| // Copyright 2015 Google Inc. All Rights Reserved. |
| // |
| // Licensed under the Apache License, Version 2.0 (the "License"); |
| // you may not use this file except in compliance with the License. |
| // You may obtain a copy of the License at |
| // |
| // http://www.apache.org/licenses/LICENSE-2.0 |
| // |
| // Unless required by applicable law or agreed to in writing, software |
| // distributed under the License is distributed on an "AS IS" BASIS, |
| // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| // See the License for the specific language governing permissions and |
| // limitations under the License. |
| |
| #ifndef COBALT_DOM_CSP_DELEGATE_H_ |
| #define COBALT_DOM_CSP_DELEGATE_H_ |
| |
| #include <string> |
| |
| #include "cobalt/base/source_location.h" |
| #include "cobalt/csp/content_security_policy.h" |
| #include "cobalt/dom/csp_violation_reporter.h" |
| |
| namespace cobalt { |
| namespace dom { |
| |
| // Object that represents a Content Security Policy for a particular document. |
| // Owned by the Document. Objects wishing to enforce CSP need to query the |
| // delegate to decide if they are permitted to load a resource. |
| // Note that any thread may call CanLoad(). |
| class CspDelegate { |
| public: |
| enum ResourceType { |
| kFont, |
| kImage, |
| kLocation, |
| kMedia, |
| kScript, |
| kStyle, |
| kXhr, |
| kWebSocket, |
| }; |
| |
| CspDelegate(); |
| virtual ~CspDelegate(); |
| |
| // Return |true| if the given resource type can be loaded from |url|. |
| // Set |did_redirect| if url was the result of a redirect. |
| virtual bool CanLoad(ResourceType type, const GURL& url, |
| bool did_redirect) const = 0; |
| virtual bool IsValidNonce(ResourceType type, |
| const std::string& nonce) const = 0; |
| |
| virtual bool AllowInline(ResourceType type, |
| const base::SourceLocation& location, |
| const std::string& script_content) const = 0; |
| |
| // Return |true| if 'unsafe-eval' is set. No report will be generated in any |
| // case. If eval_disabled_message is non-NULL, it will be set with a message |
| // that should be reported when an application attempts to use eval(). |
| virtual bool AllowEval(std::string* eval_disabled_message) const = 0; |
| |
| // Report that code was generated from a string, such as through eval() or the |
| // Function constructor. If eval() is not allowed, generate a violation |
| // report. Otherwise if eval() is allowed this is a no-op. |
| virtual void ReportEval() const = 0; |
| |
| // Signal to the CSP object that CSP policy directives have been received. |
| // Return |true| if success, |false| if failure and load should be aborted. |
| virtual bool OnReceiveHeaders(const csp::ResponseHeaders& headers) = 0; |
| virtual void OnReceiveHeader(const std::string& header, |
| csp::HeaderType header_type, |
| csp::HeaderSource header_source) = 0; |
| // Inform the policy that the document's origin has changed. |
| virtual void NotifyUrlChanged(const GURL& url) const = 0; |
| |
| private: |
| DISALLOW_COPY_AND_ASSIGN(CspDelegate); |
| }; |
| |
| // This class is just a no-op implementation that allows everything. |
| class CspDelegateInsecure : public CspDelegate { |
| public: |
| CspDelegateInsecure() {} |
| bool CanLoad(ResourceType, const GURL&, bool) const OVERRIDE { return true; } |
| bool IsValidNonce(ResourceType, const std::string&) const OVERRIDE { |
| return true; |
| } |
| bool AllowInline(ResourceType, const base::SourceLocation&, |
| const std::string&) const OVERRIDE { |
| return true; |
| } |
| bool AllowEval(std::string*) const OVERRIDE { return true; } |
| void ReportEval() const OVERRIDE {} |
| bool OnReceiveHeaders(const csp::ResponseHeaders&) OVERRIDE { return true; } |
| void OnReceiveHeader(const std::string&, csp::HeaderType, |
| csp::HeaderSource) OVERRIDE {} |
| void NotifyUrlChanged(const GURL&) const OVERRIDE {} |
| |
| private: |
| DISALLOW_COPY_AND_ASSIGN(CspDelegateInsecure); |
| }; |
| |
| class CspDelegateSecure : public CspDelegate { |
| public: |
| CspDelegateSecure(scoped_ptr<CspViolationReporter> violation_reporter, |
| const GURL& url, csp::CSPHeaderPolicy require_csp, |
| const base::Closure& policy_changed_callback); |
| ~CspDelegateSecure(); |
| |
| // Return |true| if the given resource type can be loaded from |url|. |
| // Set |did_redirect| if url was the result of a redirect. |
| bool CanLoad(ResourceType type, const GURL& url, |
| bool did_redirect) const OVERRIDE; |
| bool IsValidNonce(ResourceType type, const std::string& nonce) const OVERRIDE; |
| |
| bool AllowInline(ResourceType type, const base::SourceLocation& location, |
| const std::string& script_content) const OVERRIDE; |
| |
| // Return |true| if 'unsafe-eval' is set. No report will be generated in any |
| // case. If eval_disabled_message is non-NULL, it will be set with a message |
| // that should be reported when an application attempts to use eval(). |
| bool AllowEval(std::string* eval_disabled_message) const OVERRIDE; |
| |
| // Report that code was generated from a string, such as through eval() or the |
| // Function constructor. If eval() is not allowed, generate a violation |
| // report. Otherwise if eval() is allowed this is a no-op. |
| void ReportEval() const OVERRIDE; |
| |
| // Signal to the CSP object that CSP policy directives have been received. |
| // Return |true| if success, |false| if failure and load should be aborted. |
| bool OnReceiveHeaders(const csp::ResponseHeaders& headers) OVERRIDE; |
| void OnReceiveHeader(const std::string& header, csp::HeaderType header_type, |
| csp::HeaderSource header_source) OVERRIDE; |
| void NotifyUrlChanged(const GURL& url) const OVERRIDE { |
| return csp_->NotifyUrlChanged(url); |
| } |
| |
| protected: |
| void SetLocationPolicy(const std::string& policy); |
| |
| scoped_ptr<csp::ContentSecurityPolicy> csp_; |
| |
| // Helper class to send violation events to any reporting endpoints. |
| scoped_ptr<CspViolationReporter> reporter_; |
| |
| // We disallow all loads if CSP headers weren't received. This tracks if we |
| // did get a valid header. |
| bool was_header_received_; |
| |
| // This should be called any time the CSP policy changes. For example, after |
| // receiving (and parsing) the headers, or after encountering a CSP directive |
| // in a <meta> tag. |
| base::Closure policy_changed_callback_; |
| |
| // Whether Cobalt is forbidden to render without receiving CSP header. |
| csp::CSPHeaderPolicy require_csp_; |
| |
| private: |
| DISALLOW_COPY_AND_ASSIGN(CspDelegateSecure); |
| }; |
| |
| } // namespace dom |
| } // namespace cobalt |
| |
| #endif // COBALT_DOM_CSP_DELEGATE_H_ |