Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(945)

Unified Diff: content/common/content_security_policy/csp_source.cc

Issue 2612793002: Implement ContentSecurityPolicy on the browser-side. (Closed)
Patch Set: Add the TODO and bug ids that was forgotten. Created 3 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: content/common/content_security_policy/csp_source.cc
diff --git a/content/common/content_security_policy/csp_source.cc b/content/common/content_security_policy/csp_source.cc
new file mode 100644
index 0000000000000000000000000000000000000000..59657d16d2bfbddb3922549c059497409d957f8f
--- /dev/null
+++ b/content/common/content_security_policy/csp_source.cc
@@ -0,0 +1,186 @@
+// Copyright 2017 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include <sstream>
+
+#include "base/strings/string_util.h"
+#include "base/strings/utf_string_conversions.h"
+#include "content/common/content_security_policy/csp_context.h"
+#include "url/url_canon.h"
+#include "url/url_util.h"
+
+namespace content {
+
+namespace {
+
+bool DecodePath(const base::StringPiece& path, std::string* output) {
+ url::RawCanonOutputT<base::char16> unescaped;
+ url::DecodeURLEscapeSequences(path.data(), path.size(), &unescaped);
+ return base::UTF16ToUTF8(unescaped.data(), unescaped.length(), output);
+}
+
+int DefaultPortForScheme(const std::string& scheme) {
+ return url::DefaultPortForScheme(scheme.data(), scheme.size());
+}
+
+bool SourceAllowScheme(const CSPSource& source,
+ const GURL& url,
+ CSPContext* context) {
+ if (source.scheme.empty())
+ return context->ProtocolMatchesSelf(url);
+ if (source.scheme == url::kHttpScheme)
+ return url.SchemeIsHTTPOrHTTPS();
+ if (source.scheme == url::kWsScheme)
+ return url.SchemeIsWSOrWSS();
+ return url.SchemeIs(source.scheme);
+}
+
+bool SourceAllowHost(const CSPSource& source, const GURL& url) {
+ if (source.is_host_wildcard) {
+ if (source.host.empty())
+ return true;
+ // TODO(arthursonzogni): Chrome used to, incorrectly, match *.x.y to x.y.
+ // The renderer version of this function count how many times it happens.
+ // It might be useful to do it outside of blink too.
+ // See third_party/WebKit/Source/core/frame/csp/CSPSource.cpp
+ return base::EndsWith(url.host(), '.' + source.host,
+ base::CompareCase::INSENSITIVE_ASCII);
+ } else
+ return url.host() == source.host;
+}
+
+bool SourceAllowPort(const CSPSource& source, const GURL& url) {
+ int url_port = url.EffectiveIntPort();
+
+ if (source.is_port_wildcard)
+ return true;
+
+ if (source.port == url::PORT_UNSPECIFIED)
+ return DefaultPortForScheme(url.scheme()) == url_port;
+
+ if (source.port == url_port)
+ return true;
+
+ if (source.port == 80 && url_port == 443)
+ return true;
+
+ return false;
+}
+
+bool SourceAllowPath(const CSPSource& source,
+ const GURL& url,
+ bool is_redirect) {
+ if (is_redirect)
+ return true;
+
+ if (source.path.empty() || url.path().empty())
+ return true;
+
+ std::string url_path;
+ if (!DecodePath(url.path(), &url_path)) {
+ // TODO(arthursonzogni): try to figure out if that could happen and how to
+ // handle it.
+ return false;
+ }
+
+ // If the path represents a directory.
+ if (base::EndsWith(source.path, "/", base::CompareCase::SENSITIVE))
+ return base::StartsWith(url_path, source.path,
+ base::CompareCase::SENSITIVE);
+
+ // The path represents a file.
+ return source.path == url_path;
+}
+
+} // namespace
+
+CSPSource::CSPSource()
+ : scheme(),
+ host(),
+ is_host_wildcard(false),
+ port(url::PORT_UNSPECIFIED),
+ is_port_wildcard(false),
+ path() {}
+
+CSPSource::CSPSource(const std::string& scheme,
+ const std::string& host,
+ bool is_host_wildcard,
+ int port,
+ bool is_port_wildcard,
+ const std::string& path)
+ : scheme(scheme),
+ host(host),
+ is_host_wildcard(is_host_wildcard),
+ port(port),
+ is_port_wildcard(is_port_wildcard),
+ path(path) {
+ DCHECK(!HasPort() || HasHost()); // port => host
+ DCHECK(!HasPath() || HasHost()); // path => host
+ DCHECK(!is_port_wildcard || port == url::PORT_UNSPECIFIED);
+}
+
+CSPSource::CSPSource(const CSPSource& source) = default;
+CSPSource::~CSPSource() = default;
+
+// static
+bool CSPSource::Allow(const CSPSource& source,
+ const GURL& url,
+ CSPContext* context,
+ bool is_redirect) {
+ if (source.IsSchemeOnly())
+ return SourceAllowScheme(source, url, context);
+
+ return SourceAllowScheme(source, url, context) &&
+ SourceAllowHost(source, url) && SourceAllowPort(source, url) &&
+ SourceAllowPath(source, url, is_redirect);
+}
+
+std::string CSPSource::ToString() const {
+ // scheme
+ if (IsSchemeOnly())
+ return scheme + ":";
+
+ std::stringstream text;
+ if (!scheme.empty())
+ text << scheme << "://";
+
+ // host
+ if (is_host_wildcard) {
+ if (host.empty())
+ text << "*";
+ else
+ text << "*." << host;
+ } else {
+ text << host;
+ }
+
+ // port
+ if (is_port_wildcard)
+ text << ":*";
+ if (port != url::PORT_UNSPECIFIED)
+ text << ":" << port;
+
+ // path
+ text << path;
+
+ return text.str();
+}
+
+bool CSPSource::IsSchemeOnly() const {
+ return !HasHost();
+}
+
+bool CSPSource::HasPort() const {
+ return port != url::PORT_UNSPECIFIED || is_port_wildcard;
+}
+
+bool CSPSource::HasHost() const {
+ return !host.empty() || is_host_wildcard;
+}
+
+bool CSPSource::HasPath() const {
+ return !path.empty();
+}
+
+} // namespace content
« no previous file with comments | « content/common/content_security_policy/csp_source.h ('k') | content/common/content_security_policy/csp_source_list.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698