diff options
author | Simon Hausmann <simon.hausmann@digia.com> | 2012-09-20 14:01:09 +0200 |
---|---|---|
committer | Simon Hausmann <simon.hausmann@digia.com> | 2012-09-20 14:01:09 +0200 |
commit | 6dbcd09121fe266c7704a524b5cbd7f2754659c0 (patch) | |
tree | 5ae0d16cec0cc61f576d51c57b3a4613c7e91e22 /Source/WebKit2/UIProcess/API/gtk/WebKitSecurityManager.cpp | |
parent | 6bbb7fbbac94d0f511a7bd0cbd50854ab643bfb2 (diff) | |
download | qtwebkit-6dbcd09121fe266c7704a524b5cbd7f2754659c0.tar.gz |
Imported WebKit commit 080af0beaa6f0ba8ff8f44cb8bd8b5dcf75ac0af (http://svn.webkit.org/repository/webkit/trunk@129119)
New snapshot with prospective build fix for incorrect QtWebKit master module header file creation
Diffstat (limited to 'Source/WebKit2/UIProcess/API/gtk/WebKitSecurityManager.cpp')
-rw-r--r-- | Source/WebKit2/UIProcess/API/gtk/WebKitSecurityManager.cpp | 336 |
1 files changed, 336 insertions, 0 deletions
diff --git a/Source/WebKit2/UIProcess/API/gtk/WebKitSecurityManager.cpp b/Source/WebKit2/UIProcess/API/gtk/WebKitSecurityManager.cpp new file mode 100644 index 000000000..53b46f875 --- /dev/null +++ b/Source/WebKit2/UIProcess/API/gtk/WebKitSecurityManager.cpp @@ -0,0 +1,336 @@ +/* + * Copyright (C) 2012 Igalia S.L. + * + * This library is free software; you can redistribute it and/or + * modify it under the terms of the GNU Lesser General Public + * License as published by the Free Software Foundation; either + * version 2,1 of the License, or (at your option) any later version. + * + * This library is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU + * Library General Public License for more details. + * + * You should have received a copy of the GNU Library General Public License + * along with this library; see the file COPYING.LIB. If not, write to + * the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, + * Boston, MA 02110-1301, USA. + */ + +#include "config.h" +#include "WebKitSecurityManager.h" + +#include "WebContext.h" +#include "WebKitSecurityManagerPrivate.h" +#include "WebKitWebContextPrivate.h" +#include <WebCore/SchemeRegistry.h> + +using namespace WebKit; + +typedef enum { + SecurityPolicyLocal, + SecurityPolicyNoAccess, + SecurityPolicyDisplayIsolated, + SecurityPolicySecure, + SecurityPolicyCORSEnabled, + SecurityPolicyEmptyDocument +} SecurityPolicy; + +struct _WebKitSecurityManagerPrivate { + WebKitWebContext* webContext; +}; + +G_DEFINE_TYPE(WebKitSecurityManager, webkit_security_manager, G_TYPE_OBJECT) + +static void webkit_security_manager_init(WebKitSecurityManager* manager) +{ + WebKitSecurityManagerPrivate* priv = G_TYPE_INSTANCE_GET_PRIVATE(manager, WEBKIT_TYPE_SECURITY_MANAGER, WebKitSecurityManagerPrivate); + manager->priv = priv; + new (priv) WebKitSecurityManagerPrivate(); +} + +static void webkitSecurityManagerFinalize(GObject* object) +{ + WebKitSecurityManagerPrivate* priv = WEBKIT_SECURITY_MANAGER(object)->priv; + priv->~WebKitSecurityManagerPrivate(); + G_OBJECT_CLASS(webkit_security_manager_parent_class)->finalize(object); +} + +static void webkit_security_manager_class_init(WebKitSecurityManagerClass* klass) +{ + GObjectClass* gObjectClass = G_OBJECT_CLASS(klass); + gObjectClass->finalize = webkitSecurityManagerFinalize; + + g_type_class_add_private(klass, sizeof(WebKitSecurityManagerPrivate)); +} + +WebKitSecurityManager* webkitSecurityManagerCreate(WebKitWebContext* webContext) +{ + WebKitSecurityManager* manager = WEBKIT_SECURITY_MANAGER(g_object_new(WEBKIT_TYPE_SECURITY_MANAGER, NULL)); + manager->priv->webContext = webContext; + return manager; +} + +static void registerSecurityPolicyForURIScheme(WebKitSecurityManager* manager, const char* scheme, SecurityPolicy policy) +{ + String urlScheme = String::fromUTF8(scheme); + WebContext* webContext = toImpl(webkitWebContextGetWKContext(manager->priv->webContext)); + + // We keep the WebCore::SchemeRegistry of the UI process in sync with the + // web process one, so that we can return the SecurityPolicy for + // a given URI scheme synchronously without blocking. + switch (policy) { + case SecurityPolicyLocal: + WebCore::SchemeRegistry::registerURLSchemeAsLocal(urlScheme); + webContext->registerURLSchemeAsLocal(urlScheme); + break; + case SecurityPolicyNoAccess: + WebCore::SchemeRegistry::registerURLSchemeAsNoAccess(urlScheme); + webContext->registerURLSchemeAsNoAccess(urlScheme); + break; + case SecurityPolicyDisplayIsolated: + WebCore::SchemeRegistry::registerURLSchemeAsDisplayIsolated(urlScheme); + webContext->registerURLSchemeAsDisplayIsolated(urlScheme); + break; + case SecurityPolicySecure: + WebCore::SchemeRegistry::registerURLSchemeAsSecure(urlScheme); + webContext->registerURLSchemeAsSecure(urlScheme); + break; + case SecurityPolicyCORSEnabled: + WebCore::SchemeRegistry::registerURLSchemeAsCORSEnabled(urlScheme); + webContext->registerURLSchemeAsCORSEnabled(urlScheme); + break; + case SecurityPolicyEmptyDocument: + WebCore::SchemeRegistry::registerURLSchemeAsEmptyDocument(urlScheme); + webContext->registerURLSchemeAsEmptyDocument(urlScheme); + break; + } +} + +static bool checkSecurityPolicyForURIScheme(const char* scheme, SecurityPolicy policy) +{ + String urlScheme = String::fromUTF8(scheme); + + switch (policy) { + case SecurityPolicyLocal: + return WebCore::SchemeRegistry::shouldTreatURLSchemeAsLocal(urlScheme); + case SecurityPolicyNoAccess: + return WebCore::SchemeRegistry::shouldTreatURLSchemeAsNoAccess(urlScheme); + case SecurityPolicyDisplayIsolated: + return WebCore::SchemeRegistry::shouldTreatURLSchemeAsDisplayIsolated(urlScheme); + case SecurityPolicySecure: + return WebCore::SchemeRegistry::shouldTreatURLSchemeAsSecure(urlScheme); + case SecurityPolicyCORSEnabled: + return WebCore::SchemeRegistry::shouldTreatURLSchemeAsCORSEnabled(urlScheme); + case SecurityPolicyEmptyDocument: + return WebCore::SchemeRegistry::shouldLoadURLSchemeAsEmptyDocument(urlScheme); + } + + return false; +} + +/** + * webkit_security_manager_register_uri_scheme_as_local: + * @security_manager: a #WebKitSecurityManager + * @scheme: a URI scheme + * + * Register @scheme as a local scheme. This means that other non-local pages + * cannot link to or access URIs of this scheme. + */ +void webkit_security_manager_register_uri_scheme_as_local(WebKitSecurityManager* manager, const char* scheme) +{ + g_return_if_fail(WEBKIT_IS_SECURITY_MANAGER(manager)); + g_return_if_fail(scheme); + + registerSecurityPolicyForURIScheme(manager, scheme, SecurityPolicyLocal); +} + +/** + * webkit_security_manager_uri_scheme_is_local: + * @security_manager: a #WebKitSecurityManager + * @scheme: a URI scheme + * + * Whether @scheme is considered as a local scheme. + * See also