Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1187)

Side by Side Diff: content/public/common/origin_util.h

Issue 2005783005: Re-enable storage for Suborigins. (Closed) Base URL: https://chromium.googlesource.com/chromium/src@master
Patch Set: Update to new serialization Created 4 years, 2 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2015 The Chromium Authors. All rights reserved. 1 // Copyright 2015 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #ifndef CONTENT_PUBLIC_COMMON_ORIGIN_UTIL_H_ 5 #ifndef CONTENT_PUBLIC_COMMON_ORIGIN_UTIL_H_
6 #define CONTENT_PUBLIC_COMMON_ORIGIN_UTIL_H_ 6 #define CONTENT_PUBLIC_COMMON_ORIGIN_UTIL_H_
7 7
8 #include <string>
9
8 #include "content/common/content_export.h" 10 #include "content/common/content_export.h"
9 11
10 class GURL; 12 class GURL;
11 13
12 namespace content { 14 namespace content {
13 15
14 // Returns true if the origin is trustworthy: that is, if its contents can be 16 // Returns true if the origin is trustworthy: that is, if its contents can be
15 // said to have been transferred to the browser in a way that a network attacker 17 // said to have been transferred to the browser in a way that a network attacker
16 // cannot tamper with or observe. 18 // cannot tamper with or observe.
17 // 19 //
18 // See https://www.w3.org/TR/powerful-features/#is-origin-trustworthy. 20 // See https://www.w3.org/TR/powerful-features/#is-origin-trustworthy.
19 bool CONTENT_EXPORT IsOriginSecure(const GURL& url); 21 bool CONTENT_EXPORT IsOriginSecure(const GURL& url);
20 22
21 // Returns true if the origin can register a service worker. Scheme must be 23 // Returns true if the origin can register a service worker. Scheme must be
22 // http (localhost only), https, or a custom-set secure scheme. 24 // http (localhost only), https, or a custom-set secure scheme.
23 bool CONTENT_EXPORT OriginCanAccessServiceWorkers(const GURL& url); 25 bool CONTENT_EXPORT OriginCanAccessServiceWorkers(const GURL& url);
24 26
25 // Resets the internal schemes/origins whitelist. Used only for testing. 27 // Resets the internal schemes/origins whitelist. Used only for testing.
26 void CONTENT_EXPORT ResetSchemesAndOriginsWhitelistForTesting(); 28 void CONTENT_EXPORT ResetSchemesAndOriginsWhitelistForTesting();
27 29
30 // Utility functions for extracting Suborigin information from a URL that a
31 // Suborigin has been serialized into. See
32 // https://w3c.github.io/webappsec-suborigins/ for more information on
33 // Suborigins.
34 //
35 // Returns true if the url has a serialized Suborigin in the host. Otherwise,
36 // returns false.
37 bool CONTENT_EXPORT HasSuborigin(const GURL& url);
38
39 // If the host in the URL has a Suborigin serialized into it, returns the name.
40 // Otherwise, returns the empty string.
41 std::string CONTENT_EXPORT SuboriginFromUrl(const GURL& url);
42
43 // If the URL has a suborigin serialized into it, returns the same URL with the
44 // suborigin stripped. Otherwise, returns the empty string.
45 //
46 // For example, if given the URL https-so://foobar.example.com, the returned URL
47 // would be https://example.com.
48 GURL CONTENT_EXPORT UrlStripSuborigin(const GURL& url);
nasko 2016/09/26 22:54:55 nit: StripSuboriginFromUrl? It indicates that the
jww 2016/09/28 23:35:15 Done.
49
28 } // namespace content 50 } // namespace content
29 51
30 #endif // CONTENT_PUBLIC_COMMON_ORIGIN_UTIL_H_ 52 #endif // CONTENT_PUBLIC_COMMON_ORIGIN_UTIL_H_
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698