Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "core/frame/csp/CSPSource.h" | 5 #include "core/frame/csp/CSPSource.h" |
| 6 | 6 |
| 7 #include "core/frame/UseCounter.h" | 7 #include "core/frame/UseCounter.h" |
| 8 #include "core/frame/csp/ContentSecurityPolicy.h" | 8 #include "core/frame/csp/ContentSecurityPolicy.h" |
| 9 | |
|
foolip
2016/05/30 10:10:23
Intentional?
Mike West
2016/05/30 14:59:30
Not at all! Thanks. :)
| |
| 9 #include "platform/weborigin/KURL.h" | 10 #include "platform/weborigin/KURL.h" |
| 10 #include "platform/weborigin/KnownPorts.h" | 11 #include "platform/weborigin/KnownPorts.h" |
| 11 #include "platform/weborigin/SecurityOrigin.h" | 12 #include "platform/weborigin/SecurityOrigin.h" |
| 12 #include "wtf/text/WTFString.h" | 13 #include "wtf/text/WTFString.h" |
| 13 | 14 |
| 14 namespace blink { | 15 namespace blink { |
| 15 | 16 |
| 16 CSPSource::CSPSource(ContentSecurityPolicy* policy, const String& scheme, const String& host, int port, const String& path, WildcardDisposition hostWildcard, Wi ldcardDisposition portWildcard) | 17 CSPSource::CSPSource(ContentSecurityPolicy* policy, const String& scheme, const String& host, int port, const String& path, WildcardDisposition hostWildcard, Wi ldcardDisposition portWildcard) |
| 17 : m_policy(policy) | 18 : m_policy(policy) |
| 18 , m_scheme(scheme) | 19 , m_scheme(scheme) |
| 19 , m_host(host) | 20 , m_host(host) |
| 20 , m_port(port) | 21 , m_port(port) |
| 21 , m_path(path) | 22 , m_path(path) |
| 22 , m_hostWildcard(hostWildcard) | 23 , m_hostWildcard(hostWildcard) |
| 23 , m_portWildcard(portWildcard) | 24 , m_portWildcard(portWildcard) |
| 24 { | 25 { |
| 25 } | 26 } |
| 26 | 27 |
| 27 bool CSPSource::matches(const KURL& url, ContentSecurityPolicy::RedirectStatus r edirectStatus) const | 28 bool CSPSource::matches(const KURL& url, RedirectStatus redirectStatus) const |
| 28 { | 29 { |
| 29 if (!schemeMatches(url)) | 30 if (!schemeMatches(url)) |
| 30 return false; | 31 return false; |
| 31 if (isSchemeOnly()) | 32 if (isSchemeOnly()) |
| 32 return true; | 33 return true; |
| 33 bool pathsMatch = (redirectStatus == ContentSecurityPolicy::DidRedirect) || pathMatches(url); | 34 bool pathsMatch = (redirectStatus == RedirectStatus::FollowedRedirect) || pa thMatches(url); |
| 34 return hostMatches(url) && portMatches(url) && pathsMatch; | 35 return hostMatches(url) && portMatches(url) && pathsMatch; |
| 35 } | 36 } |
| 36 | 37 |
| 37 bool CSPSource::schemeMatches(const KURL& url) const | 38 bool CSPSource::schemeMatches(const KURL& url) const |
| 38 { | 39 { |
| 39 if (m_scheme.isEmpty()) | 40 if (m_scheme.isEmpty()) |
| 40 return m_policy->protocolMatchesSelf(url); | 41 return m_policy->protocolMatchesSelf(url); |
| 41 if (equalIgnoringCase(m_scheme, "http")) | 42 if (equalIgnoringCase(m_scheme, "http")) |
| 42 return equalIgnoringCase(url.protocol(), "http") || equalIgnoringCase(ur l.protocol(), "https"); | 43 return equalIgnoringCase(url.protocol(), "http") || equalIgnoringCase(ur l.protocol(), "https"); |
| 43 if (equalIgnoringCase(m_scheme, "ws")) | 44 if (equalIgnoringCase(m_scheme, "ws")) |
| (...skipping 60 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 104 { | 105 { |
| 105 return m_host.isEmpty(); | 106 return m_host.isEmpty(); |
| 106 } | 107 } |
| 107 | 108 |
| 108 DEFINE_TRACE(CSPSource) | 109 DEFINE_TRACE(CSPSource) |
| 109 { | 110 { |
| 110 visitor->trace(m_policy); | 111 visitor->trace(m_policy); |
| 111 } | 112 } |
| 112 | 113 |
| 113 } // namespace blink | 114 } // namespace blink |
| OLD | NEW |