blob: dbb2ae290c70c260ebed2256804856a47220fcc6 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
|
// Copyright 2014 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "content/public/common/referrer.h"
#include <string>
#include "base/command_line.h"
#include "content/public/common/content_switches.h"
namespace content {
// static
Referrer Referrer::SanitizeForRequest(const GURL& request,
const Referrer& referrer) {
Referrer sanitized_referrer(referrer.url.GetAsReferrer(), referrer.policy);
if (sanitized_referrer.policy == blink::kWebReferrerPolicyDefault) {
if (base::CommandLine::ForCurrentProcess()->HasSwitch(
switches::kReducedReferrerGranularity)) {
sanitized_referrer.policy =
blink::kWebReferrerPolicyNoReferrerWhenDowngradeOriginWhenCrossOrigin;
} else {
sanitized_referrer.policy =
blink::kWebReferrerPolicyNoReferrerWhenDowngrade;
}
}
if (sanitized_referrer.policy < 0 ||
sanitized_referrer.policy > blink::kWebReferrerPolicyLast) {
NOTREACHED();
sanitized_referrer.policy = blink::kWebReferrerPolicyNever;
}
if (!request.SchemeIsHTTPOrHTTPS() ||
!sanitized_referrer.url.SchemeIsValidForReferrer()) {
sanitized_referrer.url = GURL();
return sanitized_referrer;
}
bool is_downgrade = sanitized_referrer.url.SchemeIsCryptographic() &&
!request.SchemeIsCryptographic();
switch (sanitized_referrer.policy) {
case blink::kWebReferrerPolicyDefault:
NOTREACHED();
break;
case blink::kWebReferrerPolicyNoReferrerWhenDowngrade:
if (is_downgrade)
sanitized_referrer.url = GURL();
break;
case blink::kWebReferrerPolicyAlways:
break;
case blink::kWebReferrerPolicyNever:
sanitized_referrer.url = GURL();
break;
case blink::kWebReferrerPolicyOrigin:
sanitized_referrer.url = sanitized_referrer.url.GetOrigin();
break;
case blink::kWebReferrerPolicyOriginWhenCrossOrigin:
if (request.GetOrigin() != sanitized_referrer.url.GetOrigin())
sanitized_referrer.url = sanitized_referrer.url.GetOrigin();
break;
case blink::kWebReferrerPolicyNoReferrerWhenDowngradeOriginWhenCrossOrigin:
if (is_downgrade) {
sanitized_referrer.url = GURL();
} else if (request.GetOrigin() != sanitized_referrer.url.GetOrigin()) {
sanitized_referrer.url = sanitized_referrer.url.GetOrigin();
}
break;
}
return sanitized_referrer;
}
// static
void Referrer::SetReferrerForRequest(net::URLRequest* request,
const Referrer& referrer) {
base::CommandLine* command_line = base::CommandLine::ForCurrentProcess();
if (!referrer.url.is_valid() ||
command_line->HasSwitch(switches::kNoReferrers)) {
request->SetReferrer(std::string());
} else {
request->SetReferrer(referrer.url.spec());
}
request->set_referrer_policy(ReferrerPolicyForUrlRequest(referrer));
}
// static
net::URLRequest::ReferrerPolicy Referrer::ReferrerPolicyForUrlRequest(
const Referrer& referrer) {
switch (referrer.policy) {
case blink::kWebReferrerPolicyAlways:
return net::URLRequest::NEVER_CLEAR_REFERRER;
case blink::kWebReferrerPolicyNever:
return net::URLRequest::NO_REFERRER;
case blink::kWebReferrerPolicyOrigin:
return net::URLRequest::ORIGIN;
case blink::kWebReferrerPolicyNoReferrerWhenDowngrade:
return net::URLRequest::
CLEAR_REFERRER_ON_TRANSITION_FROM_SECURE_TO_INSECURE;
case blink::kWebReferrerPolicyOriginWhenCrossOrigin:
return net::URLRequest::ORIGIN_ONLY_ON_TRANSITION_CROSS_ORIGIN;
case blink::kWebReferrerPolicyDefault:
if (base::CommandLine::ForCurrentProcess()->HasSwitch(
switches::kReducedReferrerGranularity)) {
return net::URLRequest::
REDUCE_REFERRER_GRANULARITY_ON_TRANSITION_CROSS_ORIGIN;
}
return net::URLRequest::
CLEAR_REFERRER_ON_TRANSITION_FROM_SECURE_TO_INSECURE;
case blink::kWebReferrerPolicyNoReferrerWhenDowngradeOriginWhenCrossOrigin:
return net::URLRequest::
REDUCE_REFERRER_GRANULARITY_ON_TRANSITION_CROSS_ORIGIN;
}
return net::URLRequest::CLEAR_REFERRER_ON_TRANSITION_FROM_SECURE_TO_INSECURE;
}
} // namespace content
|