[go: nahoru, domu]

blob: 8b318b4824c955c9abd14c246e7104958b29a82a [file] [log] [blame]
// Copyright 2017 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "storage/browser/blob/blob_url_store_impl.h"
#include "base/feature_list.h"
#include "base/functional/bind.h"
#include "base/strings/strcat.h"
#include "components/crash/core/common/crash_key.h"
#include "mojo/public/cpp/bindings/receiver_set.h"
#include "net/base/features.h"
#include "storage/browser/blob/blob_impl.h"
#include "storage/browser/blob/blob_url_loader_factory.h"
#include "storage/browser/blob/blob_url_registry.h"
#include "storage/browser/blob/blob_url_utils.h"
#include "url/url_util.h"
namespace storage {
// Self deletes when the last binding to it is closed.
class BlobURLTokenImpl : public blink::mojom::BlobURLToken {
public:
BlobURLTokenImpl(base::WeakPtr<BlobUrlRegistry> registry,
const GURL& url,
mojo::PendingRemote<blink::mojom::Blob> blob,
mojo::PendingReceiver<blink::mojom::BlobURLToken> receiver)
: registry_(std::move(registry)),
url_(url),
token_(base::UnguessableToken::Create()) {
receivers_.Add(this, std::move(receiver));
receivers_.set_disconnect_handler(base::BindRepeating(
&BlobURLTokenImpl::OnConnectionError, base::Unretained(this)));
if (registry_) {
registry_->AddTokenMapping(token_, url_, std::move(blob));
}
}
~BlobURLTokenImpl() override {
if (registry_)
registry_->RemoveTokenMapping(token_);
}
void GetToken(GetTokenCallback callback) override {
std::move(callback).Run(token_);
}
void Clone(
mojo::PendingReceiver<blink::mojom::BlobURLToken> receiver) override {
receivers_.Add(this, std::move(receiver));
}
private:
void OnConnectionError() {
if (!receivers_.empty())
return;
delete this;
}
base::WeakPtr<BlobUrlRegistry> registry_;
mojo::ReceiverSet<blink::mojom::BlobURLToken> receivers_;
const GURL url_;
const base::UnguessableToken token_;
};
BlobURLStoreImpl::BlobURLStoreImpl(
const blink::StorageKey& storage_key,
base::WeakPtr<BlobUrlRegistry> registry,
BlobURLValidityCheckBehavior validity_check_behavior)
: storage_key_(storage_key),
registry_(std::move(registry)),
validity_check_behavior_(validity_check_behavior) {
if (validity_check_behavior_ ==
BlobURLValidityCheckBehavior::ALLOW_OPAQUE_ORIGIN_STORAGE_KEY_MISMATCH) {
DCHECK(base::FeatureList::IsEnabled(
net::features::kSupportPartitionedBlobUrl));
}
}
BlobURLStoreImpl::~BlobURLStoreImpl() {
if (registry_) {
for (const auto& url : urls_)
registry_->RemoveUrlMapping(url, storage_key_);
}
}
void BlobURLStoreImpl::Register(
mojo::PendingRemote<blink::mojom::Blob> blob,
const GURL& url,
// TODO(https://crbug.com/1224926): Remove these once experiment is over.
const base::UnguessableToken& unsafe_agent_cluster_id,
const absl::optional<net::SchemefulSite>& unsafe_top_level_site,
RegisterCallback callback) {
// TODO(https://crbug.com/1376126): Generate blob URLs here, rather than
// validating the URLs the renderer process generated.
