OLD | NEW |
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/renderer/content_settings_observer.h" | 5 #include "chrome/renderer/content_settings_observer.h" |
6 | 6 |
7 #include "chrome/common/render_messages.h" | 7 #include "chrome/common/render_messages.h" |
8 #include "chrome/common/url_constants.h" | 8 #include "chrome/common/url_constants.h" |
9 #include "content/public/renderer/navigation_state.h" | 9 #include "content/public/renderer/navigation_state.h" |
10 #include "content/public/renderer/render_view.h" | 10 #include "content/public/renderer/render_view.h" |
(...skipping 62 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
73 NOTREACHED(); | 73 NOTREACHED(); |
74 return CONTENT_SETTING_DEFAULT; | 74 return CONTENT_SETTING_DEFAULT; |
75 } | 75 } |
76 | 76 |
77 } // namespace | 77 } // namespace |
78 | 78 |
79 ContentSettingsObserver::ContentSettingsObserver( | 79 ContentSettingsObserver::ContentSettingsObserver( |
80 content::RenderView* render_view) | 80 content::RenderView* render_view) |
81 : content::RenderViewObserver(render_view), | 81 : content::RenderViewObserver(render_view), |
82 content::RenderViewObserverTracker<ContentSettingsObserver>(render_view), | 82 content::RenderViewObserverTracker<ContentSettingsObserver>(render_view), |
83 default_content_settings_(NULL), | |
84 content_setting_rules_(NULL), | 83 content_setting_rules_(NULL), |
85 plugins_temporarily_allowed_(false) { | 84 plugins_temporarily_allowed_(false) { |
86 ClearBlockedContentSettings(); | 85 ClearBlockedContentSettings(); |
87 } | 86 } |
88 | 87 |
89 ContentSettingsObserver::~ContentSettingsObserver() { | 88 ContentSettingsObserver::~ContentSettingsObserver() { |
90 } | 89 } |
91 | 90 |
92 void ContentSettingsObserver::SetContentSettings( | |
93 const ContentSettings& settings) { | |
94 current_content_settings_ = settings; | |
95 } | |
96 | |
97 void ContentSettingsObserver::SetDefaultContentSettings( | |
98 const ContentSettings* settings) { | |
99 default_content_settings_ = settings; | |
100 } | |
101 | |
102 void ContentSettingsObserver::SetContentSettingRules( | 91 void ContentSettingsObserver::SetContentSettingRules( |
103 const RendererContentSettingRules* content_setting_rules) { | 92 const RendererContentSettingRules* content_setting_rules) { |
104 content_setting_rules_ = content_setting_rules; | 93 content_setting_rules_ = content_setting_rules; |
105 } | 94 } |
106 | 95 |
107 ContentSetting ContentSettingsObserver::GetContentSetting( | |
108 ContentSettingsType type) { | |
109 // Don't call this for plug-ins. | |
110 DCHECK_NE(CONTENT_SETTINGS_TYPE_PLUGINS, type); | |
111 return current_content_settings_.settings[type]; | |
112 } | |
113 | |
114 void ContentSettingsObserver::DidBlockContentType( | 96 void ContentSettingsObserver::DidBlockContentType( |
115 ContentSettingsType settings_type, | 97 ContentSettingsType settings_type, |
116 const std::string& resource_identifier) { | 98 const std::string& resource_identifier) { |
117 // Always send a message when |resource_identifier| is not empty, to tell the | 99 // Always send a message when |resource_identifier| is not empty, to tell the |
118 // browser which resource was blocked (otherwise the browser will only show | 100 // browser which resource was blocked (otherwise the browser will only show |
119 // the first resource to be blocked, and none that are blocked at a later | 101 // the first resource to be blocked, and none that are blocked at a later |
120 // time). | 102 // time). |
121 if (!content_blocked_[settings_type] || !resource_identifier.empty()) { | 103 if (!content_blocked_[settings_type] || !resource_identifier.empty()) { |
122 content_blocked_[settings_type] = true; | 104 content_blocked_[settings_type] = true; |
123 Send(new ChromeViewHostMsg_ContentBlocked(routing_id(), settings_type, | 105 Send(new ChromeViewHostMsg_ContentBlocked(routing_id(), settings_type, |
