mirror of
https://bitbucket.org/chromiumembedded/cef
synced 2024-12-11 09:08:06 +01:00
b568f160d9
git-svn-id: https://chromiumembedded.googlecode.com/svn/trunk@570 5089003a-bbd8-11dd-ad1f-f1f9622dbc98
103 lines
3.4 KiB
C++
103 lines
3.4 KiB
C++
// Copyright (c) 2011 The Chromium Embedded Framework Authors. All rights
|
|
// reserved. Use of this source code is governed by a BSD-style license that
|
|
// can be found in the LICENSE file.
|
|
|
|
#include "include/cef_origin_whitelist.h"
|
|
#include "libcef/cef_context.h"
|
|
#include "libcef/cef_thread.h"
|
|
|
|
#include "base/bind.h"
|
|
#include "third_party/WebKit/Source/WebKit/chromium/public/WebSecurityPolicy.h"
|
|
#include "third_party/WebKit/Source/WebKit/chromium/public/platform/WebString.h"
|
|
#include "third_party/WebKit/Source/WebKit/chromium/public/platform/WebURL.h"
|
|
|
|
using WebKit::WebSecurityPolicy;
|
|
using WebKit::WebString;
|
|
|
|
bool CefAddCrossOriginWhitelistEntry(const CefString& source_origin,
|
|
const CefString& target_protocol,
|
|
const CefString& target_domain,
|
|
bool allow_target_subdomains) {
|
|
// Verify that the context is in a valid state.
|
|
if (!CONTEXT_STATE_VALID()) {
|
|
NOTREACHED();
|
|
return false;
|
|
}
|
|
|
|
std::string source_url = source_origin;
|
|
GURL gurl = GURL(source_url);
|
|
if (gurl.is_empty() || !gurl.is_valid()) {
|
|
NOTREACHED() << "Invalid source_origin URL: " << source_url;
|
|
return false;
|
|
}
|
|
|
|
if (CefThread::CurrentlyOn(CefThread::UI)) {
|
|
std::string target_protocol_str = target_protocol;
|
|
std::string target_domain_str = target_domain;
|
|
WebSecurityPolicy::addOriginAccessWhitelistEntry(
|
|
gurl,
|
|
WebString::fromUTF8(target_protocol_str),
|
|
WebString::fromUTF8(target_domain_str),
|
|
allow_target_subdomains);
|
|
} else {
|
|
CefThread::PostTask(CefThread::UI, FROM_HERE,
|
|
base::Bind(base::IgnoreResult(&CefAddCrossOriginWhitelistEntry),
|
|
source_origin, target_protocol, target_domain,
|
|
allow_target_subdomains));
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
bool CefRemoveCrossOriginWhitelistEntry(const CefString& source_origin,
|
|
const CefString& target_protocol,
|
|
const CefString& target_domain,
|
|
bool allow_target_subdomains) {
|
|
// Verify that the context is in a valid state.
|
|
if (!CONTEXT_STATE_VALID()) {
|
|
NOTREACHED();
|
|
return false;
|
|
}
|
|
|
|
std::string source_url = source_origin;
|
|
GURL gurl = GURL(source_url);
|
|
if (gurl.is_empty() || !gurl.is_valid()) {
|
|
NOTREACHED() << "Invalid source_origin URL: " << source_url;
|
|
return false;
|
|
}
|
|
|
|
if (CefThread::CurrentlyOn(CefThread::UI)) {
|
|
std::string target_protocol_str = target_protocol;
|
|
std::string target_domain_str = target_domain;
|
|
WebSecurityPolicy::removeOriginAccessWhitelistEntry(
|
|
gurl,
|
|
WebString::fromUTF8(target_protocol_str),
|
|
WebString::fromUTF8(target_domain_str),
|
|
allow_target_subdomains);
|
|
} else {
|
|
CefThread::PostTask(CefThread::UI, FROM_HERE,
|
|
base::Bind(base::IgnoreResult(&CefRemoveCrossOriginWhitelistEntry),
|
|
source_origin, target_protocol, target_domain,
|
|
allow_target_subdomains));
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
bool CefClearCrossOriginWhitelist() {
|
|
// Verify that the context is in a valid state.
|
|
if (!CONTEXT_STATE_VALID()) {
|
|
NOTREACHED();
|
|
return false;
|
|
}
|
|
|
|
if (CefThread::CurrentlyOn(CefThread::UI)) {
|
|
WebSecurityPolicy::resetOriginAccessWhitelists();
|
|
} else {
|
|
CefThread::PostTask(CefThread::UI, FROM_HERE,
|
|
base::Bind(base::IgnoreResult(&CefClearCrossOriginWhitelist)));
|
|
}
|
|
|
|
return true;
|
|
}
|