Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 /* | 1 /* |
| 2 * Copyright (C) 2011 Google Inc. All Rights Reserved. | 2 * Copyright (C) 2011 Google Inc. All Rights Reserved. |
| 3 * | 3 * |
| 4 * Redistribution and use in source and binary forms, with or without | 4 * Redistribution and use in source and binary forms, with or without |
| 5 * modification, are permitted provided that the following conditions | 5 * modification, are permitted provided that the following conditions |
| 6 * are met: | 6 * are met: |
| 7 * 1. Redistributions of source code must retain the above copyright | 7 * 1. Redistributions of source code must retain the above copyright |
| 8 * notice, this list of conditions and the following disclaimer. | 8 * notice, this list of conditions and the following disclaimer. |
| 9 * 2. Redistributions in binary form must reproduce the above copyright | 9 * 2. Redistributions in binary form must reproduce the above copyright |
| 10 * notice, this list of conditions and the following disclaimer in the | 10 * notice, this list of conditions and the following disclaimer in the |
| 11 * documentation and/or other materials provided with the distribution. | 11 * documentation and/or other materials provided with the distribution. |
| 12 * | 12 * |
| 13 * THIS SOFTWARE IS PROVIDED BY GOOGLE, INC. ``AS IS'' AND ANY | 13 * THIS SOFTWARE IS PROVIDED BY GOOGLE, INC. ``AS IS'' AND ANY |
| 14 * EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | 14 * EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| 15 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | 15 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR |
| 16 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE COMPUTER, INC. OR | 16 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE COMPUTER, INC. OR |
| 17 * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, | 17 * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, |
| 18 * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, | 18 * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, |
| 19 * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR | 19 * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR |
| 20 * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY | 20 * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY |
| 21 * OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT | 21 * OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
| 22 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE | 22 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE |
| 23 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | 23 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
| 24 * | 24 * |
| 25 */ | 25 */ |
| 26 | 26 |
| 27 #include "core/dom/SecurityContext.h" | 27 #include "core/dom/SecurityContext.h" |
| 28 | 28 |
| 29 #include "core/frame/csp/ContentSecurityPolicy.h" | 29 #include "core/frame/csp/ContentSecurityPolicy.h" |
| 30 #include "platform/weborigin/SchemeRegistry.h" | |
| 30 #include "platform/weborigin/SecurityOrigin.h" | 31 #include "platform/weborigin/SecurityOrigin.h" |
| 31 | 32 |
| 32 namespace blink { | 33 namespace blink { |
| 33 | 34 |
| 34 SecurityContext::SecurityContext() | 35 SecurityContext::SecurityContext() |
| 35 : m_haveInitializedSecurityOrigin(false) | 36 : m_haveInitializedSecurityOrigin(false) |
| 36 , m_sandboxFlags(SandboxNone) | 37 , m_sandboxFlags(SandboxNone) |
| 37 , m_hostedInReservedIPRange(false) | 38 , m_hostedInReservedIPRange(false) |
| 38 , m_insecureRequestsPolicy(InsecureRequestsDoNotUpgrade) | 39 , m_insecureRequestsPolicy(InsecureRequestsDoNotUpgrade) |
| 39 , m_enforceStrictMixedContentChecking(false) | 40 , m_enforceStrictMixedContentChecking(false) |
| (...skipping 27 matching lines...) Expand all Loading... | |
| 67 // a place to inherit the origin from). | 68 // a place to inherit the origin from). |
| 68 if (!haveInitializedSecurityOrigin()) | 69 if (!haveInitializedSecurityOrigin()) |
| 69 return true; | 70 return true; |
| 70 | 71 |
| 71 RefPtr<SecurityOrigin> other = SecurityOrigin::create(url); | 72 RefPtr<SecurityOrigin> other = SecurityOrigin::create(url); |
| 72 return securityOrigin()->canAccess(other.get()); | 73 return securityOrigin()->canAccess(other.get()); |
| 73 } | 74 } |
| 74 | 75 |
| 75 void SecurityContext::enforceSandboxFlags(SandboxFlags mask) | 76 void SecurityContext::enforceSandboxFlags(SandboxFlags mask) |
| 76 { | 77 { |
| 78 // The security origin must be set already in order to determine a sandboxed origin's potential trustworthiness. | |
|
Mike West
2016/02/25 11:58:11
We apparently don't have any unit tests for this m
estark
2016/03/01 02:59:26
Done. I'm happy to add isSecureContext() tests but
| |
| 79 ASSERT(securityOrigin()); | |
| 77 m_sandboxFlags |= mask; | 80 m_sandboxFlags |= mask; |
| 78 | 81 |
| 79 if (isSandboxed(SandboxOrigin) && securityOrigin() && !securityOrigin()->isU nique()) { | 82 if (isSandboxed(SandboxOrigin) && !securityOrigin()->isUnique()) { |
| 80 setSecurityOrigin(SecurityOrigin::createUnique()); | 83 // Before overwriting the original origin, compute secure |
| 84 // context properties from it. These properties are used to do | |
| 85 // secure context checks involving unique origins in remote | |
| 86 // frames. | |
| 87 setSecurityOrigin(SecurityOrigin::createUnique(securityOrigin()->isPoten tiallyTrustworthy(), securityOrigin()->isPotentiallyTrustworthy() && SchemeRegis try::schemeShouldBypassSecureContextCheck(securityOrigin()->protocol()))); | |
|
alexmos
2016/02/26 19:21:57
Would it make sense for the scheme check to just u
estark
2016/03/01 02:59:26
Done.
| |
| 81 didUpdateSecurityOrigin(); | 88 didUpdateSecurityOrigin(); |
| 82 } | 89 } |
| 83 } | 90 } |
| 84 | 91 |
| 85 } // namespace blink | 92 } // namespace blink |
| OLD | NEW |