diff options
author | Lorry Tar Creator <lorry-tar-importer@lorry> | 2017-06-27 06:07:23 +0000 |
---|---|---|
committer | Lorry Tar Creator <lorry-tar-importer@lorry> | 2017-06-27 06:07:23 +0000 |
commit | 1bf1084f2b10c3b47fd1a588d85d21ed0eb41d0c (patch) | |
tree | 46dcd36c86e7fbc6e5df36deb463b33e9967a6f7 /Source/WebCore/page/SecurityOriginData.cpp | |
parent | 32761a6cee1d0dee366b885b7b9c777e67885688 (diff) | |
download | WebKitGtk-tarball-master.tar.gz |
webkitgtk-2.16.5HEADwebkitgtk-2.16.5master
Diffstat (limited to 'Source/WebCore/page/SecurityOriginData.cpp')
-rw-r--r-- | Source/WebCore/page/SecurityOriginData.cpp | 147 |
1 files changed, 147 insertions, 0 deletions
diff --git a/Source/WebCore/page/SecurityOriginData.cpp b/Source/WebCore/page/SecurityOriginData.cpp new file mode 100644 index 000000000..e2e44f062 --- /dev/null +++ b/Source/WebCore/page/SecurityOriginData.cpp @@ -0,0 +1,147 @@ +/* + * Copyright (C) 2011, 2015 Apple Inc. All rights reserved. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions + * are met: + * 1. Redistributions of source code must retain the above copyright + * notice, this list of conditions and the following disclaimer. + * 2. Redistributions in binary form must reproduce the above copyright + * notice, this list of conditions and the following disclaimer in the + * documentation and/or other materials provided with the distribution. + * + * THIS SOFTWARE IS PROVIDED BY APPLE INC. AND ITS CONTRIBUTORS ``AS IS'' + * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, + * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR + * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE INC. OR ITS CONTRIBUTORS + * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR + * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF + * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS + * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN + * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) + * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF + * THE POSSIBILITY OF SUCH DAMAGE. + */ + +#include "config.h" +#include "SecurityOriginData.h" + +#include "Document.h" +#include "Frame.h" +#include "SecurityOrigin.h" +#include <wtf/text/CString.h> +#include <wtf/text/StringBuilder.h> + +using namespace WebCore; + +namespace WebCore { + +SecurityOriginData SecurityOriginData::fromSecurityOrigin(const SecurityOrigin& securityOrigin) +{ + SecurityOriginData securityOriginData; + + securityOriginData.protocol = securityOrigin.protocol(); + securityOriginData.host = securityOrigin.host(); + securityOriginData.port = securityOrigin.port(); + + return securityOriginData; +} + +#if !LOG_DISABLED +String SecurityOriginData::debugString() const +{ + return makeString(protocol, "://", host, ":", String::number(port.value_or(0))); +} +#endif + +SecurityOriginData SecurityOriginData::fromFrame(Frame* frame) +{ + if (!frame) + return SecurityOriginData(); + + Document* document = frame->document(); + if (!document) + return SecurityOriginData(); + + return SecurityOriginData::fromSecurityOrigin(document->securityOrigin()); +} + +Ref<SecurityOrigin> SecurityOriginData::securityOrigin() const +{ + return SecurityOrigin::create(protocol.isolatedCopy(), host.isolatedCopy(), port); +} + +static const char separatorCharacter = '_'; + +String SecurityOriginData::databaseIdentifier() const +{ + // Historically, we've used the following (somewhat non-sensical) string + // for the databaseIdentifier of local files. We used to compute this + // string because of a bug in how we handled the scheme for file URLs. + // Now that we've fixed that bug, we still need to produce this string + // to avoid breaking existing persistent state. + if (equalIgnoringASCIICase(protocol, "file")) + return ASCIILiteral("file__0"); + + StringBuilder stringBuilder; + stringBuilder.append(protocol); + stringBuilder.append(separatorCharacter); + stringBuilder.append(encodeForFileName(host)); + stringBuilder.append(separatorCharacter); + stringBuilder.appendNumber(port.value_or(0)); + + return stringBuilder.toString(); +} + +std::optional<SecurityOriginData> SecurityOriginData::fromDatabaseIdentifier(const String& databaseIdentifier) +{ + // Make sure there's a first separator + size_t separator1 = databaseIdentifier.find(separatorCharacter); + if (separator1 == notFound) + return std::nullopt; + + // Make sure there's a second separator + size_t separator2 = databaseIdentifier.reverseFind(separatorCharacter); + if (separator2 == notFound) + return std::nullopt; + + // Ensure there were at least 2 separator characters. Some hostnames on intranets have + // underscores in them, so we'll assume that any additional underscores are part of the host. + if (separator1 == separator2) + return std::nullopt; + + // Make sure the port section is a valid port number or doesn't exist + bool portOkay; + int port = databaseIdentifier.right(databaseIdentifier.length() - separator2 - 1).toInt(&portOkay); + bool portAbsent = (separator2 == databaseIdentifier.length() - 1); + if (!(portOkay || portAbsent)) + return std::nullopt; + + if (port < 0 || port > std::numeric_limits<uint16_t>::max()) + return std::nullopt; + + return SecurityOriginData {databaseIdentifier.substring(0, separator1), databaseIdentifier.substring(separator1 + 1, separator2 - separator1 - 1), static_cast<uint16_t>(port)}; +} + +SecurityOriginData SecurityOriginData::isolatedCopy() const +{ + SecurityOriginData result; + + result.protocol = protocol.isolatedCopy(); + result.host = host.isolatedCopy(); + result.port = port; + + return result; +} + +bool operator==(const SecurityOriginData& a, const SecurityOriginData& b) +{ + if (&a == &b) + return true; + + return a.protocol == b.protocol + && a.host == b.host + && a.port == b.port; +} + +} // namespace WebCore |