blob: 0c5902331ffdedd29cd7ea57ff7dd0d59a316d7e [file] [log] [blame]
/*
* Copyright (C) 2011 Google, Inc. All rights reserved.
* Copyright (C) 2016 Apple Inc. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY GOOGLE INC. ``AS IS'' AND ANY
* EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE INC. OR
* CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
* EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
* PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
* PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
* OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
#include "config.h"
#include "ContentSecurityPolicySource.h"
#include "ContentSecurityPolicy.h"
#include "SecurityOriginData.h"
#include <pal/text/TextEncoding.h>
#include <wtf/URL.h>
namespace WebCore {
ContentSecurityPolicySource::ContentSecurityPolicySource(const ContentSecurityPolicy& policy, const String& scheme, const String& host, std::optional<uint16_t> port, const String& path, bool hostHasWildcard, bool portHasWildcard, IsSelfSource isSelfSource)
: m_policy(policy)
, m_scheme(scheme)
, m_host(host)
, m_path(path)
, m_port(port)
, m_hostHasWildcard(hostHasWildcard)
, m_portHasWildcard(portHasWildcard)
, m_isSelfSource(isSelfSource == IsSelfSource::Yes)
{
}
bool ContentSecurityPolicySource::matches(const URL& url, bool didReceiveRedirectResponse) const
{
// https://www.w3.org/TR/CSP3/#match-url-to-source-expression.
if (!schemeMatches(url))
return false;
if (isSchemeOnly())
return true;
return hostMatches(url) && portMatches(url) && (didReceiveRedirectResponse || pathMatches(url));
}
bool ContentSecurityPolicySource::schemeMatches(const URL& url) const
{
// https://www.w3.org/TR/CSP3/#match-schemes.
const auto& scheme = m_scheme.isEmpty() ? m_policy.selfProtocol() : m_scheme;
auto urlScheme = url.protocol().convertToASCIILowercase();
if (scheme == urlScheme)
return true;
// host-sources can do direct-upgrades.
if (scheme == "http"_s && urlScheme == "https"_s)
return true;
if (scheme == "ws"_s && (urlScheme == "wss"_s || urlScheme == "https"_s || urlScheme == "http"_s))
return true;
if (scheme == "wss"_s && urlScheme == "https"_s)
return true;
// self-sources can always upgrade to secure protocols and side-grade insecure protocols.
if ((m_isSelfSource
&& ((urlScheme == "https"_s || urlScheme == "wss"_s) || (scheme == "http"_s && urlScheme == "ws"_s))))
return true;
return false;
}
static bool wildcardMatches(StringView host, const String& hostWithWildcard)
{
auto hostLength = host.length();
auto hostWithWildcardLength = hostWithWildcard.length();
return host.endsWithIgnoringASCIICase(hostWithWildcard)
&& hostLength > hostWithWildcardLength
&& host[hostLength - hostWithWildcardLength - 1] == '.';
}
bool ContentSecurityPolicySource::hostMatches(const URL& url) const
{
auto host = url.host();
if (m_hostHasWildcard)
return wildcardMatches(host, m_host);
return equalIgnoringASCIICase(host, m_host);
}
bool ContentSecurityPolicySource::pathMatches(const URL& url) const
{
if (m_path.isEmpty())
return true;
auto path = PAL::decodeURLEscapeSequences(url.path());
if (m_path.endsWith('/'))
return path.startsWith(m_path);
return path == m_path;
}
bool ContentSecurityPolicySource::portMatches(const URL& url) const
{
if (m_portHasWildcard)
return true;
std::optional<uint16_t> port = url.port();
if (port == m_port)
return true;
// host-source and self-source allows upgrading to a more secure scheme which allows for different ports.
auto defaultSecurePort = WTF::defaultPortForProtocol("https"_s).value_or(443);
auto defaultInsecurePort = WTF::defaultPortForProtocol("http"_s).value_or(80);
bool isUpgradeSecure = (port == defaultSecurePort) || (!port && (url.protocol() == "https"_s || url.protocol() == "wss"_s));
bool isCurrentUpgradable = (m_port == defaultInsecurePort) || (m_scheme == "http"_s && (!m_port || m_port == defaultSecurePort));
if (isUpgradeSecure && isCurrentUpgradable)
return true;
if (!port)
return WTF::isDefaultPortForProtocol(m_port.value(), url.protocol());
if (!m_port)
return WTF::isDefaultPortForProtocol(port.value(), url.protocol());
return false;
}
bool ContentSecurityPolicySource::isSchemeOnly() const
{
return m_host.isEmpty();
}
ContentSecurityPolicySource::operator SecurityOriginData() const
{
return { m_scheme, m_host, m_port };
}
} // namespace WebCore