Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright 2015 The Chromium Authors. All rights reserved. | 1 // Copyright 2015 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #ifndef CONTENT_PUBLIC_COMMON_ORIGIN_UTIL_H_ | 5 #ifndef CONTENT_PUBLIC_COMMON_ORIGIN_UTIL_H_ |
| 6 #define CONTENT_PUBLIC_COMMON_ORIGIN_UTIL_H_ | 6 #define CONTENT_PUBLIC_COMMON_ORIGIN_UTIL_H_ |
| 7 | 7 |
| 8 #include <string> | |
| 9 | |
| 8 #include "content/common/content_export.h" | 10 #include "content/common/content_export.h" |
| 9 | 11 |
| 10 class GURL; | 12 class GURL; |
| 11 | 13 |
| 12 namespace content { | 14 namespace content { |
| 13 | 15 |
| 14 // Returns true if the origin is trustworthy: that is, if its contents can be | 16 // Returns true if the origin is trustworthy: that is, if its contents can be |
| 15 // said to have been transferred to the browser in a way that a network attacker | 17 // said to have been transferred to the browser in a way that a network attacker |
| 16 // cannot tamper with or observe. | 18 // cannot tamper with or observe. |
| 17 // | 19 // |
| 18 // See https://www.w3.org/TR/powerful-features/#is-origin-trustworthy. | 20 // See https://www.w3.org/TR/powerful-features/#is-origin-trustworthy. |
| 19 bool CONTENT_EXPORT IsOriginSecure(const GURL& url); | 21 bool CONTENT_EXPORT IsOriginSecure(const GURL& url); |
| 20 | 22 |
| 21 // Returns true if the origin can register a service worker. Scheme must be | 23 // Returns true if the origin can register a service worker. Scheme must be |
| 22 // http (localhost only), https, or a custom-set secure scheme. | 24 // http (localhost only), https, or a custom-set secure scheme. |
| 23 bool CONTENT_EXPORT OriginCanAccessServiceWorkers(const GURL& url); | 25 bool CONTENT_EXPORT OriginCanAccessServiceWorkers(const GURL& url); |
| 24 | 26 |
| 25 // Resets the internal schemes/origins whitelist. Used only for testing. | 27 // Resets the internal schemes/origins whitelist. Used only for testing. |
| 26 void CONTENT_EXPORT ResetSchemesAndOriginsWhitelistForTesting(); | 28 void CONTENT_EXPORT ResetSchemesAndOriginsWhitelistForTesting(); |
| 27 | 29 |
| 30 // Utility functions for extracting Suborigin information from a URL that a | |
| 31 // Suborigin has been serialized into. See | |
| 32 // https://w3c.github.io/webappsec-suborigins/ for more information on | |
| 33 // Suborigins. | |
| 34 // | |
| 35 // Returns true if the url has a serialized Suborigin in the host. Otherwise, | |
| 36 // returns false. | |
| 37 bool CONTENT_EXPORT HasSuborigin(const GURL& url); | |
| 38 | |
| 39 // If the host in the URL has a Suborigin serialized into it, returns the name. | |
| 40 // Otherwise, returns the empty string. | |
| 41 std::string CONTENT_EXPORT SuboriginFromUrl(const GURL& url); | |
| 42 | |
| 43 // If the URL has a suborigin serialized into it, returns the same URL with the | |
| 44 // suborigin stripped. Otherwise, returns the empty string. | |
| 45 // | |
| 46 // For example, if given the URL https-so://foobar.example.com, the returned URL | |
| 47 // would be https://example.com. | |
| 48 GURL CONTENT_EXPORT UrlStripSuborigin(const GURL& url); | |
|
nasko
2016/09/26 22:54:55
nit: StripSuboriginFromUrl? It indicates that the
jww
2016/09/28 23:35:15
Done.
| |
| 49 | |
| 28 } // namespace content | 50 } // namespace content |
| 29 | 51 |
| 30 #endif // CONTENT_PUBLIC_COMMON_ORIGIN_UTIL_H_ | 52 #endif // CONTENT_PUBLIC_COMMON_ORIGIN_UTIL_H_ |
| OLD | NEW |