
2014-04-25 09:49:37 +00:00
|
|
|
// Use of this source code is governed by the MIT license that can be
|
2013-08-24 07:26:10 +00:00
|
|
|
// found in the LICENSE file.
|
|
|
|
|
2014-03-16 00:30:26 +00:00
|
|
|
#include "atom/browser/api/atom_api_protocol.h"
|
2013-08-24 07:26:10 +00:00
|
|
|
|
2015-06-12 07:58:23 +00:00
|
|
|
#include "atom/browser/atom_browser_client.h"
|
2015-06-18 08:59:03 +00:00
|
|
|
#include "atom/browser/atom_browser_main_parts.h"
|
2016-07-12 07:51:31 +00:00
|
|
|
#include "atom/browser/browser.h"
|
2015-08-12 07:18:31 +00:00
|
|
|
#include "atom/browser/net/url_request_async_asar_job.h"
|
2015-08-12 12:37:52 +00:00
|
|
|
#include "atom/browser/net/url_request_buffer_job.h"
|
2015-08-12 13:09:44 +00:00
|
|
|
#include "atom/browser/net/url_request_fetch_job.h"
|
2017-11-03 20:03:14 +00:00
|
|
|
#include "atom/browser/net/url_request_stream_job.h"
|
2015-08-12 12:37:52 +00:00
|
|
|
#include "atom/browser/net/url_request_string_job.h"
|
2015-08-07 10:10:19 +00:00
|
|
|
#include "atom/common/native_mate_converters/callback.h"
|
2016-06-08 13:52:21 +00:00
|
|
|
#include "atom/common/native_mate_converters/value_converter.h"
|
2014-04-17 05:45:14 +00:00
|
|
|
#include "atom/common/node_includes.h"
|
2016-06-08 06:46:50 +00:00
|
|
|
#include "atom/common/options_switches.h"
|
|
|
|
#include "base/command_line.h"
|
|
|
|
#include "base/strings/string_util.h"
|
2016-06-08 06:49:26 +00:00
|
|
|
#include "content/public/browser/child_process_security_policy.h"
|
2015-09-07 08:29:54 +00:00
|
|
|
#include "native_mate/dictionary.h"
|
2016-05-05 18:34:16 +00:00
|
|
|
#include "url/url_util.h"
|
2013-08-24 07:26:10 +00:00
|
|
|
|
2014-04-21 08:33:32 +00:00
|
|
|
using content::BrowserThread;
|
2013-08-24 07:26:10 +00:00
|
|
|
|
2016-07-09 08:02:55 +00:00
|
|
|
namespace {
|
|
|
|
|
2016-08-04 06:45:45 +00:00
|
|
|
// List of registered custom standard schemes.
|
|
|
|
std::vector<std::string> g_standard_schemes;
|
|
|
|
|
2019-01-29 07:11:01 +00:00
|
|
|
struct SchemeOptions {
|
|
|
|
bool standard = false;
|
|
|
|
bool secure = false;
|
|
|
|
bool bypassCSP = false;
|
|
|
|
bool allowServiceWorkers = false;
|
|
|
|
bool supportFetchAPI = false;
|
|
|
|
bool corsEnabled = false;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct CustomScheme {
|
|
|
|
std::string scheme;
|
|
|
|
SchemeOptions options;
|
|
|
|
};
|
|
|
|
|
2016-07-09 08:02:55 +00:00
|
|
|
} // namespace
|
|
|
|
|
2019-01-29 07:11:01 +00:00
|
|
|
namespace mate {
|
|
|
|
|
|
|
|
template <>
|
|
|
|
struct Converter<CustomScheme> {
|
|
|
|
static bool FromV8(v8::Isolate* isolate,
|
|
|
|
v8::Local<v8::Value> val,
|
|
|
|
CustomScheme* out) {
|
|
|
|
mate::Dictionary dict;
|
|
|
|
if (!ConvertFromV8(isolate, val, &dict))
|
|
|
|
return false;
|
|
|
|
if (!dict.Get("scheme", &(out->scheme)))
|
|
|
|
return false;
|
|
|
|
mate::Dictionary opt;
|
|
|
|
// options are optional. Default values specified in SchemeOptions are used
