mirror of
https://github.com/electron/electron.git
synced 2026-02-19 03:14:51 -05:00
* chore: bump chromium in DEPS to 146.0.7652.0 * fix(patch-conflict): update mas_avoid_private_macos_api_usage context for constrainFrameRect method The upstream CL added a new constrainFrameRect:toScreen: method override to NativeWidgetMacNSWindow as part of headless mode window zoom implementation. The MAS patch's #endif for frameViewClassForStyleMask now correctly appears after that method, since constrainFrameRect is a public API override that doesn't need to be guarded. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7487666 * fix(patch-conflict): update printing.patch for base::DictValue rename Updated printing.patch to use the new base::DictValue type name instead of base::Value::Dict following Chromium's type renaming change. This affects CompleteUpdatePrintSettings() signature and related code. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7509820 * fix(patch-conflict): update accessibility_ui patch for base::DictValue/ListValue rename Updated adjust_accessibility_ui_for_electron.patch to use the new base::DictValue and base::ListValue type names instead of base::Value::Dict and base::Value::List following Chromium's type renaming change. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7509820 * chore: update patches * 6625736: Rename DURABLE_STORAGE to PERSISTENT_STORAGE for consistency | https://chromium-review.googlesource.com/c/chromium/src/+/6625736 * chore: bump chromium in DEPS to 146.0.7653.0 * chore: update patches * 7000847: add type tag to v8::External for gin_helper function templates The upstream gin function templates now use v8::ExternalPointerTypeTag for type safety when using v8::External. Updated Electron's forked gin_helper function template to use the same kGinInternalCallbackHolderBaseTag that Chromium's gin uses. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7000847 * fix(patch-update): extend V8 Object API deprecation patch for Node.js Extended the existing patch to cover additional files that use GetAlignedPointerFromInternalField and SetAlignedPointerInInternalField: - src/stream_base-inl.h - src/udp_wrap.cc - src/js_udp_wrap.cc - src/node_process_methods.cc - src/node_snapshotable.cc - src/base_object.cc These APIs now require an EmbedderDataTypeTag parameter. Ref: https://chromium-review.googlesource.com/c/v8/v8/+/7087956 * 7000847: add type tag to v8::External calls in shared_texture Updated v8::External::New and v8::External::Value calls to use the kExternalPointerTypeTagDefault tag as required by the V8 API change that deprecates the tagless versions. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7000847 * 7508687: use ChildProcessId for file permission APIs The ChildProcessSecurityPolicy::CanReadFile and GrantReadFile APIs now require ChildProcessId instead of int. Updated to use GetID() instead of GetDeprecatedID() for these specific calls. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7508687 * 7000847: add type tag to v8::External calls in callback and osr_converter The v8::External API now requires an EmbedderPointerTypeTag parameter for both New() and Value() methods to improve V8 sandbox type safety. Updated calls in: - callback.cc: TranslatorHolder constructor and CallTranslator - osr_converter.cc: OffscreenSharedTextureValue converter Ref: https://chromium-review.googlesource.com/c/v8/v8/+/7000847 * fixup! 7087956: [api] Promote deprecation of v8::Context and v8::Object API methods Extended the Node.js patch to cover histogram.cc which also uses SetAlignedPointerInInternalField and GetAlignedPointerFromInternalField APIs that now require the EmbedderDataTypeTag parameter. Ref: https://chromium-review.googlesource.com/c/v8/v8/+/7087956 * chore: bump chromium in DEPS to 146.0.7655.0 * chore: update patches * 7509043: update WebSpellingMarker type for API change The upstream Chromium API changed - WebSpellingMarker was moved from a nested type within WebTextCheckClient to a standalone type in the blink namespace. