Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(200)

Unified Diff: third_party/WebKit/Source/core/dom/SecurityContext.cpp

Issue 1723753002: Make Document::isSecureContext() work for OOPIFs (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: rebase Created 4 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: third_party/WebKit/Source/core/dom/SecurityContext.cpp
diff --git a/third_party/WebKit/Source/core/dom/SecurityContext.cpp b/third_party/WebKit/Source/core/dom/SecurityContext.cpp
index a37ff6b8230baa1b56ff5bf886d6a06243d97da4..89fa373dbc757319cc71c29998990d8c39b288ac 100644
--- a/third_party/WebKit/Source/core/dom/SecurityContext.cpp
+++ b/third_party/WebKit/Source/core/dom/SecurityContext.cpp
@@ -27,6 +27,7 @@
#include "core/dom/SecurityContext.h"
#include "core/frame/csp/ContentSecurityPolicy.h"
+#include "platform/weborigin/SchemeRegistry.h"
#include "platform/weborigin/SecurityOrigin.h"
namespace blink {
@@ -74,10 +75,16 @@ bool SecurityContext::isSecureTransitionTo(const KURL& url) const
void SecurityContext::enforceSandboxFlags(SandboxFlags mask)
{
+ // The security origin must be set already in order to determine a sandboxed origin's potential trustworthiness.
Mike West 2016/02/25 11:58:11 We apparently don't have any unit tests for this m
estark 2016/03/01 02:59:26 Done. I'm happy to add isSecureContext() tests but
+ ASSERT(securityOrigin());
m_sandboxFlags |= mask;
- if (isSandboxed(SandboxOrigin) && securityOrigin() && !securityOrigin()->isUnique()) {
- setSecurityOrigin(SecurityOrigin::createUnique());
+ if (isSandboxed(SandboxOrigin) && !securityOrigin()->isUnique()) {
+ // Before overwriting the original origin, compute secure
+ // context properties from it. These properties are used to do
+ // secure context checks involving unique origins in remote
+ // frames.
+ setSecurityOrigin(SecurityOrigin::createUnique(securityOrigin()->isPotentiallyTrustworthy(), securityOrigin()->isPotentiallyTrustworthy() && SchemeRegistry::schemeShouldBypassSecureContextCheck(securityOrigin()->protocol())));
alexmos 2016/02/26 19:21:57 Would it make sense for the scheme check to just u
estark 2016/03/01 02:59:26 Done.
didUpdateSecurityOrigin();
}
}

Powered by Google App Engine
This is Rietveld 408576698