|
2019-01-30 20:54:18 +00:00
|
|
|
if (dict.Get("privileges", &opt)) {
|
2019-01-29 07:11:01 +00:00
|
|
|
opt.Get("standard", &(out->options.standard));
|
|
|
|
opt.Get("supportFetchAPI", &(out->options.supportFetchAPI));
|
|
|
|
opt.Get("secure", &(out->options.secure));
|
|
|
|
opt.Get("bypassCSP", &(out->options.bypassCSP));
|
|
|
|
opt.Get("allowServiceWorkers", &(out->options.allowServiceWorkers));
|
|
|
|
opt.Get("supportFetchAPI", &(out->options.supportFetchAPI));
|
|
|
|
opt.Get("corsEnabled", &(out->options.corsEnabled));
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
} // namespace mate
|
|
|
|
|
|
|
|
namespace atom {
|
|
|
|
|
|
|
|
namespace api {
|
|
|
|
|
2016-08-05 07:35:37 +00:00
|
|
|
std::vector<std::string> GetStandardSchemes() {
|
|
|
|
return g_standard_schemes;
|
|
|
|
}
|
|
|
|
|
2019-01-29 07:11:01 +00:00
|
|
|
void RegisterSchemesAsPrivileged(v8::Local<v8::Value> val,
|
|
|
|
mate::Arguments* args) {
|
|
|
|
std::vector<CustomScheme> custom_schemes;
|
|
|
|
if (!mate::ConvertFromV8(args->isolate(), val, &custom_schemes)) {
|
|
|
|
args->ThrowError("Argument must be an array of custom schemes.");
|
|
|
|
return;
|
|
|
|
}
|
2016-08-05 07:35:37 +00:00
|
|
|
|
2019-01-29 07:11:01 +00:00
|
|
|
std::vector<std::string> secure_schemes, cspbypassing_schemes, fetch_schemes,
|
|
|
|
service_worker_schemes, cors_schemes;
|
|
|
|
for (const auto& custom_scheme : custom_schemes) {
|
|
|
|
// Register scheme to privileged list (https, wss, data, chrome-extension)
|
|
|
|
if (custom_scheme.options.standard) {
|
|
|
|
auto* policy = content::ChildProcessSecurityPolicy::GetInstance();
|
|
|
|
url::AddStandardScheme(custom_scheme.scheme.c_str(),
|
|
|
|
url::SCHEME_WITH_HOST);
|
|
|
|
g_standard_schemes.push_back(custom_scheme.scheme);
|
|
|
|
policy->RegisterWebSafeScheme(custom_scheme.scheme);
|
|
|
|
}
|
|
|
|
if (custom_scheme.options.secure) {
|
|
|
|
secure_schemes.push_back(custom_scheme.scheme);
|
|
|
|
url::AddSecureScheme(custom_scheme.scheme.c_str());
|
|
|
|
}
|
|
|
|
if (custom_scheme.options.bypassCSP) {
|
|
|
|
cspbypassing_schemes.push_back(custom_scheme.scheme);
|
|
|
|
url::AddCSPBypassingScheme(custom_scheme.scheme.c_str());
|
|
|
|
}
|
|
|
|
if (custom_scheme.options.corsEnabled) {
|
|
|
|
cors_schemes.push_back(custom_scheme.scheme);
|
|
|
|
url::AddCorsEnabledScheme(custom_scheme.scheme.c_str());
|
|
|
|
}
|
|
|
|
if (custom_scheme.options.supportFetchAPI) {
|
|
|
|
fetch_schemes.push_back(custom_scheme.scheme);
|
|
|
|
}
|
|
|
|
if (custom_scheme.options.allowServiceWorkers) {
|
|
|
|
service_worker_schemes.push_back(custom_scheme.scheme);
|
2017-04-18 07:20:08 +00:00
|
|
|
}
|
2016-08-05 07:35:37 +00:00
|
|
|
}
|
|
|
|
|
2019-01-29 07:11:01 +00:00
|
|
|
const auto AppendSchemesToCmdLine = [](const char* switch_name,
|
|
|
|
std::vector<std::string> schemes) {
|
|
|
|
// Add the schemes to command line switches, so child processes can also
|
|
|
|
// register them.