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7509043 * 7498491: update process_id to use OriginatingProcess type The upstream Chromium API changed - URLLoaderFactoryParams::process_id was changed from an integer to a union type network::OriginatingProcess that distinguishes between browser and renderer processes. - For browser process requests, use OriginatingProcess::browser() - For renderer process lookups, check !is_browser() and use renderer_process().value() to get the child_id Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7498491 * 5710330: Add crash keys to debug NativeWidgetMacNSWindowBorderlessFrame exception | https://chromium-review.googlesource.com/c/chromium/src/+/5710330 5710330 added a new NSNextStepFrame interface extension and implementations for NativeWidgetMacNSWindowTitledFrame and NativeWidgetMacNSWindowBorderlessFrame. These use private macOS APIs that are not available in Mac App Store builds. * chore: update patches * chore: bump chromium in DEPS to 146.0.7661.0 * chore: bump chromium in DEPS to 146.0.7663.0 * fix(patch-conflict): update accessibility_ui for string_view API change Upstream removed redundant std::string(default_api_type) conversion as part of a string_view optimization cleanup. Updated patch context to match. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7514107 * fix(patch-conflict): update service process launch options for sandbox API refactor Upstream removed content/common/sandbox_init_win.cc and content/public/common/sandbox_init_win.h, moving the functionality directly into ChildProcessLauncherHelper. Updated patch to call sandbox::policy::SandboxWin::StartSandboxedProcess directly with the LaunchOptions pointer instead of going through the removed helper. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7528253 * fix(patch-conflict): update MAS safestorage for keychain API refactor Upstream refactored KeychainPassword::GetPassword() to use a new GetPasswordImpl() helper function with improved error tracking via base::expected<std::string, OSStatus>. Adapted patch to use the new GetPasswordImpl with the suffixed account name and handle migration from legacy accounts through the new API. Ref: https://chromium-review.googlesource.com/c/chromium/src/+/7516438 * chore: update patches * chore: bump chromium in DEPS to 146.0.7663.0 * fix: base::Value::Dict -> base::DictValue https://chromium-review.googlesource.com/c/chromium/src/+/7513889 * fix: include new cookie exclusion reason https://chromium-review.googlesource.com/c/chromium/src/+/7486527 * fix: enable libc++ ABI flag for trivially copyable std::vector<bool> Required for changes introduced in the following CL https://chromium-review.googlesource.com/c/chromium/src/+/7513653 * fixup! fix: base::Value::Dict -> base::DictValue https://chromium-review.googlesource.com/c/chromium/src/+/7513889 * fix: spellcheck not working in tests https://chromium-review.googlesource.com/c/chromium/src/+/7452579 * fix: cookie test failing due to multiple rejection reasons https://chromium-review.googlesource.com/c/chromium/src/+/7506629 * fix: macos sizing unmaximized window incorrectly https://chromium-review.googlesource.com/c/chromium/src/+/7487666 Changes to headless mode caused the unmaximized window to subtract the height of the menubar. * fix: skip tests for incompatible BoringSSL ML-DSA crypto https://boringssl-review.googlesource.com/c/boringssl/+/84929 * test: fix pseudonymization registration in utility process on Linux Ref: 7486913: Pass pseudonymization salt via shared memory at process launch | https://chromium-review.googlesource.com/c/chromium/src/+/7486913 * fix: restore MAS patch-outs Restores some `#if !IS_MAS_BUILD()` gates dropped in773054ad59* fixup! 7508687: use ChildProcessId for file permission APIs * fixup! fix(patch-conflict): update MAS safestorage for keychain API refactor * chore: add note about parallel upstream change * fixup! Merge remote-tracking branch 'origin/main' into roller/chromium/main * Revert "fixup! 7508687: use ChildProcessId for file permission APIs" This reverts commit05c43e4e5d. The _impl version has the signature, but not the public interface. :oof: * fixup! fix(patch-conflict): update MAS safestorage for keychain API refactor --------- Co-authored-by: electron-roller[bot] <84116207+electron-roller[bot]@users.noreply.github.com> Co-authored-by: Keeley Hammond <khammond@slack-corp.com> Co-authored-by: Samuel Maddock <samuelmaddock@electronjs.org> Co-authored-by: clavin <clavin@electronjs.org>
484 lines
19 KiB
C++
484 lines
19 KiB
C++
// Copyright (c) 2015 GitHub, Inc.
|
|
// Use of this source code is governed by the MIT license that can be
|
|
// found in the LICENSE file.
