Adds presentation_context and presentation_media_sinks_observer
[chromium-blink-merge.git] / net / http / http_auth_filter.cc
blob53d81eaab4b094cba14204674d3a254660dc9a0d
1 // Copyright (c) 2010 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "base/strings/string_util.h"
6 #include "net/http/http_auth_filter.h"
7 #include "url/gurl.h"
9 namespace net {
11 // Using a std::set<> has the benefit of removing duplicates automatically.
12 typedef std::set<base::string16> RegistryWhitelist;
14 // TODO(ahendrickson) -- Determine if we want separate whitelists for HTTP and
15 // HTTPS, one for both, or only an HTTP one. My understanding is that the HTTPS
16 // entries in the registry mean that you are only allowed to connect to the site
17 // via HTTPS and still be considered 'safe'.
19 HttpAuthFilterWhitelist::HttpAuthFilterWhitelist(
20 const std::string& server_whitelist) {
21 SetWhitelist(server_whitelist);
24 HttpAuthFilterWhitelist::~HttpAuthFilterWhitelist() {
27 // Add a new domain |filter| to the whitelist, if it's not already there
28 bool HttpAuthFilterWhitelist::AddFilter(const std::string& filter,
29 HttpAuth::Target target) {
30 if ((target != HttpAuth::AUTH_SERVER) && (target != HttpAuth::AUTH_PROXY))
31 return false;
32 // All proxies pass
33 if (target == HttpAuth::AUTH_PROXY)
34 return true;
35 rules_.AddRuleFromString(filter);
36 return true;
39 void HttpAuthFilterWhitelist::AddRuleToBypassLocal() {
40 rules_.AddRuleToBypassLocal();
43 bool HttpAuthFilterWhitelist::IsValid(const GURL& url,
44 HttpAuth::Target target) const {
45 if ((target != HttpAuth::AUTH_SERVER) && (target != HttpAuth::AUTH_PROXY))
46 return false;
47 // All proxies pass
48 if (target == HttpAuth::AUTH_PROXY)
49 return true;
50 return rules_.Matches(url);
53 void HttpAuthFilterWhitelist::SetWhitelist(
54 const std::string& server_whitelist) {
55 rules_.ParseFromString(server_whitelist);
58 } // namespace net