Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1086)

Unified Diff: third_party/WebKit/Source/platform/feature_policy/FeaturePolicy.cpp

Issue 2520223002: Replicate a parsed feature policy representation so it doesn't need to be parsed in the browser pro… (Closed)
Patch Set: Fp2 Created 4 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: third_party/WebKit/Source/platform/feature_policy/FeaturePolicy.cpp
diff --git a/third_party/WebKit/Source/platform/feature_policy/FeaturePolicy.cpp b/third_party/WebKit/Source/platform/feature_policy/FeaturePolicy.cpp
index 51cabe384318c6df08f81d54e45eccead7a43177..19532863bf8303881bdba3b0a36889f8fe98719c 100644
--- a/third_party/WebKit/Source/platform/feature_policy/FeaturePolicy.cpp
+++ b/third_party/WebKit/Source/platform/feature_policy/FeaturePolicy.cpp
@@ -27,69 +27,6 @@ const FeaturePolicy::Feature* featureForName(
return nullptr;
}
-// Converts a list of JSON feature policy items into a mapping of features to
-// whitelists. For future compatibility, unrecognized features are simply
-// ignored, as are unparseable origins. If |messages| is not null, then any
-// errors in the input will cause an error message to be appended to it.
-HashMap<const FeaturePolicy::Feature*,
- std::unique_ptr<FeaturePolicy::Whitelist>>
-parseFeaturePolicyFromJson(std::unique_ptr<JSONArray> policyItems,
- RefPtr<SecurityOrigin> origin,
- FeaturePolicy::FeatureList& features,
- Vector<String>* messages) {
- HashMap<const FeaturePolicy::Feature*,
- std::unique_ptr<FeaturePolicy::Whitelist>>
- whitelists;
-
- for (size_t i = 0; i < policyItems->size(); ++i) {
- JSONObject* item = JSONObject::cast(policyItems->at(i));
- if (!item) {
- if (messages)
- messages->append("Policy is not an object");
- continue; // Array element is not an object; skip
- }
-
- for (size_t j = 0; j < item->size(); ++j) {
- JSONObject::Entry entry = item->at(j);
- String featureName = entry.first;
- JSONArray* targets = JSONArray::cast(entry.second);
- if (!targets) {
- if (messages)
- messages->append("Whitelist is not an array of strings.");
- continue;
- }
-
- const FeaturePolicy::Feature* feature =
- featureForName(featureName, features);
- if (!feature)
- continue; // Feature is not recognized; skip
-
- std::unique_ptr<FeaturePolicy::Whitelist> whitelist(
- new FeaturePolicy::Whitelist);
- String targetString;
- for (size_t j = 0; j < targets->size(); ++j) {
- if (targets->at(j)->asString(&targetString)) {
- if (equalIgnoringCase(targetString, "self")) {
- whitelist->add(origin);
- } else if (targetString == "*") {
- whitelist->addAll();
- } else {
- KURL originUrl = KURL(KURL(), targetString);
- if (originUrl.isValid()) {
- whitelist->add(SecurityOrigin::create(originUrl));
- }
- }
- } else {
- if (messages)
- messages->append("Whitelist is not an array of strings.");
- }
- }
- whitelists.set(feature, std::move(whitelist));
- }
- }
- return whitelists;
-}
-
} // namespace
// Definitions of all features controlled by Feature Policy should appear here.
@@ -195,20 +132,91 @@ std::unique_ptr<FeaturePolicy> FeaturePolicy::createFromParentPolicy(
getDefaultFeatureList());
}
-void FeaturePolicy::setHeaderPolicy(const String& policy,
- Vector<String>* messages) {
- DCHECK(m_headerWhitelists.isEmpty());
+// static
+WebVector<WebFeaturePolicy::ParsedWhitelist> FeaturePolicy::parseFeaturePolicy(
iclelland 2016/11/23 20:20:28 As a new public interface, it would be good to hav