|
|
|
|
#include "shell/browser/api/electron_api_cookies.h"
|
|
|
|
#include <sstream>
|
|
#include <string>
|
|
#include <string_view>
|
|
#include <utility>
|
|
|
|
#include "base/containers/fixed_flat_map.h"
|
|
#include "base/time/time.h"
|
|
#include "base/values.h"
|
|
#include "content/public/browser/browser_context.h"
|
|
#include "content/public/browser/browser_task_traits.h"
|
|
#include "content/public/browser/browser_thread.h"
|
|
#include "content/public/browser/storage_partition.h"
|
|
#include "gin/dictionary.h"
|
|
#include "gin/object_template_builder.h"
|
|
#include "net/cookies/canonical_cookie.h"
|
|
#include "net/cookies/cookie_change_dispatcher.h"
|
|
#include "net/cookies/cookie_inclusion_status.h"
|
|
#include "net/cookies/cookie_store.h"
|
|
#include "net/cookies/cookie_util.h"
|
|
#include "shell/browser/cookie_change_notifier.h"
|
|
#include "shell/browser/electron_browser_context.h"
|
|
#include "shell/browser/javascript_environment.h"
|
|
#include "shell/common/gin_converters/gurl_converter.h"
|
|
#include "shell/common/gin_converters/value_converter.h"
|
|
#include "shell/common/gin_helper/dictionary.h"
|
|
#include "shell/common/gin_helper/handle.h"
|
|
#include "shell/common/gin_helper/object_template_builder.h"
|
|
#include "shell/common/gin_helper/promise.h"
|
|
|
|
namespace gin {
|
|
|
|
template <>
|
|
struct Converter<net::CookieSameSite> {
|
|
static v8::Local<v8::Value> ToV8(v8::Isolate* isolate,
|
|
const net::CookieSameSite& val) {
|
|
switch (val) {
|
|
case net::CookieSameSite::UNSPECIFIED:
|
|
return ConvertToV8(isolate, "unspecified");
|
|
case net::CookieSameSite::NO_RESTRICTION:
|
|
return ConvertToV8(isolate, "no_restriction");
|
|
case net::CookieSameSite::LAX_MODE:
|
|
return ConvertToV8(isolate, "lax");
|
|
case net::CookieSameSite::STRICT_MODE:
|
|
return ConvertToV8(isolate, "strict");
|
|
}
|
|
DCHECK(false);
|
|
return ConvertToV8(isolate, "unknown");
|
|
}
|
|
};
|
|
|
|
template <>
|
|
struct Converter<net::CanonicalCookie> {
|
|
static v8::Local<v8::Value> ToV8(v8::Isolate* isolate,
|
|
const net::CanonicalCookie& val) {
|
|
gin::Dictionary dict(isolate, v8::Object::New(isolate));
|
|
dict.Set("name", val.Name());
|
|
dict.Set("value", val.Value());
|
|
dict.Set("domain", val.Domain());
|
|
dict.Set("hostOnly", net::cookie_util::DomainIsHostOnly(val.Domain()));
|
|
dict.Set("path", val.Path());
|
|
dict.Set("secure", val.SecureAttribute());
|
|
dict.Set("httpOnly", val.IsHttpOnly());
|
|
dict.Set("session", !val.IsPersistent());
|
|
if (val.IsPersistent())
|
|
dict.Set("expirationDate", val.ExpiryDate().InSecondsFSinceUnixEpoch());
|
|
dict.Set("sameSite", val.SameSite());
|
|
return ConvertToV8(isolate, dict).As<v8::Object>();
|
|
}
|
|
};
|
|
|
|
template <>
|
|
struct Converter<net::CookieChangeCause> {
|
|
static v8::Local<v8::Value> ToV8(v8::Isolate* isolate,
|
|
const net::CookieChangeCause& val) {
|
|
switch (val) {
|
|
case net::CookieChangeCause::INSERTED:
|
|
return gin::StringToV8(isolate, "inserted");
|
|
case net::CookieChangeCause::INSERTED_NO_CHANGE_OVERWRITE:
