Home | History | Annotate | Download | only in dom
      1 /*
      2  * Copyright (C) 2011 Google Inc. All Rights Reserved.
      3  *
      4  * Redistribution and use in source and binary forms, with or without
      5  * modification, are permitted provided that the following conditions
      6  * are met:
      7  * 1. Redistributions of source code must retain the above copyright
      8  *    notice, this list of conditions and the following disclaimer.
      9  * 2. Redistributions in binary form must reproduce the above copyright
     10  *    notice, this list of conditions and the following disclaimer in the
     11  *    documentation and/or other materials provided with the distribution.
     12  *
     13  * THIS SOFTWARE IS PROVIDED BY GOOGLE, INC. ``AS IS'' AND ANY
     14  * EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     15  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     16  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL APPLE COMPUTER, INC. OR
     17  * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
     18  * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
     19  * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
     20  * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
     21  * OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
     22  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
     23  * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
     24  *
     25  */
     26 
     27 #ifndef SecurityContext_h
     28 #define SecurityContext_h
     29 
     30 #include "wtf/PassRefPtr.h"
     31 #include "wtf/RefPtr.h"
     32 #include "wtf/text/WTFString.h"
     33 
     34 namespace WebCore {
     35 
     36 class SecurityOrigin;
     37 class ContentSecurityPolicy;
     38 class KURL;
     39 
     40 enum SandboxFlag {
     41     // See http://www.whatwg.org/specs/web-apps/current-work/#attr-iframe-sandbox for a list of the sandbox flags.
     42     SandboxNone = 0,
     43     SandboxNavigation = 1,
     44     SandboxPlugins = 1 << 1,
     45     SandboxOrigin = 1 << 2,
     46     SandboxForms = 1 << 3,
     47     SandboxScripts = 1 << 4,
     48     SandboxTopNavigation = 1 << 5,
     49     SandboxPopups = 1 << 6, // See https://www.w3.org/Bugs/Public/show_bug.cgi?id=12393
     50     SandboxAutomaticFeatures = 1 << 7,
     51     SandboxSeamlessIframes = 1 << 8,
     52     SandboxPointerLock = 1 << 9,
     53     SandboxAll = -1 // Mask with all bits set to 1.
     54 };
     55 
     56 typedef int SandboxFlags;
     57 
     58 class SecurityContext {
     59 public:
     60     SecurityOrigin* securityOrigin() const { return m_securityOrigin.get(); }
     61     SandboxFlags sandboxFlags() const { return m_sandboxFlags; }
     62     ContentSecurityPolicy* contentSecurityPolicy() { return m_contentSecurityPolicy.get(); }
     63 
     64     bool isSecureTransitionTo(const KURL&) const;
     65 
     66     void enforceSandboxFlags(SandboxFlags mask);
     67     bool isSandboxed(SandboxFlags mask) const { return m_sandboxFlags & mask; }
     68 
     69     // Explicitly override the security origin for this security context.
     70     // Note: It is dangerous to change the security origin of a script context
     71     //       that already contains content.
     72     void setSecurityOrigin(PassRefPtr<SecurityOrigin>);
     73 
     74     static SandboxFlags parseSandboxPolicy(const String& policy, String& invalidTokensErrorMessage);
     75 
     76 protected:
     77     SecurityContext();
     78     virtual ~SecurityContext();
     79 
     80     virtual void didUpdateSecurityOrigin();
     81 
     82     void setContentSecurityPolicy(PassOwnPtr<ContentSecurityPolicy>);
     83 
     84     void didFailToInitializeSecurityOrigin() { m_haveInitializedSecurityOrigin = false; }
     85     bool haveInitializedSecurityOrigin() const { return m_haveInitializedSecurityOrigin; }
     86 
     87     // Set in Document::initSecurityContext() at Document creation, per:
     88     // http://www.whatwg.org/specs/web-apps/current-work/#attr-iframe-seamless
     89     bool m_mayDisplaySeamlesslyWithParent;
     90 
     91 private:
     92     bool m_haveInitializedSecurityOrigin;
     93     SandboxFlags m_sandboxFlags;
     94     RefPtr<SecurityOrigin> m_securityOrigin;
     95     OwnPtr<ContentSecurityPolicy> m_contentSecurityPolicy;
     96 };
     97 
     98 } // namespace WebCore
     99 
    100 #endif // SecurityContext_h
    101