1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112
|
// Copyright 2022 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifdef UNSAFE_BUFFERS_BUILD
// TODO(crbug.com/390223051): Remove C-library calls to fix the errors.
#pragma allow_unsafe_libc_calls
#endif
#include "third_party/blink/public/common/fenced_frame/fenced_frame_utils.h"
#include <cstring>
#include <string_view>
#include "base/metrics/histogram_functions.h"
#include "base/strings/string_util.h"
#include "base/uuid.h"
#include "net/base/url_util.h"
#include "third_party/blink/public/common/frame/fenced_frame_sandbox_flags.h"
#include "url/gurl.h"
namespace {
bool IsHttpLocalhost(const GURL& url) {
return url.SchemeIs(url::kHttpScheme) && net::IsLocalhost(url);
}
} // namespace
namespace blink {
bool IsValidFencedFrameURL(const GURL& url) {
if (!url.is_valid())
return false;
return (url.SchemeIs(url::kHttpsScheme) || url.IsAboutBlank() ||
IsHttpLocalhost(url)) &&
!url.parsed_for_possibly_invalid_spec().potentially_dangling_markup;
}
const char kURNUUIDprefix[] = "urn:uuid:";
bool IsValidUrnUuidURL(const GURL& url) {
if (!url.is_valid())
return false;
const std::string& spec = url.spec();
return base::StartsWith(spec, kURNUUIDprefix,
base::CompareCase::INSENSITIVE_ASCII) &&
base::Uuid::ParseCaseInsensitive(
std::string_view(spec).substr(std::strlen(kURNUUIDprefix)))
.is_valid();
}
void RecordFencedFrameCreationOutcome(
const FencedFrameCreationOutcome outcome) {
base::UmaHistogramEnumeration(
kFencedFrameCreationOrNavigationOutcomeHistogram, outcome);
}
void RecordOpaqueFencedFrameSizeCoercion(bool did_coerce) {
base::UmaHistogramBoolean(kIsOpaqueFencedFrameSizeCoercedHistogram,
did_coerce);
}
void RecordFencedFrameResizedAfterSizeFrozen() {
base::UmaHistogramBoolean(kIsFencedFrameResizedAfterSizeFrozen, true);
}
void RecordFencedFrameUnsandboxedFlags(network::mojom::WebSandboxFlags flags) {
using WebSandboxFlags = network::mojom::WebSandboxFlags;
for (int32_t i = 1; i <= static_cast<int32_t>(WebSandboxFlags::kMaxValue);
i = i << 1) {
WebSandboxFlags current_mask = static_cast<WebSandboxFlags>(i);
if ((flags & kFencedFrameMandatoryUnsandboxedFlags & current_mask) !=
WebSandboxFlags::kNone) {
base::UmaHistogramSparse(kFencedFrameMandatoryUnsandboxedFlagsSandboxed,
i);
}
}
}
void RecordFencedFrameFailedSandboxLoadInTopLevelFrame(bool is_main_frame) {
base::UmaHistogramBoolean(kFencedFrameFailedSandboxLoadInTopLevelFrame,
is_main_frame);
}
void RecordDisableUntrustedNetworkOutcome(
const DisableUntrustedNetworkOutcome outcome) {
base::UmaHistogramEnumeration(kDisableUntrustedNetworkOutcome, outcome);
}
void RecordSharedStorageGetInFencedFrameOutcome(
const SharedStorageGetInFencedFrameOutcome outcome) {
base::UmaHistogramEnumeration(kSharedStorageGetInFencedFrameOutcome, outcome);
}
void RecordNotifyEventOutcome(const NotifyEventOutcome outcome) {
base::UmaHistogramEnumeration(kNotifyEventOutcome, outcome);
}
// If more event types besides click are supported for fenced events, this
// function should operate on a global map of unfenced event_type_name ->
// fenced event_type_name. Also, these functions use raw string literals to
// represent event types. While this isn't ideal, the already-defined constants
// for event types (in the blink::event_type_names namespace) aren't exported
// by Blink's public interface. Wrapping the equivalent literals in this
// function ensures that if names need to be changed later, changes are only
// needed in one file.
bool CanNotifyEventTypeAcrossFence(const std::string& event_type) {
return event_type == "click";
}
} // namespace blink
|