/src/mozilla-central/netwerk/base/ReferrerPolicy.h
Line | Count | Source (jump to first uncovered line) |
1 | | /* This Source Code Form is subject to the terms of the Mozilla Public |
2 | | * License, v. 2.0. If a copy of the MPL was not distributed with this |
3 | | * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ |
4 | | |
5 | | #ifndef ReferrerPolicy_h__ |
6 | | #define ReferrerPolicy_h__ |
7 | | |
8 | | #include "nsString.h" |
9 | | #include "nsIHttpChannel.h" |
10 | | #include "nsUnicharUtils.h" |
11 | | |
12 | | namespace mozilla { namespace net { |
13 | | |
14 | | enum ReferrerPolicy { |
15 | | /* spec tokens: never no-referrer */ |
16 | | RP_No_Referrer = nsIHttpChannel::REFERRER_POLICY_NO_REFERRER, |
17 | | |
18 | | /* spec tokens: origin */ |
19 | | RP_Origin = nsIHttpChannel::REFERRER_POLICY_ORIGIN, |
20 | | |
21 | | /* spec tokens: default no-referrer-when-downgrade */ |
22 | | RP_No_Referrer_When_Downgrade = nsIHttpChannel::REFERRER_POLICY_NO_REFERRER_WHEN_DOWNGRADE, |
23 | | |
24 | | /* spec tokens: origin-when-cross-origin */ |
25 | | RP_Origin_When_Crossorigin = nsIHttpChannel::REFERRER_POLICY_ORIGIN_WHEN_XORIGIN, |
26 | | |
27 | | /* spec tokens: always unsafe-url */ |
28 | | RP_Unsafe_URL = nsIHttpChannel::REFERRER_POLICY_UNSAFE_URL, |
29 | | |
30 | | /* spec tokens: same-origin */ |
31 | | RP_Same_Origin = nsIHttpChannel::REFERRER_POLICY_SAME_ORIGIN, |
32 | | |
33 | | /* spec tokens: strict-origin */ |
34 | | RP_Strict_Origin = nsIHttpChannel::REFERRER_POLICY_STRICT_ORIGIN, |
35 | | |
36 | | /* spec tokens: strict-origin-when-cross-origin */ |
37 | | RP_Strict_Origin_When_Cross_Origin = nsIHttpChannel::REFERRER_POLICY_STRICT_ORIGIN_WHEN_XORIGIN, |
38 | | |
39 | | /* spec tokens: empty string */ |
40 | | /* The empty string "" corresponds to no referrer policy, or unset policy */ |
41 | | RP_Unset = nsIHttpChannel::REFERRER_POLICY_UNSET, |
42 | | }; |
43 | | |
44 | | /* spec tokens: never no-referrer */ |
45 | | const char kRPS_Never[] = "never"; |
46 | | const char kRPS_No_Referrer[] = "no-referrer"; |
47 | | |
48 | | /* spec tokens: origin */ |
49 | | const char kRPS_Origin[] = "origin"; |
50 | | |
51 | | /* spec tokens: default no-referrer-when-downgrade */ |
52 | | const char kRPS_Default[] = "default"; |
53 | | const char kRPS_No_Referrer_When_Downgrade[] = "no-referrer-when-downgrade"; |
54 | | |
55 | | /* spec tokens: origin-when-cross-origin */ |
56 | | const char kRPS_Origin_When_Cross_Origin[] = "origin-when-cross-origin"; |
57 | | const char kRPS_Origin_When_Crossorigin[] = "origin-when-crossorigin"; |
58 | | |
59 | | /* spec tokens: same-origin */ |
60 | | const char kRPS_Same_Origin[] = "same-origin"; |
61 | | |
62 | | /* spec tokens: strict-origin */ |
63 | | const char kRPS_Strict_Origin[] = "strict-origin"; |
64 | | |
65 | | /* spec tokens: strict-origin-when-cross-origin */ |
66 | | const char kRPS_Strict_Origin_When_Cross_Origin[] = "strict-origin-when-cross-origin"; |
67 | | |
68 | | /* spec tokens: always unsafe-url */ |
69 | | const char kRPS_Always[] = "always"; |
70 | | const char kRPS_Unsafe_URL[] = "unsafe-url"; |
71 | | |
72 | | inline ReferrerPolicy |
73 | | ReferrerPolicyFromString(const nsAString& content) |
74 | | { |
75 | | if (content.IsEmpty()) { |
76 | | return RP_No_Referrer; |
77 | | } |
