From c7ac7e6eaff862c1ea4f99e0c6ce75e095106d9c Mon Sep 17 00:00:00 2001 From: Andreas Kling Date: Tue, 12 Jan 2021 12:23:01 +0100 Subject: Services: Move to Userland/Services/ --- .../Services/LaunchServer/ClientConnection.cpp | 159 +++++++++++++++++++++ 1 file changed, 159 insertions(+) create mode 100644 Userland/Services/LaunchServer/ClientConnection.cpp (limited to 'Userland/Services/LaunchServer/ClientConnection.cpp') diff --git a/Userland/Services/LaunchServer/ClientConnection.cpp b/Userland/Services/LaunchServer/ClientConnection.cpp new file mode 100644 index 0000000000..7ac167c1ae --- /dev/null +++ b/Userland/Services/LaunchServer/ClientConnection.cpp @@ -0,0 +1,159 @@ +/* + * Copyright (c) 2020, Nicholas Hollett + * All rights reserved. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions are met: + * + * 1. Redistributions of source code must retain the above copyright notice, this + * list of conditions and the following disclaimer. + * + * 2. Redistributions in binary form must reproduce the above copyright notice, + * this list of conditions and the following disclaimer in the documentation + * and/or other materials provided with the distribution. + * + * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" + * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE + * DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE + * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL + * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR + * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER + * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, + * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE + * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + */ + +#include "ClientConnection.h" +#include "Launcher.h" +#include +#include +#include + +namespace LaunchServer { + +static HashMap> s_connections; +ClientConnection::ClientConnection(NonnullRefPtr client_socket, int client_id) + : IPC::ClientConnection(*this, move(client_socket), client_id) +{ + s_connections.set(client_id, *this); +} + +ClientConnection::~ClientConnection() +{ +} + +void ClientConnection::die() +{ + s_connections.remove(client_id()); +} + +OwnPtr ClientConnection::handle(const Messages::LaunchServer::Greet&) +{ + return make(client_id()); +} + +OwnPtr ClientConnection::handle(const Messages::LaunchServer::OpenURL& request) +{ + if (!m_allowlist.is_empty()) { + bool allowed = false; + for (auto& allowed_handler : m_allowlist) { + if (allowed_handler.handler_name == request.handler_name() + && (allowed_handler.any_url || allowed_handler.urls.contains_slow(request.url()))) { + allowed = true; + break; + } + } + if (!allowed) { + // You are not on the list, go home! + did_misbehave(String::formatted("Client requested a combination of handler/URL that was not on the list: '{}' with '{}'", request.handler_name(), request.url()).characters()); + return {}; + } + } + + URL url(request.url()); + auto result = Launcher::the().open_url(url, request.handler_name()); + return make(result); +} + +OwnPtr ClientConnection::handle(const Messages::LaunchServer::GetHandlersForURL& request) +{ + URL url(request.url()); + auto result = Launcher::the().handlers_for_url(url); + return make(result); +} + +OwnPtr ClientConnection::handle(const Messages::LaunchServer::GetHandlersWithDetailsForURL& request) +{ + URL url(request.url()); + auto result = Launcher::the().handlers_with_details_for_url(url); + return make(result); +} + +OwnPtr ClientConnection::handle(const Messages::LaunchServer::AddAllowedURL& request) +{ + if (m_allowlist_is_sealed) { + did_misbehave("Got request to add more allowed handlers after list was sealed"); + return {}; + } + + if (!request.url().is_valid()) { + did_misbehave("Got request to allow invalid URL"); + return {}; + } + + m_allowlist.empend(String(), false, Vector { request.url() }); + + return make(); +} + +OwnPtr ClientConnection::handle(const Messages::LaunchServer::AddAllowedHandlerWithAnyURL& request) +{ + if (m_allowlist_is_sealed) { + did_misbehave("Got request to add more allowed handlers after list was sealed"); + return {}; + } + + if (request.handler_name().is_empty()) { + did_misbehave("Got request to allow empty handler name"); + return {}; + } + + m_allowlist.empend(request.handler_name(), true, Vector()); + + return make(); +} + +OwnPtr ClientConnection::handle(const Messages::LaunchServer::AddAllowedHandlerWithOnlySpecificURLs& request) +{ + if (m_allowlist_is_sealed) { + did_misbehave("Got request to add more allowed handlers after list was sealed"); + return {}; + } + + if (request.handler_name().is_empty()) { + did_misbehave("Got request to allow empty handler name"); + return {}; + } + + if (request.urls().is_empty()) { + did_misbehave("Got request to allow empty URL list"); + return {}; + } + + m_allowlist.empend(request.handler_name(), false, request.urls()); + + return make(); +} + +OwnPtr ClientConnection::handle(const Messages::LaunchServer::SealAllowlist&) +{ + if (m_allowlist_is_sealed) { + did_misbehave("Got more than one request to seal the allowed handlers list"); + return {}; + } + + return make(); +} + +} -- cgit v1.2.3