Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 /* | 1 /* |
| 2 * Copyright (C) 2009 Google Inc. All rights reserved. | 2 * Copyright (C) 2009 Google Inc. All rights reserved. |
| 3 * | 3 * |
| 4 * Redistribution and use in source and binary forms, with or without | 4 * Redistribution and use in source and binary forms, with or without |
| 5 * modification, are permitted provided that the following conditions are | 5 * modification, are permitted provided that the following conditions are |
| 6 * met: | 6 * met: |
| 7 * | 7 * |
| 8 * * Redistributions of source code must retain the above copyright | 8 * * Redistributions of source code must retain the above copyright |
| 9 * notice, this list of conditions and the following disclaimer. | 9 * notice, this list of conditions and the following disclaimer. |
| 10 * * Redistributions in binary form must reproduce the above | 10 * * Redistributions in binary form must reproduce the above |
| (...skipping 24 matching lines...) Expand all Loading... | |
| 35 #include "core/frame/LocalDOMWindow.h" | 35 #include "core/frame/LocalDOMWindow.h" |
| 36 #include "core/frame/LocalFrame.h" | 36 #include "core/frame/LocalFrame.h" |
| 37 #include "core/frame/Location.h" | 37 #include "core/frame/Location.h" |
| 38 #include "core/frame/Settings.h" | 38 #include "core/frame/Settings.h" |
| 39 #include "core/html/HTMLFrameElementBase.h" | 39 #include "core/html/HTMLFrameElementBase.h" |
| 40 #include "core/workers/MainThreadWorkletGlobalScope.h" | 40 #include "core/workers/MainThreadWorkletGlobalScope.h" |
| 41 #include "platform/weborigin/SecurityOrigin.h" | 41 #include "platform/weborigin/SecurityOrigin.h" |
| 42 | 42 |
| 43 namespace blink { | 43 namespace blink { |
| 44 | 44 |
| 45 static bool isOriginAccessibleFromDOMWindow(const SecurityOrigin* targetOrigin, const LocalDOMWindow* accessingWindow) | 45 namespace { |
| 46 | |
| 47 bool canAccessFrameInternal(const LocalDOMWindow* accessingWindow, const Securit yOrigin* targetFrameOrigin, const DOMWindow* targetWindow) | |
| 46 { | 48 { |
| 47 return accessingWindow && accessingWindow->document()->getSecurityOrigin()-> canAccessCheckSuborigins(targetOrigin); | 49 SECURITY_DCHECK(!(targetWindow && targetWindow->frame()) |
|
haraken
2016/08/13 02:29:36
I think it's worth changing this to SECURITY_CHECK
Yuki
2016/08/15 03:42:58
Done.
| |
| 48 } | 50 || targetWindow == targetWindow->frame()->domWindow()); |
| 49 | |
| 50 static bool canAccessFrame(v8::Isolate* isolate, const LocalDOMWindow* accessing Window, const SecurityOrigin* targetFrameOrigin, const DOMWindow* targetWindow, ExceptionState& exceptionState) | |
| 51 { | |
| 52 ASSERT_WITH_SECURITY_IMPLICATION(!(targetWindow && targetWindow->frame()) || targetWindow == targetWindow->frame()->domWindow()); | |
| 53 | 51 |
| 54 // It's important to check that targetWindow is a LocalDOMWindow: it's | 52 // It's important to check that targetWindow is a LocalDOMWindow: it's |
| 55 // possible for a remote frame and local frame to have the same security | 53 // possible for a remote frame and local frame to have the same security |
| 56 // origin, depending on the model being used to allocate Frames between | 54 // origin, depending on the model being used to allocate Frames between |
| 57 // processes. See https://crbug.com/601629. | 55 // processes. See https://crbug.com/601629. |
| 58 if (targetWindow && targetWindow->isLocalDOMWindow() && isOriginAccessibleFr omDOMWindow(targetFrameOrigin, accessingWindow)) | 56 if (!(accessingWindow && targetWindow && targetWindow->isLocalDOMWindow())) |
|
haraken
2016/08/13 02:29:36
!accessingWindow || !targetWindow || ! targetWindo
Yuki
2016/08/15 03:42:58
I'd prefer this (old) style to yours. My execuses
| |
| 57 return false; | |
| 58 | |
| 59 const SecurityOrigin* accessingOrigin = | |
| 60 accessingWindow->document()->getSecurityOrigin(); | |
| 61 if (!accessingOrigin->canAccessCheckSuborigins(targetFrameOrigin)) | |
| 62 return false; | |
| 63 | |
| 64 // Notify the loader's client if the initial document has been accessed. | |
| 65 LocalFrame* targetFrame = toLocalDOMWindow(targetWindow)->frame(); | |
