Bug 238262

Summary: REGRESSION(r286590): Links with URL schemes are not clickable in Mail
Product: WebKit Reporter: Per Arne Vollan <pvollan>
Component: WebKit Misc.Assignee: Per Arne Vollan <pvollan>
Status: RESOLVED FIXED    
Severity: Normal CC: commit-queue, ggaren, webkit-bug-importer
Priority: P2 Keywords: InRadar
Version: WebKit Nightly Build   
Hardware: Unspecified   
OS: Unspecified   
Bug Depends on: 238839    
Bug Blocks:    
Attachments:
Description Flags
Patch
none
Patch
none
Patch none

Per Arne Vollan
Reported 2022-03-23 08:20:26 PDT
Links with URL schemes are not clickable in Mail on iOS.
Attachments
Patch (5.04 KB, patch)
2022-03-23 08:24 PDT, Per Arne Vollan
no flags
Patch (5.03 KB, patch)
2022-03-23 10:55 PDT, Per Arne Vollan
no flags
Patch (5.08 KB, patch)
2022-03-24 08:58 PDT, Per Arne Vollan
no flags
Per Arne Vollan
Comment 1 2022-03-23 08:21:32 PDT
Per Arne Vollan
Comment 2 2022-03-23 08:24:15 PDT
Per Arne Vollan
Comment 3 2022-03-23 10:55:20 PDT
Geoffrey Garen
Comment 4 2022-03-23 11:02:33 PDT
Comment on attachment 455519 [details] Patch View in context: https://bugs.webkit.org/attachment.cgi?id=455519&action=review > Source/WebKit/UIProcess/Cocoa/WebProcessPoolCocoa.mm:422 > + if (!WebCore::IOSApplication::isMobileSafari()) > + parameters.dynamicMachExtensionHandles = SandboxExtension::createHandlesForMachLookup(nonBrowserServices(), std::nullopt); How do we know that Safari does not want / need to launch apps by URL scheme? What about other browsers?
Per Arne Vollan
Comment 5 2022-03-23 12:00:54 PDT
(In reply to Geoffrey Garen from comment #4) > Comment on attachment 455519 [details] > Patch > > View in context: > https://bugs.webkit.org/attachment.cgi?id=455519&action=review > > > Source/WebKit/UIProcess/Cocoa/WebProcessPoolCocoa.mm:422 > > + if (!WebCore::IOSApplication::isMobileSafari()) > > + parameters.dynamicMachExtensionHandles = SandboxExtension::createHandlesForMachLookup(nonBrowserServices(), std::nullopt); > > How do we know that Safari does not want / need to launch apps by URL scheme? > That is a good point. We have not seen any telemetry for Safari accessing this daemon. We have also been blocking it for the last ~2 years, so I do not believe it is being used by Safari. > What about other browsers? That is also a good point! This patch grants access to the service for other browsers. It would be good if we could avoid that. I will look into that. Thanks for reviewing!
Geoffrey Garen
Comment 6 2022-03-23 14:08:42 PDT
> We have not seen any telemetry for Safari accessing > this daemon. I wonder if there is some preference that Safari sets (or that Mail un-sets) that influences whether we consult lsd for links or not? If so, perhaps we can key off of that preference rather than isMobileSafari(), providing the sandbox win to all apps that have the preference in that state. > We have also been blocking it for the last ~2 years, so I do > not believe it is being used by Safari. Blocking in all apps?
Per Arne Vollan
Comment 7 2022-03-23 15:16:55 PDT
(In reply to Geoffrey Garen from comment #6) > > We have not seen any telemetry for Safari accessing > > this daemon. > > I wonder if there is some preference that Safari sets (or that Mail un-sets) > that influences whether we consult lsd for links or not? If so, perhaps we > can key off of that preference rather than isMobileSafari(), providing the > sandbox win to all apps that have the preference in that state. > Yes, that is a good point. I will look into this! > > We have also been blocking it for the last ~2 years, so I do > > not believe it is being used by Safari. > > Blocking in all apps? We have only been blocking in Safari. Thanks for reviewing!
Per Arne Vollan
Comment 8 2022-03-24 08:58:45 PDT
Per Arne Vollan
Comment 9 2022-03-24 09:01:25 PDT
(In reply to Per Arne Vollan from comment #7) > (In reply to Geoffrey Garen from comment #6) > > > We have not seen any telemetry for Safari accessing > > > this daemon. > > > > I wonder if there is some preference that Safari sets (or that Mail un-sets) > > that influences whether we consult lsd for links or not? If so, perhaps we > > can key off of that preference rather than isMobileSafari(), providing the > > sandbox win to all apps that have the preference in that state. > > > > Yes, that is a good point. I will look into this! > I was not able to find such a preference, but in the latest patch I made sure that no browsers will get this sandbox extension. This will provide the sandbox win for all browsers. > > > We have also been blocking it for the last ~2 years, so I do > > > not believe it is being used by Safari. > > > > Blocking in all apps? > > We have only been blocking in Safari. > > Thanks for reviewing!
Geoffrey Garen
Comment 10 2022-03-24 10:28:01 PDT
Comment on attachment 455645 [details] Patch r=me I think this is an OK compromise for the time being; and please also file a follow-up bug to investigate how to remove lsd for all clients, since there is some security value left over there.
Per Arne Vollan
Comment 11 2022-03-24 14:17:34 PDT
(In reply to Geoffrey Garen from comment #10) > Comment on attachment 455645 [details] > Patch > > r=me > > I think this is an OK compromise for the time being; and please also file a > follow-up bug to investigate how to remove lsd for all clients, since there > is some security value left over there. I will file a follow-up bug. Thanks for reviewing!
EWS
Comment 12 2022-03-24 16:15:25 PDT
Committed r291821 (248846@main): <https://commits.webkit.org/248846@main> All reviewed patches have been landed. Closing bug and clearing flags on attachment 455645 [details].
WebKit Commit Bot
Comment 13 2022-04-05 14:47:08 PDT
Re-opened since this is blocked by bug 238839
Per Arne Vollan
Comment 14 2022-04-08 15:02:56 PDT
Note You need to log in before you can comment on or make changes to this bug.