| // Copyright 2014 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #ifndef CONTENT_COMMON_SERVICE_WORKER_SERVICE_WORKER_UTILS_H_ |
| #define CONTENT_COMMON_SERVICE_WORKER_SERVICE_WORKER_UTILS_H_ |
| |
| #include "base/command_line.h" |
| #include "base/macros.h" |
| #include "content/common/content_export.h" |
| #include "content/common/service_worker/service_worker_status_code.h" |
| #include "content/common/service_worker/service_worker_types.h" |
| #include "content/public/common/content_switches.h" |
| #include "content/public/common/resource_type.h" |
| #include "url/gurl.h" |
| |
| namespace content { |
| |
| class ServiceWorkerUtils { |
| public: |
| static bool IsMainResourceType(ResourceType type) { |
| return IsResourceTypeFrame(type) || type == RESOURCE_TYPE_SHARED_WORKER; |
| } |
| |
| // A helper for creating a do-nothing status callback. |
| static void NoOpStatusCallback(ServiceWorkerStatusCode status) {} |
| |
| // Returns true if |scope| matches |url|. |
| CONTENT_EXPORT static bool ScopeMatches(const GURL& scope, const GURL& url); |
| |
| // Returns true if the script at |script_url| is allowed to control |scope| |
| // according to Service Worker's path restriction policy. If |
| // |service_worker_allowed| is not null, it points to the |
| // Service-Worker-Allowed header value. |
| CONTENT_EXPORT static bool IsPathRestrictionSatisfied( |
| const GURL& scope, |
| const GURL& script_url, |
| const std::string* service_worker_allowed_header_value, |
| std::string* error_message); |
| |
| static bool ContainsDisallowedCharacter(const GURL& scope, |
| const GURL& script_url, |
| std::string* error_message); |
| |
| static bool CanRegisterServiceWorker(const GURL& context_url, |
| const GURL& pattern, |
| const GURL& script_url); |
| |
| // Returns true when '--disable-web-security' flag is set. Otherwise returns |
| // whether the all origins of |urls| are same as the origin of |url|. |
| template <typename... Args> |
| static bool PassOriginEqualitySecurityCheck(const GURL& url, |
| const Args&... urls) { |
| if (base::CommandLine::ForCurrentProcess()->HasSwitch( |
| switches::kDisableWebSecurity)) |
| return true; |
| for (const GURL& u : {urls...}) { |
| if (url.GetOrigin() != u.GetOrigin()) |
| return false; |
| } |
| return true; |
| } |
| |
| // PlzNavigate |
| // Returns true if the |provider_id| was assigned by the browser process. |
| static bool IsBrowserAssignedProviderId(int provider_id) { |
| return provider_id < kInvalidServiceWorkerProviderId; |
| } |
| }; |
| |
| class CONTENT_EXPORT LongestScopeMatcher { |
| public: |
| explicit LongestScopeMatcher(const GURL& url) : url_(url) {} |
| virtual ~LongestScopeMatcher() {} |
| |
| // Returns true if |scope| matches |url_| longer than |match_|. |
| bool MatchLongest(const GURL& scope); |
| |
| private: |
| const GURL url_; |
| GURL match_; |
| |
| DISALLOW_COPY_AND_ASSIGN(LongestScopeMatcher); |
| }; |
| |
| } // namespace content |
| |
| #endif // CONTENT_COMMON_SERVICE_WORKER_SERVICE_WORKER_UTILS_H_ |