|
2016-11-11 19:10:54 +00:00
|
|
|
base::CommandLine::ForCurrentProcess()->AppendSwitchASCII(
|
2019-01-29 07:11:01 +00:00
|
|
|
switch_name, base::JoinString(schemes, ","));
|
|
|
|
};
|
|
|
|
|
|
|
|
AppendSchemesToCmdLine(atom::switches::kSecureSchemes, secure_schemes);
|
|
|
|
AppendSchemesToCmdLine(atom::switches::kBypassCSPSchemes,
|
|
|
|
cspbypassing_schemes);
|
|
|
|
AppendSchemesToCmdLine(atom::switches::kCORSSchemes, cors_schemes);
|
|
|
|
AppendSchemesToCmdLine(atom::switches::kFetchSchemes, fetch_schemes);
|
|
|
|
AppendSchemesToCmdLine(atom::switches::kServiceWorkerSchemes,
|
|
|
|
service_worker_schemes);
|
|
|
|
AppendSchemesToCmdLine(atom::switches::kStandardSchemes, g_standard_schemes);
|
2016-08-05 07:35:37 +00:00
|
|
|
}
|
|
|
|
|
2016-05-08 11:14:14 +00:00
|
|
|
Protocol::Protocol(v8::Isolate* isolate, AtomBrowserContext* browser_context)
|
2018-03-30 13:24:55 +00:00
|
|
|
: browser_context_(browser_context), weak_factory_(this) {
|
2016-05-08 11:14:14 +00:00
|
|
|
Init(isolate);
|
2015-06-12 07:58:23 +00:00
|
|
|
}
|
|
|
|
|
2018-04-18 01:55:30 +00:00
|
|
|
Protocol::~Protocol() {}
|
|
|
|
void Protocol::UnregisterProtocol(const std::string& scheme,
|
|
|
|
mate::Arguments* args) {
|
2015-08-13 11:26:18 +00:00
|
|
|
CompletionCallback callback;
|
|
|
|
args->GetNext(&callback);
|
2018-10-04 18:08:56 +00:00
|
|
|
auto* getter = static_cast<URLRequestContextGetter*>(
|
|
|
|
browser_context_->GetRequestContext());
|
2019-01-12 01:00:43 +00:00
|
|
|
base::PostTaskWithTraitsAndReplyWithResult(
|
|
|
|
FROM_HERE, {content::BrowserThread::IO},
|
2018-03-30 13:24:55 +00:00
|
|
|
base::BindOnce(&Protocol::UnregisterProtocolInIO,
|
|
|
|
base::RetainedRef(getter), scheme),
|
|
|
|
base::BindOnce(&Protocol::OnIOCompleted, GetWeakPtr(), callback));
|
2015-08-13 11:26:18 +00:00
|
|
|
}
|
|
|
|
|
2016-06-15 12:11:42 +00:00
|
|
|
// static
|
2015-08-13 11:26:18 +00:00
|
|
|
Protocol::ProtocolError Protocol::UnregisterProtocolInIO(
|
2018-10-04 18:08:56 +00:00
|
|
|
scoped_refptr<URLRequestContextGetter> request_context_getter,
|
2015-08-13 11:26:18 +00:00
|
|
|
const std::string& scheme) {
|
2018-10-04 18:08:56 +00:00
|
|
|
auto* job_factory = request_context_getter->job_factory();
|
2016-06-15 12:11:42 +00:00
|
|
|
if (!job_factory->HasProtocolHandler(scheme))
|
2015-08-13 11:26:18 +00:00
|
|
|
return PROTOCOL_NOT_REGISTERED;
|
2016-06-15 12:11:42 +00:00
|
|
|
job_factory->SetProtocolHandler(scheme, nullptr);
|
2015-08-13 11:26:18 +00:00
|
|
|
return PROTOCOL_OK;
|
|
|
|
}
|
|
|
|
|
2019-01-17 17:05:10 +00:00
|
|
|
bool IsProtocolHandledInIO(
|
|
|