webkit_security_manager_register_uri_scheme_as_local(). + * + * Returns: %TRUE if @scheme is a local scheme or %FALSE otherwise. + */ +gboolean webkit_security_manager_uri_scheme_is_local(WebKitSecurityManager* manager, const char* scheme) +{ + g_return_val_if_fail(WEBKIT_IS_SECURITY_MANAGER(manager), FALSE); + g_return_val_if_fail(scheme, FALSE); + + return checkSecurityPolicyForURIScheme(scheme, SecurityPolicyLocal); +} + +/** + * webkit_security_manager_register_uri_scheme_as_no_access: + * @security_manager: a #WebKitSecurityManager + * @scheme: a URI scheme + * + * Register @scheme as a no-access scheme. This means that pages loaded + * with this URI scheme cannot access pages loaded with any other URI scheme. + */ +void webkit_security_manager_register_uri_scheme_as_no_access(WebKitSecurityManager* manager, const char* scheme) +{ + g_return_if_fail(WEBKIT_IS_SECURITY_MANAGER(manager)); + g_return_if_fail(scheme); + + registerSecurityPolicyForURIScheme(manager, scheme, SecurityPolicyNoAccess); +} + +/** + * webkit_security_manager_uri_scheme_is_no_access: + * @security_manager: a #WebKitSecurityManager + * @scheme: a URI scheme + * + * Whether @scheme is considered as a no-access scheme. + * See also webkit_security_manager_register_uri_scheme_as_no_access(). + * + * Returns: %TRUE if @scheme is a no-access scheme or %FALSE otherwise. + */ +gboolean webkit_security_manager_uri_scheme_is_no_access(WebKitSecurityManager* manager, const char* scheme) +{ + g_return_val_if_fail(WEBKIT_IS_SECURITY_MANAGER(manager), FALSE); + g_return_val_if_fail(scheme, FALSE); + + return checkSecurityPolicyForURIScheme(scheme, SecurityPolicyNoAccess); +} + +/** + * webkit_security_manager_register_uri_scheme_as_display_isolated: + * @security_manager: a #WebKitSecurityManager + * @scheme: a URI scheme + * + * Register @scheme as a display isolated scheme. This means that pages cannot + * display these URIs unless they are from the same scheme. + */ +void webkit_security_manager_register_uri_scheme_as_display_isolated(WebKitSecurityManager* manager, const char* scheme) +{ + g_return_if_fail(WEBKIT_IS_SECURITY_MANAGER(manager)); + g_return_if_fail(scheme); + + registerSecurityPolicyForURIScheme(manager, scheme, SecurityPolicyDisplayIsolated); +} + +/** + * webkit_security_manager_uri_scheme_is_display_isolated: + * @security_manager: a #WebKitSecurityManager + * @scheme: a URI scheme + * + * Whether @scheme is considered as a display isolated scheme. + * See also webkit_security_manager_register_uri_scheme_as_display_isolated(). + * + * Returns: %TRUE if @scheme is a display isolated scheme or %FALSE otherwise. + */ +gboolean webkit_security_manager_uri_scheme_is_display_isolated(WebKitSecurityManager* manager, const char* scheme) +{ + g_return_val_if_fail(WEBKIT_IS_SECURITY_MANAGER(manager), FALSE); + g_return_val_if_fail(scheme, FALSE); + + return checkSecurityPolicyForURIScheme(scheme, SecurityPolicyDisplayIsolated); +} + +/** + * webkit_security_manager_register_uri_scheme_as_secure: + * @security_manager: a #WebKitSecurityManager + * @scheme: a URI scheme + * + * Register @scheme as a secure scheme. This means that mixed + * content warnings won't be generated for this scheme when + * included by an HTTPS page. + */ +void webkit_security_manager_register_uri_scheme_as_secure(WebKitSecurityManager* manager, const char* scheme) +{ + g_return_if_fail(WEBKIT_IS_SECURITY_MANAGER(manager)); + g_return_if_fail(scheme); + + registerSecurityPolicyForURIScheme(manager, scheme, SecurityPolicySecure); +} + +/** + * webkit_security_manager_uri_scheme_is_secure: + * @security_manager: a #WebKitSecurityManager + * @scheme: a URI scheme + * + * Whether @scheme is considered as a secure scheme. + * See also webkit_security_manager_register_uri_scheme_as_secure(). + * + * Returns: %TRUE if @scheme is a secure scheme or %FALSE otherwise. + */ +gboolean webkit_security_manager_uri_scheme_is_secure(WebKitSecurityManager* manager, const char* scheme) +{ + g_return_val_if_fail(WEBKIT_IS_SECURITY_MANAGER(manager), FALSE); + g_return_val_if_fail(scheme, FALSE); + + return checkSecurityPolicyForURIScheme(scheme, SecurityPolicySecure); +} + +/** + * webkit_security_manager_register_uri_scheme_as_cors_enabled: + * @security_manager: a #WebKitSecurityManager + * @scheme: a URI scheme + * + * Register @scheme as a CORS (Cross-origin resource sharing) enabled scheme. + * This means that CORS requests are allowed. See W3C CORS specification + * http://www.w3.org/TR/cors/. + */ +void webkit_security_manager_register_uri_scheme_as_cors_enabled(WebKitSecurityManager* manager, const char* scheme) +{ + g_return_if_fail(WEBKIT_IS_SECURITY_MANAGER(manager)); + g_return_if_fail(scheme); + + registerSecurityPolicyForURIScheme(manager, scheme, SecurityPolicyCORSEnabled); +} + +/** + * webkit_security_manager_uri_scheme_is_cors_enabled: + * @security_manager: a #WebKitSecurityManager + * @scheme: a URI scheme + * + * Whether @scheme is considered as a CORS enabled scheme. + * See also webkit_security_manager_register_uri_scheme_as_cors_enabled(). + * + * Returns: %TRUE if @scheme is a CORS enabled scheme or %FALSE otherwise. + */ +gboolean webkit_security_manager_uri_scheme_is_cors_enabled(WebKitSecurityManager* manager, const char* scheme) +{ + g_return_val_if_fail(WEBKIT_IS_SECURITY_MANAGER(manager), FALSE); + g_return_val_if_fail(scheme, FALSE); + + return checkSecurityPolicyForURIScheme(scheme, SecurityPolicyCORSEnabled); +} + +/** + * webkit_security_manager_register_uri_scheme_as_empty_document: + * @security_manager: a #WebKitSecurityManager + * @scheme: a URI scheme + * + * Register @scheme as an empty document scheme. This means that + * they are allowd to commit synchronously. + */ +void webkit_security_manager_register_uri_scheme_as_empty_document(WebKitSecurityManager* manager, const char* scheme) +{ + g_return_if_fail(WEBKIT_IS_SECURITY_MANAGER(manager)); + g_return_if_fail(scheme); + + registerSecurityPolicyForURIScheme(manager, scheme, SecurityPolicyEmptyDocument); +} + +/** + * webkit_security_manager_uri_scheme_is_empty_document: + * @security_manager: a #WebKitSecurityManager + * @scheme: a URI scheme + * + * Whether @scheme is considered as an empty document scheme. + * See also webkit_security_manager_register_uri_scheme_as_empty_document(). + * + * Returns: %TRUE if @scheme is a an empty document scheme or %FALSE otherwise. + */ +gboolean webkit_security_manager_uri_scheme_is_empty_document(WebKitSecurityManager* manager, const char* scheme) +{ + g_return_val_if_fail(WEBKIT_IS_SECURITY_MANAGER(manager), FALSE); + g_return_val_if_fail(scheme, FALSE); + + return checkSecurityPolicyForURIScheme(scheme, SecurityPolicyEmptyDocument); +} |