ContentSecurityPolicySource.cpp [plain text]
#include "config.h"
#include "ContentSecurityPolicySource.h"
#include "ContentSecurityPolicy.h"
#include "SecurityOriginData.h"
#include "URL.h"
namespace WebCore {
ContentSecurityPolicySource::ContentSecurityPolicySource(const ContentSecurityPolicy& policy, const String& scheme, const String& host, std::optional<uint16_t> port, const String& path, bool hostHasWildcard, bool portHasWildcard)
: m_policy(policy)
, m_scheme(scheme)
, m_host(host)
, m_path(path)
, m_port(port)
, m_hostHasWildcard(hostHasWildcard)
, m_portHasWildcard(portHasWildcard)
{
}
bool ContentSecurityPolicySource::matches(const URL& url, bool didReceiveRedirectResponse) const
{
if (!schemeMatches(url))
return false;
if (isSchemeOnly())
return true;
return hostMatches(url) && portMatches(url) && (didReceiveRedirectResponse || pathMatches(url));
}
bool ContentSecurityPolicySource::schemeMatches(const URL& url) const
{
if (m_scheme.isEmpty())
return m_policy.protocolMatchesSelf(url);
if (equalLettersIgnoringASCIICase(m_scheme, "http"))
return url.protocolIsInHTTPFamily();
return equalIgnoringASCIICase(url.protocol(), m_scheme);
}
static bool wildcardMatches(StringView host, const String& hostWithWildcard)
{
auto hostLength = host.length();
auto hostWithWildcardLength = hostWithWildcard.length();
return host.endsWithIgnoringASCIICase(hostWithWildcard)
&& hostLength > hostWithWildcardLength
&& host[hostLength - hostWithWildcardLength - 1] == '.';
}
bool ContentSecurityPolicySource::hostMatches(const URL& url) const
{
auto host = url.host();
return equalIgnoringASCIICase(host, m_host) || (m_hostHasWildcard && wildcardMatches(host, m_host));
}
bool ContentSecurityPolicySource::pathMatches(const URL& url) const
{
if (m_path.isEmpty())
return true;
String path = decodeURLEscapeSequences(url.path());
if (m_path.endsWith("/"))
return path.startsWith(m_path);
return path == m_path;
}
bool ContentSecurityPolicySource::portMatches(const URL& url) const
{
if (m_portHasWildcard)
return true;
std::optional<uint16_t> port = url.port();
if (port == m_port)
return true;
if ((m_port && isDefaultPortForProtocol(m_port.value(), "http")) && ((!port && url.protocolIs("https")) || (port && isDefaultPortForProtocol(port.value(), "https"))))
return true;
if (!port)
return isDefaultPortForProtocol(m_port.value(), url.protocol());
if (!m_port)
return isDefaultPortForProtocol(port.value(), url.protocol());
return false;
}
bool ContentSecurityPolicySource::isSchemeOnly() const
{
return m_host.isEmpty();
}
ContentSecurityPolicySource::operator SecurityOriginData() const
{
return { m_scheme, m_host, m_port };
}
}