blob: 3bfd394af0977200832a86209db1a85c70dadb0c [file] [log] [blame]
// Copyright 2019 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef NET_COOKIES_COOKIE_ACCESS_DELEGATE_H_
#define NET_COOKIES_COOKIE_ACCESS_DELEGATE_H_
#include "net/base/net_export.h"
#include "net/cookies/canonical_cookie.h"
#include "net/cookies/cookie_constants.h"
#include "url/gurl.h"
namespace net {
class SchemefulSite;
class SiteForCookies;
class NET_EXPORT CookieAccessDelegate {
public:
CookieAccessDelegate();
virtual ~CookieAccessDelegate();
// Returns true if the passed in |url| should be permitted to access secure
// cookies in addition to URLs that normally do so. Returning false from this
// method on a URL that would already be treated as secure by default, e.g. an
// https:// one has no effect.
virtual bool ShouldTreatUrlAsTrustworthy(const GURL& url) const;
// Gets the access semantics to apply to |cookie|, based on its domain (i.e.,
// whether a policy specifies that legacy access semantics should apply).
virtual CookieAccessSemantics GetAccessSemantics(
const CanonicalCookie& cookie) const = 0;
// Returns whether a cookie should be attached regardless of its SameSite
// value vs the request context.
virtual bool ShouldIgnoreSameSiteRestrictions(
const GURL& url,
const SiteForCookies& site_for_cookies) const = 0;
// Returns whether `site` is same-party with `party_context` and
// `top_frame_site`.
virtual bool IsContextSamePartyWithSite(
const net::SchemefulSite& site,
const net::SchemefulSite& top_frame_site,
const std::set<net::SchemefulSite>& party_context) const = 0;
// Returns whether `site` belongs to a non-singleton First-Party Set.
virtual bool IsInNontrivialFirstPartySet(
const net::SchemefulSite& site) const = 0;
private:
DISALLOW_COPY_AND_ASSIGN(CookieAccessDelegate);
};
} // namespace net
#endif // NET_COOKIES_COOKIE_ACCESS_DELEGATE_H_