OLD | NEW |
| (Empty) |
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "net/http/url_security_manager.h" | |
6 | |
7 #include <urlmon.h> | |
8 #pragma comment(lib, "urlmon.lib") | |
9 | |
10 #include "base/strings/string_util.h" | |
11 #include "base/strings/utf_string_conversions.h" | |
12 #include "base/win/scoped_comptr.h" | |
13 #include "net/http/http_auth_filter.h" | |
14 #include "url/gurl.h" | |
15 | |
16 // The Windows implementation of URLSecurityManager uses WinINet/IE's | |
17 // URL security zone manager. See the MSDN page "URL Security Zones" at | |
18 // http://msdn.microsoft.com/en-us/library/ms537021(VS.85).aspx for more | |
19 // info on the Internet Security Manager and Internet Zone Manager objects. | |
20 // | |
21 // On Windows, we honor the WinINet/IE settings and group policy related to | |
22 // URL Security Zones. See the Microsoft Knowledge Base article 182569 | |
23 // "Internet Explorer security zones registry entries for advanced users" | |
24 // (http://support.microsoft.com/kb/182569) for more info on these registry | |
25 // keys. | |
26 | |
27 namespace net { | |
28 | |
29 class URLSecurityManagerWin : public URLSecurityManager { | |
30 public: | |
31 explicit URLSecurityManagerWin(const HttpAuthFilter* whitelist_delegate); | |
32 | |
33 // URLSecurityManager methods: | |
34 virtual bool CanUseDefaultCredentials(const GURL& auth_origin) const; | |
35 virtual bool CanDelegate(const GURL& auth_origin) const; | |
36 | |
37 private: | |
38 bool EnsureSystemSecurityManager(); | |
39 | |
40 base::win::ScopedComPtr<IInternetSecurityManager> security_manager_; | |
41 scoped_ptr<const HttpAuthFilter> whitelist_delegate_; | |
42 | |
43 DISALLOW_COPY_AND_ASSIGN(URLSecurityManagerWin); | |
44 }; | |
45 | |
46 URLSecurityManagerWin::URLSecurityManagerWin( | |
47 const HttpAuthFilter* whitelist_delegate) | |
48 : whitelist_delegate_(whitelist_delegate) { | |
49 } | |
50 | |
51 bool URLSecurityManagerWin::CanUseDefaultCredentials( | |
52 const GURL& auth_origin) const { | |
53 if (!const_cast<URLSecurityManagerWin*>(this)->EnsureSystemSecurityManager()) | |
54 return false; | |
55 | |
56 base::string16 url16 = base::ASCIIToUTF16(auth_origin.spec()); | |
57 DWORD policy = 0; | |
58 HRESULT hr; | |
59 hr = security_manager_->ProcessUrlAction(url16.c_str(), | |
60 URLACTION_CREDENTIALS_USE, | |
61 reinterpret_cast<BYTE*>(&policy), | |
62 sizeof(policy), NULL, 0, | |
63 PUAF_NOUI, 0); | |
64 if (FAILED(hr)) { | |
65 LOG(ERROR) << "IInternetSecurityManager::ProcessUrlAction failed: " << hr; | |
66 return false; | |
67 } | |
68 | |
69 // Four possible policies for URLACTION_CREDENTIALS_USE. See the MSDN page | |
70 // "About URL Security Zones" at | |
71 // http://msdn.microsoft.com/en-us/library/ms537183(VS.85).aspx | |
72 switch (policy) { | |
73 case URLPOLICY_CREDENTIALS_SILENT_LOGON_OK: | |
74 return true; | |
75 case URLPOLICY_CREDENTIALS_CONDITIONAL_PROMPT: { | |
76 // This policy means "prompt the user for permission if the resource is | |
77 // not located in the Intranet zone". TODO(wtc): Note that it's | |
78 // prompting for permission (to use the default credentials), as opposed | |
79 // to prompting the user to enter a user name and password. | |
80 | |
81 // URLZONE_LOCAL_MACHINE 0 | |
82 // URLZONE_INTRANET 1 | |
83 // URLZONE_TRUSTED 2 | |
84 // URLZONE_INTERNET 3 | |
85 // URLZONE_UNTRUSTED 4 | |
86 DWORD zone = 0; | |
87 hr = security_manager_->MapUrlToZone(url16.c_str(), &zone, 0); | |
88 if (FAILED(hr)) { | |
89 LOG(ERROR) << "IInternetSecurityManager::MapUrlToZone failed: " << hr; | |
90 return false; | |
91 } | |
92 return zone <= URLZONE_INTRANET; | |
93 } | |
94 case URLPOLICY_CREDENTIALS_MUST_PROMPT_USER: | |
95 return false; | |
96 case URLPOLICY_CREDENTIALS_ANONYMOUS_ONLY: | |
97 // TODO(wtc): we should fail the authentication. | |
98 return false; | |
99 default: | |
100 NOTREACHED(); | |
101 return false; | |
102 } | |
103 } | |
104 | |
105 bool URLSecurityManagerWin::CanDelegate(const GURL& auth_origin) const { | |
106 // TODO(cbentzel): Could this just use the security zone as well? Apparently | |
107 // this is what IE does as well. | |
108 if (whitelist_delegate_.get()) | |
109 return whitelist_delegate_->IsValid(auth_origin, HttpAuth::AUTH_SERVER); | |
110 return false; | |
111 } | |
112 | |
113 bool URLSecurityManagerWin::EnsureSystemSecurityManager() { | |
114 if (!security_manager_.get()) { | |
115 HRESULT hr = CoInternetCreateSecurityManager(NULL, | |
116 security_manager_.Receive(), | |
117 NULL); | |
118 if (FAILED(hr) || !security_manager_.get()) { | |
119 LOG(ERROR) << "Unable to create the Windows Security Manager instance"; | |
120 return false; | |
121 } | |
122 } | |
123 return true; | |
124 } | |
125 | |
126 // static | |
127 URLSecurityManager* URLSecurityManager::Create( | |
128 const HttpAuthFilter* whitelist_default, | |
129 const HttpAuthFilter* whitelist_delegate) { | |
130 // If we have a whitelist, just use that. | |
131 if (whitelist_default) | |
132 return new URLSecurityManagerWhitelist(whitelist_default, | |
133 whitelist_delegate); | |
134 return new URLSecurityManagerWin(whitelist_delegate); | |
135 } | |
136 | |
137 } // namespace net | |
OLD | NEW |