| /* |
| * Copyright (C) 2012 Google Inc. All rights reserved. |
| * |
| * Redistribution and use in source and binary forms, with or without |
| * modification, are permitted provided that the following conditions are |
| * met: |
| * |
| * * Redistributions of source code must retain the above copyright |
| * notice, this list of conditions and the following disclaimer. |
| * * Redistributions in binary form must reproduce the above |
| * copyright notice, this list of conditions and the following disclaimer |
| * in the documentation and/or other materials provided with the |
| * distribution. |
| * * Neither the name of Google Inc. nor the names of its |
| * contributors may be used to endorse or promote products derived from |
| * this software without specific prior written permission. |
| * |
| * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS |
| * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT |
| * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR |
| * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT |
| * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
| * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT |
| * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
| * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
| * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
| * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE |
| * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
| */ |
| |
| #ifndef MixedContentChecker_h |
| #define MixedContentChecker_h |
| |
| #include "base/gtest_prod_util.h" |
| #include "core/CoreExport.h" |
| #include "platform/heap/Handle.h" |
| #include "platform/loader/fetch/ResourceRequest.h" |
| #include "platform/weborigin/SecurityViolationReportingPolicy.h" |
| #include "platform/wtf/text/WTFString.h" |
| #include "public/platform/WebMixedContentContextType.h" |
| #include "public/platform/WebURLRequest.h" |
| |
| namespace blink { |
| |
| class ExecutionContext; |
| class Frame; |
| class LocalFrame; |
| class KURL; |
| class ResourceResponse; |
| class SecurityOrigin; |
| class SourceLocation; |
| class WorkerOrWorkletGlobalScope; |
| class WebWorkerFetchContext; |
| |
| // Checks resource loads for mixed content. If PlzNavigate is enabled then this |
| // class only checks for sub-resource loads while frame-level loads are |
| // delegated to the browser where they are checked by |
| // MixedContentNavigationThrottle. Changes to this class might need to be |
| // reflected on its browser counterpart. |
| // |
| // Current mixed content W3C draft that drives this implementation: |
| // https://w3c.github.io/webappsec-mixed-content/ |
| class CORE_EXPORT MixedContentChecker final { |
| WTF_MAKE_NONCOPYABLE(MixedContentChecker); |
| DISALLOW_NEW(); |
| |
| public: |
| static bool ShouldBlockFetch(LocalFrame*, |
| WebURLRequest::RequestContext, |
| WebURLRequest::FrameType, |
| ResourceRequest::RedirectStatus, |
| const KURL&, |
| SecurityViolationReportingPolicy = |
| SecurityViolationReportingPolicy::kReport); |
| static bool ShouldBlockFetch( |
| LocalFrame* frame, |
| const ResourceRequest& request, |
| const KURL& url, |
| SecurityViolationReportingPolicy reporting_policy = |
| SecurityViolationReportingPolicy::kReport) { |
| return ShouldBlockFetch(frame, request.GetRequestContext(), |
| request.GetFrameType(), request.GetRedirectStatus(), |
| url, reporting_policy); |
| } |
| |
| static bool ShouldBlockFetchOnWorker(WorkerOrWorkletGlobalScope*, |
| WebWorkerFetchContext*, |
| const ResourceRequest&, |
| const KURL&, |
| SecurityViolationReportingPolicy); |
| |
| static bool ShouldBlockWebSocket( |
| LocalFrame*, |
| const KURL&, |
| SecurityViolationReportingPolicy = |
| SecurityViolationReportingPolicy::kReport); |
| |
| static bool IsMixedContent(SecurityOrigin*, const KURL&); |
| static bool IsMixedFormAction(LocalFrame*, |
| const KURL&, |
| SecurityViolationReportingPolicy = |
| SecurityViolationReportingPolicy::kReport); |
| |
| static void CheckMixedPrivatePublic(LocalFrame*, |
| const AtomicString& resource_ip_address); |
| |
| static WebMixedContentContextType ContextTypeForInspector( |
| LocalFrame*, |
| const ResourceRequest&); |
| |
| // Returns the frame that should be considered the effective frame |
| // for a mixed content check for the given frame type. |
| static Frame* EffectiveFrameForFrameType(LocalFrame*, |
| WebURLRequest::FrameType); |
| |
| static void HandleCertificateError(LocalFrame*, |
| const ResourceResponse&, |
| WebURLRequest::FrameType, |
| WebURLRequest::RequestContext); |
| |
| // Receive information about mixed content found externally. |
| static void MixedContentFound(LocalFrame*, |
| const KURL& main_resource_url, |
| const KURL& mixed_content_url, |
| WebURLRequest::RequestContext, |
| bool was_allowed, |
| bool had_redirect, |
| std::unique_ptr<SourceLocation>); |
| |
| private: |
| FRIEND_TEST_ALL_PREFIXES(MixedContentCheckerTest, HandleCertificateError); |
| |
| static Frame* InWhichFrameIsContentMixed(Frame*, |
| WebURLRequest::FrameType, |
| const KURL&, |
| const LocalFrame*); |
| |
| static void LogToConsoleAboutFetch(ExecutionContext*, |
| const KURL&, |
| const KURL&, |
| WebURLRequest::RequestContext, |
| bool allowed, |
| std::unique_ptr<SourceLocation>); |
| static void LogToConsoleAboutWebSocket(LocalFrame*, |
| const KURL&, |
| const KURL&, |
| bool allowed); |
| static void Count(Frame*, WebURLRequest::RequestContext, const LocalFrame*); |
| }; |
| |
| } // namespace blink |
| |
| #endif // MixedContentChecker_h |