| OLD | NEW |
| 1 // Copyright 2015 The Chromium Authors. All rights reserved. | 1 // Copyright 2015 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #ifndef CONTENT_PUBLIC_COMMON_ORIGIN_UTIL_H_ | 5 #ifndef CONTENT_PUBLIC_COMMON_ORIGIN_UTIL_H_ |
| 6 #define CONTENT_PUBLIC_COMMON_ORIGIN_UTIL_H_ | 6 #define CONTENT_PUBLIC_COMMON_ORIGIN_UTIL_H_ |
| 7 | 7 |
| 8 #include <string> |
| 9 |
| 8 #include "content/common/content_export.h" | 10 #include "content/common/content_export.h" |
| 9 | 11 |
| 10 class GURL; | 12 class GURL; |
| 11 | 13 |
| 12 namespace content { | 14 namespace content { |
| 13 | 15 |
| 14 // Returns true if the origin is trustworthy: that is, if its contents can be | 16 // Returns true if the origin is trustworthy: that is, if its contents can be |
| 15 // said to have been transferred to the browser in a way that a network attacker | 17 // said to have been transferred to the browser in a way that a network attacker |
| 16 // cannot tamper with or observe. | 18 // cannot tamper with or observe. |
| 17 // | 19 // |
| 18 // See https://www.w3.org/TR/powerful-features/#is-origin-trustworthy. | 20 // See https://www.w3.org/TR/powerful-features/#is-origin-trustworthy. |
| 19 bool CONTENT_EXPORT IsOriginSecure(const GURL& url); | 21 bool CONTENT_EXPORT IsOriginSecure(const GURL& url); |
| 20 | 22 |
| 21 // Returns true if the origin can register a service worker. Scheme must be | 23 // Returns true if the origin can register a service worker. Scheme must be |
| 22 // http (localhost only), https, or a custom-set secure scheme. | 24 // http (localhost only), https, or a custom-set secure scheme. |
| 23 bool CONTENT_EXPORT OriginCanAccessServiceWorkers(const GURL& url); | 25 bool CONTENT_EXPORT OriginCanAccessServiceWorkers(const GURL& url); |
| 24 | 26 |
| 25 // Resets the internal schemes/origins whitelist. Used only for testing. | 27 // Resets the internal schemes/origins whitelist. Used only for testing. |
| 26 void CONTENT_EXPORT ResetSchemesAndOriginsWhitelistForTesting(); | 28 void CONTENT_EXPORT ResetSchemesAndOriginsWhitelistForTesting(); |
| 27 | 29 |
| 30 // Utility functions for extracting Suborigin information from a URL that a |
| 31 // Suborigin has been serialized into. See |
| 32 // https://w3c.github.io/webappsec-suborigins/ for more information on |
| 33 // Suborigins. |
| 34 // |
| 35 // Returns true if the url has a serialized Suborigin in the host. Otherwise, |
| 36 // returns false. |
| 37 bool CONTENT_EXPORT HasSuborigin(const GURL& url); |
| 38 |
| 39 // If the host in the URL has a Suborigin serialized into it, returns the name. |
| 40 // Otherwise, returns the empty string. |
| 41 std::string CONTENT_EXPORT SuboriginFromUrl(const GURL& url); |
| 42 |
| 43 // If the URL has a suborigin serialized into it, returns the same URL with the |
| 44 // suborigin stripped. Otherwise, returns the original URL unchanged. |
| 45 // |
| 46 // For example, if given the URL https-so://foobar.example.com, the returned URL |
| 47 // would be https://example.com. If given the URL https://foobar.com (no |
| 48 // suborigin), the returned URL would be https://foobar.com. |
| 49 GURL CONTENT_EXPORT StripSuboriginFromUrl(const GURL& url); |
| 50 |
| 28 } // namespace content | 51 } // namespace content |
| 29 | 52 |
| 30 #endif // CONTENT_PUBLIC_COMMON_ORIGIN_UTIL_H_ | 53 #endif // CONTENT_PUBLIC_COMMON_ORIGIN_UTIL_H_ |
| OLD | NEW |