mirror of
https://github.com/RGBCube/serenity
synced 2025-05-14 04:14:58 +00:00

This commit un-deprecates DeprecatedString, and repurposes it as a byte string. As the null state has already been removed, there are no other particularly hairy blockers in repurposing this type as a byte string (what it _really_ is). This commit is auto-generated: $ xs=$(ack -l \bDeprecatedString\b\|deprecated_string AK Userland \ Meta Ports Ladybird Tests Kernel) $ perl -pie 's/\bDeprecatedString\b/ByteString/g; s/deprecated_string/byte_string/g' $xs $ clang-format --style=file -i \ $(git diff --name-only | grep \.cpp\|\.h) $ gn format $(git ls-files '*.gn' '*.gni')
120 lines
3.5 KiB
C++
120 lines
3.5 KiB
C++
/*
|
|
* Copyright (c) 2020, Nicholas Hollett <niax@niax.co.uk>
|
|
*
|
|
* SPDX-License-Identifier: BSD-2-Clause
|
|
*/
|
|
|
|
#include "ConnectionFromClient.h"
|
|
#include "Launcher.h"
|
|
#include <AK/HashMap.h>
|
|
#include <AK/URL.h>
|
|
#include <LaunchServer/LaunchClientEndpoint.h>
|
|
|
|
namespace LaunchServer {
|
|
|
|
static HashMap<int, RefPtr<ConnectionFromClient>> s_connections;
|
|
ConnectionFromClient::ConnectionFromClient(NonnullOwnPtr<Core::LocalSocket> client_socket, int client_id)
|
|
: IPC::ConnectionFromClient<LaunchClientEndpoint, LaunchServerEndpoint>(*this, move(client_socket), client_id)
|
|
{
|
|
s_connections.set(client_id, *this);
|
|
}
|
|
|
|
void ConnectionFromClient::die()
|
|
{
|
|
s_connections.remove(client_id());
|
|
}
|
|
|
|
Messages::LaunchServer::OpenUrlResponse ConnectionFromClient::open_url(URL const& url, ByteString const& handler_name)
|
|
{
|
|
if (!m_allowlist.is_empty()) {
|
|
bool allowed = false;
|
|
auto request_url_without_fragment = url;
|
|
request_url_without_fragment.set_fragment({});
|
|
for (auto& allowed_handler : m_allowlist) {
|
|
if (allowed_handler.handler_name == handler_name
|
|
&& (allowed_handler.any_url || allowed_handler.urls.contains_slow(request_url_without_fragment))) {
|
|
allowed = true;
|
|
break;
|
|
}
|
|
}
|
|
if (!allowed) {
|
|
// You are not on the list, go home!
|
|
did_misbehave(ByteString::formatted("Client requested a combination of handler/URL that was not on the list: '{}' with '{}'", handler_name, url).characters());
|
|
return nullptr;
|
|
}
|
|
}
|
|
|
|
return Launcher::the().open_url(url, handler_name);
|
|
}
|
|
|
|
Messages::LaunchServer::GetHandlersForUrlResponse ConnectionFromClient::get_handlers_for_url(URL const& url)
|
|
{
|
|
return Launcher::the().handlers_for_url(url);
|
|
}
|
|
|
|
Messages::LaunchServer::GetHandlersWithDetailsForUrlResponse ConnectionFromClient::get_handlers_with_details_for_url(URL const& url)
|
|
{
|
|
return Launcher::the().handlers_with_details_for_url(url);
|
|
}
|
|
|
|
void ConnectionFromClient::add_allowed_url(URL const& url)
|
|
{
|
|
if (m_allowlist_is_sealed) {
|
|
did_misbehave("Got request to add more allowed handlers after list was sealed");
|
|
return;
|
|
}
|
|
|
|
if (!url.is_valid()) {
|
|
did_misbehave("Got request to allow invalid URL");
|
|
return;
|
|
}
|
|
|
|
m_allowlist.empend(ByteString(), false, Vector<URL> { url });
|
|
}
|
|
|
|
void ConnectionFromClient::add_allowed_handler_with_any_url(ByteString const& handler_name)
|
|
{
|
|
if (m_allowlist_is_sealed) {
|
|
did_misbehave("Got request to add more allowed handlers after list was sealed");
|
|
return;
|
|
}
|
|
|
|
if (handler_name.is_empty()) {
|
|
did_misbehave("Got request to allow empty handler name");
|
|
return;
|
|
}
|
|
|
|
m_allowlist.empend(handler_name, true, Vector<URL>());
|
|
}
|
|
|
|
void ConnectionFromClient::add_allowed_handler_with_only_specific_urls(ByteString const& handler_name, Vector<URL> const& urls)
|
|
{
|
|
if (m_allowlist_is_sealed) {
|
|
did_misbehave("Got request to add more allowed handlers after list was sealed");
|
|
return;
|
|
}
|
|
|
|
if (handler_name.is_empty()) {
|
|
did_misbehave("Got request to allow empty handler name");
|
|
return;
|
|
}
|
|
|
|
if (urls.is_empty()) {
|
|
did_misbehave("Got request to allow empty URL list");
|
|
return;
|
|
}
|
|
|
|
m_allowlist.empend(handler_name, false, urls);
|
|
}
|
|
|
|
void ConnectionFromClient::seal_allowlist()
|
|
{
|
|
if (m_allowlist_is_sealed) {
|
|
did_misbehave("Got more than one request to seal the allowed handlers list");
|
|
return;
|
|
}
|
|
|
|
m_allowlist_is_sealed = true;
|
|
}
|
|
|
|
}
|