blob: d1e5bf0cc13f29289d6096bcb35374724db69ec5 [file] [log] [blame]
kinuko8cbea052015-04-25 13:35:431// Copyright 2015 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include "content/public/common/origin_util.h"
6
7#include "base/lazy_instance.h"
8#include "base/stl_util.h"
9#include "content/public/common/content_client.h"
10#include "net/base/net_util.h"
11#include "url/gurl.h"
12
13namespace content {
14
15namespace {
16
annekao1db36fd2015-07-29 17:09:1617class SchemeAndOriginWhitelist {
kinuko8cbea052015-04-25 13:35:4318 public:
annekao1db36fd2015-07-29 17:09:1619 SchemeAndOriginWhitelist() { Reset(); }
20 ~SchemeAndOriginWhitelist() {}
kinuko8cbea052015-04-25 13:35:4321
22 void Reset() {
annekao1db36fd2015-07-29 17:09:1623 GetContentClient()->AddSecureSchemesAndOrigins(&secure_schemes_,
24 &secure_origins_);
25 GetContentClient()->AddServiceWorkerSchemes(&service_worker_schemes_);
kinuko8cbea052015-04-25 13:35:4326 }
27
annekao1db36fd2015-07-29 17:09:1628 const std::set<std::string>& secure_schemes() const {
29 return secure_schemes_;
30 }
31 const std::set<GURL>& secure_origins() const { return secure_origins_; }
32 const std::set<std::string>& service_worker_schemes() const {
33 return service_worker_schemes_;
34 }
kinuko8cbea052015-04-25 13:35:4335
36 private:
annekao1db36fd2015-07-29 17:09:1637 std::set<std::string> secure_schemes_;
38 std::set<GURL> secure_origins_;
39 std::set<std::string> service_worker_schemes_;
40 DISALLOW_COPY_AND_ASSIGN(SchemeAndOriginWhitelist);
kinuko8cbea052015-04-25 13:35:4341};
42
annekao1db36fd2015-07-29 17:09:1643base::LazyInstance<SchemeAndOriginWhitelist>::Leaky g_trustworthy_whitelist =
kinuko8cbea052015-04-25 13:35:4344 LAZY_INSTANCE_INITIALIZER;
45
46} // namespace
47
48bool IsOriginSecure(const GURL& url) {
49 if (url.SchemeIsCryptographic() || url.SchemeIsFile())
50 return true;
51
52 if (url.SchemeIsFileSystem() && url.inner_url() &&
53 IsOriginSecure(*url.inner_url())) {
54 return true;
55 }
56
57 std::string hostname = url.HostNoBrackets();
58 if (net::IsLocalhost(hostname))
59 return true;
60
annekao1db36fd2015-07-29 17:09:1661 if (ContainsKey(g_trustworthy_whitelist.Get().secure_schemes(), url.scheme()))
kinuko8cbea052015-04-25 13:35:4362 return true;
63
annekao1db36fd2015-07-29 17:09:1664 if (ContainsKey(g_trustworthy_whitelist.Get().secure_origins(),
65 url.GetOrigin())) {
kinuko8cbea052015-04-25 13:35:4366 return true;
annekao1db36fd2015-07-29 17:09:1667 }
kinuko8cbea052015-04-25 13:35:4368
69 return false;
70}
71
annekao1db36fd2015-07-29 17:09:1672bool OriginCanAccessServiceWorkers(const GURL& url) {
73 if (url.SchemeIsHTTPOrHTTPS() && IsOriginSecure(url))
74 return true;
75
76 if (ContainsKey(g_trustworthy_whitelist.Get().service_worker_schemes(),
77 url.scheme())) {
78 return true;
79 }
80
81 return false;
82}
83
84void ResetSchemesAndOriginsWhitelistForTesting() {
kinukoaaff1f6f2015-05-01 04:04:1385 g_trustworthy_whitelist.Get().Reset();
86}
87
kinuko8cbea052015-04-25 13:35:4388} // namespace content