| // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #ifndef NET_HTTP_URL_SECURITY_MANAGER_H_ |
| #define NET_HTTP_URL_SECURITY_MANAGER_H_ |
| |
| #include <memory> |
| |
| #include "base/macros.h" |
| #include "net/base/net_export.h" |
| |
| class GURL; |
| |
| namespace net { |
| |
| class HttpAuthFilter; |
| |
| // The URL security manager controls the policies (allow, deny, prompt user) |
| // regarding URL actions (e.g., sending the default credentials to a server). |
| class NET_EXPORT_PRIVATE URLSecurityManager { |
| public: |
| URLSecurityManager() {} |
| virtual ~URLSecurityManager() {} |
| |
| // Creates a platform-dependent instance of URLSecurityManager. |
| // |
| // A security manager has two whitelists, a "default whitelist" that is a |
| // whitelist of servers with which default credentials can be used, and a |
| // "delegate whitelist" that is the whitelist of servers that are allowed to |
| // have delegated Kerberos tickets. |
| // |
| // On creation both whitelists are NULL. |
| // |
| // If the default whitelist is NULL and the platform is Windows, it indicates |
| // that security zone mapping should be used to determine whether default |
| // credentials should be used. If the default whitelist is NULL and the |
| // platform is non-Windows, it indicates that no servers should be |
| // whitelisted. |
| // |
| // If the delegate whitelist is NULL no servers can have delegated Kerberos |
| // tickets. |
| // |
| static std::unique_ptr<URLSecurityManager> Create(); |
| |
| // Returns true if we can send the default credentials to the server at |
| // |auth_origin| for HTTP NTLM or Negotiate authentication. |
| virtual bool CanUseDefaultCredentials(const GURL& auth_origin) const = 0; |
| |
| // Returns true if Kerberos delegation is allowed for the server at |
| // |auth_origin| for HTTP Negotiate authentication. |
| virtual bool CanDelegate(const GURL& auth_origin) const = 0; |
| |
| virtual void SetDefaultWhitelist( |
| std::unique_ptr<HttpAuthFilter> whitelist_default) = 0; |
| virtual void SetDelegateWhitelist( |
| std::unique_ptr<HttpAuthFilter> whitelist_delegate) = 0; |
| |
| private: |
| DISALLOW_COPY_AND_ASSIGN(URLSecurityManager); |
| }; |
| |
| class URLSecurityManagerWhitelist : public URLSecurityManager { |
| public: |
| URLSecurityManagerWhitelist(); |
| ~URLSecurityManagerWhitelist() override; |
| |
| // URLSecurityManager methods. |
| bool CanUseDefaultCredentials(const GURL& auth_origin) const override; |
| bool CanDelegate(const GURL& auth_origin) const override; |
| void SetDefaultWhitelist( |
| std::unique_ptr<HttpAuthFilter> whitelist_default) override; |
| void SetDelegateWhitelist( |
| std::unique_ptr<HttpAuthFilter> whitelist_delegate) override; |
| |
| protected: |
| bool HasDefaultWhitelist() const; |
| |
| private: |
| std::unique_ptr<const HttpAuthFilter> whitelist_default_; |
| std::unique_ptr<const HttpAuthFilter> whitelist_delegate_; |
| |
| DISALLOW_COPY_AND_ASSIGN(URLSecurityManagerWhitelist); |
| }; |
| |
| } // namespace net |
| |
| #endif // NET_HTTP_URL_SECURITY_MANAGER_H_ |