|
scoped_refptr<URLRequestContextGetter> request_context_getter,
|
|
|
|
const std::string& scheme) {
|
|
|
|
bool is_handled =
|
|
|
|
request_context_getter->job_factory()->IsHandledProtocol(scheme);
|
|
|
|
return is_handled;
|
|
|
|
}
|
|
|
|
|
|
|
|
v8::Local<v8::Promise> Protocol::IsProtocolHandled(const std::string& scheme) {
|
2019-02-21 12:32:44 +00:00
|
|
|
util::Promise promise(isolate());
|
|
|
|
v8::Local<v8::Promise> handle = promise.GetHandle();
|
2018-10-04 18:08:56 +00:00
|
|
|
auto* getter = static_cast<URLRequestContextGetter*>(
|
|
|
|
browser_context_->GetRequestContext());
|
2019-01-17 17:05:10 +00:00
|
|
|
|
2019-01-12 01:00:43 +00:00
|
|
|
base::PostTaskWithTraitsAndReplyWithResult(
|
|
|
|
FROM_HERE, {content::BrowserThread::IO},
|
2019-02-21 12:32:44 +00:00
|
|
|
base::BindOnce(&IsProtocolHandledInIO, base::RetainedRef(getter), scheme),
|
2019-03-13 21:30:21 +00:00
|
|
|
base::BindOnce(util::Promise::ResolvePromise<bool>, std::move(promise)));
|
2015-08-13 11:33:53 +00:00
|
|
|
|
2019-02-21 12:32:44 +00:00
|
|
|
return handle;
|
2015-08-13 11:33:53 +00:00
|
|
|
}
|
|
|
|
|
2018-04-18 01:55:30 +00:00
|
|
|
void Protocol::UninterceptProtocol(const std::string& scheme,
|
|
|
|
mate::Arguments* args) {
|
2015-08-13 12:19:02 +00:00
|
|
|
CompletionCallback callback;
|
|
|
|
args->GetNext(&callback);
|
2018-10-04 18:08:56 +00:00
|
|
|
auto* getter = static_cast<URLRequestContextGetter*>(
|
|
|
|
browser_context_->GetRequestContext());
|
2019-01-12 01:00:43 +00:00
|
|
|
base::PostTaskWithTraitsAndReplyWithResult(
|
|
|
|
FROM_HERE, {content::BrowserThread::IO},
|
2018-03-30 13:24:55 +00:00
|
|
|
base::BindOnce(&Protocol::UninterceptProtocolInIO,
|
|
|
|
base::RetainedRef(getter), scheme),
|
|
|
|
base::BindOnce(&Protocol::OnIOCompleted, GetWeakPtr(), callback));
|
2015-08-13 12:19:02 +00:00
|
|
|
}
|
|
|
|
|
2016-06-15 12:11:42 +00:00
|
|
|
// static
|
2015-08-13 12:19:02 +00:00
|
|
|
Protocol::ProtocolError Protocol::UninterceptProtocolInIO(
|
2018-10-04 18:08:56 +00:00
|
|
|
scoped_refptr<URLRequestContextGetter> request_context_getter,
|
2015-08-13 12:19:02 +00:00
|
|
|
const std::string& scheme) {
|
2018-10-04 18:08:56 +00:00
|
|
|
return request_context_getter->job_factory()->UninterceptProtocol(scheme)
|
2018-04-18 01:55:30 +00:00
|
|
|
? PROTOCOL_OK
|
|
|
|
: PROTOCOL_NOT_INTERCEPTED;
|
2015-08-13 12:19:02 +00:00
|
|
|
}
|
|
|
|
|
2018-04-18 01:55:30 +00:00
|
|
|
void Protocol::OnIOCompleted(const CompletionCallback& callback,
|
|
|
|
ProtocolError error) {
|
2015-08-12 13:32:52 +00:00
|
|
|
// The completion callback is optional.