|
|
return gin::StringToV8(isolate, "inserted-no-change-overwrite");
|
|
case net::CookieChangeCause::INSERTED_NO_VALUE_CHANGE_OVERWRITE:
|
|
return gin::StringToV8(isolate, "inserted-no-value-change-overwrite");
|
|
case net::CookieChangeCause::EXPLICIT:
|
|
return gin::StringToV8(isolate, "explicit");
|
|
case net::CookieChangeCause::OVERWRITE:
|
|
return gin::StringToV8(isolate, "overwrite");
|
|
case net::CookieChangeCause::EXPIRED:
|
|
return gin::StringToV8(isolate, "expired");
|
|
case net::CookieChangeCause::EVICTED:
|
|
return gin::StringToV8(isolate, "evicted");
|
|
case net::CookieChangeCause::EXPIRED_OVERWRITE:
|
|
return gin::StringToV8(isolate, "expired-overwrite");
|
|
default:
|
|
return gin::StringToV8(isolate, "unknown");
|
|
}
|
|
}
|
|
};
|
|
|
|
} // namespace gin
|
|
|
|
namespace electron::api {
|
|
|
|
namespace {
|
|
|
|
// Returns whether |cookie| matches |filter|.
|
|
bool MatchesCookie(const base::DictValue& filter,
|
|
const net::CanonicalCookie& cookie) {
|
|
const std::string* str;
|
|
if ((str = filter.FindString("name")) && *str != cookie.Name())
|
|
return false;
|
|
if ((str = filter.FindString("path")) && *str != cookie.Path())
|
|
return false;
|
|
if ((str = filter.FindString("domain")) && !cookie.IsDomainMatch(*str))
|
|
return false;
|
|
std::optional<bool> secure_filter = filter.FindBool("secure");
|
|
if (secure_filter && *secure_filter != cookie.SecureAttribute())
|
|
return false;
|
|
std::optional<bool> session_filter = filter.FindBool("session");
|
|
if (session_filter && *session_filter == cookie.IsPersistent())
|
|
return false;
|
|
std::optional<bool> httpOnly_filter = filter.FindBool("httpOnly");
|
|
if (httpOnly_filter && *httpOnly_filter != cookie.IsHttpOnly())
|
|
return false;
|
|
return true;
|
|
}
|
|
|
|
// Remove cookies from |list| not matching |filter|, and pass it to |callback|.
|
|
void FilterCookies(base::DictValue filter,
|
|
gin_helper::Promise<net::CookieList> promise,
|
|
const net::CookieList& cookies) {
|
|
net::CookieList result;
|
|
for (const auto& cookie : cookies) {
|
|
if (MatchesCookie(filter, cookie))
|
|
result.push_back(cookie);
|
|
}
|
|
promise.Resolve(result);
|
|
}
|
|
|
|
void FilterCookieWithStatuses(
|
|
base::DictValue filter,
|
|
gin_helper::Promise<net::CookieList> promise,
|
|
const net::CookieAccessResultList& list,
|
|
const net::CookieAccessResultList& excluded_list) {
|
|
FilterCookies(std::move(filter), std::move(promise),
|
|
net::cookie_util::StripAccessResults(list));
|
|
}
|
|
|
|
// Parse dictionary property to CanonicalCookie time correctly.
|
|
base::Time ParseTimeProperty(const std::optional<double>& value) {
|
|
if (!value) // empty time means ignoring the parameter
|
|
return {};
|
|
if (*value == 0) // FromSecondsSinceUnixEpoch would convert 0 to empty Time
|
|
return base::Time::UnixEpoch();
|
|
return base::Time::FromSecondsSinceUnixEpoch(*value);
|
|
}
|
|
|
|
const std::string InclusionStatusToString(net::CookieInclusionStatus status) {
|
|
// See net/cookies/cookie_inclusion_status.h for cookie error descriptions.
