| Index: content/common/content_security_policy/csp_context.cc
|
| diff --git a/content/common/content_security_policy/csp_context.cc b/content/common/content_security_policy/csp_context.cc
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..b7edf25b470d1a9e656b37b4c255d3a56e086fcf
|
| --- /dev/null
|
| +++ b/content/common/content_security_policy/csp_context.cc
|
| @@ -0,0 +1,88 @@
|
| +// Copyright 2017 The Chromium Authors. All rights reserved.
|
| +// Use of this source code is governed by a BSD-style license that can be
|
| +// found in the LICENSE file.
|
| +
|
| +#include "content/common/content_security_policy/csp_context.h"
|
| +
|
| +namespace content {
|
| +
|
| +CSPContext::CSPContext() : has_self_(false) {}
|
| +
|
| +CSPContext::~CSPContext() {}
|
| +
|
| +bool CSPContext::Allow(const std::vector<ContentSecurityPolicy>& policies,
|
| + CSPDirective::Name directive_name,
|
| + const GURL& url,
|
| + bool is_redirect) {
|
| + if (SchemeShouldBypassCSP(url.scheme_piece()))
|
| + return true;
|
| +
|
| + for (const auto& policy : policies) {
|
| + if (!ContentSecurityPolicy::Allow(policy, directive_name, url, this,
|
| + is_redirect))
|
| + return false;
|
| + }
|
| + return true;
|
| +}
|
| +
|
| +void CSPContext::SetSelf(const url::Origin origin) {
|
| + if (origin.unique()) {
|
| + // TODO(arthursonzogni): Decide what to do with unique origins.
|
| + has_self_ = false;
|
| + return;
|
| + }
|
| +
|
| + if (origin.scheme() == url::kFileScheme) {
|
| + has_self_ = true;
|
| + self_scheme_ = url::kFileScheme;
|
| + self_source_ = CSPSource(url::kFileScheme, "", false, url::PORT_UNSPECIFIED,
|
| + false, "");
|
| + return;
|
| + }
|
| +
|
| + has_self_ = true;
|
| + self_scheme_ = origin.scheme();
|
| + self_source_ = CSPSource(
|
| + origin.scheme(), origin.host(), false,
|
| + origin.port() == 0 ? url::PORT_UNSPECIFIED : origin.port(), // port
|
| + false, "");
|
| +}
|
| +
|
| +bool CSPContext::AllowSelf(const GURL& url) {
|
| + return has_self_ && CSPSource::Allow(self_source_, url, this);
|
| +}
|
| +
|
| +bool CSPContext::ProtocolMatchesSelf(const GURL& url) {
|
| + if (!has_self_)
|
| + return false;
|
| + if (self_scheme_ == url::kHttpScheme)
|
| + return url.SchemeIsHTTPOrHTTPS() || url.SchemeIsSuborigin();
|
| + return url.SchemeIs(self_scheme_);
|
| +}
|
| +
|
| +void CSPContext::LogToConsole(const std::string& message) {
|
| + return;
|
| +}
|
| +
|
| +bool CSPContext::SchemeShouldBypassCSP(const base::StringPiece& scheme) {
|
| + return false;
|
| +}
|
| +
|
| +bool CSPContext::SelfSchemeShouldBypassCSP() {
|
| + if (!has_self_)
|
| + return false;
|
| + return SchemeShouldBypassCSP(self_scheme_);
|
| +}
|
| +
|
| +void CSPContext::ReportViolation(
|
| + const std::string& directive_text,
|
| + const std::string& effective_directive,
|
| + const std::string& message,
|
| + const GURL& blocked_url,
|
| + const std::vector<std::string>& report_end_points,
|
| + const std::string& header,
|
| + blink::WebContentSecurityPolicyType disposition) {
|
| + return;
|
| +}
|
| +
|
| +} // namespace content
|
|
|