SecurityPolicy.cpp [plain text]
#include "config.h"
#include "SecurityPolicy.h"
#include "OriginAccessEntry.h"
#include "SecurityOrigin.h"
#include <memory>
#include <wtf/HashMap.h>
#include <wtf/MainThread.h>
#include <wtf/NeverDestroyed.h>
#include <wtf/URL.h>
#include <wtf/text/StringHash.h>
namespace WebCore {
static SecurityPolicy::LocalLoadPolicy localLoadPolicy = SecurityPolicy::AllowLocalLoadsForLocalOnly;
typedef Vector<OriginAccessEntry> OriginAccessWhiteList;
typedef HashMap<String, std::unique_ptr<OriginAccessWhiteList>> OriginAccessMap;
static Lock originAccessMapLock;
static OriginAccessMap& originAccessMap()
{
ASSERT(originAccessMapLock.isHeld());
static NeverDestroyed<OriginAccessMap> originAccessMap;
return originAccessMap;
}
bool SecurityPolicy::shouldHideReferrer(const URL& url, const String& referrer)
{
bool referrerIsSecureURL = protocolIs(referrer, "https");
bool referrerIsWebURL = referrerIsSecureURL || protocolIs(referrer, "http");
if (!referrerIsWebURL)
return true;
if (!referrerIsSecureURL)
return false;
bool URLIsSecureURL = url.protocolIs("https");
return !URLIsSecureURL;
}
String SecurityPolicy::referrerToOriginString(const String& referrer)
{
String originString = SecurityOrigin::createFromString(referrer)->toString();
if (originString == "null")
return String();
return originString + "/";
}
String SecurityPolicy::generateReferrerHeader(ReferrerPolicy referrerPolicy, const URL& url, const String& referrer)
{
ASSERT(referrer == URL(URL(), referrer).strippedForUseAsReferrer());
if (referrer.isEmpty())
return String();
if (!protocolIsInHTTPFamily(referrer))
return String();
switch (referrerPolicy) {
case ReferrerPolicy::EmptyString:
ASSERT_NOT_REACHED();
break;
case ReferrerPolicy::NoReferrer:
return String();
case ReferrerPolicy::NoReferrerWhenDowngrade:
break;
case ReferrerPolicy::SameOrigin: {
auto origin = SecurityOrigin::createFromString(referrer);
if (!origin->canRequest(url))
return String();
break;
}
case ReferrerPolicy::Origin:
return referrerToOriginString(referrer);
case ReferrerPolicy::StrictOrigin:
if (shouldHideReferrer(url, referrer))
return String();
return referrerToOriginString(referrer);
case ReferrerPolicy::OriginWhenCrossOrigin: {
auto origin = SecurityOrigin::createFromString(referrer);
if (!origin->canRequest(url))
return referrerToOriginString(referrer);
break;
}
case ReferrerPolicy::StrictOriginWhenCrossOrigin: {
auto origin = SecurityOrigin::createFromString(referrer);
if (!origin->canRequest(url)) {
if (shouldHideReferrer(url, referrer))
return String();
return referrerToOriginString(referrer);
}
break;
}
case ReferrerPolicy::UnsafeUrl:
return referrer;
}
return shouldHideReferrer(url, referrer) ? String() : referrer;
}
bool SecurityPolicy::shouldInheritSecurityOriginFromOwner(const URL& url)
{
return url.isEmpty() || equalIgnoringASCIICase(url.string(), WTF::blankURL()) || equalLettersIgnoringASCIICase(url.string(), "about:srcdoc");
}
void SecurityPolicy::setLocalLoadPolicy(LocalLoadPolicy policy)
{
localLoadPolicy = policy;
}
bool SecurityPolicy::restrictAccessToLocal()
{
return localLoadPolicy != SecurityPolicy::AllowLocalLoadsForAll;
}
bool SecurityPolicy::allowSubstituteDataAccessToLocal()
{
return localLoadPolicy != SecurityPolicy::AllowLocalLoadsForLocalOnly;
}
bool SecurityPolicy::isAccessWhiteListed(const SecurityOrigin* activeOrigin, const SecurityOrigin* targetOrigin)
{
Locker<Lock> locker(originAccessMapLock);
if (OriginAccessWhiteList* list = originAccessMap().get(activeOrigin->toString())) {
for (auto& entry : *list) {
if (entry.matchesOrigin(*targetOrigin))
return true;
}
}
return false;
}
bool SecurityPolicy::isAccessToURLWhiteListed(const SecurityOrigin* activeOrigin, const URL& url)
{
Ref<SecurityOrigin> targetOrigin(SecurityOrigin::create(url));
return isAccessWhiteListed(activeOrigin, &targetOrigin.get());
}
void SecurityPolicy::addOriginAccessWhitelistEntry(const SecurityOrigin& sourceOrigin, const String& destinationProtocol, const String& destinationDomain, bool allowDestinationSubdomains)
{
ASSERT(!sourceOrigin.isUnique());
if (sourceOrigin.isUnique())
return;
String sourceString = sourceOrigin.toString();
Locker<Lock> locker(originAccessMapLock);
OriginAccessMap::AddResult result = originAccessMap().add(sourceString, nullptr);
if (result.isNewEntry)
result.iterator->value = std::make_unique<OriginAccessWhiteList>();
OriginAccessWhiteList* list = result.iterator->value.get();
list->append(OriginAccessEntry(destinationProtocol, destinationDomain, allowDestinationSubdomains ? OriginAccessEntry::AllowSubdomains : OriginAccessEntry::DisallowSubdomains, OriginAccessEntry::TreatIPAddressAsIPAddress));
}
void SecurityPolicy::removeOriginAccessWhitelistEntry(const SecurityOrigin& sourceOrigin, const String& destinationProtocol, const String& destinationDomain, bool allowDestinationSubdomains)
{
ASSERT(!sourceOrigin.isUnique());
if (sourceOrigin.isUnique())
return;
String sourceString = sourceOrigin.toString();
Locker<Lock> locker(originAccessMapLock);
OriginAccessMap& map = originAccessMap();
OriginAccessMap::iterator it = map.find(sourceString);
if (it == map.end())
return;
OriginAccessWhiteList& list = *it->value;
OriginAccessEntry originAccessEntry(destinationProtocol, destinationDomain, allowDestinationSubdomains ? OriginAccessEntry::AllowSubdomains : OriginAccessEntry::DisallowSubdomains, OriginAccessEntry::TreatIPAddressAsIPAddress);
if (!list.removeFirst(originAccessEntry))
return;
if (list.isEmpty())
map.remove(it);
}
void SecurityPolicy::resetOriginAccessWhitelists()
{
Locker<Lock> locker(originAccessMapLock);
originAccessMap().clear();
}
}