summaryrefslogtreecommitdiff
path: root/Userland/Services/LaunchServer/ClientConnection.cpp
diff options
context:
space:
mode:
authorAndreas Kling <kling@serenityos.org>2021-01-12 12:23:01 +0100
committerAndreas Kling <kling@serenityos.org>2021-01-12 12:23:01 +0100
commitc7ac7e6eaff862c1ea4f99e0c6ce75e095106d9c (patch)
treece2a3fef96f0b8eebe907743f1e03739457c11a6 /Userland/Services/LaunchServer/ClientConnection.cpp
parent4055b0329117c1a280080bbd638eb48bafe29638 (diff)
downloadserenity-c7ac7e6eaff862c1ea4f99e0c6ce75e095106d9c.zip
Services: Move to Userland/Services/
Diffstat (limited to 'Userland/Services/LaunchServer/ClientConnection.cpp')
-rw-r--r--Userland/Services/LaunchServer/ClientConnection.cpp159
1 files changed, 159 insertions, 0 deletions
diff --git a/Userland/Services/LaunchServer/ClientConnection.cpp b/Userland/Services/LaunchServer/ClientConnection.cpp
new file mode 100644
index 0000000000..7ac167c1ae
--- /dev/null
+++ b/Userland/Services/LaunchServer/ClientConnection.cpp
@@ -0,0 +1,159 @@
+/*
+ * Copyright (c) 2020, Nicholas Hollett <niax@niax.co.uk>
+ * All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions are met:
+ *
+ * 1. Redistributions of source code must retain the above copyright notice, this
+ * list of conditions and the following disclaimer.
+ *
+ * 2. Redistributions in binary form must reproduce the above copyright notice,
+ * this list of conditions and the following disclaimer in the documentation
+ * and/or other materials provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
+ * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
+ * DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
+ * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
+ * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
+ * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
+ * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ */
+
+#include "ClientConnection.h"
+#include "Launcher.h"
+#include <AK/HashMap.h>
+#include <AK/URL.h>
+#include <LaunchServer/LaunchClientEndpoint.h>
+
+namespace LaunchServer {
+
+static HashMap<int, RefPtr<ClientConnection>> s_connections;
+ClientConnection::ClientConnection(NonnullRefPtr<Core::LocalSocket> client_socket, int client_id)
+ : IPC::ClientConnection<LaunchClientEndpoint, LaunchServerEndpoint>(*this, move(client_socket), client_id)
+{
+ s_connections.set(client_id, *this);
+}
+
+ClientConnection::~ClientConnection()
+{
+}
+
+void ClientConnection::die()
+{
+ s_connections.remove(client_id());
+}
+
+OwnPtr<Messages::LaunchServer::GreetResponse> ClientConnection::handle(const Messages::LaunchServer::Greet&)
+{
+ return make<Messages::LaunchServer::GreetResponse>(client_id());
+}
+
+OwnPtr<Messages::LaunchServer::OpenURLResponse> ClientConnection::handle(const Messages::LaunchServer::OpenURL& request)
+{
+ if (!m_allowlist.is_empty()) {
+ bool allowed = false;
+ for (auto& allowed_handler : m_allowlist) {
+ if (allowed_handler.handler_name == request.handler_name()
+ && (allowed_handler.any_url || allowed_handler.urls.contains_slow(request.url()))) {
+ allowed = true;
+ break;
+ }
+ }
+ if (!allowed) {
+ // You are not on the list, go home!
+ did_misbehave(String::formatted("Client requested a combination of handler/URL that was not on the list: '{}' with '{}'", request.handler_name(), request.url()).characters());
+ return {};
+ }
+ }
+
+ URL url(request.url());
+ auto result = Launcher::the().open_url(url, request.handler_name());
+ return make<Messages::LaunchServer::OpenURLResponse>(result);
+}
+
+OwnPtr<Messages::LaunchServer::GetHandlersForURLResponse> ClientConnection::handle(const Messages::LaunchServer::GetHandlersForURL& request)
+{
+ URL url(request.url());
+ auto result = Launcher::the().handlers_for_url(url);
+ return make<Messages::LaunchServer::GetHandlersForURLResponse>(result);
+}
+
+OwnPtr<Messages::LaunchServer::GetHandlersWithDetailsForURLResponse> ClientConnection::handle(const Messages::LaunchServer::GetHandlersWithDetailsForURL& request)
+{
+ URL url(request.url());
+ auto result = Launcher::the().handlers_with_details_for_url(url);
+ return make<Messages::LaunchServer::GetHandlersWithDetailsForURLResponse>(result);
+}
+
+OwnPtr<Messages::LaunchServer::AddAllowedURLResponse> ClientConnection::handle(const Messages::LaunchServer::AddAllowedURL& request)
+{
+ if (m_allowlist_is_sealed) {
+ did_misbehave("Got request to add more allowed handlers after list was sealed");
+ return {};
+ }
+
+ if (!request.url().is_valid()) {
+ did_misbehave("Got request to allow invalid URL");
+ return {};
+ }
+
+ m_allowlist.empend(String(), false, Vector<URL> { request.url() });
+
+ return make<Messages::LaunchServer::AddAllowedURLResponse>();
+}
+
+OwnPtr<Messages::LaunchServer::AddAllowedHandlerWithAnyURLResponse> ClientConnection::handle(const Messages::LaunchServer::AddAllowedHandlerWithAnyURL& request)
+{
+ if (m_allowlist_is_sealed) {
+ did_misbehave("Got request to add more allowed handlers after list was sealed");
+ return {};
+ }
+
+ if (request.handler_name().is_empty()) {
+ did_misbehave("Got request to allow empty handler name");
+ return {};
+ }
+
+ m_allowlist.empend(request.handler_name(), true, Vector<URL>());
+
+ return make<Messages::LaunchServer::AddAllowedHandlerWithAnyURLResponse>();
+}
+
+OwnPtr<Messages::LaunchServer::AddAllowedHandlerWithOnlySpecificURLsResponse> ClientConnection::handle(const Messages::LaunchServer::AddAllowedHandlerWithOnlySpecificURLs& request)
+{
+ if (m_allowlist_is_sealed) {
+ did_misbehave("Got request to add more allowed handlers after list was sealed");
+ return {};
+ }
+
+ if (request.handler_name().is_empty()) {
+ did_misbehave("Got request to allow empty handler name");
+ return {};
+ }
+
+ if (request.urls().is_empty()) {
+ did_misbehave("Got request to allow empty URL list");
+ return {};
+ }
+
+ m_allowlist.empend(request.handler_name(), false, request.urls());
+
+ return make<Messages::LaunchServer::AddAllowedHandlerWithOnlySpecificURLsResponse>();
+}
+
+OwnPtr<Messages::LaunchServer::SealAllowlistResponse> ClientConnection::handle(const Messages::LaunchServer::SealAllowlist&)
+{
+ if (m_allowlist_is_sealed) {
+ did_misbehave("Got more than one request to seal the allowed handlers list");
+ return {};
+ }
+
+ return make<Messages::LaunchServer::SealAllowlistResponse>();
+}
+
+}