blob: 624d8bbb53407be7107031e167c451aea036eab4 [file] [log] [blame]
// Copyright (c) 2012 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef CONTENT_BROWSER_SSL_SSL_POLICY_H_
#define CONTENT_BROWSER_SSL_SSL_POLICY_H_
#include <string>
#include "base/macros.h"
#include "base/memory/ref_counted.h"
#include "content/public/common/resource_type.h"
#include "content/public/common/security_style.h"
#include "net/cert/cert_status_flags.h"
class GURL;
namespace content {
class NavigationEntryImpl;
class SSLCertErrorHandler;
class SSLPolicyBackend;
class SSLRequestInfo;
class WebContents;
struct SSLStatus;
// SSLPolicy
//
// This class is responsible for making the security decisions that concern the
// SSL trust indicators. It relies on the SSLPolicyBackend to actually enact
// the decisions it reaches.
//
class SSLPolicy {
public:
explicit SSLPolicy(SSLPolicyBackend* backend);
// An error occurred with the certificate in an SSL connection.
void OnCertError(SSLCertErrorHandler* handler);
void DidRunInsecureContent(NavigationEntryImpl* entry,
const GURL& security_origin);
// We have started a resource request with the given info.
void OnRequestStarted(SSLRequestInfo* info);
// Update the SSL information in |entry| to match the current state.
// |web_contents| is the WebContents associated with this entry.
void UpdateEntry(NavigationEntryImpl* entry, WebContents* web_contents);
SSLPolicyBackend* backend() const { return backend_; }
// Returns a security style describing an individual resource. Does
// not take into account any of the page- or host-level state such as
// mixed content or whether the host has run insecure content.
static SecurityStyle GetSecurityStyleForResource(const GURL& url,
int cert_id,
net::CertStatus cert_status);
private:
enum OnCertErrorInternalOptionsMask {
OVERRIDABLE = 1 << 0,
STRICT_ENFORCEMENT = 1 << 1,
EXPIRED_PREVIOUS_DECISION = 1 << 2
};
// Callback that the user chose to accept or deny the certificate.
void OnAllowCertificate(scoped_refptr<SSLCertErrorHandler> handler,
bool allow);
// Helper method for derived classes handling certificate errors.
//
// Options should be a bitmask combination of OnCertErrorInternalOptionsMask.
// OVERRIDABLE indicates whether or not the user could (assuming perfect
// knowledge) successfully override the error and still get the security
// guarantees of TLS. STRICT_ENFORCEMENT indicates whether or not the site the
// user is trying to connect to has requested strict enforcement of
// certificate validation (e.g. with HTTP Strict-Transport-Security).
// EXPIRED_PREVIOUS_DECISION indicates whether a user decision had been
// previously made but the decision has expired.
void OnCertErrorInternal(SSLCertErrorHandler* handler, int options_mask);
// If the security style of |entry| has not been initialized, then initialize
// it with the default style for its URL.
void InitializeEntryIfNeeded(NavigationEntryImpl* entry);
// Mark |origin| as having run insecure content in the process with ID |pid|.
void OriginRanInsecureContent(const std::string& origin, int pid);
// The backend we use to enact our decisions.
SSLPolicyBackend* backend_;
DISALLOW_COPY_AND_ASSIGN(SSLPolicy);
};
} // namespace content
#endif // CONTENT_BROWSER_SSL_SSL_POLICY_H_