|
|
using Reason = net::CookieInclusionStatus::ExclusionReason;
|
|
static constexpr auto Reasons =
|
|
base::MakeFixedFlatMap<Reason, std::string_view>(
|
|
{{Reason::EXCLUDE_UNKNOWN_ERROR, "Unknown error"},
|
|
{Reason::EXCLUDE_HTTP_ONLY,
|
|
"The cookie was HttpOnly, but the attempted access was through a "
|
|
"non-HTTP API."},
|
|
{Reason::EXCLUDE_SECURE_ONLY,
|
|
"The cookie was Secure, but the URL was not allowed to access "
|
|
"Secure cookies."},
|
|
{Reason::EXCLUDE_DOMAIN_MISMATCH,
|
|
"The cookie's domain attribute did not match the domain of the URL "
|
|
"attempting access."},
|
|
{Reason::EXCLUDE_NOT_ON_PATH,
|
|
"The cookie's path attribute did not match the path of the URL "
|
|
"attempting access."},
|
|
{Reason::EXCLUDE_SAMESITE_STRICT,
|
|
"The cookie had SameSite=Strict, and the attempted access did not "
|
|
"have an appropriate SameSiteCookieContext"},
|
|
{Reason::EXCLUDE_SAMESITE_LAX,
|
|
"The cookie had SameSite=Lax, and the attempted access did not "
|
|
"have "
|
|
"an appropriate SameSiteCookieContext"},
|
|
{Reason::EXCLUDE_SAMESITE_UNSPECIFIED_TREATED_AS_LAX,
|
|
"The cookie did not specify a SameSite attribute, and therefore "
|
|
"was treated as if it were SameSite=Lax, and the attempted "
|
|
"access did not have an appropriate SameSiteCookieContext."},
|
|
{Reason::EXCLUDE_SAMESITE_NONE_INSECURE,
|
|
"The cookie specified SameSite=None, but it was not Secure."},
|
|
{Reason::EXCLUDE_USER_PREFERENCES,
|
|
"Caller did not allow access to the cookie."},
|
|
{Reason::EXCLUDE_FAILURE_TO_STORE,
|
|
"The cookie was malformed and could not be stored"},
|
|
{Reason::EXCLUDE_NONCOOKIEABLE_SCHEME,
|
|
"Attempted to set a cookie from a scheme that does not support "
|
|
"cookies."},
|
|
{Reason::EXCLUDE_OVERWRITE_SECURE,
|
|
"The cookie would have overwritten a Secure cookie, and was not "
|
|
"allowed to do so."},
|
|
{Reason::EXCLUDE_OVERWRITE_HTTP_ONLY,
|
|
"The cookie would have overwritten an HttpOnly cookie, and was not "
|
|
"allowed to do so."},
|
|
{Reason::EXCLUDE_INVALID_DOMAIN,
|
|
"The cookie was set with an invalid Domain attribute."},
|
|
{Reason::EXCLUDE_INVALID_PREFIX,
|
|
"The cookie was set with an invalid __Host- or __Secure- prefix."},
|
|
{Reason::EXCLUDE_INVALID_PARTITIONED,
|
|
"Cookie was set with an invalid Partitioned attribute, which is "
|
|
"only valid if the cookie has a __Host- prefix."},
|
|
{Reason::EXCLUDE_NAME_VALUE_PAIR_EXCEEDS_MAX_SIZE,
|
|
"The cookie exceeded the name/value pair size limit."},
|
|
{Reason::EXCLUDE_ATTRIBUTE_VALUE_EXCEEDS_MAX_SIZE,
|
|
"Cookie exceeded the attribute size limit."},
|
|
{Reason::EXCLUDE_DOMAIN_NON_ASCII,
|
|
"The cookie was set with a Domain attribute containing non ASCII "
|
|
"characters."},
|
|
{Reason::EXCLUDE_THIRD_PARTY_BLOCKED_WITHIN_FIRST_PARTY_SET,
|
|
"The cookie is blocked by third-party cookie blocking but the two "
|
|
"sites are in the same First-Party Set"},
|
|
{Reason::EXCLUDE_PORT_MISMATCH,
|
|
"The cookie's source_port did not match the port of the request."},
|
|
{Reason::EXCLUDE_SCHEME_MISMATCH,
|
|
