blob: 4ea403a3203ad5646f4ea1888f5b0271b91f33fe [file] [log] [blame]
// Copyright 2014 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef CONTENT_COMMON_SERVICE_WORKER_SERVICE_WORKER_UTILS_H_
#define CONTENT_COMMON_SERVICE_WORKER_SERVICE_WORKER_UTILS_H_
#include "base/command_line.h"
#include "base/macros.h"
#include "content/common/content_export.h"
#include "content/common/service_worker/service_worker_status_code.h"
#include "content/common/service_worker/service_worker_types.h"
#include "content/public/common/content_switches.h"
#include "content/public/common/resource_type.h"
#include "url/gurl.h"
namespace content {
class ServiceWorkerUtils {
public:
static bool IsMainResourceType(ResourceType type) {
return IsResourceTypeFrame(type) || type == RESOURCE_TYPE_SHARED_WORKER;
}
// A helper for creating a do-nothing status callback.
static void NoOpStatusCallback(ServiceWorkerStatusCode status) {}
// Returns true if |scope| matches |url|.
CONTENT_EXPORT static bool ScopeMatches(const GURL& scope, const GURL& url);
// Returns true if the script at |script_url| is allowed to control |scope|
// according to Service Worker's path restriction policy. If
// |service_worker_allowed| is not null, it points to the
// Service-Worker-Allowed header value.
CONTENT_EXPORT static bool IsPathRestrictionSatisfied(
const GURL& scope,
const GURL& script_url,
const std::string* service_worker_allowed_header_value,
std::string* error_message);
static bool ContainsDisallowedCharacter(const GURL& scope,
const GURL& script_url,
std::string* error_message);
static bool CanRegisterServiceWorker(const GURL& context_url,
const GURL& pattern,
const GURL& script_url);
// Returns true when '--disable-web-security' flag is set. Otherwise returns
// whether the all origins of |urls| are same as the origin of |url|.
template <typename... Args>
static bool PassOriginEqualitySecurityCheck(const GURL& url,
const Args&... urls) {
if (base::CommandLine::ForCurrentProcess()->HasSwitch(
switches::kDisableWebSecurity))
return true;
for (const GURL& u : {urls...}) {
if (url.GetOrigin() != u.GetOrigin())
return false;
}
return true;
}
// PlzNavigate
// Returns true if the |provider_id| was assigned by the browser process.
static bool IsBrowserAssignedProviderId(int provider_id) {
return provider_id < kInvalidServiceWorkerProviderId;
}
};
class CONTENT_EXPORT LongestScopeMatcher {
public:
explicit LongestScopeMatcher(const GURL& url) : url_(url) {}
virtual ~LongestScopeMatcher() {}
// Returns true if |scope| matches |url_| longer than |match_|.
bool MatchLongest(const GURL& scope);
private:
const GURL url_;
GURL match_;
DISALLOW_COPY_AND_ASSIGN(LongestScopeMatcher);
};
} // namespace content
#endif // CONTENT_COMMON_SERVICE_WORKER_SERVICE_WORKER_UTILS_H_