124 resource_identifier)); | 106 resource_identifier)); |
125 } | 107 } |
126 } | 108 } |
127 | 109 |
128 bool ContentSettingsObserver::OnMessageReceived(const IPC::Message& message) { | 110 bool ContentSettingsObserver::OnMessageReceived(const IPC::Message& message) { |
129 bool handled = true; | 111 bool handled = true; |
130 IPC_BEGIN_MESSAGE_MAP(ContentSettingsObserver, message) | 112 IPC_BEGIN_MESSAGE_MAP(ContentSettingsObserver, message) |
131 // Don't swallow LoadBlockedPlugins messages, as they're sent to every | 113 // Don't swallow LoadBlockedPlugins messages, as they're sent to every |
132 // blocked plugin. | 114 // blocked plugin. |
133 IPC_MESSAGE_HANDLER_GENERIC(ChromeViewMsg_LoadBlockedPlugins, | 115 IPC_MESSAGE_HANDLER_GENERIC(ChromeViewMsg_LoadBlockedPlugins, |
134 OnLoadBlockedPlugins(); handled = false) | 116 OnLoadBlockedPlugins(); handled = false) |
135 IPC_MESSAGE_HANDLER(ChromeViewMsg_SetContentSettingsForLoadingURL, | |
136 OnSetContentSettingsForLoadingURL) | |
137 IPC_MESSAGE_UNHANDLED(handled = false) | 117 IPC_MESSAGE_UNHANDLED(handled = false) |
138 IPC_END_MESSAGE_MAP() | 118 IPC_END_MESSAGE_MAP() |
139 return handled; | 119 return handled; |
140 } | 120 } |
141 | 121 |
142 void ContentSettingsObserver::DidCommitProvisionalLoad( | 122 void ContentSettingsObserver::DidCommitProvisionalLoad( |
143 WebFrame* frame, bool is_new_navigation) { | 123 WebFrame* frame, bool is_new_navigation) { |
144 if (frame->parent()) | 124 if (frame->parent()) |
145 return; // Not a top-level navigation. | 125 return; // Not a top-level navigation. |
146 | 126 |
147 NavigationState* state = NavigationState::FromDataSource(frame->dataSource()); | 127 NavigationState* state = NavigationState::FromDataSource(frame->dataSource()); |
148 if (!state->was_within_same_page()) { | 128 if (!state->was_within_same_page()) { |
149 // Clear "block" flags for the new page. This needs to happen before any of | 129 // Clear "block" flags for the new page. This needs to happen before any of |
150 // |AllowScript()|, |AllowScriptFromSource()|, |AllowImage()|, or | 130 // |AllowScript()|, |AllowScriptFromSource()|, |AllowImage()|, or |
151 // |AllowPlugins()| is called for the new page so that these functions can | 131 // |AllowPlugins()| is called for the new page so that these functions can |
152 // correctly detect that a piece of content flipped from "not blocked" to | 132 // correctly detect that a piece of content flipped from "not blocked" to |
153 // "blocked". | 133 // "blocked". |
154 ClearBlockedContentSettings(); | 134 ClearBlockedContentSettings(); |
155 plugins_temporarily_allowed_ = false; | 135 plugins_temporarily_allowed_ = false; |
156 } | 136 } |
157 | 137 |
158 GURL url = frame->document().url(); | 138 GURL url = frame->document().url(); |
159 | |
160 if (frame->document().securityOrigin().toString() == "null" && | |
161 !url.SchemeIs(chrome::kFileScheme)) { | |
162 // The Frame has a unique security origin. Instead of granting the frame | |
163 // privileges based on it's URL, we fall back to the default content | |
164 // settings. | |
165 | |
166 // We exempt file URLs here because we sandbox them by default, but folks | |
167 // might reasonably want to supply non-default content settings for various | |
168 // file URLs. | |
169 if (default_content_settings_) | |
170 SetContentSettings(*default_content_settings_); | |
171 return; | |
172 } | |
173 | |
174 // If we start failing this DCHECK, please makes sure we don't regress | 139 // If we start failing this DCHECK, please makes sure we don't regress |
175 // this bug: http://code.google.com/p/chromium/issues/detail?id=79304 | 140 // this bug: http://code.google.com/p/chromium/issues/detail?id=79304 |
176 DCHECK(!url.SchemeIs(chrome::kDataScheme)); | 141 DCHECK(frame->document().securityOrigin().toString() == "null" || |
