1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126
|
/*
* Copyright (C) 2021 Apple Inc. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY APPLE INC. AND ITS CONTRIBUTORS ``AS IS''
* AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
* THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE INC. OR ITS CONTRIBUTORS
* BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
* THE POSSIBILITY OF SUCH DAMAGE.
*/
#pragma once
#include "SecurityOrigin.h"
#include <wtf/URL.h>
#include <wtf/text/WTFString.h>
namespace WebCore {
class ResourceResponse;
class ScriptExecutionContext;
// https://html.spec.whatwg.org/multipage/origin.html#cross-origin-opener-policy-value
enum class CrossOriginOpenerPolicyValue : uint8_t {
UnsafeNone,
SameOrigin,
SameOriginPlusCOEP,
SameOriginAllowPopups
};
// https://html.spec.whatwg.org/multipage/origin.html#cross-origin-opener-policy
struct CrossOriginOpenerPolicy {
CrossOriginOpenerPolicyValue value { CrossOriginOpenerPolicyValue::UnsafeNone };
String reportingEndpoint;
CrossOriginOpenerPolicyValue reportOnlyValue { CrossOriginOpenerPolicyValue::UnsafeNone };
String reportOnlyReportingEndpoint;
CrossOriginOpenerPolicy isolatedCopy() const;
template<class Encoder> void encode(Encoder&) const;
template<class Decoder> static std::optional<CrossOriginOpenerPolicy> decode(Decoder&);
};
inline bool operator==(const CrossOriginOpenerPolicy& a, const CrossOriginOpenerPolicy& b)
{
return a.value == b.value && a.reportingEndpoint == b.reportingEndpoint && a.reportOnlyValue == b.reportOnlyValue && a.reportOnlyReportingEndpoint == b.reportOnlyReportingEndpoint;
}
template<class Encoder>
void CrossOriginOpenerPolicy::encode(Encoder& encoder) const
{
encoder << value << reportingEndpoint << reportOnlyValue << reportOnlyReportingEndpoint;
}
template<class Decoder>
std::optional<CrossOriginOpenerPolicy> CrossOriginOpenerPolicy::decode(Decoder& decoder)
{
std::optional<CrossOriginOpenerPolicyValue> value;
decoder >> value;
if (!value)
return std::nullopt;
std::optional<String> reportingEndpoint;
decoder >> reportingEndpoint;
if (!reportingEndpoint)
return std::nullopt;
std::optional<CrossOriginOpenerPolicyValue> reportOnlyValue;
decoder >> reportOnlyValue;
if (!reportOnlyValue)
return std::nullopt;
std::optional<String> reportOnlyReportingEndpoint;
decoder >> reportOnlyReportingEndpoint;
if (!reportOnlyReportingEndpoint)
return std::nullopt;
return {{
*value,
WTFMove(*reportingEndpoint),
*reportOnlyValue,
WTFMove(*reportOnlyReportingEndpoint)
}};
}
// https://html.spec.whatwg.org/multipage/origin.html#coop-enforcement-result
struct CrossOriginOpenerPolicyEnforcementResult {
bool needsBrowsingContextGroupSwitch { false };
bool needsBrowsingContextGroupSwitchDueToReportOnly { false };
URL url;
Ref<SecurityOrigin> currentOrigin;
CrossOriginOpenerPolicy crossOriginOpenerPolicy;
bool isCurrentContextNavigationSource { true };
};
CrossOriginOpenerPolicy obtainCrossOriginOpenerPolicy(const ResourceResponse&, const ScriptExecutionContext&);
WEBCORE_EXPORT void addCrossOriginOpenerPolicyHeaders(ResourceResponse&, const CrossOriginOpenerPolicy&);
} // namespace WebCore
namespace WTF {
template<> struct EnumTraits<WebCore::CrossOriginOpenerPolicyValue> {
using values = EnumValues<
WebCore::CrossOriginOpenerPolicyValue,
WebCore::CrossOriginOpenerPolicyValue::UnsafeNone,
WebCore::CrossOriginOpenerPolicyValue::SameOrigin,
WebCore::CrossOriginOpenerPolicyValue::SameOriginPlusCOEP,
WebCore::CrossOriginOpenerPolicyValue::SameOriginAllowPopups
>;
};
} // namespace WTF
|