|
|
|
|
if (callback.is_null())
|
|
|
|
return;
|
|
|
|
|
2015-08-12 05:30:19 +00:00
|
|
|
v8::Locker locker(isolate());
|
|
|
|
v8::HandleScope handle_scope(isolate());
|
2015-07-09 09:18:45 +00:00
|
|
|
|
2015-08-12 05:30:19 +00:00
|
|
|
if (error == PROTOCOL_OK) {
|
|
|
|
callback.Run(v8::Null(isolate()));
|
|
|
|
} else {
|
|
|
|
std::string str = ErrorCodeToString(error);
|
|
|
|
callback.Run(v8::Exception::Error(mate::StringToV8(isolate(), str)));
|
2013-09-03 09:21:10 +00:00
|
|
|
}
|
2013-08-30 02:15:15 +00:00
|
|
|
}
|
|
|
|
|
2015-08-12 05:30:19 +00:00
|
|
|
std::string Protocol::ErrorCodeToString(ProtocolError error) {
|
|
|
|
switch (error) {
|
2018-04-18 01:55:30 +00:00
|
|
|
case PROTOCOL_FAIL:
|
|
|
|
return "Failed to manipulate protocol factory";
|
|
|
|
case PROTOCOL_REGISTERED:
|
|
|
|
return "The scheme has been registered";
|
|
|
|
case PROTOCOL_NOT_REGISTERED:
|
|
|
|
return "The scheme has not been registered";
|
|
|
|
case PROTOCOL_INTERCEPTED:
|
|
|
|
return "The scheme has been intercepted";
|
|
|
|
case PROTOCOL_NOT_INTERCEPTED:
|
|
|
|
return "The scheme has not been intercepted";
|
|
|
|
default:
|
|
|
|
return "Unexpected error";
|
2013-09-03 09:21:10 +00:00
|
|
|
}
|
2013-08-30 02:15:15 +00:00
|
|
|
}
|
|
|
|
|
2013-08-24 07:26:10 +00:00
|
|
|
// static
|
2018-04-18 01:55:30 +00:00
|
|
|
mate::Handle<Protocol> Protocol::Create(v8::Isolate* isolate,
|
|
|
|
AtomBrowserContext* browser_context) {
|
2016-05-08 11:14:14 +00:00
|
|
|
return mate::CreateHandle(isolate, new Protocol(isolate, browser_context));
|
2016-04-25 01:17:54 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// static
|
2018-04-18 01:55:30 +00:00
|
|
|
void Protocol::BuildPrototype(v8::Isolate* isolate,
|
|
|
|
v8::Local<v8::FunctionTemplate> prototype) {
|
2016-08-02 10:28:12 +00:00
|
|
|
prototype->SetClassName(mate::StringToV8(isolate, "Protocol"));
|
2016-08-02 09:08:12 +00:00
|
|
|
mate::ObjectTemplateBuilder(isolate, prototype->PrototypeTemplate())
|
2016-04-25 01:17:54 +00:00
|
|
|
.SetMethod("registerStringProtocol",
|
|
|
|
&Protocol::RegisterProtocol<URLRequestStringJob>)
|
|
|
|
.SetMethod("registerBufferProtocol",
|
|
|
|
&Protocol::RegisterProtocol<URLRequestBufferJob>)
|
|
|
|
.SetMethod("registerFileProtocol",
|
|
|
|
&Protocol::RegisterProtocol<URLRequestAsyncAsarJob>)
|
|
|
|
.SetMethod("registerHttpProtocol",
|
|
|
|
&Protocol::RegisterProtocol<URLRequestFetchJob>)
|
2017-11-03 20:03:14 +00:00
|
|
|
.SetMethod("registerStreamProtocol",
