SecurityContext.cpp [plain text]
#include "config.h"
#include "SecurityContext.h"
#include "ContentSecurityPolicy.h"
#include "HTMLParserIdioms.h"
#include "SecurityOrigin.h"
#include "SecurityOriginPolicy.h"
#include <wtf/NeverDestroyed.h>
#include <wtf/text/StringBuilder.h>
namespace WebCore {
SecurityContext::SecurityContext()
: m_haveInitializedSecurityOrigin(false)
, m_sandboxFlags(SandboxNone)
{
}
SecurityContext::~SecurityContext()
{
}
void SecurityContext::setSecurityOriginPolicy(RefPtr<SecurityOriginPolicy>&& securityOriginPolicy)
{
m_securityOriginPolicy = WTFMove(securityOriginPolicy);
m_haveInitializedSecurityOrigin = true;
}
SecurityOrigin* SecurityContext::securityOrigin() const
{
if (!m_securityOriginPolicy)
return nullptr;
return &m_securityOriginPolicy->origin();
}
void SecurityContext::setContentSecurityPolicy(std::unique_ptr<ContentSecurityPolicy> contentSecurityPolicy)
{
m_contentSecurityPolicy = WTFMove(contentSecurityPolicy);
}
bool SecurityContext::isSecureTransitionTo(const URL& url) const
{
if (!haveInitializedSecurityOrigin())
return true;
return securityOriginPolicy()->origin().canAccess(SecurityOrigin::create(url).ptr());
}
void SecurityContext::enforceSandboxFlags(SandboxFlags mask)
{
m_sandboxFlags |= mask;
if (isSandboxed(SandboxOrigin) && securityOriginPolicy() && !securityOriginPolicy()->origin().isUnique())
setSecurityOriginPolicy(SecurityOriginPolicy::create(SecurityOrigin::createUnique()));
}
bool SecurityContext::isSupportedSandboxPolicy(StringView policy)
{
static const char* const supportedPolicies[] = {
"allow-forms", "allow-same-origin", "allow-scripts", "allow-top-navigation", "allow-pointer-lock", "allow-popups"
};
for (auto* supportedPolicy : supportedPolicies) {
if (equalIgnoringASCIICase(policy, supportedPolicy))
return true;
}
return false;
}
SandboxFlags SecurityContext::parseSandboxPolicy(const String& policy, String& invalidTokensErrorMessage)
{
SandboxFlags flags = SandboxAll;
unsigned length = policy.length();
unsigned start = 0;
unsigned numberOfTokenErrors = 0;
StringBuilder tokenErrors;
while (true) {
while (start < length && isHTMLSpace(policy[start]))
++start;
if (start >= length)
break;
unsigned end = start + 1;
while (end < length && !isHTMLSpace(policy[end]))
++end;
String sandboxToken = policy.substring(start, end - start);
if (equalLettersIgnoringASCIICase(sandboxToken, "allow-same-origin"))
flags &= ~SandboxOrigin;
else if (equalLettersIgnoringASCIICase(sandboxToken, "allow-forms"))
flags &= ~SandboxForms;
else if (equalLettersIgnoringASCIICase(sandboxToken, "allow-scripts")) {
flags &= ~SandboxScripts;
flags &= ~SandboxAutomaticFeatures;
} else if (equalLettersIgnoringASCIICase(sandboxToken, "allow-top-navigation"))
flags &= ~SandboxTopNavigation;
else if (equalLettersIgnoringASCIICase(sandboxToken, "allow-popups"))
flags &= ~SandboxPopups;
else if (equalLettersIgnoringASCIICase(sandboxToken, "allow-pointer-lock"))
flags &= ~SandboxPointerLock;
else {
if (numberOfTokenErrors)
tokenErrors.appendLiteral(", '");
else
tokenErrors.append('\'');
tokenErrors.append(sandboxToken);
tokenErrors.append('\'');
numberOfTokenErrors++;
}
start = end + 1;
}
if (numberOfTokenErrors) {
if (numberOfTokenErrors > 1)
tokenErrors.appendLiteral(" are invalid sandbox flags.");
else
tokenErrors.appendLiteral(" is an invalid sandbox flag.");
invalidTokensErrorMessage = tokenErrors.toString();
}
return flags;
}
}