WebsiteDataRecord.cpp [plain text]
#include "config.h"
#include "WebsiteDataRecord.h"
#include <WebCore/LocalizedStrings.h>
#include <WebCore/PublicSuffix.h>
#include <WebCore/SecurityOrigin.h>
#if PLATFORM(COCOA)
#import <WebCore/CFNetworkSPI.h>
#endif
static String displayNameForLocalFiles()
{
return WEB_UI_STRING("Local documents on your computer", "'Website' name displayed when local documents have stored local data");
}
namespace WebKit {
String WebsiteDataRecord::displayNameForCookieHostName(const String& hostName)
{
#if PLATFORM(COCOA)
if (hostName == String(kCFHTTPCookieLocalFileDomain))
return displayNameForLocalFiles();
#else
if (hostName == "localhost")
return hostName;
#endif
#if ENABLE(PUBLIC_SUFFIX_LIST)
return WebCore::topPrivatelyControlledDomain(hostName.startsWith('.') ? hostName.substring(1) : hostName);
#endif
return String();
}
#if ENABLE(NETSCAPE_PLUGIN_API)
String WebsiteDataRecord::displayNameForPluginDataHostName(const String& hostName)
{
#if ENABLE(PUBLIC_SUFFIX_LIST)
return WebCore::topPrivatelyControlledDomain(hostName);
#endif
return String();
}
#endif
String WebsiteDataRecord::displayNameForOrigin(const WebCore::SecurityOriginData& securityOrigin)
{
const auto& protocol = securityOrigin.protocol;
if (protocol == "file")
return displayNameForLocalFiles();
#if ENABLE(PUBLIC_SUFFIX_LIST)
if (protocol == "http" || protocol == "https")
return WebCore::topPrivatelyControlledDomain(securityOrigin.host);
#endif
return String();
}
void WebsiteDataRecord::add(WebsiteDataType type, const WebCore::SecurityOriginData& origin)
{
types |= type;
origins.add(origin);
}
void WebsiteDataRecord::addCookieHostName(const String& hostName)
{
types |= WebsiteDataType::Cookies;
cookieHostNames.add(hostName);
}
#if ENABLE(NETSCAPE_PLUGIN_API)
void WebsiteDataRecord::addPluginDataHostName(const String& hostName)
{
types |= WebsiteDataType::PlugInData;
pluginDataHostNames.add(hostName);
}
#endif
static inline bool hostIsInDomain(StringView host, StringView domain)
{
if (!host.endsWithIgnoringASCIICase(domain))
return false;
ASSERT(host.length() >= domain.length());
unsigned suffixOffset = host.length() - domain.length();
return !suffixOffset || host[suffixOffset - 1] == '.';
}
bool WebsiteDataRecord::matchesTopPrivatelyControlledDomain(const String& topPrivatelyControlledDomain) const
{
if (topPrivatelyControlledDomain.isEmpty())
return false;
if (types.contains(WebsiteDataType::Cookies)) {
for (const auto& hostName : cookieHostNames) {
if (hostIsInDomain(hostName, topPrivatelyControlledDomain))
return true;
}
}
for (const auto& dataRecordOriginData : origins) {
if (hostIsInDomain(dataRecordOriginData.host, topPrivatelyControlledDomain))
return true;
}
return false;
}
String WebsiteDataRecord::topPrivatelyControlledDomain()
{
#if ENABLE(PUBLIC_SUFFIX_LIST)
if (!cookieHostNames.isEmpty())
return WebCore::topPrivatelyControlledDomain(cookieHostNames.takeAny());
if (!origins.isEmpty())
return WebCore::topPrivatelyControlledDomain(origins.takeAny().securityOrigin().get().host());
#if ENABLE(NETSCAPE_PLUGIN_API)
if (!pluginDataHostNames.isEmpty())
return WebCore::topPrivatelyControlledDomain(pluginDataHostNames.takeAny());
#endif
#endif // ENABLE(PUBLIC_SUFFIX_LIST)
return emptyString();
}
void WebsiteDataRecord::addOriginWithCredential(const String& origin)
{
types |= WebsiteDataType::Credentials;
originsWithCredentials.add(origin);
}
}