UNPKG

chrome-devtools-frontend

Version:
268 lines (226 loc) • 8.14 kB
// Copyright 2019 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. import type * as Platform from '../platform/platform.js'; import type * as Protocol from '../../generated/protocol.js'; const OPAQUE_PARTITION_KEY = '<opaque>'; export class Cookie { readonly #nameInternal: string; readonly #valueInternal: string; readonly #typeInternal: Type|null|undefined; #attributes: { [x: string]: string|number|boolean|undefined, }; #sizeInternal: number; #priorityInternal: Protocol.Network.CookiePriority; #cookieLine: string|null; constructor(name: string, value: string, type?: Type|null, priority?: Protocol.Network.CookiePriority) { this.#nameInternal = name; this.#valueInternal = value; this.#typeInternal = type; this.#attributes = {}; this.#sizeInternal = 0; this.#priorityInternal = (priority || 'Medium' as Protocol.Network.CookiePriority); this.#cookieLine = null; } static fromProtocolCookie(protocolCookie: Protocol.Network.Cookie): Cookie { const cookie = new Cookie(protocolCookie.name, protocolCookie.value, null, protocolCookie.priority); cookie.addAttribute('domain', protocolCookie['domain']); cookie.addAttribute('path', protocolCookie['path']); if (protocolCookie['expires']) { cookie.addAttribute('expires', protocolCookie['expires'] * 1000); } if (protocolCookie['httpOnly']) { cookie.addAttribute('httpOnly'); } if (protocolCookie['secure']) { cookie.addAttribute('secure'); } if (protocolCookie['sameSite']) { cookie.addAttribute('sameSite', protocolCookie['sameSite']); } if ('sourcePort' in protocolCookie) { cookie.addAttribute('sourcePort', protocolCookie.sourcePort); } if ('sourceScheme' in protocolCookie) { cookie.addAttribute('sourceScheme', protocolCookie.sourceScheme); } if ('partitionKey' in protocolCookie) { cookie.addAttribute('partitionKey', protocolCookie.partitionKey); } if ('partitionKeyOpaque' in protocolCookie) { cookie.addAttribute('partitionKey', OPAQUE_PARTITION_KEY); } cookie.setSize(protocolCookie['size']); return cookie; } key(): string { return (this.domain() || '-') + ' ' + this.name() + ' ' + (this.path() || '-'); } name(): string { return this.#nameInternal; } value(): string { return this.#valueInternal; } type(): Type|null|undefined { return this.#typeInternal; } httpOnly(): boolean { return 'httponly' in this.#attributes; } secure(): boolean { return 'secure' in this.#attributes; } sameSite(): Protocol.Network.CookieSameSite { // TODO(allada) This should not rely on #attributes and instead store them individually. // when #attributes get added via addAttribute() they are lowercased, hence the lowercasing of samesite here return this.#attributes['samesite'] as Protocol.Network.CookieSameSite; } partitionKey(): string { return this.#attributes['partitionkey'] as string; } setPartitionKey(key: string): void { this.addAttribute('partitionKey', key); } partitionKeyOpaque(): boolean { return (this.#attributes['partitionkey'] === OPAQUE_PARTITION_KEY); } setPartitionKeyOpaque(): void { this.addAttribute('partitionKey', OPAQUE_PARTITION_KEY); } priority(): Protocol.Network.CookiePriority { return this.#priorityInternal; } session(): boolean { // RFC 2965 suggests using Discard attribute to mark session cookies, but this does not seem to be widely used. // Check for absence of explicitly max-age or expiry date instead. return !('expires' in this.#attributes || 'max-age' in this.#attributes); } path(): string { return this.#attributes['path'] as string; } domain(): string { return this.#attributes['domain'] as string; } expires(): number { return this.#attributes['expires'] as number; } maxAge(): number { return this.#attributes['max-age'] as number; } sourcePort(): number { return this.#attributes['sourceport'] as number; } sourceScheme(): Protocol.Network.CookieSourceScheme { return this.#attributes['sourcescheme'] as Protocol.Network.CookieSourceScheme; } size(): number { return this.#sizeInternal; } /** * @deprecated */ url(): Platform.DevToolsPath.UrlString|null { if (!this.domain() || !this.path()) { return null; } let port = ''; const sourcePort = this.sourcePort(); // Do not include standard ports to ensure the back-end will change standard ports according to the scheme. if (sourcePort && sourcePort !== 80 && sourcePort !== 443) { port = `:${this.sourcePort()}`; } // We must not consider the this.sourceScheme() here, otherwise it will be impossible to set a cookie without // the Secure attribute from a secure origin. return (this.secure() ? 'https://' : 'http://') + this.domain() + port + this.path() as Platform.DevToolsPath.UrlString; } setSize(size: number): void { this.#sizeInternal = size; } expiresDate(requestDate: Date): Date|null { // RFC 6265 indicates that the max-age attribute takes precedence over the expires attribute if (this.maxAge()) { return new Date(requestDate.getTime() + 1000 * this.maxAge()); } if (this.expires()) { return new Date(this.expires()); } return null; } addAttribute(key: string, value?: string|number|boolean): void { const normalizedKey = key.toLowerCase(); switch (normalizedKey) { case 'priority': this.#priorityInternal = (value as Protocol.Network.CookiePriority); break; default: this.#attributes[normalizedKey] = value; } } setCookieLine(cookieLine: string): void { this.#cookieLine = cookieLine; } getCookieLine(): string|null { return this.#cookieLine; } matchesSecurityOrigin(securityOrigin: string): boolean { const hostname = new URL(securityOrigin).hostname; return Cookie.isDomainMatch(this.domain(), hostname); } static isDomainMatch(domain: string, hostname: string): boolean { // This implementation mirrors // https://source.chromium.org/search?q=net::cookie_util::IsDomainMatch() // // Can domain match in two ways; as a domain cookie (where the cookie // domain begins with ".") or as a host cookie (where it doesn't). // Some consumers of the CookieMonster expect to set cookies on // URLs like http://.strange.url. To retrieve cookies in this instance, // we allow matching as a host cookie even when the domain_ starts with // a period. if (hostname === domain) { return true; } // Domain cookie must have an initial ".". To match, it must be // equal to url's host with initial period removed, or a suffix of // it. // Arguably this should only apply to "http" or "https" cookies, but // extension cookie tests currently use the funtionality, and if we // ever decide to implement that it should be done by preventing // such cookies from being set. if (!domain || domain[0] !== '.') { return false; } // The host with a "." prefixed. if (domain.substr(1) === hostname) { return true; } // A pure suffix of the host (ok since we know the domain already // starts with a ".") return hostname.length > domain.length && hostname.endsWith(domain); } } // TODO(crbug.com/1167717): Make this a const enum again // eslint-disable-next-line rulesdir/const_enum export enum Type { Request = 0, Response = 1, } // TODO(crbug.com/1167717): Make this a const enum again // eslint-disable-next-line rulesdir/const_enum export enum Attributes { Name = 'name', Value = 'value', Size = 'size', Domain = 'domain', Path = 'path', Expires = 'expires', HttpOnly = 'httpOnly', Secure = 'secure', SameSite = 'sameSite', SourceScheme = 'sourceScheme', SourcePort = 'sourcePort', Priority = 'priority', PartitionKey = 'partitionKey', }