Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(251)

Side by Side Diff: third_party/WebKit/Source/core/dom/SecurityContext.cpp

Issue 2651883008: Make content::FeaturePolicy implement WebFeaturePolicy, and use it in blink code (Closed)
Patch Set: Cleanup Created 3 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 /* 1 /*
2 * Copyright (C) 2011 Google Inc. All Rights Reserved. 2 * Copyright (C) 2011 Google Inc. All Rights Reserved.
3 * 3 *
4 * Redistribution and use in source and binary forms, with or without 4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions 5 * modification, are permitted provided that the following conditions
6 * are met: 6 * are met:
7 * 1. Redistributions of source code must retain the above copyright 7 * 1. Redistributions of source code must retain the above copyright
8 * notice, this list of conditions and the following disclaimer. 8 * notice, this list of conditions and the following disclaimer.
9 * 2. Redistributions in binary form must reproduce the above copyright 9 * 2. Redistributions in binary form must reproduce the above copyright
10 * notice, this list of conditions and the following disclaimer in the 10 * notice, this list of conditions and the following disclaimer in the
(...skipping 11 matching lines...) Expand all
22 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE 22 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
23 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 23 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
24 * 24 *
25 */ 25 */
26 26
27 #include "core/dom/SecurityContext.h" 27 #include "core/dom/SecurityContext.h"
28 28
29 #include "core/frame/csp/ContentSecurityPolicy.h" 29 #include "core/frame/csp/ContentSecurityPolicy.h"
30 #include "platform/RuntimeEnabledFeatures.h" 30 #include "platform/RuntimeEnabledFeatures.h"
31 #include "platform/weborigin/SecurityOrigin.h" 31 #include "platform/weborigin/SecurityOrigin.h"
32 #include "public/platform/Platform.h"
32 33
33 namespace blink { 34 namespace blink {
34 35
35 SecurityContext::SecurityContext() 36 SecurityContext::SecurityContext()
36 : m_sandboxFlags(SandboxNone), 37 : m_sandboxFlags(SandboxNone),
37 m_addressSpace(WebAddressSpacePublic), 38 m_addressSpace(WebAddressSpacePublic),
38 m_insecureRequestPolicy(kLeaveInsecureRequestsAlone) {} 39 m_insecureRequestPolicy(kLeaveInsecureRequestsAlone) {}
39 40
40 SecurityContext::~SecurityContext() {} 41 SecurityContext::~SecurityContext() {}
41 42
(...skipping 52 matching lines...) Expand 10 before | Expand all | Expand 10 after
94 DCHECK(RuntimeEnabledFeatures::suboriginsEnabled()); 95 DCHECK(RuntimeEnabledFeatures::suboriginsEnabled());
95 DCHECK(m_securityOrigin.get()); 96 DCHECK(m_securityOrigin.get());
96 DCHECK(!m_securityOrigin->hasSuborigin() || 97 DCHECK(!m_securityOrigin->hasSuborigin() ||
97 m_securityOrigin->suborigin()->name() == suborigin.name()); 98 m_securityOrigin->suborigin()->name() == suborigin.name());
98 m_securityOrigin->addSuborigin(suborigin); 99 m_securityOrigin->addSuborigin(suborigin);
99 didUpdateSecurityOrigin(); 100 didUpdateSecurityOrigin();
100 } 101 }
101 102
102 void SecurityContext::setFeaturePolicyFromHeader( 103 void SecurityContext::setFeaturePolicyFromHeader(
103 const WebParsedFeaturePolicyHeader& parsedHeader, 104 const WebParsedFeaturePolicyHeader& parsedHeader,
104 FeaturePolicy* parentFeaturePolicy) { 105 const WebFeaturePolicy* parentFeaturePolicy) {
105 DCHECK(!m_featurePolicy); 106 DCHECK(!m_featurePolicy);
106 m_featurePolicy = FeaturePolicy::createFromParentPolicy(parentFeaturePolicy, 107
107 m_securityOrigin); 108 // Compose the new policy based on the parent policy, with the new header
108 m_featurePolicy->setHeaderPolicy(parsedHeader); 109 WebSecurityOrigin origin = WebSecurityOrigin(m_securityOrigin);
110 m_featurePolicy.reset(Platform::current()->createFeaturePolicy(
111 parentFeaturePolicy, parsedHeader, origin));
112 }
113
114 void SecurityContext::updateFeaturePolicyOrigin() {
raymes 2017/02/13 04:45:22 Should we just call this from setSecurityOrigin in
iclelland 2017/02/23 20:04:12 Yes. Done.
115 if (!m_featurePolicy)
116 return;
117 Platform::current()->updateFeaturePolicyOrigin(
118 m_featurePolicy.get(), WebSecurityOrigin(m_securityOrigin));
raymes 2017/02/13 04:45:22 Do you know under what circumstances we can change
iclelland 2017/02/23 20:04:12 There are a few odd scenarios around document.open
109 } 119 }
110 120
111 } // namespace blink 121 } // namespace blink
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698