OLD | NEW |
1 /* | 1 /* |
2 * Copyright (C) 1999 Lars Knoll (knoll@kde.org) | 2 * Copyright (C) 1999 Lars Knoll (knoll@kde.org) |
3 * (C) 1999 Antti Koivisto (koivisto@kde.org) | 3 * (C) 1999 Antti Koivisto (koivisto@kde.org) |
4 * (C) 2001 Dirk Mueller (mueller@kde.org) | 4 * (C) 2001 Dirk Mueller (mueller@kde.org) |
5 * (C) 2006 Alexey Proskuryakov (ap@webkit.org) | 5 * (C) 2006 Alexey Proskuryakov (ap@webkit.org) |
6 * Copyright (C) 2004, 2005, 2006, 2007, 2008, 2009, 2011, 2012 Apple Inc. All r
ights reserved. | 6 * Copyright (C) 2004, 2005, 2006, 2007, 2008, 2009, 2011, 2012 Apple Inc. All r
ights reserved. |
7 * Copyright (C) 2008, 2009 Torch Mobile Inc. All rights reserved. (http://www.t
orchmobile.com/) | 7 * Copyright (C) 2008, 2009 Torch Mobile Inc. All rights reserved. (http://www.t
orchmobile.com/) |
8 * Copyright (C) 2008, 2009, 2011, 2012 Google Inc. All rights reserved. | 8 * Copyright (C) 2008, 2009, 2011, 2012 Google Inc. All rights reserved. |
9 * Copyright (C) 2010 Nokia Corporation and/or its subsidiary(-ies) | 9 * Copyright (C) 2010 Nokia Corporation and/or its subsidiary(-ies) |
10 * Copyright (C) Research In Motion Limited 2010-2011. All rights reserved. | 10 * Copyright (C) Research In Motion Limited 2010-2011. All rights reserved. |
(...skipping 5638 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
5649 { | 5649 { |
5650 wrapper = V8DOMWrapper::associateObjectWithWrapper(isolate, this, wrapperTyp
e, wrapper); | 5650 wrapper = V8DOMWrapper::associateObjectWithWrapper(isolate, this, wrapperTyp
e, wrapper); |
5651 DOMWrapperWorld& world = DOMWrapperWorld::current(isolate); | 5651 DOMWrapperWorld& world = DOMWrapperWorld::current(isolate); |
5652 if (world.isMainWorld() && frame()) | 5652 if (world.isMainWorld() && frame()) |
5653 frame()->script().windowProxy(world)->updateDocumentWrapper(wrapper); | 5653 frame()->script().windowProxy(world)->updateDocumentWrapper(wrapper); |
5654 return wrapper; | 5654 return wrapper; |
5655 } | 5655 } |
5656 | 5656 |
5657 bool Document::isSecureContext(String& errorMessage, const SecureContextCheck pr
ivilegeContextCheck) const | 5657 bool Document::isSecureContext(String& errorMessage, const SecureContextCheck pr
ivilegeContextCheck) const |
5658 { | 5658 { |
| 5659 // There may be exceptions for the secure context check defined for certain |
| 5660 // origins. The exceptions are applied only to the origin themselves and to |
| 5661 // sandboxed URLs from those origins, but *not* to any children. |
| 5662 // |
| 5663 // For example: |
| 5664 // <iframe src="http://host"> |
| 5665 // <iframe src="scheme-has-exception://host"></iframe> |
| 5666 // <iframe sandbox src="scheme-has-exception://host"></iframe> |
| 5667 // </iframe> |
| 5668 // both inner iframes pass this check, assuming that the scheme |
| 5669 // "scheme-has-exception:" is granted an exception. |
| 5670 // |
| 5671 // However, |
| 5672 // <iframe src="http://host"> |
| 5673 // <iframe sandbox src="http://host"></iframe> |
| 5674 // </iframe> |
| 5675 // would fail the check (that is, sandbox does not grant an exception itself
). |
| 5676 // |
| 5677 // Additionally, with |
| 5678 // <iframe src="scheme-has-exception://host"> |
| 5679 // <iframe src="http://host"></iframe> |
| 5680 // <iframe sandbox src="http://host"></iframe> |
| 5681 // </iframe> |
| 5682 // both inner iframes would fail the check, even though the outermost iframe |
| 5683 // passes. |
| 5684 // |
| 5685 // In all cases, a frame must be potentially trustworthy in addition to |
| 5686 // having an exception listed in order for the exception to be granted. |
5659 if (SecurityContext::isSandboxed(SandboxOrigin)) { | 5687 if (SecurityContext::isSandboxed(SandboxOrigin)) { |
5660 if (!SecurityOrigin::create(url())->isPotentiallyTrustworthy(errorMessag
e)) | 5688 RefPtr<SecurityOrigin> origin = SecurityOrigin::create(url()); |
| 5689 if (!origin->isPotentiallyTrustworthy(errorMessage)) |
5661 return false; | 5690 return false; |
| 5691 if (SchemeRegistry::schemeShouldBypassSecureContextCheck(origin->protoco
l())) |
| 5692 return true; |
5662 } else { | 5693 } else { |
5663 if (!securityOrigin()->isPotentiallyTrustworthy(errorMessage)) | 5694 if (!securityOrigin()->isPotentiallyTrustworthy(errorMessage)) |
5664 return false; | 5695 return false; |
| 5696 if (SchemeRegistry::schemeShouldBypassSecureContextCheck(securityOrigin(
)->protocol())) |
| 5697 return true; |
5665 } | 5698 } |
5666 | 5699 |
5667 if (privilegeContextCheck == StandardSecureContextCheck) { | 5700 if (privilegeContextCheck == StandardSecureContextCheck) { |
5668 Document* context = parentDocument(); | 5701 Document* context = parentDocument(); |
5669 while (context) { | 5702 while (context) { |
5670 // Skip to the next ancestor if it's a srcdoc. | 5703 // Skip to the next ancestor if it's a srcdoc. |
5671 if (!context->isSrcdocDocument()) { | 5704 if (!context->isSrcdocDocument()) { |
5672 if (context->securityContext().isSandboxed(SandboxOrigin)) { | 5705 if (context->securityContext().isSandboxed(SandboxOrigin)) { |
5673 // For a sandboxed origin, use the document's URL. | 5706 // For a sandboxed origin, use the document's URL. |
5674 RefPtr<SecurityOrigin> origin = SecurityOrigin::create(conte
xt->url()); | 5707 RefPtr<SecurityOrigin> origin = SecurityOrigin::create(conte
xt->url()); |
(...skipping 82 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
5757 #ifndef NDEBUG | 5790 #ifndef NDEBUG |
5758 using namespace blink; | 5791 using namespace blink; |
5759 void showLiveDocumentInstances() | 5792 void showLiveDocumentInstances() |
5760 { | 5793 { |
5761 Document::WeakDocumentSet& set = Document::liveDocumentSet(); | 5794 Document::WeakDocumentSet& set = Document::liveDocumentSet(); |
5762 fprintf(stderr, "There are %u documents currently alive:\n", set.size()); | 5795 fprintf(stderr, "There are %u documents currently alive:\n", set.size()); |
5763 for (Document* document : set) | 5796 for (Document* document : set) |
5764 fprintf(stderr, "- Document %p URL: %s\n", document, document->url().str
ing().utf8().data()); | 5797 fprintf(stderr, "- Document %p URL: %s\n", document, document->url().str
ing().utf8().data()); |
5765 } | 5798 } |
5766 #endif | 5799 #endif |
OLD | NEW |