| /* |
| * Copyright (C) 2012 Google, Inc. All rights reserved. |
| * |
| * Redistribution and use in source and binary forms, with or without |
| * modification, are permitted provided that the following conditions |
| * are met: |
| * 1. Redistributions of source code must retain the above copyright |
| * notice, this list of conditions and the following disclaimer. |
| * 2. Redistributions in binary form must reproduce the above copyright |
| * notice, this list of conditions and the following disclaimer in the |
| * documentation and/or other materials provided with the distribution. |
| * |
| * THIS SOFTWARE IS PROVIDED BY GOOGLE INC. ``AS IS'' AND ANY |
| * EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR |
| * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE COMPUTER, INC. OR |
| * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, |
| * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, |
| * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR |
| * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY |
| * OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
| * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE |
| * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
| */ |
| |
| #include "config.h" |
| #include "DOMSecurityPolicy.h" |
| |
| #include "ContentSecurityPolicy.h" |
| #include "ContextDestructionObserver.h" |
| #include "DOMStringList.h" |
| #include "Frame.h" |
| #include "ScriptExecutionContext.h" |
| #include <wtf/text/TextPosition.h> |
| #include <wtf/text/WTFString.h> |
| |
| namespace WebCore { |
| |
| namespace { |
| |
| bool isPolicyActiveInContext(ScriptExecutionContext* context) |
| { |
| // If the ScriptExecutionContext has been destroyed, there's no active policy. |
| if (!context) |
| return false; |
| |
| return context->contentSecurityPolicy()->isActive(); |
| } |
| |
| template<bool (ContentSecurityPolicy::*allowWithType)(const String&, const String&, const URL&, ContentSecurityPolicy::ReportingStatus) const> |
| bool isAllowedWithType(ScriptExecutionContext* context, const String& type) |
| { |
| if (!isPolicyActiveInContext(context)) |
| return true; |
| |
| return (context->contentSecurityPolicy()->*allowWithType)(type, type, URL(), ContentSecurityPolicy::SuppressReport); |
| } |
| |
| template<bool (ContentSecurityPolicy::*allowWithURL)(const URL&, ContentSecurityPolicy::ReportingStatus) const> |
| bool isAllowedWithURL(ScriptExecutionContext* context, const String& url) |
| { |
| if (!isPolicyActiveInContext(context)) |
| return true; |
| |
| URL parsedURL = context->completeURL(url); |
| if (!parsedURL.isValid()) |
| return false; // FIXME: Figure out how to throw a JavaScript error. |
| |
| return (context->contentSecurityPolicy()->*allowWithURL)(parsedURL, ContentSecurityPolicy::SuppressReport); |
| } |
| |
| template<bool (ContentSecurityPolicy::*allowWithContext)(const String&, const WTF::OrdinalNumber&, ContentSecurityPolicy::ReportingStatus) const> |
| bool isAllowed(ScriptExecutionContext* context) |
| { |
| if (!isPolicyActiveInContext(context)) |
| return true; |
| |
| return (context->contentSecurityPolicy()->*allowWithContext)(String(), WTF::OrdinalNumber::beforeFirst(), ContentSecurityPolicy::SuppressReport); |
| } |
| |
| } // namespace |
| |
| DOMSecurityPolicy::DOMSecurityPolicy(ScriptExecutionContext* context) |
| : ContextDestructionObserver(context) |
| { |
| } |
| |
| DOMSecurityPolicy::~DOMSecurityPolicy() |
| { |
| } |
| |
| bool DOMSecurityPolicy::isActive() const |
| { |
| return isPolicyActiveInContext(scriptExecutionContext()); |
| } |
| |
| PassRefPtr<DOMStringList> DOMSecurityPolicy::reportURIs() const |
| { |
| RefPtr<DOMStringList> result = DOMStringList::create(); |
| |
| if (isActive()) |
| scriptExecutionContext()->contentSecurityPolicy()->gatherReportURIs(*result.get()); |
| |
| return result.release(); |
| } |
| |
| bool DOMSecurityPolicy::allowsInlineScript() const |
| { |
| return isAllowed<&ContentSecurityPolicy::allowInlineScript>(scriptExecutionContext()); |
| } |
| |
| bool DOMSecurityPolicy::allowsInlineStyle() const |
| { |
| return isAllowed<&ContentSecurityPolicy::allowInlineStyle>(scriptExecutionContext()); |
| } |
| |
| bool DOMSecurityPolicy::allowsEval() const |
| { |
| if (!isActive()) |
| return true; |
| |
| return scriptExecutionContext()->contentSecurityPolicy()->allowEval(0, ContentSecurityPolicy::SuppressReport); |
| } |
| |
| |
| bool DOMSecurityPolicy::allowsConnectionTo(const String& url) const |
| { |
| return isAllowedWithURL<&ContentSecurityPolicy::allowConnectToSource>(scriptExecutionContext(), url); |
| } |
| |
| bool DOMSecurityPolicy::allowsFontFrom(const String& url) const |
| { |
| return isAllowedWithURL<&ContentSecurityPolicy::allowFontFromSource>(scriptExecutionContext(), url); |
| } |
| |
| bool DOMSecurityPolicy::allowsFormAction(const String& url) const |
| { |
| return isAllowedWithURL<&ContentSecurityPolicy::allowFormAction>(scriptExecutionContext(), url); |
| } |
| |
| bool DOMSecurityPolicy::allowsFrameFrom(const String& url) const |
| { |
| return isAllowedWithURL<&ContentSecurityPolicy::allowChildFrameFromSource>(scriptExecutionContext(), url); |
| } |
| |
| bool DOMSecurityPolicy::allowsImageFrom(const String& url) const |
| { |
| return isAllowedWithURL<&ContentSecurityPolicy::allowImageFromSource>(scriptExecutionContext(), url); |
| } |
| |
| bool DOMSecurityPolicy::allowsMediaFrom(const String& url) const |
| { |
| return isAllowedWithURL<&ContentSecurityPolicy::allowMediaFromSource>(scriptExecutionContext(), url); |
| } |
| |
| bool DOMSecurityPolicy::allowsObjectFrom(const String& url) const |
| { |
| return isAllowedWithURL<&ContentSecurityPolicy::allowObjectFromSource>(scriptExecutionContext(), url); |
| } |
| |
| bool DOMSecurityPolicy::allowsPluginType(const String& type) const |
| { |
| return isAllowedWithType<&ContentSecurityPolicy::allowPluginType>(scriptExecutionContext(), type); |
| } |
| |
| bool DOMSecurityPolicy::allowsScriptFrom(const String& url) const |
| { |
| return isAllowedWithURL<&ContentSecurityPolicy::allowScriptFromSource>(scriptExecutionContext(), url); |
| } |
| |
| bool DOMSecurityPolicy::allowsStyleFrom(const String& url) const |
| { |
| return isAllowedWithURL<&ContentSecurityPolicy::allowStyleFromSource>(scriptExecutionContext(), url); |
| } |
| |
| } // namespace WebCore |