Adaptation of the original PdfViewer app to work as a library (fork of https://github.com/GrapheneOS/PdfViewer)
Go to file
octocorvus 124e48c6c8 fix PDF date parsing issue causing crash
The issue is due to optional time zone offset 'mm' field followed by
apostrophe being absent, but the parser expecting an extra apostrophe
after the time zone 'HH' field apostrophe anyway, causing it go past the
end of the date string.

Fix the issue by only checking for apostrophe if 'mm' field is present.
2024-05-07 23:56:19 -04:00
.github switch to new gradle wrapper validation GitHub action 2024-04-12 18:37:54 -04:00
app fix PDF date parsing issue causing crash 2024-05-07 23:56:19 -04:00
gradle update Kotlin to 1.9.24 2024-05-07 12:53:56 -04:00
viewer bugfix: add missing CSS for hiddenCanvasElement 2024-05-07 15:27:09 -04:00
.gitignore viewer: use esbuild to bundle pdf viewer and worker 2023-09-16 04:20:38 -04:00
build.gradle.kts update Kotlin to 1.9.24 2024-05-07 12:53:56 -04:00
eslint.config.js exclude top-level build directory from eslint checks 2024-05-07 23:56:19 -04:00
gradle.properties update Android Gradle Plugin to 8.0.0 2023-04-14 08:37:42 -04:00
gradlew update Gradle to 8.4 2023-11-12 17:51:46 -05:00
gradlew.bat update Gradle to 8.6 2024-02-11 10:59:50 -05:00
LICENSE update copyright notice 2024-02-15 02:58:53 -05:00
package-lock.json Bump esbuild from 0.20.2 to 0.21.1 2024-05-07 18:02:23 -04:00
package.json Bump esbuild from 0.20.2 to 0.21.1 2024-05-07 18:02:23 -04:00
PDFJS_LICENSE initial commit with overhauled / rebranded project 2019-06-27 23:22:08 -04:00
process_static.js viewer: use esbuild to bundle pdf viewer and worker 2023-09-16 04:20:38 -04:00
README.md add README based on release notes 2020-05-27 19:11:43 -04:00
settings.gradle.kts Update Gradle build scripts 2023-05-03 12:58:19 -04:00

Simple Android PDF viewer based on pdf.js and content providers. The app doesn't require any permissions. The PDF stream is fed into the sandboxed WebView without giving it access to content or files. Content-Security-Policy is used to enforce that the JavaScript and styling properties within the WebView are entirely static content from the apk assets. It reuses the hardened Chromium rendering stack while only exposing a tiny subset of the attack surface compared to actual web content. The PDF rendering code itself is memory safe with dynamic code evaluation disabled, and even if an attacker did gain code execution by exploiting the underlying web rendering engine, they're within the Chromium renderer sandbox with no access to the network (unlike a browser), files, or other content.