1 /* 2 * Copyright (C) 2011 Google Inc. All Rights Reserved. 3 * 4 * Redistribution and use in source and binary forms, with or without 5 * modification, are permitted provided that the following conditions 6 * are met: 7 * 1. Redistributions of source code must retain the above copyright 8 * notice, this list of conditions and the following disclaimer. 9 * 2. Redistributions in binary form must reproduce the above copyright 10 * notice, this list of conditions and the following disclaimer in the 11 * documentation and/or other materials provided with the distribution. 12 * 13 * THIS SOFTWARE IS PROVIDED BY GOOGLE, INC. ``AS IS'' AND ANY 14 * EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 15 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 16 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE COMPUTER, INC. OR 17 * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, 18 * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, 19 * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR 20 * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY 21 * OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 22 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE 23 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 24 * 25 */ 26 27 #ifndef SecurityContext_h 28 #define SecurityContext_h 29 30 #include "wtf/PassRefPtr.h" 31 #include "wtf/RefPtr.h" 32 #include "wtf/text/WTFString.h" 33 34 namespace WebCore { 35 36 class SecurityOrigin; 37 class ContentSecurityPolicy; 38 class KURL; 39 40 enum SandboxFlag { 41 // See http://www.whatwg.org/specs/web-apps/current-work/#attr-iframe-sandbox for a list of the sandbox flags. 42 SandboxNone = 0, 43 SandboxNavigation = 1, 44 SandboxPlugins = 1 << 1, 45 SandboxOrigin = 1 << 2, 46 SandboxForms = 1 << 3, 47 SandboxScripts = 1 << 4, 48 SandboxTopNavigation = 1 << 5, 49 SandboxPopups = 1 << 6, // See https://www.w3.org/Bugs/Public/show_bug.cgi?id=12393 50 SandboxAutomaticFeatures = 1 << 7, 51 SandboxSeamlessIframes = 1 << 8, 52 SandboxPointerLock = 1 << 9, 53 SandboxAll = -1 // Mask with all bits set to 1. 54 }; 55 56 typedef int SandboxFlags; 57 58 class SecurityContext { 59 public: 60 SecurityOrigin* securityOrigin() const { return m_securityOrigin.get(); } 61 SandboxFlags sandboxFlags() const { return m_sandboxFlags; } 62 ContentSecurityPolicy* contentSecurityPolicy() { return m_contentSecurityPolicy.get(); } 63 64 bool isSecureTransitionTo(const KURL&) const; 65 66 void enforceSandboxFlags(SandboxFlags mask); 67 bool isSandboxed(SandboxFlags mask) const { return m_sandboxFlags & mask; } 68 69 // Explicitly override the security origin for this security context. 70 // Note: It is dangerous to change the security origin of a script context 71 // that already contains content. 72 void setSecurityOrigin(PassRefPtr<SecurityOrigin>); 73 74 static SandboxFlags parseSandboxPolicy(const String& policy, String& invalidTokensErrorMessage); 75 76 protected: 77 SecurityContext(); 78 virtual ~SecurityContext(); 79 80 virtual void didUpdateSecurityOrigin(); 81 82 void setContentSecurityPolicy(PassOwnPtr<ContentSecurityPolicy>); 83 84 void didFailToInitializeSecurityOrigin() { m_haveInitializedSecurityOrigin = false; } 85 bool haveInitializedSecurityOrigin() const { return m_haveInitializedSecurityOrigin; } 86 87 // Set in Document::initSecurityContext() at Document creation, per: 88 // http://www.whatwg.org/specs/web-apps/current-work/#attr-iframe-seamless 89 bool m_mayDisplaySeamlesslyWithParent; 90 91 private: 92 bool m_haveInitializedSecurityOrigin; 93 SandboxFlags m_sandboxFlags; 94 RefPtr<SecurityOrigin> m_securityOrigin; 95 OwnPtr<ContentSecurityPolicy> m_contentSecurityPolicy; 96 }; 97 98 } // namespace WebCore 99 100 #endif // SecurityContext_h 101