"The cookie's source_scheme did not match the scheme of the "
|
|
"request."},
|
|
{Reason::EXCLUDE_SHADOWING_DOMAIN,
|
|
"The cookie is a domain cookie and has the same name as an origin "
|
|
"cookie on this origin."},
|
|
{Reason::EXCLUDE_DISALLOWED_CHARACTER,
|
|
"The cookie contains ASCII control characters"},
|
|
{Reason::EXCLUDE_THIRD_PARTY_PHASEOUT,
|
|
"The cookie is blocked for third-party cookie phaseout."},
|
|
{Reason::EXCLUDE_NO_COOKIE_CONTENT,
|
|
"The cookie contains no content or only whitespace."},
|
|
{Reason::EXCLUDE_ANONYMOUS_CONTEXT,
|
|
"The cookie is unpartitioned and being accessed from an anonymous "
|
|
"context."},
|
|
{Reason::EXCLUDE_INVALID_PATH,
|
|
"The cookie was set with an invalid Path attribute."}});
|
|
static_assert(
|
|
Reasons.size() ==
|
|
net::CookieInclusionStatus::ExclusionReasonBitset::kValueCount,
|
|
"Please ensure all ExclusionReason variants are enumerated in "
|
|
"GetDebugString");
|
|
|
|
std::ostringstream reason;
|
|
reason << "Failed to set cookie - ";
|
|
for (const auto& [val, str] : Reasons) {
|
|
if (status.HasExclusionReason(val)) {
|
|
reason << str;
|
|
}
|
|
}
|
|
|
|
reason << status.GetDebugString();
|
|
return reason.str();
|
|
}
|
|
|
|
std::string StringToCookieSameSite(const std::string* str_ptr,
|
|
net::CookieSameSite* same_site) {
|
|
if (!str_ptr) {
|
|
*same_site = net::CookieSameSite::LAX_MODE;
|
|
return "";
|
|
}
|
|
const std::string& str = *str_ptr;
|
|
if (str == "unspecified") {
|
|
*same_site = net::CookieSameSite::UNSPECIFIED;
|
|
} else if (str == "no_restriction") {
|
|
*same_site = net::CookieSameSite::NO_RESTRICTION;
|
|
} else if (str == "lax") {
|
|
*same_site = net::CookieSameSite::LAX_MODE;
|
|
} else if (str == "strict") {
|
|
*same_site = net::CookieSameSite::STRICT_MODE;
|
|
} else {
|
|
return "Failed to convert '" + str +
|
|
"' to an appropriate cookie same site value";
|
|
}
|
|
return "";
|
|
}
|
|
|
|
bool IsDeletion(net::CookieChangeCause cause) {
|
|
switch (cause) {
|
|
case net::CookieChangeCause::INSERTED:
|
|
case net::CookieChangeCause::INSERTED_NO_CHANGE_OVERWRITE:
|
|
case net::CookieChangeCause::INSERTED_NO_VALUE_CHANGE_OVERWRITE:
|
|
return false;
|
|
default:
|
|
return true;
|
|
}
|
|
}
|
|
|
|
} // namespace
|
|
|
|
gin::DeprecatedWrapperInfo Cookies::kWrapperInfo = {gin::kEmbedderNativeGin};
|
|
|
|
Cookies::Cookies(ElectronBrowserContext* browser_context)
|
|
: browser_context_{browser_context} {
|
|
cookie_change_subscription_ =
|
|
browser_context_->cookie_change_notifier()->RegisterCookieChangeCallback(
|
|
base::BindRepeating(&Cookies::OnCookieChanged,
|
|
base::Unretained(this)));
|
|
}
|
|
|
|
Cookies::~Cookies() = default;
|
|
|
|
v8::Local<v8::Promise> Cookies::Get(v8::Isolate* isolate,
|
|
const gin_helper::Dictionary& filter) {
|
|
gin_helper::Promise<net::CookieList> promise(isolate);
|
|
v8::Local<v8::Promise> handle = promise.GetHandle();
|
|
|
|
auto* storage_partition = browser_context_->GetDefaultStoragePartition();
|
|
auto* manager = storage_partition->GetCookieManagerForBrowserProcess();
|
|
|
|
base::DictValue dict;
