WebKit Bugzilla
New
Browse
Log In
×
Sign in with GitHub
or
Remember my login
Create Account
·
Forgot Password
Forgotten password account recovery
RESOLVED FIXED
172869
Prevent scheme handlers from handling all built-in URL schemes
https://bugs.webkit.org/show_bug.cgi?id=172869
Summary
Prevent scheme handlers from handling all built-in URL schemes
Brady Eidson
Reported
2017-06-02 12:57:46 PDT
Prevent scheme handlers from handling all built-in URL schemes <
rdar://problem/32404790
>
Attachments
Patch
(13.89 KB, patch)
2017-06-02 14:25 PDT
,
Brady Eidson
no flags
Details
Formatted Diff
Diff
Patch
(14.31 KB, patch)
2017-06-02 15:11 PDT
,
Brady Eidson
no flags
Details
Formatted Diff
Diff
Patch
(14.31 KB, patch)
2017-06-02 15:17 PDT
,
Brady Eidson
no flags
Details
Formatted Diff
Diff
Show Obsolete
(2)
View All
Add attachment
proposed patch, testcase, etc.
Brady Eidson
Comment 1
2017-06-02 14:25:57 PDT
Created
attachment 311860
[details]
Patch
Andy Estes
Comment 2
2017-06-02 14:47:37 PDT
Comment on
attachment 311860
[details]
Patch View in context:
https://bugs.webkit.org/attachment.cgi?id=311860&action=review
> Source/WebCore/platform/SchemeRegistry.cpp:63 > + // Other misc schemes that the SchemeRegistry doesn't know about. > + schemes.get().add("webkit-fake-url"); > +#if PLATFORM(MAC) > + schemes.get().add("safari-extension"); > +#endif
There's also x-apple-ql-id (QLPreviewProtocol()) and x-apple-content-filter (ContentFilter::urlScheme()).
Andy Estes
Comment 3
2017-06-02 14:57:22 PDT
What happens if someone tries to register schemes used by system apps (tel:, mailto:, etc.)? Those were probably hijackable by NSURLProtocol, so maybe they should be hijackable here too. Just wondering if you'd thought about it.
Brady Eidson
Comment 4
2017-06-02 15:02:59 PDT
(In reply to Andy Estes from
comment #3
)
> What happens if someone tries to register schemes used by system apps (tel:, > mailto:, etc.)? Those were probably hijackable by NSURLProtocol, so maybe > they should be hijackable here too. Just wondering if you'd thought about it.
We have thought about it, and they definitely get to be hijackable. They are not URLs WebKit handles internally.
Brady Eidson
Comment 5
2017-06-02 15:11:19 PDT
Created
attachment 311870
[details]
Patch
Andy Estes
Comment 6
2017-06-02 15:15:28 PDT
Comment on
attachment 311870
[details]
Patch View in context:
https://bugs.webkit.org/attachment.cgi?id=311870&action=review
> Source/WebCore/platform/SchemeRegistry.cpp:73 > +#if PLATFORM(IOS) > + schemes.get().add(QLPreviewProtocol()); > +#endif
This might break tvOS and watchOS builds. I'd use USE(QUICK_LOOK) instead.
Brady Eidson
Comment 7
2017-06-02 15:17:47 PDT
Created
attachment 311874
[details]
Patch
WebKit Commit Bot
Comment 8
2017-06-02 16:07:12 PDT
Comment on
attachment 311874
[details]
Patch Clearing flags on attachment: 311874 Committed
r217738
: <
http://trac.webkit.org/changeset/217738
>
WebKit Commit Bot
Comment 9
2017-06-02 16:07:14 PDT
All reviewed patches have been landed. Closing bug.
Note
You need to
log in
before you can comment on or make changes to this bug.
Top of Page
Format For Printing
XML
Clone This Bug