Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 /* | 1 /* |
| 2 * Copyright (C) 2011 Google, Inc. All rights reserved. | 2 * Copyright (C) 2011 Google, Inc. All rights reserved. |
| 3 * | 3 * |
| 4 * Redistribution and use in source and binary forms, with or without | 4 * Redistribution and use in source and binary forms, with or without |
| 5 * modification, are permitted provided that the following conditions | 5 * modification, are permitted provided that the following conditions |
| 6 * are met: | 6 * are met: |
| 7 * 1. Redistributions of source code must retain the above copyright | 7 * 1. Redistributions of source code must retain the above copyright |
| 8 * notice, this list of conditions and the following disclaimer. | 8 * notice, this list of conditions and the following disclaimer. |
| 9 * 2. Redistributions in binary form must reproduce the above copyright | 9 * 2. Redistributions in binary form must reproduce the above copyright |
| 10 * notice, this list of conditions and the following disclaimer in the | 10 * notice, this list of conditions and the following disclaimer in the |
| (...skipping 37 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 48 | 48 |
| 49 class ContentSecurityPolicyResponseHeaders; | 49 class ContentSecurityPolicyResponseHeaders; |
| 50 class CSPDirectiveList; | 50 class CSPDirectiveList; |
| 51 class DOMStringList; | 51 class DOMStringList; |
| 52 class JSONObject; | 52 class JSONObject; |
| 53 class KURL; | 53 class KURL; |
| 54 class ExecutionContextClient; | 54 class ExecutionContextClient; |
| 55 class SecurityOrigin; | 55 class SecurityOrigin; |
| 56 | 56 |
| 57 typedef int SandboxFlags; | 57 typedef int SandboxFlags; |
| 58 typedef String SuboriginFlags; | |
|
abarth-chromium
2014/07/31 04:56:47
I'd skip this typedef.
jww
2014/10/21 23:51:06
Done.
| |
| 58 typedef Vector<OwnPtr<CSPDirectiveList> > CSPDirectiveListVector; | 59 typedef Vector<OwnPtr<CSPDirectiveList> > CSPDirectiveListVector; |
| 59 | 60 |
| 60 class ContentSecurityPolicy : public RefCounted<ContentSecurityPolicy> { | 61 class ContentSecurityPolicy : public RefCounted<ContentSecurityPolicy> { |
| 61 WTF_MAKE_FAST_ALLOCATED; | 62 WTF_MAKE_FAST_ALLOCATED; |
| 62 public: | 63 public: |
| 63 // CSP 1.0 Directives | 64 // CSP 1.0 Directives |
| 64 static const char ConnectSrc[]; | 65 static const char ConnectSrc[]; |
| 65 static const char DefaultSrc[]; | 66 static const char DefaultSrc[]; |
| 66 static const char FontSrc[]; | 67 static const char FontSrc[]; |
| 67 static const char FrameSrc[]; | 68 static const char FrameSrc[]; |
| 68 static const char ImgSrc[]; | 69 static const char ImgSrc[]; |
| 69 static const char MediaSrc[]; | 70 static const char MediaSrc[]; |
| 70 static const char ObjectSrc[]; | 71 static const char ObjectSrc[]; |
| 71 static const char ReportURI[]; | 72 static const char ReportURI[]; |
| 72 static const char Sandbox[]; | 73 static const char Sandbox[]; |
| 73 static const char ScriptSrc[]; | 74 static const char ScriptSrc[]; |
| 74 static const char StyleSrc[]; | 75 static const char StyleSrc[]; |
| 75 | 76 |
| 76 // CSP 1.1 Directives | 77 // CSP 1.1 Directives |
| 77 static const char BaseURI[]; | 78 static const char BaseURI[]; |
| 78 static const char ChildSrc[]; | 79 static const char ChildSrc[]; |
| 79 static const char FormAction[]; | 80 static const char FormAction[]; |
| 80 static const char FrameAncestors[]; | 81 static const char FrameAncestors[]; |
| 81 static const char PluginTypes[]; | 82 static const char PluginTypes[]; |
| 82 static const char ReflectedXSS[]; | 83 static const char ReflectedXSS[]; |
| 83 static const char Referrer[]; | 84 static const char Referrer[]; |
| 84 | 85 |
| 86 // Experimental Directives (post CSP 1.1) | |
| 87 static const char Suborigin[]; | |
| 88 | |
| 85 static PassRefPtr<ContentSecurityPolicy> create(ExecutionContextClient* clie nt) | 89 static PassRefPtr<ContentSecurityPolicy> create(ExecutionContextClient* clie nt) |
| 86 { | 90 { |
| 87 return adoptRef(new ContentSecurityPolicy(client)); | 91 return adoptRef(new ContentSecurityPolicy(client)); |
| 88 } | 92 } |
| 89 ~ContentSecurityPolicy(); | 93 ~ContentSecurityPolicy(); |
| 90 | 94 |
| 91 void copyStateFrom(const ContentSecurityPolicy*); | 95 void copyStateFrom(const ContentSecurityPolicy*); |
| 92 | 96 |
| 93 enum ReportingStatus { | 97 enum ReportingStatus { |
| 94 SendReport, | 98 SendReport, |
| (...skipping 47 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 142 void setOverrideAllowInlineStyle(bool); | 146 void setOverrideAllowInlineStyle(bool); |
| 143 | 147 |
| 144 bool isActive() const; | 148 bool isActive() const; |