|
|
|
|
&Protocol::RegisterProtocol<URLRequestStreamJob>)
|
2016-04-25 01:17:54 +00:00
|
|
|
.SetMethod("unregisterProtocol", &Protocol::UnregisterProtocol)
|
|
|
|
.SetMethod("isProtocolHandled", &Protocol::IsProtocolHandled)
|
|
|
|
.SetMethod("interceptStringProtocol",
|
|
|
|
&Protocol::InterceptProtocol<URLRequestStringJob>)
|
|
|
|
.SetMethod("interceptBufferProtocol",
|
|
|
|
&Protocol::InterceptProtocol<URLRequestBufferJob>)
|
|
|
|
.SetMethod("interceptFileProtocol",
|
|
|
|
&Protocol::InterceptProtocol<URLRequestAsyncAsarJob>)
|
|
|
|
.SetMethod("interceptHttpProtocol",
|
|
|
|
&Protocol::InterceptProtocol<URLRequestFetchJob>)
|
2017-11-03 20:03:14 +00:00
|
|
|
.SetMethod("interceptStreamProtocol",
|
|
|
|
&Protocol::InterceptProtocol<URLRequestStreamJob>)
|
2016-04-25 01:17:54 +00:00
|
|
|
.SetMethod("uninterceptProtocol", &Protocol::UninterceptProtocol);
|
2013-08-24 07:26:10 +00:00
|
|
|
}
|
|
|
|
|
2016-02-19 14:09:01 +00:00
|
|
|
} // namespace api
|
2014-04-21 08:33:32 +00:00
|
|
|
|
2016-02-19 14:09:01 +00:00
|
|
|
} // namespace atom
|
2016-02-24 05:25:30 +00:00
|
|
|
|
|
|
|
namespace {
|
|
|
|
|
2019-01-29 07:11:01 +00:00
|
|
|
void RegisterSchemesAsPrivileged(v8::Local<v8::Value> val,
|
|
|
|
mate::Arguments* args) {
|
2016-07-12 07:51:31 +00:00
|
|
|
if (atom::Browser::Get()->is_ready()) {
|
2018-04-18 01:55:30 +00:00
|
|
|
args->ThrowError(
|
2019-01-29 07:11:01 +00:00
|
|
|
"protocol.registerSchemesAsPrivileged should be called before "
|
2018-04-18 01:55:30 +00:00
|
|
|
"app is ready");
|
2016-07-12 07:51:31 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-01-29 07:11:01 +00:00
|
|
|
atom::api::RegisterSchemesAsPrivileged(val, args);
|
2016-05-08 11:14:14 +00:00
|
|
|
}
|
|
|
|
|
2018-04-18 01:55:30 +00:00
|
|
|
void Initialize(v8::Local<v8::Object> exports,
|
|
|
|
v8::Local<v8::Value> unused,
|
|
|
|
v8::Local<v8::Context> context,
|
|
|
|
void* priv) {
|
2016-02-24 05:25:30 +00:00
|
|
|
v8::Isolate* isolate = context->GetIsolate();
|
|
|
|
mate::Dictionary dict(isolate, exports);
|
2019-01-29 07:11:01 +00:00
|
|
|
dict.SetMethod("registerSchemesAsPrivileged", &RegisterSchemesAsPrivileged);
|
2016-08-05 07:35:37 +00:00
|
|
|
dict.SetMethod("getStandardSchemes", &atom::api::GetStandardSchemes);
|
2016-02-24 05:25:30 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
} // namespace
|
|
|
|
|
2019-03-08 18:29:52 +00:00
|
|
|
NODE_LINKED_MODULE_CONTEXT_AWARE(atom_browser_protocol, Initialize)
|