if (!BlobUrlIsValid(url, "Register")) {
std::move(callback).Run();
return;
}
if (registry_)
registry_->AddUrlMapping(url, std::move(blob), storage_key_,
unsafe_agent_cluster_id, unsafe_top_level_site);
urls_.insert(url);
std::move(callback).Run();
}
void BlobURLStoreImpl::Revoke(const GURL& url) {
if (!BlobUrlIsValid(url, "Revoke"))
return;
if (registry_)
registry_->RemoveUrlMapping(url, storage_key_);
urls_.erase(url);
}
void BlobURLStoreImpl::Resolve(const GURL& url, ResolveCallback callback) {
if (!registry_) {
std::move(callback).Run(mojo::NullRemote(), absl::nullopt);
return;
}
mojo::PendingRemote<blink::mojom::Blob> blob = registry_->GetBlobFromUrl(url);
std::move(callback).Run(std::move(blob),
registry_->GetUnsafeAgentClusterID(url));
}
void BlobURLStoreImpl::ResolveAsURLLoaderFactory(
const GURL& url,
mojo::PendingReceiver<network::mojom::URLLoaderFactory> receiver,
ResolveAsURLLoaderFactoryCallback callback) {
if (!registry_) {
BlobURLLoaderFactory::Create(mojo::NullRemote(), url, std::move(receiver));
std::move(callback).Run(absl::nullopt, absl::nullopt);
return;
}
BlobURLLoaderFactory::Create(registry_->GetBlobFromUrl(url), url,
std::move(receiver));
std::move(callback).Run(registry_->GetUnsafeAgentClusterID(url),
registry_->GetUnsafeTopLevelSite(url));
}
void BlobURLStoreImpl::ResolveForNavigation(
const GURL& url,
mojo::PendingReceiver<blink::mojom::BlobURLToken> token,
ResolveForNavigationCallback callback) {
if (!registry_) {
std::move(callback).Run(absl::nullopt);
return;
}
mojo::PendingRemote<blink::mojom::Blob> blob = registry_->GetBlobFromUrl(url);
if (!blob) {
std::move(callback).Run(absl::nullopt);
return;
}
new BlobURLTokenImpl(registry_, url, std::move(blob), std::move(token));
std::move(callback).Run(registry_->GetUnsafeAgentClusterID(url));
}
bool BlobURLStoreImpl::BlobUrlIsValid(const GURL& url,
const char* method) const {
// TODO(crbug.com/1278268): Remove crash keys.
url::Origin storage_key_origin = storage_key_.origin();
static crash_reporter::CrashKeyString<256> origin_key("origin");
static crash_reporter::CrashKeyString<256> url_key("url");
crash_reporter::ScopedCrashKeyString scoped_origin_key(
&origin_key, storage_key_origin.GetDebugString());
crash_reporter::ScopedCrashKeyString scoped_url_key(
&url_key, url.possibly_invalid_spec());
if (!url.SchemeIsBlob()) {
mojo::ReportBadMessage(
base::StrCat({"Invalid scheme passed to BlobURLStore::", method}));
return false;
}
url::Origin url_origin = url::Origin::Create(url);
// For file:// origins blink sometimes creates blob URLs with "null" as origin
// and other times "file://" (based on a runtime setting). On the other hand,
// `origin_` will always be a non-opaque file: origin for pages loaded from
// file:// URLs. To deal with this, we treat file:// origins and
// opaque origins separately from non-opaque origins.
// URLs created by blink::BlobURL::CreateBlobURL() will always get "blank" as
// origin if the scheme is local, which usually includes the file scheme and
// on Android also the content scheme.
bool valid_origin = true;
if (url_origin.scheme() == url::kFileScheme) {
valid_origin = storage_key_origin.scheme() == url::kFileScheme;
} else if (url_origin.opaque()) {
// TODO(https://crbug.com/1058759): Once `storage_key_` corresponds to an
// opaque origin under the circumstances described in the crbug, remove the
// ALLOW_OPAQUE_ORIGIN_STORAGE_KEY_MISMATCH workaround here.
valid_origin =
storage_key_origin.opaque() ||
base::Contains(url::GetLocalSchemes(), storage_key_origin.scheme()) ||
validity_check_behavior_ ==
BlobURLValidityCheckBehavior::
ALLOW_OPAQUE_ORIGIN_STORAGE_KEY_MISMATCH;
} else {
valid_origin = storage_key_origin == url_origin;
}
if (!valid_origin) {
mojo::ReportBadMessage(base::StrCat(
{"URL with invalid origin passed to BlobURLStore::", method}));
return false;
}
if (BlobUrlUtils::UrlHasFragment(url)) {
mojo::ReportBadMessage(
base::StrCat({"URL with fragment passed to BlobURLStore::", method}));
return false;
}
return true;
}
} // namespace storage