|
|
gin::ConvertFromV8(isolate, filter.GetHandle(), &dict);
|
|
|
|
std::string url;
|
|
filter.Get("url", &url);
|
|
if (url.empty()) {
|
|
manager->GetAllCookies(
|
|
base::BindOnce(&FilterCookies, std::move(dict), std::move(promise)));
|
|
} else {
|
|
net::CookieOptions options;
|
|
options.set_include_httponly();
|
|
options.set_same_site_cookie_context(
|
|
net::CookieOptions::SameSiteCookieContext::MakeInclusive());
|
|
options.set_do_not_update_access_time();
|
|
|
|
manager->GetCookieList(GURL(url), options,
|
|
net::CookiePartitionKeyCollection::Todo(),
|
|
base::BindOnce(&FilterCookieWithStatuses,
|
|
std::move(dict), std::move(promise)));
|
|
}
|
|
|
|
return handle;
|
|
}
|
|
|
|
v8::Local<v8::Promise> Cookies::Remove(v8::Isolate* isolate,
|
|
const GURL& url,
|
|
const std::string& name) {
|
|
gin_helper::Promise<void> promise(isolate);
|
|
v8::Local<v8::Promise> handle = promise.GetHandle();
|
|
|
|
auto cookie_deletion_filter = network::mojom::CookieDeletionFilter::New();
|
|
cookie_deletion_filter->url = url;
|
|
cookie_deletion_filter->cookie_name = name;
|
|
|
|
auto* storage_partition = browser_context_->GetDefaultStoragePartition();
|
|
auto* manager = storage_partition->GetCookieManagerForBrowserProcess();
|
|
|
|
manager->DeleteCookies(
|
|
std::move(cookie_deletion_filter),
|
|
base::BindOnce(
|
|
[](gin_helper::Promise<void> promise, uint32_t num_deleted) {
|
|
gin_helper::Promise<void>::ResolvePromise(std::move(promise));
|
|
},
|
|
std::move(promise)));
|
|
|
|
return handle;
|
|
}
|
|
|
|
v8::Local<v8::Promise> Cookies::Set(v8::Isolate* isolate,
|
|
base::DictValue details) {
|
|
gin_helper::Promise<void> promise(isolate);
|
|
v8::Local<v8::Promise> handle = promise.GetHandle();
|
|
|
|
const std::string* url_string = details.FindString("url");
|
|
if (!url_string) {
|
|
promise.RejectWithErrorMessage("Missing required option 'url'");
|
|
return handle;
|
|
}
|
|
const std::string* name = details.FindString("name");
|
|
const std::string* value = details.FindString("value");
|
|
const std::string* domain = details.FindString("domain");
|
|
const std::string* path = details.FindString("path");
|
|
bool http_only = details.FindBool("httpOnly").value_or(false);
|
|
const std::string* same_site_string = details.FindString("sameSite");
|
|
net::CookieSameSite same_site;
|
|
std::string error = StringToCookieSameSite(same_site_string, &same_site);
|
|
if (!error.empty()) {
|
|
promise.RejectWithErrorMessage(error);
|
|
return handle;
|
|
}
|
|
bool secure = details.FindBool("secure").value_or(
|
|
same_site == net::CookieSameSite::NO_RESTRICTION);
|
|
|
|
GURL url(url_string ? *url_string : "");
|
|
if (!url.is_valid()) {
|
|
net::CookieInclusionStatus cookie_inclusion_status;
|
|
cookie_inclusion_status.AddExclusionReason(
|
|
net::CookieInclusionStatus::ExclusionReason::EXCLUDE_INVALID_DOMAIN);
|
|
promise.RejectWithErrorMessage(
|
|
InclusionStatusToString(cookie_inclusion_status));
|
|
return handle;
|
|
}
|
|
|
|
net::CookieInclusionStatus status;
|
|
auto canonical_cookie = net::CanonicalCookie::CreateSanitizedCookie(
