mirror of
https://github.com/RGBCube/serenity
synced 2025-05-31 07:48:11 +00:00

This change unfortunately cannot be atomically made without a single commit changing everything. Most of the important changes are in LibIPC/Connection.cpp, LibIPC/ServerConnection.cpp and LibCore/LocalServer.cpp. The notable changes are: - IPCCompiler now generates the decode and decode_message functions such that they take a Core::Stream::LocalSocket instead of the socket fd. - IPC::Decoder now uses the receive_fd method of LocalSocket instead of doing system calls directly on the fd. - IPC::ConnectionBase and related classes now use the Stream API functions. - IPC::ServerConnection no longer constructs the socket itself; instead, a convenience macro, IPC_CLIENT_CONNECTION, is used in place of C_OBJECT and will generate a static try_create factory function for the ServerConnection subclass. The subclass is now responsible for passing the socket constructed in this function to its ServerConnection base; the socket is passed as the first argument to the constructor (as a NonnullOwnPtr<Core::Stream::LocalServer>) before any other arguments. - The functionality regarding taking over sockets from SystemServer has been moved to LibIPC/SystemServerTakeover.cpp. The Core::LocalSocket implementation of this functionality hasn't been deleted due to my intention of removing this class in the near future and to reduce noise on this (already quite noisy) PR.
124 lines
3.5 KiB
C++
124 lines
3.5 KiB
C++
/*
|
|
* Copyright (c) 2020, Nicholas Hollett <niax@niax.co.uk>
|
|
*
|
|
* SPDX-License-Identifier: BSD-2-Clause
|
|
*/
|
|
|
|
#include "ClientConnection.h"
|
|
#include "Launcher.h"
|
|
#include <AK/HashMap.h>
|
|
#include <AK/URL.h>
|
|
#include <LaunchServer/LaunchClientEndpoint.h>
|
|
|
|
namespace LaunchServer {
|
|
|
|
static HashMap<int, RefPtr<ClientConnection>> s_connections;
|
|
ClientConnection::ClientConnection(NonnullOwnPtr<Core::Stream::LocalSocket> client_socket, int client_id)
|
|
: IPC::ClientConnection<LaunchClientEndpoint, LaunchServerEndpoint>(*this, move(client_socket), client_id)
|
|
{
|
|
s_connections.set(client_id, *this);
|
|
}
|
|
|
|
ClientConnection::~ClientConnection()
|
|
{
|
|
}
|
|
|
|
void ClientConnection::die()
|
|
{
|
|
s_connections.remove(client_id());
|
|
}
|
|
|
|
Messages::LaunchServer::OpenUrlResponse ClientConnection::open_url(URL const& url, String const& handler_name)
|
|
{
|
|
if (!m_allowlist.is_empty()) {
|
|
bool allowed = false;
|
|
auto request_url_without_fragment = url;
|
|
request_url_without_fragment.set_fragment({});
|
|
for (auto& allowed_handler : m_allowlist) {
|
|
if (allowed_handler.handler_name == handler_name
|
|
&& (allowed_handler.any_url || allowed_handler.urls.contains_slow(request_url_without_fragment))) {
|
|
allowed = true;
|
|
break;
|
|
}
|
|
}
|
|
if (!allowed) {
|
|
// You are not on the list, go home!
|
|
did_misbehave(String::formatted("Client requested a combination of handler/URL that was not on the list: '{}' with '{}'", handler_name, url).characters());
|
|
return nullptr;
|
|
}
|
|
}
|
|
|
|
return Launcher::the().open_url(url, handler_name);
|
|
}
|
|
|
|
Messages::LaunchServer::GetHandlersForUrlResponse ClientConnection::get_handlers_for_url(URL const& url)
|
|
{
|
|
return Launcher::the().handlers_for_url(url);
|
|
}
|
|
|
|
Messages::LaunchServer::GetHandlersWithDetailsForUrlResponse ClientConnection::get_handlers_with_details_for_url(URL const& url)
|
|
{
|
|
return Launcher::the().handlers_with_details_for_url(url);
|
|
}
|
|
|
|
void ClientConnection::add_allowed_url(URL const& url)
|
|
{
|
|
if (m_allowlist_is_sealed) {
|
|
did_misbehave("Got request to add more allowed handlers after list was sealed");
|
|
return;
|
|
}
|
|
|
|
if (!url.is_valid()) {
|
|
did_misbehave("Got request to allow invalid URL");
|
|
return;
|
|
}
|
|
|
|
m_allowlist.empend(String(), false, Vector<URL> { url });
|
|
}
|
|
|
|
void ClientConnection::add_allowed_handler_with_any_url(String const& handler_name)
|
|
{
|
|
if (m_allowlist_is_sealed) {
|
|
did_misbehave("Got request to add more allowed handlers after list was sealed");
|
|
return;
|
|
}
|
|
|
|
if (handler_name.is_empty()) {
|
|
did_misbehave("Got request to allow empty handler name");
|
|
return;
|
|
}
|
|
|
|
m_allowlist.empend(handler_name, true, Vector<URL>());
|
|
}
|
|
|
|
void ClientConnection::add_allowed_handler_with_only_specific_urls(String const& handler_name, Vector<URL> const& urls)
|
|
{
|
|
if (m_allowlist_is_sealed) {
|
|
did_misbehave("Got request to add more allowed handlers after list was sealed");
|
|
return;
|
|
}
|
|
|
|
if (handler_name.is_empty()) {
|
|
did_misbehave("Got request to allow empty handler name");
|
|
return;
|
|
}
|
|
|
|
if (urls.is_empty()) {
|
|
did_misbehave("Got request to allow empty URL list");
|
|
return;
|
|
}
|
|
|
|
m_allowlist.empend(handler_name, false, urls);
|
|
}
|
|
|
|
void ClientConnection::seal_allowlist()
|
|
{
|
|
if (m_allowlist_is_sealed) {
|
|
did_misbehave("Got more than one request to seal the allowed handlers list");
|
|
return;
|
|
}
|
|
|
|
m_allowlist_is_sealed = true;
|
|
}
|
|
|
|
}
|