blob: 04e8421cdbd62371c8cb27b46bf2e275b1243f16 [file] [log] [blame]
/*
* Copyright (C) 2011 Google Inc. All Rights Reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY GOOGLE, INC. ``AS IS'' AND ANY
* EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE COMPUTER, INC. OR
* CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
* EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
* PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
* PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
* OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*
*/
#include "core/dom/SecurityContext.h"
#include "core/frame/csp/ContentSecurityPolicy.h"
#include "platform/RuntimeEnabledFeatures.h"
#include "platform/weborigin/SecurityOrigin.h"
namespace blink {
SecurityContext::SecurityContext()
: m_sandboxFlags(SandboxNone),
m_addressSpace(WebAddressSpacePublic),
m_insecureRequestPolicy(kLeaveInsecureRequestsAlone) {}
SecurityContext::~SecurityContext() {}
DEFINE_TRACE(SecurityContext) {
visitor->trace(m_contentSecurityPolicy);
}
void SecurityContext::setSecurityOrigin(
PassRefPtr<SecurityOrigin> securityOrigin) {
m_securityOrigin = securityOrigin;
}
void SecurityContext::setContentSecurityPolicy(
ContentSecurityPolicy* contentSecurityPolicy) {
m_contentSecurityPolicy = contentSecurityPolicy;
}
void SecurityContext::enforceSandboxFlags(SandboxFlags mask) {
applySandboxFlags(mask);
}
void SecurityContext::applySandboxFlags(SandboxFlags mask) {
m_sandboxFlags |= mask;
if (isSandboxed(SandboxOrigin) && getSecurityOrigin() &&
!getSecurityOrigin()->isUnique()) {
setSecurityOrigin(SecurityOrigin::createUnique());
didUpdateSecurityOrigin();
}
}
String SecurityContext::addressSpaceForBindings() const {
switch (m_addressSpace) {
case WebAddressSpacePublic:
return "public";
case WebAddressSpacePrivate:
return "private";
case WebAddressSpaceLocal:
return "local";
}
NOTREACHED();
return "public";
}
// Enforces the given suborigin as part of the security origin for this
// security context. |name| must not be empty, although it may be null. A null
// name represents a lack of a suborigin.
// See: https://w3c.github.io/webappsec-suborigins/index.html
void SecurityContext::enforceSuborigin(const Suborigin& suborigin) {
if (!RuntimeEnabledFeatures::suboriginsEnabled())
return;
DCHECK(!suborigin.name().isEmpty());
DCHECK(RuntimeEnabledFeatures::suboriginsEnabled());
DCHECK(m_securityOrigin.get());
DCHECK(!m_securityOrigin->hasSuborigin() ||
m_securityOrigin->suborigin()->name() == suborigin.name());
m_securityOrigin->addSuborigin(suborigin);
didUpdateSecurityOrigin();
}
} // namespace blink