177 | 142 !url.SchemeIs(chrome::kDataScheme)); |
178 // Set content settings. Default them from the parent window if one exists. | |
179 // This makes sure about:blank windows work as expected. | |
180 HostContentSettings::iterator host_content_settings = | |
181 host_content_settings_.find(url); | |
182 if (host_content_settings != host_content_settings_.end()) { | |
183 SetContentSettings(host_content_settings->second); | |
184 | |
185 // These content settings were merely recorded transiently for this load. | |
186 // We can erase them now. If at some point we reload this page, the | |
187 // browser will send us new, up-to-date content settings. | |
188 host_content_settings_.erase(host_content_settings); | |
189 } else if (frame->opener()) { | |
190 // The opener's view is not guaranteed to be non-null (it could be | |
191 // detached from its page but not yet destructed). | |
192 if (WebView* opener_view = frame->opener()->view()) { | |
193 content::RenderView* opener = | |
194 content::RenderView::FromWebView(opener_view); | |
195 ContentSettingsObserver* observer = ContentSettingsObserver::Get(opener); | |
196 SetContentSettings(observer->current_content_settings_); | |
197 } | |
198 } | |
199 } | 143 } |
200 | 144 |
201 bool ContentSettingsObserver::AllowDatabase(WebFrame* frame, | 145 bool ContentSettingsObserver::AllowDatabase(WebFrame* frame, |
202 const WebString& name, | 146 const WebString& name, |
203 const WebString& display_name, | 147 const WebString& display_name, |
204 unsigned long estimated_size) { | 148 unsigned long estimated_size) { |
205 if (frame->document().securityOrigin().isEmpty() || | 149 if (frame->document().securityOrigin().isEmpty() || |
206 frame->top()->document().securityOrigin().isEmpty()) | 150 frame->top()->document().securityOrigin().isEmpty()) |
207 return false; // Uninitialized document. | 151 return false; // Uninitialized document. |
208 | 152 |
(...skipping 116 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
325 } | 269 } |
326 | 270 |
327 void ContentSettingsObserver::DidNotAllowPlugins(WebFrame* frame) { | 271 void ContentSettingsObserver::DidNotAllowPlugins(WebFrame* frame) { |
328 DidBlockContentType(CONTENT_SETTINGS_TYPE_PLUGINS, std::string()); | 272 DidBlockContentType(CONTENT_SETTINGS_TYPE_PLUGINS, std::string()); |
329 } | 273 } |
330 | 274 |
331 void ContentSettingsObserver::DidNotAllowScript(WebFrame* frame) { | 275 void ContentSettingsObserver::DidNotAllowScript(WebFrame* frame) { |
332 DidBlockContentType(CONTENT_SETTINGS_TYPE_JAVASCRIPT, std::string()); | 276 DidBlockContentType(CONTENT_SETTINGS_TYPE_JAVASCRIPT, std::string()); |
333 } | 277 } |
334 | 278 |
335 void ContentSettingsObserver::OnSetContentSettingsForLoadingURL( | |
336 const GURL& url, | |
337 const ContentSettings& content_settings) { | |
338 host_content_settings_[url] = content_settings; | |
339 } | |
340 | |
341 void ContentSettingsObserver::OnLoadBlockedPlugins() { | 279 void ContentSettingsObserver::OnLoadBlockedPlugins() { |
342 plugins_temporarily_allowed_ = true; | 280 plugins_temporarily_allowed_ = true; |
343 } | 281 } |
344 | 282 |
345 bool ContentSettingsObserver::AllowContentType( | |
346 ContentSettingsType settings_type) { | |
347 // CONTENT_SETTING_ASK is only valid for cookies. | |
348 return current_content_settings_.settings[settings_type] != | |
349 CONTENT_SETTING_BLOCK; | |
350 } | |
351 | |
352 void ContentSettingsObserver::ClearBlockedContentSettings() { | 283 void ContentSettingsObserver::ClearBlockedContentSettings() { |
353 for (size_t i = 0; i < arraysize(content_blocked_); ++i) | 284 for (size_t i = 0; i < arraysize(content_blocked_); ++i) |
354 content_blocked_[i] = false; | 285 content_blocked_[i] = false; |
355 cached_storage_permissions_.clear(); | 286 cached_storage_permissions_.clear(); |
356 } | 287 } |
OLD | NEW |