raymes 2016/11/30 06:25:17 Done - I added a test.
+ const String& policy,
+ const SecurityOrigin* origin,
+ Vector<String>* messages) {
+ Vector<WebFeaturePolicy::ParsedWhitelist> whitelists;
+
+ if (origin->isUnique())
iclelland 2016/11/23 20:20:28 This is a new check -- as far as I can tell, a uni
raymes 2016/11/30 06:25:17 Yeah it is a new check. You're right - let me remo
+ return whitelists;
+
// Use a reasonable parse depth limit; the actual maximum depth is only going
// to be 4 for a valid policy, but we'll give the featurePolicyParser a chance
// to report more specific errors, unless the string is really invalid.
- std::unique_ptr<JSONArray> policyJSON = parseJSONHeader(policy, 50);
- if (!policyJSON) {
+ std::unique_ptr<JSONArray> policyItems = parseJSONHeader(policy, 50);
+ if (!policyItems) {
if (messages)
messages->append("Unable to parse header");
- return;
+ return whitelists;
+ }
+
+ for (size_t i = 0; i < policyItems->size(); ++i) {
+ JSONObject* item = JSONObject::cast(policyItems->at(i));
+ if (!item) {
+ if (messages)
+ messages->append("Policy is not an object");
+ continue; // Array element is not an object; skip
+ }
+
+ for (size_t j = 0; j < item->size(); ++j) {
+ JSONObject::Entry entry = item->at(j);
+ String featureName = entry.first;
+ JSONArray* targets = JSONArray::cast(entry.second);
+ if (!targets) {
+ if (messages)
+ messages->append("Whitelist is not an array of strings.");
+ continue;
+ }
+
+ WebFeaturePolicy::ParsedWhitelist whitelist;
+ whitelist.featureName = featureName;
+ Vector<WebString> origins;
+ String targetString;
+ for (size_t j = 0; j < targets->size(); ++j) {
+ if (targets->at(j)->asString(&targetString)) {
+ if (equalIgnoringCase(targetString, "self")) {
+ origins.append(origin->toString());
+ } else if (targetString == "*") {
+ whitelist.matchesAllOrigins = true;
+ } else {
+ KURL originUrl = KURL(KURL(), targetString);
+ if (originUrl.isValid())
iclelland 2016/11/23 20:20:28 This might as well be if (KURL(KURL(), targetStrin
raymes 2016/11/29 08:20:34 Good point - we can probably use a WebSecurityOrig
+ origins.append(targetString);
+ }
+ } else {
+ if (messages)
+ messages->append("Whitelist is not an array of strings.");
+ }
+ }
+ whitelist.origins = origins;
+ whitelists.append(whitelist);
+ }
+ }
+ return whitelists;
+}
+
+void FeaturePolicy::setHeaderPolicy(
+ const WebVector<WebFeaturePolicy::ParsedWhitelist>& policy) {
+ DCHECK(m_headerWhitelists.isEmpty());
+ for (const WebFeaturePolicy::ParsedWhitelist& parsedWhitelist : policy) {
iclelland 2016/11/23 20:20:28 This method seems like it's mostly a conversion fu
raymes 2016/11/29 08:20:34 I haven't made this change yet (and my connection
raymes 2016/11/30 06:25:17 Done now.
+ const FeaturePolicy::Feature* feature =
+ featureForName(parsedWhitelist.featureName, m_features);
+ if (!feature)
+ continue;
+ std::unique_ptr<Whitelist> whitelist(new FeaturePolicy::Whitelist);
+ if (parsedWhitelist.matchesAllOrigins) {
+ whitelist->addAll();
+ } else {
+ for (const WebString& origin : parsedWhitelist.origins) {
+ KURL originUrl = KURL(KURL(), origin);
+ if (originUrl.isValid())
+ whitelist->add(SecurityOrigin::create(originUrl));
+ }
+ }
+ m_headerWhitelists.set(feature, std::move(whitelist));
}
- m_headerWhitelists = parseFeaturePolicyFromJson(
- std::move(policyJSON), m_origin, m_features, messages);
}
bool FeaturePolicy::isFeatureEnabledForOrigin(

Powered by Google App Engine
This is Rietveld 408576698