1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
content / public / browser / ssl_host_state_delegate.h [blame]
// Copyright 2014 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef CONTENT_PUBLIC_BROWSER_SSL_HOST_STATE_DELEGATE_H_
#define CONTENT_PUBLIC_BROWSER_SSL_HOST_STATE_DELEGATE_H_
#include <memory>
#include <string>
#include "base/functional/callback_forward.h"
#include "net/cert/x509_certificate.h"
class GURL;
namespace content {
class StoragePartition;
// The SSLHostStateDelegate encapsulates the host-specific state for SSL errors.
// For example, SSLHostStateDelegate remembers whether the user has whitelisted
// a particular broken cert for use with particular host. We separate this
// state from the SSLManager because this state is shared across many navigation
// controllers.
//
// SSLHostStateDelegate may be implemented by the embedder to provide a storage
// strategy for certificate decisions or it may be left unimplemented to use a
// default strategy of not remembering decisions at all.
class SSLHostStateDelegate {
public:
// The judgements that can be reached by a user for invalid certificates.
enum CertJudgment {
DENIED,
ALLOWED
};
// The types of nonsecure subresources that this class keeps track of.
enum InsecureContentType {
// A MIXED subresource was loaded over HTTP on an HTTPS page.
MIXED_CONTENT,
// A CERT_ERRORS subresource was loaded over HTTPS with certificate
// errors on an HTTPS page.
CERT_ERRORS_CONTENT,
};
// Records that |cert| is permitted to be used for |host| in the future, for
// a specified |error| type.
virtual void AllowCert(const std::string&,
const net::X509Certificate& cert,
int error,
StoragePartition* storage_partition) = 0;
// Clear allow preferences matched by |host_filter|. If the filter is null,
// clear all preferences.
virtual void Clear(
base::RepeatingCallback<bool(const std::string&)> host_filter) = 0;
// Queries whether |cert| is allowed for |host| and |error|. Returns true in
virtual CertJudgment QueryPolicy(const std::string& host,
const net::X509Certificate& cert,
int error,
StoragePartition* storage_partition) = 0;
// Records that a host has run insecure content of the given |content_type|.
virtual void HostRanInsecureContent(const std::string& host,
int child_id,
InsecureContentType content_type) = 0;
// Returns whether the specified host ran insecure content of the given
// |content_type|.
virtual bool DidHostRunInsecureContent(const std::string& host,
int child_id,
InsecureContentType content_type) = 0;
// Allowlists site so it can be loaded over HTTP when HTTPS-First Mode is
// enabled.
virtual void AllowHttpForHost(const std::string& host,
StoragePartition* storage_partition) = 0;
// Returns whether site is allowed to load over HTTP when HTTPS-First Mode is
// enabled.
virtual bool IsHttpAllowedForHost(const std::string& host,
StoragePartition* storage_partition) = 0;
// Revokes all SSL certificate error allow exceptions made by the user for
// |host|.
virtual void RevokeUserAllowExceptions(const std::string& host) = 0;
// Sets HTTPS-First Mode enforcement for the given `host`.
virtual void SetHttpsEnforcementForHost(
const std::string& host,
bool enforce,
StoragePartition* storage_partition) = 0;
// Returns whether HTTPS-First Mode is enabled for the given `url`. This check
// ignores the scheme of `url`. E.g. http://example.com and
// https://example.com will return the same result.
virtual bool IsHttpsEnforcedForUrl(const GURL& url,
StoragePartition* storage_partition) = 0;
// Returns whether the user has allowed a certificate error exception or
// HTTP exception for |host|. This does not mean that *all* certificate errors
// are allowed, just that there exists an exception. To see if a particular
// certificate and error combination exception is allowed, use QueryPolicy().
virtual bool HasAllowException(const std::string& host,
StoragePartition* storage_partition) = 0;
// Returns true if the user has allowed a certificate error exception or HTTP
// exception for any host.
virtual bool HasAllowExceptionForAnyHost(
StoragePartition* storage_partition) = 0;
protected:
virtual ~SSLHostStateDelegate() {}
};
} // namespace content
#endif // CONTENT_PUBLIC_BROWSER_SSL_HOST_STATE_DELEGATE_H_