78 | | |
79 | | nsString lowerContent(content); |
80 | | ToLowerCase(lowerContent); |
81 | | // This is implemented step by step as described in the Referrer Policy |
82 | | // specification, section "Determine token's Policy". |
83 | | if (lowerContent.EqualsLiteral(kRPS_Never) || |
84 | | lowerContent.EqualsLiteral(kRPS_No_Referrer)) { |
85 | | return RP_No_Referrer; |
86 | | } |
87 | | if (lowerContent.EqualsLiteral(kRPS_Origin)) { |
88 | | return RP_Origin; |
89 | | } |
90 | | if (lowerContent.EqualsLiteral(kRPS_Default) || |
91 | | lowerContent.EqualsLiteral(kRPS_No_Referrer_When_Downgrade)) { |
92 | | return RP_No_Referrer_When_Downgrade; |
93 | | } |
94 | | if (lowerContent.EqualsLiteral(kRPS_Origin_When_Cross_Origin) || |
95 | | lowerContent.EqualsLiteral(kRPS_Origin_When_Crossorigin)) { |
96 | | return RP_Origin_When_Crossorigin; |
97 | | } |
98 | | if (lowerContent.EqualsLiteral(kRPS_Same_Origin)) { |
99 | | return RP_Same_Origin; |
100 | | } |
101 | | if (lowerContent.EqualsLiteral(kRPS_Strict_Origin)) { |
102 | | return RP_Strict_Origin; |
103 | | } |
104 | | if (lowerContent.EqualsLiteral(kRPS_Strict_Origin_When_Cross_Origin)) { |
105 | | return RP_Strict_Origin_When_Cross_Origin; |
106 | | } |
107 | | if (lowerContent.EqualsLiteral(kRPS_Always) || |
108 | | lowerContent.EqualsLiteral(kRPS_Unsafe_URL)) { |
109 | | return RP_Unsafe_URL; |
110 | | } |
111 | | // Spec says if none of the previous match, use empty string. |
112 | | return RP_Unset; |
113 | | |
114 | | } |
115 | | |
116 | | inline ReferrerPolicy |
117 | | AttributeReferrerPolicyFromString(const nsAString& content) |
118 | 0 | { |
119 | 0 | // Specs : https://html.spec.whatwg.org/multipage/infrastructure.html#referrer-policy-attribute |
120 | 0 | // Spec says the empty string "" corresponds to no referrer policy, or RP_Unset |
121 | 0 | if (content.IsEmpty()) { |
122 | 0 | return RP_Unset; |
123 | 0 | } |
124 | 0 | |
125 | 0 | nsString lowerContent(content); |
126 | 0 | ToLowerCase(lowerContent); |
127 | 0 |
|
128 | 0 | if (lowerContent.EqualsLiteral(kRPS_No_Referrer)) { |
129 | 0 | return RP_No_Referrer; |
130 | 0 | } |
131 | 0 | if (lowerContent.EqualsLiteral(kRPS_Origin)) { |
132 | 0 | return RP_Origin; |
133 | 0 | } |
134 | 0 | if (lowerContent.EqualsLiteral(kRPS_No_Referrer_When_Downgrade)) { |
135 | 0 | return RP_No_Referrer_When_Downgrade; |
136 | 0 | } |
137 | 0 | if (lowerContent.EqualsLiteral(kRPS_Origin_When_Cross_Origin)) { |
138 | 0 | return RP_Origin_When_Crossorigin; |
139 | 0 | } |
140 | 0 | if (lowerContent.EqualsLiteral(kRPS_Unsafe_URL)) { |
141 | 0 | return RP_Unsafe_URL; |
142 | 0 | } |
143 | 0 | if (lowerContent.EqualsLiteral(kRPS_Strict_Origin)) { |
144 | 0 | return RP_Strict_Origin; |
145 | 0 | } |
146 | 0 | if (lowerContent.EqualsLiteral(kRPS_Same_Origin)) { |
147 | 0 | return RP_Same_Origin; |
148 | 0 | } |
149 | 0 | if (lowerContent.EqualsLiteral(kRPS_Strict_Origin_When_Cross_Origin)) { |
150 | 0 | return RP_Strict_Origin_When_Cross_Origin; |
151 | 0 | } |
152 | 0 | |
153 | 0 | // Spec says invalid value default is empty string state |
154 | 0 | // So, return RP_Unset if none of the previous match, return RP_Unset |
155 | 0 | return RP_Unset; |
156 | 0 | } |
157 | | |
158 | | } // namespace net |
159 | | } // namespace mozilla |
160 | | |
161 | | #endif |