| 145 | 149 |
| 146 void reportDirectiveAsSourceExpression(const String& directiveName, const St ring& sourceExpression) const; | 150 void reportDirectiveAsSourceExpression(const String& directiveName, const St ring& sourceExpression) const; |
| 147 void reportDuplicateDirective(const String&) const; | 151 void reportDuplicateDirective(const String&) const; |
| 148 void reportInvalidDirectiveValueCharacter(const String& directiveName, const String& value) const; | 152 void reportInvalidDirectiveValueCharacter(const String& directiveName, const String& value) const; |
| 149 void reportInvalidPathCharacter(const String& directiveName, const String& v alue, const char) const; | 153 void reportInvalidPathCharacter(const String& directiveName, const String& v alue, const char) const; |
| 150 void reportInvalidPluginTypes(const String&) const; | 154 void reportInvalidPluginTypes(const String&) const; |
| 151 void reportInvalidSandboxFlags(const String&) const; | 155 void reportInvalidSandboxFlags(const String&) const; |
| 156 void reportInvalidSuboriginFlags(const String&) const; | |
| 152 void reportInvalidSourceExpression(const String& directiveName, const String & source) const; | 157 void reportInvalidSourceExpression(const String& directiveName, const String & source) const; |
| 153 void reportInvalidReflectedXSS(const String&) const; | 158 void reportInvalidReflectedXSS(const String&) const; |
| 154 void reportMissingReportURI(const String&) const; | 159 void reportMissingReportURI(const String&) const; |
| 155 void reportUnsupportedDirective(const String&) const; | 160 void reportUnsupportedDirective(const String&) const; |
| 156 void reportInvalidInReportOnly(const String&) const; | 161 void reportInvalidInReportOnly(const String&) const; |
| 157 void reportInvalidReferrer(const String&) const; | 162 void reportInvalidReferrer(const String&) const; |
| 158 void reportReportOnlyInMeta(const String&) const; | 163 void reportReportOnlyInMeta(const String&) const; |
| 159 void reportMetaOutsideHead(const String&) const; | 164 void reportMetaOutsideHead(const String&) const; |
| 160 void reportViolation(const String& directiveText, const String& effectiveDir ective, const String& consoleMessage, const KURL& blockedURL, const Vector<KURL> & reportURIs, const String& header); | 165 void reportViolation(const String& directiveText, const String& effectiveDir ective, const String& consoleMessage, const KURL& blockedURL, const Vector<KURL> & reportURIs, const String& header); |
| 161 | 166 |
| 162 void reportBlockedScriptExecutionToInspector(const String& directiveText) co nst; | 167 void reportBlockedScriptExecutionToInspector(const String& directiveText) co nst; |
| 163 | 168 |
| 164 const KURL url() const; | 169 const KURL url() const; |
| 165 KURL completeURL(const String&) const; | 170 KURL completeURL(const String&) const; |
| 166 SecurityOrigin* securityOrigin() const; | 171 SecurityOrigin* securityOrigin() const; |
| 167 void enforceSandboxFlags(SandboxFlags) const; | 172 void enforceSandboxFlags(SandboxFlags) const; |
| 173 void enforceSuborigin(SuboriginFlags) const; | |
| 168 String evalDisabledErrorMessage() const; | 174 String evalDisabledErrorMessage() const; |
| 169 | 175 |
| 170 bool experimentalFeaturesEnabled() const; | 176 bool experimentalFeaturesEnabled() const; |
| 171 | 177 |
| 172 static bool shouldBypassMainWorld(ExecutionContext*); | 178 static bool shouldBypassMainWorld(ExecutionContext*); |
| 173 | 179 |
| 174 static bool isDirectiveName(const String&); | 180 static bool isDirectiveName(const String&); |
| 175 | 181 |
| 176 ExecutionContextClient* client() const { return m_client; } | 182 ExecutionContextClient* client() const { return m_client; } |
| 177 Document* document() const { return client()->isDocument() ? toDocument(clie nt()) : 0; } | 183 Document* document() const { return client()->isDocument() ? toDocument(clie nt()) : 0; } |
| (...skipping 16 matching lines...) Expand all Loading... | |
| 194 // We put the hash functions used on the policy object so that we only need | 200 // We put the hash functions used on the policy object so that we only need |
| 195 // to calculate a hash once and then distribute it to all of the directives | 201 // to calculate a hash once and then distribute it to all of the directives |
| 196 // for validation. | 202 // for validation. |
| 197 uint8_t m_scriptHashAlgorithmsUsed; | 203 uint8_t m_scriptHashAlgorithmsUsed; |
| 198 uint8_t m_styleHashAlgorithmsUsed; | 204 uint8_t m_styleHashAlgorithmsUsed; |
| 199 }; | 205 }; |
| 200 | 206 |
| 201 } | 207 } |
| 202 | 208 |
| 203 #endif | 209 #endif |
| OLD | NEW |