blob: c51af2f78c9fd6a78703a1c41d09c9927fe19369 [file] [log] [blame]
/*
* Copyright (C) 2015 Apple Inc. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY APPLE INC. AND ITS CONTRIBUTORS ``AS IS''
* AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
* THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE INC. OR ITS CONTRIBUTORS
* BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
* THE POSSIBILITY OF SUCH DAMAGE.
*/
#include "config.h"
#include "WebsiteDataRecord.h"
#include <WebCore/LocalizedStrings.h>
#include <WebCore/PublicSuffix.h>
#include <WebCore/SecurityOrigin.h>
#if PLATFORM(COCOA)
#import <pal/spi/cf/CFNetworkSPI.h>
#endif
static String displayNameForLocalFiles()
{
return WEB_UI_STRING("Local documents on your computer", "'Website' name displayed when local documents have stored local data");
}
namespace WebKit {
String WebsiteDataRecord::displayNameForCookieHostName(const String& hostName)
{
#if PLATFORM(COCOA)
if (hostName == String(kCFHTTPCookieLocalFileDomain))
return displayNameForLocalFiles();
#else
if (hostName == "localhost")
return hostName;
#endif
#if ENABLE(PUBLIC_SUFFIX_LIST)
return WebCore::topPrivatelyControlledDomain(hostName.startsWith('.') ? hostName.substring(1) : hostName);
#endif
return String();
}
#if ENABLE(NETSCAPE_PLUGIN_API)
String WebsiteDataRecord::displayNameForPluginDataHostName(const String& hostName)
{
#if ENABLE(PUBLIC_SUFFIX_LIST)
return WebCore::topPrivatelyControlledDomain(hostName);
#endif
return String();
}
#endif
String WebsiteDataRecord::displayNameForOrigin(const WebCore::SecurityOriginData& securityOrigin)
{
const auto& protocol = securityOrigin.protocol;
if (protocol == "file")
return displayNameForLocalFiles();
#if ENABLE(PUBLIC_SUFFIX_LIST)
if (protocol == "http" || protocol == "https")
return WebCore::topPrivatelyControlledDomain(securityOrigin.host);
#endif
return String();
}
void WebsiteDataRecord::add(WebsiteDataType type, const WebCore::SecurityOriginData& origin)
{
types |= type;
origins.add(origin);
}
void WebsiteDataRecord::addCookieHostName(const String& hostName)
{
types |= WebsiteDataType::Cookies;
cookieHostNames.add(hostName);
}
#if ENABLE(NETSCAPE_PLUGIN_API)
void WebsiteDataRecord::addPluginDataHostName(const String& hostName)
{
types |= WebsiteDataType::PlugInData;
pluginDataHostNames.add(hostName);
}
#endif
static inline bool hostIsInDomain(StringView host, StringView domain)
{
if (!host.endsWithIgnoringASCIICase(domain))
return false;
ASSERT(host.length() >= domain.length());
unsigned suffixOffset = host.length() - domain.length();
return !suffixOffset || host[suffixOffset - 1] == '.';
}
bool WebsiteDataRecord::matchesTopPrivatelyControlledDomain(const String& topPrivatelyControlledDomain) const
{
if (topPrivatelyControlledDomain.isEmpty())
return false;
if (types.contains(WebsiteDataType::Cookies)) {
for (const auto& hostName : cookieHostNames) {
if (hostIsInDomain(hostName, topPrivatelyControlledDomain))
return true;
}
}
for (const auto& dataRecordOriginData : origins) {
if (hostIsInDomain(dataRecordOriginData.host, topPrivatelyControlledDomain))
return true;
}
return false;
}
String WebsiteDataRecord::topPrivatelyControlledDomain()
{
#if ENABLE(PUBLIC_SUFFIX_LIST)
if (!cookieHostNames.isEmpty())
return WebCore::topPrivatelyControlledDomain(cookieHostNames.takeAny());
if (!origins.isEmpty())
return WebCore::topPrivatelyControlledDomain(origins.takeAny().securityOrigin().get().host());
#if ENABLE(NETSCAPE_PLUGIN_API)
if (!pluginDataHostNames.isEmpty())
return WebCore::topPrivatelyControlledDomain(pluginDataHostNames.takeAny());
#endif
#endif // ENABLE(PUBLIC_SUFFIX_LIST)
return emptyString();
}
void WebsiteDataRecord::addOriginWithCredential(const String& origin)
{
types |= WebsiteDataType::Credentials;
originsWithCredentials.add(origin);
}
}