blob: 081bb52f2d0ba3f9ed26f70c205e9f204b0aeaaf [file] [log] [blame]
// Copyright 2018 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef SERVICES_NETWORK_COOKIE_SETTINGS_H_
#define SERVICES_NETWORK_COOKIE_SETTINGS_H_
#include <set>
#include <string>
#include <vector>
#include "base/component_export.h"
#include "base/feature_list.h"
#include "components/content_settings/core/common/content_settings.h"
#include "components/content_settings/core/common/cookie_settings_base.h"
#include "net/base/features.h"
#include "net/base/network_delegate.h"
#include "net/cookies/canonical_cookie.h"
#include "net/cookies/same_party_context.h"
#include "services/network/public/cpp/session_cookie_delete_predicate.h"
#include "third_party/abseil-cpp/absl/types/optional.h"
class GURL;
namespace net {
class SiteForCookies;
} // namespace net
namespace url {
class Origin;
} // namespace url
namespace network {
// Handles cookie access and deletion logic for the network service.
class COMPONENT_EXPORT(NETWORK_SERVICE) CookieSettings
: public content_settings::CookieSettingsBase {
public:
CookieSettings();
CookieSettings(const CookieSettings&) = delete;
CookieSettings& operator=(const CookieSettings&) = delete;
~CookieSettings() override;
void set_content_settings(const ContentSettingsForOneType& content_settings) {
content_settings_ = content_settings;
}
void set_block_third_party_cookies(bool block_third_party_cookies) {
block_third_party_cookies_ = block_third_party_cookies;
}
bool are_third_party_cookies_blocked() const {
return block_third_party_cookies_;
}
void set_secure_origin_cookies_allowed_schemes(
const std::vector<std::string>& secure_origin_cookies_allowed_schemes) {
secure_origin_cookies_allowed_schemes_.clear();
secure_origin_cookies_allowed_schemes_.insert(
secure_origin_cookies_allowed_schemes.begin(),
secure_origin_cookies_allowed_schemes.end());
}
void set_matching_scheme_cookies_allowed_schemes(
const std::vector<std::string>& matching_scheme_cookies_allowed_schemes) {
matching_scheme_cookies_allowed_schemes_.clear();
matching_scheme_cookies_allowed_schemes_.insert(
matching_scheme_cookies_allowed_schemes.begin(),
matching_scheme_cookies_allowed_schemes.end());
}
void set_third_party_cookies_allowed_schemes(
const std::vector<std::string>& third_party_cookies_allowed_schemes) {
third_party_cookies_allowed_schemes_.clear();
third_party_cookies_allowed_schemes_.insert(
third_party_cookies_allowed_schemes.begin(),
third_party_cookies_allowed_schemes.end());
}
void set_content_settings_for_legacy_cookie_access(
const ContentSettingsForOneType& settings) {
settings_for_legacy_cookie_access_ = settings;
}
void set_storage_access_grants(const ContentSettingsForOneType& settings) {
storage_access_grants_ = settings;
}
// Returns a predicate that takes the domain of a cookie and a bool whether
// the cookie is secure and returns true if the cookie should be deleted on
// exit.
DeleteCookiePredicate CreateDeleteCookieOnExitPredicate() const;
// content_settings::CookieSettingsBase:
ContentSetting GetSettingForLegacyCookieAccess(
const std::string& cookie_domain) const override;
bool ShouldIgnoreSameSiteRestrictions(
const GURL& url,
const net::SiteForCookies& site_for_cookies) const override;
// Returns kStateDisallowed iff the given |url| has to be requested over
// connection that is not tracked by the server. Usually is kStateAllowed,
// unless user privacy settings block cookies from being get or set.
// It may be set to kPartitionedStateAllowedOnly if the request allows
// partitioned state to be sent over the connection, but unpartitioned
// state should be blocked.
net::NetworkDelegate::PrivacySetting IsPrivacyModeEnabled(
const GURL& url,
const net::SiteForCookies& site_for_cookies,
const absl::optional<url::Origin>& top_frame_origin,
net::SamePartyContext::Type same_party_context_type) const;
// Returns true if the given cookie is accessible according to user
// cookie-blocking settings. Assumes that the cookie is otherwise accessible
// (i.e. that the cookie is otherwise valid with no other exclusion reasons).
bool IsCookieAccessible(
const net::CanonicalCookie& cookie,
const GURL& url,
const net::SiteForCookies& site_for_cookies,
const absl::optional<url::Origin>& top_frame_origin) const;
// Annotates `maybe_included_cookies` and `excluded_cookies` with
// ExclusionReasons if needed, per user's cookie blocking settings, and
// ensures that all excluded cookies from `maybe_included_cookies` are moved
// to `excluded_cookies`. Returns false if the CookieSettings blocks access
// to all cookies; true otherwise. Does not change the relative ordering of
// the cookies in `maybe_included_cookies`, since this order is important when
// building the cookie line.
bool AnnotateAndMoveUserBlockedCookies(
const GURL& url,
const net::SiteForCookies& site_for_cookies,
const url::Origin* top_frame_origin,
net::CookieAccessResultList& maybe_included_cookies,
net::CookieAccessResultList& excluded_cookies) const;
private:
// Returns whether third-party cookie blocking should be bypassed (i.e. always
// allow the cookie regardless of cookie content settings and third-party
// cookie blocking settings.
