blob: c15a4edb2782dfc3f696b6e0fa95ea7bb0375806 [file] [log] [blame]
/*
* Copyright (C) 2011 Google Inc. All Rights Reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY GOOGLE, INC. ``AS IS'' AND ANY
* EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE COMPUTER, INC. OR
* CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
* EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
* PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
* PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
* OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*
*/
#ifndef SecurityContext_h
#define SecurityContext_h
#include "core/CoreExport.h"
#include "core/dom/SandboxFlags.h"
#include "platform/heap/Handle.h"
#include "wtf/HashSet.h"
#include "wtf/Noncopyable.h"
#include "wtf/PassRefPtr.h"
#include "wtf/RefPtr.h"
#include "wtf/text/StringHash.h"
#include "wtf/text/WTFString.h"
namespace blink {
class SecurityOrigin;
class ContentSecurityPolicy;
class KURL;
class CORE_EXPORT SecurityContext : public WillBeGarbageCollectedMixin {
WTF_MAKE_NONCOPYABLE(SecurityContext);
public:
DECLARE_VIRTUAL_TRACE();
using InsecureNavigationsSet = HashSet<unsigned, WTF::AlreadyHashed>;
// The ordering here is important: 'Upgrade' overrides 'DoNotUpgrade'.
enum InsecureRequestsPolicy {
InsecureRequestsDoNotUpgrade = 0,
InsecureRequestsUpgrade
};
SecurityOrigin* securityOrigin() const { return m_securityOrigin.get(); }
ContentSecurityPolicy* contentSecurityPolicy() const { return m_contentSecurityPolicy.get(); }
bool isSecureTransitionTo(const KURL&) const;
// Explicitly override the security origin for this security context.
// Note: It is dangerous to change the security origin of a script context
// that already contains content.
void setSecurityOrigin(PassRefPtr<SecurityOrigin>);
virtual void didUpdateSecurityOrigin() = 0;
SandboxFlags sandboxFlags() const { return m_sandboxFlags; }
bool isSandboxed(SandboxFlags mask) const { return m_sandboxFlags & mask; }
void enforceSandboxFlags(SandboxFlags mask);
void setHostedInReservedIPRange() { m_hostedInReservedIPRange = true; }
bool isHostedInReservedIPRange() const { return m_hostedInReservedIPRange; }
void setInsecureRequestsPolicy(InsecureRequestsPolicy policy) { m_insecureRequestsPolicy = policy; }
InsecureRequestsPolicy insecureRequestsPolicy() const { return m_insecureRequestsPolicy; }
void addInsecureNavigationUpgrade(unsigned hashedHost) { m_insecureNavigationsToUpgrade.add(hashedHost); }
InsecureNavigationsSet* insecureNavigationsToUpgrade() { return &m_insecureNavigationsToUpgrade; }
void setShouldEnforceStrictMixedContentChecking(bool shouldEnforce) { m_enforceStrictMixedContentChecking = shouldEnforce; }
bool shouldEnforceStrictMixedContentChecking() { return m_enforceStrictMixedContentChecking; }
protected:
SecurityContext();
virtual ~SecurityContext();
void setContentSecurityPolicy(PassRefPtrWillBeRawPtr<ContentSecurityPolicy>);
void didFailToInitializeSecurityOrigin() { m_haveInitializedSecurityOrigin = false; }
bool haveInitializedSecurityOrigin() const { return m_haveInitializedSecurityOrigin; }
private:
bool m_haveInitializedSecurityOrigin;
RefPtr<SecurityOrigin> m_securityOrigin;
RefPtrWillBeMember<ContentSecurityPolicy> m_contentSecurityPolicy;
SandboxFlags m_sandboxFlags;
bool m_hostedInReservedIPRange;
InsecureRequestsPolicy m_insecureRequestsPolicy;
InsecureNavigationsSet m_insecureNavigationsToUpgrade;
bool m_enforceStrictMixedContentChecking;
};
} // namespace blink
#endif // SecurityContext_h