mirror of
https://github.com/LadybirdBrowser/ladybird.git
synced 2025-07-28 19:59:17 +00:00
LibWeb/CSP: Implement the media-src directive
This commit is contained in:
parent
5addbcd61b
commit
1b12aa4d8e
Notes:
github-actions[bot]
2025-07-06 12:17:16 +00:00
Author: https://github.com/Lubrsi
Commit: 1b12aa4d8e
Pull-request: https://github.com/LadybirdBrowser/ladybird/pull/5308
Reviewed-by: https://github.com/shannonbooth
5 changed files with 95 additions and 0 deletions
|
@ -0,0 +1,61 @@
|
|||
/*
|
||||
* Copyright (c) 2024, Luke Wilde <luke@ladybird.org>
|
||||
*
|
||||
* SPDX-License-Identifier: BSD-2-Clause
|
||||
*/
|
||||
|
||||
#include <LibWeb/ContentSecurityPolicy/Directives/DirectiveOperations.h>
|
||||
#include <LibWeb/ContentSecurityPolicy/Directives/MediaSourceDirective.h>
|
||||
#include <LibWeb/ContentSecurityPolicy/Directives/Names.h>
|
||||
#include <LibWeb/Fetch/Infrastructure/HTTP/Requests.h>
|
||||
|
||||
namespace Web::ContentSecurityPolicy::Directives {
|
||||
|
||||
GC_DEFINE_ALLOCATOR(MediaSourceDirective);
|
||||
|
||||
MediaSourceDirective::MediaSourceDirective(String name, Vector<String> value)
|
||||
: Directive(move(name), move(value))
|
||||
{
|
||||
}
|
||||
|
||||
// https://w3c.github.io/webappsec-csp/#media-src-pre-request
|
||||
Directive::Result MediaSourceDirective::pre_request_check(GC::Heap&, GC::Ref<Fetch::Infrastructure::Request const> request, GC::Ref<Policy const> policy) const
|
||||
{
|
||||
// 1. Let name be the result of executing § 6.8.1 Get the effective directive for request on request.
|
||||
auto name = get_the_effective_directive_for_request(request);
|
||||
|
||||
// 2. If the result of executing § 6.8.4 Should fetch directive execute on name, media-src and policy is "No",
|
||||
// return "Allowed".
|
||||
if (should_fetch_directive_execute(name, Names::MediaSrc, policy) == ShouldExecute::No)
|
||||
return Result::Allowed;
|
||||
|
||||
// 3. If the result of executing § 6.7.2.5 Does request match source list? on request, this directive’s value,
|
||||
// and policy, is "Does Not Match", return "Blocked".
|
||||
if (does_request_match_source_list(request, value(), policy) == MatchResult::DoesNotMatch)
|
||||
return Result::Blocked;
|
||||
|
||||
// 4. Return "Allowed".
|
||||
return Result::Allowed;
|
||||
}
|
||||
|
||||
// https://w3c.github.io/webappsec-csp/#media-src-post-request
|
||||
Directive::Result MediaSourceDirective::post_request_check(GC::Heap&, GC::Ref<Fetch::Infrastructure::Request const> request, GC::Ref<Fetch::Infrastructure::Response const> response, GC::Ref<Policy const> policy) const
|
||||
{
|
||||
// 1. Let name be the result of executing § 6.8.1 Get the effective directive for request on request.
|
||||
auto name = get_the_effective_directive_for_request(request);
|
||||
|
||||
// 2. If the result of executing § 6.8.4 Should fetch directive execute on name, media-src and policy is "No",
|
||||
// return "Allowed".
|
||||
if (should_fetch_directive_execute(name, Names::MediaSrc, policy) == ShouldExecute::No)
|
||||
return Result::Allowed;
|
||||
|
||||
// 3. If the result of executing § 6.7.2.6 Does response to request match source list? on response, request, this
|
||||
// directive’s value, and policy, is "Does Not Match", return "Blocked".
|
||||
if (does_response_match_source_list(response, request, value(), policy) == MatchResult::DoesNotMatch)
|
||||
return Result::Blocked;
|
||||
|
||||
// 4. Return "Allowed".
|
||||
return Result::Allowed;
|
||||
}
|
||||
|
||||
}
|
Loading…
Add table
Add a link
Reference in a new issue