// This just checks the scheme of the |url| and |site_for_cookies|:
// - Allow cookies if the |site_for_cookies| is a chrome:// scheme URL, and
// the |url| has a secure scheme.
// - Allow cookies if the |site_for_cookies| and the |url| match in scheme
// and both have the Chrome extensions scheme.
bool ShouldAlwaysAllowCookies(const GURL& url,
const GURL& first_party_url) const;
// content_settings::CookieSettingsBase:
ContentSetting GetCookieSettingInternal(
const GURL& url,
const GURL& first_party_url,
bool is_third_party_request,
content_settings::SettingSource* source) const override;
// An enum that represents the result of applying the user's
// third-party-cookie-blocking setting in a given context.
enum class ThirdPartyBlockingOutcome {
// Access is not blocked due to the third-party-cookie-blocking setting,
// either because there's a more specific reason to block access, or because
// the context isn't "third-party", or because the access isn't blocked at
// all.
kIrrelevant = 1,
// Access to all cookies (partitioned or unpartitioned) is blocked in this
// context.
kAllStateDisallowed,
// Access to unpartitioned cookies is blocked in this context, but access to
// partitioned cookies is allowed.
kPartitionedStateAllowed,
};
struct CookieSettingWithMetadata {
ContentSetting cookie_setting;
// Only relevant if access to the cookie is blocked for some reason (i.e. if
// `IsAllow(cookie_setting)` is false).
ThirdPartyBlockingOutcome third_party_blocking_outcome;
};
// Determines whether cookie access should be blocked due to the
// third-party-cookie-blocking setting and any relevant Storage Access
// permission grants. Does not distinguish between access to unpartitioned
// state and access to partitioned state.
bool BlockDueToThirdPartyCookieBlockingSetting(
bool is_third_party_request,
const GURL& url,
const GURL& first_party_url,
ContentSetting cookie_setting) const;
// Determines the scope of third-party-cookie-blocking, i.e. whether it
// applies to all cookies or just unpartitioned cookies. Assumes that
// BlockDueToThirdpartyCookieBlockingSetting has been called and returned
// true.
ThirdPartyBlockingOutcome GetThirdPartyBlockingScope(
const GURL& first_party_url) const;
// Returns the cookie setting for the given request, along with metadata
// associated with the lookup. Namely, whether the setting is due to
// third-party cookie blocking settings or not.
CookieSettingWithMetadata GetCookieSettingWithMetadata(
const GURL& url,
const GURL& first_party_url,
bool is_third_party_request) const;
// An overload of the above, which determines `first_party_url` and
// `is_third_party_request` appropriately.
CookieSettingWithMetadata GetCookieSettingWithMetadata(
const GURL& url,
const net::SiteForCookies& site_for_cookies,
const url::Origin* top_frame_origin) const;
// Returns whether the given cookie should be allowed to be sent, according to
// the user's settings. Assumes that the `cookie.access_result` has been
// correctly filled in by the cookie store. Note that the cookie may be
// "excluded" for other reasons, even if this method returns true.
bool IsCookieAllowed(
const CookieSettings::CookieSettingWithMetadata& setting_with_metadata,
const net::CookieWithAccessResult& cookie) const;
// Returns true iff a cookie with the given `is_same_party` property should be
// accessible in a context with the given
// `third_party_blocking_outcome`. Records metrics iff `record_metrics`
// is true.
bool IsAllowedSamePartyCookie(
bool is_same_party,
ThirdPartyBlockingOutcome third_party_blocking_outcome,
bool record_metrics) const;
// Returns true iff a cookie with the given `is_partitioned` property should
// be accessible in a context with the given
// `third_party_blocking_outcome`.
static bool IsAllowedPartitionedCookie(
bool is_partitioned,
ThirdPartyBlockingOutcome third_party_blocking_outcome);
// Returns whether *some* cookie would be allowed to be sent in this context,
// according to the user's settings. Note that cookies may still be "excluded"
// for other reasons, even if this method returns true.
//
// `is_same_party` should reflect whether the context is same-party *and*
// whether the (real or hypothetical) cookie is SameParty.
//
// `record_metrics` indicates whether metrics should be recorded for this
// call. I.e., whether we are checking access to a real cookie, or a
// hypothetical one.
bool IsHypotheticalCookieAllowed(
const CookieSettings::CookieSettingWithMetadata& setting_with_metadata,
bool is_same_party,
bool is_partitioned,
bool record_metrics) const;
// Returns true if at least one content settings is session only.
bool HasSessionOnlyOrigins() const;
ContentSettingsForOneType content_settings_;
bool block_third_party_cookies_ = false;
std::set<std::string> secure_origin_cookies_allowed_schemes_;
std::set<std::string> matching_scheme_cookies_allowed_schemes_;
std::set<std::string> third_party_cookies_allowed_schemes_;
ContentSettingsForOneType settings_for_legacy_cookie_access_;
// Used to represent storage access grants provided by the StorageAccessAPI.
// Will only be populated when the StorageAccessAPI feature is enabled
// https://crbug.com/989663.
ContentSettingsForOneType storage_access_grants_;
const bool sameparty_cookies_considered_first_party_ =
base::FeatureList::IsEnabled(
net::features::kSamePartyCookiesConsideredFirstParty);
};
} // namespace network
#endif // SERVICES_NETWORK_COOKIE_SETTINGS_H_