|
|
url, name ? *name : "", value ? *value : "", domain ? *domain : "",
|
|
path ? *path : "", ParseTimeProperty(details.FindDouble("creationDate")),
|
|
ParseTimeProperty(details.FindDouble("expirationDate")),
|
|
ParseTimeProperty(details.FindDouble("lastAccessDate")), secure,
|
|
http_only, same_site, net::COOKIE_PRIORITY_DEFAULT, std::nullopt,
|
|
&status);
|
|
|
|
if (!canonical_cookie || !canonical_cookie->IsCanonical()) {
|
|
net::CookieInclusionStatus cookie_inclusion_status;
|
|
cookie_inclusion_status.AddExclusionReason(
|
|
net::CookieInclusionStatus::ExclusionReason::EXCLUDE_FAILURE_TO_STORE);
|
|
promise.RejectWithErrorMessage(InclusionStatusToString(
|
|
!status.IsInclude() ? status : cookie_inclusion_status));
|
|
return handle;
|
|
}
|
|
|
|
net::CookieOptions options;
|
|
if (http_only) {
|
|
options.set_include_httponly();
|
|
}
|
|
options.set_same_site_cookie_context(
|
|
net::CookieOptions::SameSiteCookieContext::MakeInclusive());
|
|
|
|
auto* storage_partition = browser_context_->GetDefaultStoragePartition();
|
|
auto* manager = storage_partition->GetCookieManagerForBrowserProcess();
|
|
manager->SetCanonicalCookie(
|
|
*canonical_cookie, url, options,
|
|
base::BindOnce(
|
|
[](gin_helper::Promise<void> promise, net::CookieAccessResult r) {
|
|
if (r.status.IsInclude()) {
|
|
promise.Resolve();
|
|
} else {
|
|
promise.RejectWithErrorMessage(InclusionStatusToString(r.status));
|
|
}
|
|
},
|
|
std::move(promise)));
|
|
|
|
return handle;
|
|
}
|
|
|
|
v8::Local<v8::Promise> Cookies::FlushStore(v8::Isolate* isolate) {
|
|
gin_helper::Promise<void> promise(isolate);
|
|
v8::Local<v8::Promise> handle = promise.GetHandle();
|
|
|
|
auto* storage_partition = browser_context_->GetDefaultStoragePartition();
|
|
auto* manager = storage_partition->GetCookieManagerForBrowserProcess();
|
|
|
|
manager->FlushCookieStore(base::BindOnce(
|
|
gin_helper::Promise<void>::ResolvePromise, std::move(promise)));
|
|
|
|
return handle;
|
|
}
|
|
|
|
void Cookies::OnCookieChanged(const net::CookieChangeInfo& change) {
|
|
v8::Isolate* isolate = JavascriptEnvironment::GetIsolate();
|
|
v8::HandleScope scope(isolate);
|
|
bool is_deletion = IsDeletion(change.cause);
|
|
Emit("changed", gin::ConvertToV8(isolate, change.cookie),
|
|
gin::ConvertToV8(isolate, change.cause),
|
|
gin::ConvertToV8(isolate, is_deletion));
|
|
}
|
|
|
|
// static
|
|
gin_helper::Handle<Cookies> Cookies::Create(
|
|
v8::Isolate* isolate,
|
|
ElectronBrowserContext* browser_context) {
|
|
return gin_helper::CreateHandle(isolate, new Cookies{browser_context});
|
|
}
|
|
|
|
gin::ObjectTemplateBuilder Cookies::GetObjectTemplateBuilder(
|
|
v8::Isolate* isolate) {
|
|
return gin_helper::EventEmitterMixin<Cookies>::GetObjectTemplateBuilder(
|
|
isolate)
|
|
.SetMethod("get", &Cookies::Get)
|
|
.SetMethod("remove", &Cookies::Remove)
|
|
.SetMethod("set", &Cookies::Set)
|
|
.SetMethod("flushStore", &Cookies::FlushStore);
|
|
}
|
|
|
|
const char* Cookies::GetTypeName() {
|
|
return "Cookies";
|
|
}
|
|
|
|
} // namespace electron::api
|