summaryrefslogtreecommitdiffstats
path: root/net/base/strict_transport_security_state.h
diff options
context:
space:
mode:
authorabarth@chromium.org <abarth@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2009-09-05 14:21:09 +0000
committerabarth@chromium.org <abarth@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2009-09-05 14:21:09 +0000
commit77f6fb43d125edea5fe8b76d663de95098baf1de (patch)
tree3d0edff4af0ca2e5aea5b4520cf31526b249036e /net/base/strict_transport_security_state.h
parent78d4c52c925f79756e5c1cc8ae1095cdf61f3745 (diff)
downloadchromium_src-77f6fb43d125edea5fe8b76d663de95098baf1de.zip
chromium_src-77f6fb43d125edea5fe8b76d663de95098baf1de.tar.gz
chromium_src-77f6fb43d125edea5fe8b76d663de95098baf1de.tar.bz2
Rename X-Force-TLS to Strict-Transport-Security.
Also, remove StrictTransportSecurity code from SSLPolicy because that code doesn't work. R=agl Review URL: http://codereview.chromium.org/198035 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@25577 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net/base/strict_transport_security_state.h')
-rw-r--r--net/base/strict_transport_security_state.h87
1 files changed, 87 insertions, 0 deletions
diff --git a/net/base/strict_transport_security_state.h b/net/base/strict_transport_security_state.h
new file mode 100644
index 0000000..b41be1e
--- /dev/null
+++ b/net/base/strict_transport_security_state.h
@@ -0,0 +1,87 @@
+// Copyright (c) 2009 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#ifndef NET_BASE_STRICT_TRANSPORT_SECURITY_STATE_H_
+#define NET_BASE_STRICT_TRANSPORT_SECURITY_STATE_H_
+
+#include <map>
+#include <string>
+
+#include "base/basictypes.h"
+#include "base/lock.h"
+#include "base/ref_counted.h"
+#include "base/time.h"
+
+class GURL;
+
+namespace net {
+
+// StrictTransportSecurityState
+//
+// Tracks which hosts have enabled StrictTransportSecurityState. After a host
+// enables StrictTransportSecurityState, then we refuse to talk to the host
+// over HTTP, treat all certificate errors as fatal, and refuse to load any
+// mixed content.
+//
+class StrictTransportSecurityState :
+ public base::RefCountedThreadSafe<StrictTransportSecurityState> {
+ public:
+ StrictTransportSecurityState();
+
+ // Called when we see an X-Force-TLS header that we should process. Modifies
+ // our state as instructed by the header.
+ void DidReceiveHeader(const GURL& url, const std::string& value);
+
+ // Enable StrictTransportSecurity for |host|.
+ void EnableHost(const std::string& host, base::Time expiry,
+ bool include_subdomains);
+
+ // Returns whether |host| has had StrictTransportSecurity enabled.
+ bool IsEnabledForHost(const std::string& host);
+
+ // Returns |true| if |value| parses as a valid X-Force-TLS header value.
+ // The values of max-age and and includeSubDomains are returned in |max_age|
+ // and |include_subdomains|, respectively. The out parameters are not
+ // modified if the function returns |false|.
+ static bool ParseHeader(const std::string& value,
+ int* max_age,
+ bool* include_subdomains);
+
+ struct State {
+ base::Time expiry; // the absolute time (UTC) when this record expires
+ bool include_subdomains; // subdomains included?
+ };
+
+ class Delegate {
+ public:
+ // This function may not block and may be called with internal locks held.
+ // Thus it must not reenter the StrictTransportSecurityState object.
+ virtual void StateIsDirty(StrictTransportSecurityState* state) = 0;
+ };
+
+ void SetDelegate(Delegate*);
+
+ bool Serialise(std::string* output);
+ bool Deserialise(const std::string& state);
+
+ private:
+ // If we have a callback configured, call it to let our serialiser know that
+ // our state is dirty.
+ void DirtyNotify();
+
+ // The set of hosts that have enabled StrictTransportSecurity.
+ std::map<std::string, State> enabled_hosts_;
+
+ // Protect access to our data members with this lock.
+ Lock lock_;
+
+ // Our delegate who gets notified when we are dirtied, or NULL.
+ Delegate* delegate_;
+
+ DISALLOW_COPY_AND_ASSIGN(StrictTransportSecurityState);
+};
+
+} // namespace net
+
+#endif // NET_BASE_STRICT_TRANSPORT_SECURITY_STATE_H_