| 66 if (targetFrame->loader().stateMachine()->isDisplayingInitialEmptyDocument() ) | |
| 67 targetFrame->loader().didAccessInitialDocument(); | |
| 68 | |
| 69 return true; | |
| 70 } | |
| 71 | |
| 72 bool canAccessFrame(const LocalDOMWindow* accessingWindow, const SecurityOrigin* targetFrameOrigin, const DOMWindow* targetWindow, ExceptionState& exceptionStat e) | |
| 73 { | |
| 74 if (canAccessFrameInternal(accessingWindow, targetFrameOrigin, targetWindow) ) | |
| 59 return true; | 75 return true; |
| 60 | 76 |
| 61 if (targetWindow) | 77 if (targetWindow) |
| 62 exceptionState.throwSecurityError(targetWindow->sanitizedCrossDomainAcce ssErrorMessage(accessingWindow), targetWindow->crossDomainAccessErrorMessage(acc essingWindow)); | 78 exceptionState.throwSecurityError(targetWindow->sanitizedCrossDomainAcce ssErrorMessage(accessingWindow), targetWindow->crossDomainAccessErrorMessage(acc essingWindow)); |
| 63 return false; | 79 return false; |
| 64 } | 80 } |
| 65 | 81 |
| 66 static bool canAccessFrame(v8::Isolate* isolate, const LocalDOMWindow* accessing Window, SecurityOrigin* targetFrameOrigin, const DOMWindow* targetWindow, Securi tyReportingOption reportingOption = ReportSecurityError) | 82 bool canAccessFrame(const LocalDOMWindow* accessingWindow, SecurityOrigin* targe tFrameOrigin, const DOMWindow* targetWindow, SecurityReportingOption reportingOp tion = ReportSecurityError) |
| 67 { | 83 { |
| 68 ASSERT_WITH_SECURITY_IMPLICATION(!(targetWindow && targetWindow->frame()) || targetWindow == targetWindow->frame()->domWindow()); | 84 if (canAccessFrameInternal(accessingWindow, targetFrameOrigin, targetWindow) ) |
| 69 | |
| 70 // It's important to check that targetWindow is a LocalDOMWindow: it's | |
| 71 // possible for a remote frame and local frame to have the same security | |
| 72 // origin, depending on the model being used to allocate Frames between | |
| 73 // processes. See https://crbug.com/601629. | |
| 74 if (targetWindow->isLocalDOMWindow() && isOriginAccessibleFromDOMWindow(targ etFrameOrigin, accessingWindow)) | |
| 75 return true; | 85 return true; |
| 76 | 86 |
| 77 if (reportingOption == ReportSecurityError && targetWindow) | 87 if (accessingWindow && targetWindow && reportingOption == ReportSecurityErro r) |
| 78 accessingWindow->printErrorMessage(targetWindow->crossDomainAccessErrorM essage(accessingWindow)); | 88 accessingWindow->printErrorMessage(targetWindow->crossDomainAccessErrorM essage(accessingWindow)); |
| 79 return false; | 89 return false; |
| 80 } | 90 } |
| 81 | 91 |
| 92 } // namespace | |
| 93 | |
| 82 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi ndow* accessingWindow, const DOMWindow* target, ExceptionState& exceptionState) | 94 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi ndow* accessingWindow, const DOMWindow* target, ExceptionState& exceptionState) |
| 83 { | 95 { |
| 84 ASSERT(target); | 96 ASSERT(target); |
| 85 const Frame* frame = target->frame(); | 97 const Frame* frame = target->frame(); |
| 86 if (!frame || !frame->securityContext()) | 98 if (!frame || !frame->securityContext()) |
| 87 return false; | 99 return false; |
| 88 return canAccessFrame(isolate, accessingWindow, frame->securityContext()->ge tSecurityOrigin(), target, exceptionState); | 100 return canAccessFrame(accessingWindow, frame->securityContext()->getSecurity Origin(), target, exceptionState); |
| 89 } | 101 } |
| 90 | 102 |
| 91 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi ndow* accessingWindow, const DOMWindow* target, SecurityReportingOption reportin gOption) | 103 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi ndow* accessingWindow, const DOMWindow* target, SecurityReportingOption reportin gOption) |
| 92 { | 104 { |
| 93 ASSERT(target); | 105 ASSERT(target); |
| 94 const Frame* frame = target->frame(); | 106 const Frame* frame = target->frame(); |
| 95 if (!frame || !frame->securityContext()) | 107 if (!frame || !frame->securityContext()) |
| 96 return false; | 108 return false; |
| 97 return canAccessFrame(isolate, accessingWindow, frame->securityContext()->ge tSecurityOrigin(), target, reportingOption); | 109 return canAccessFrame(accessingWindow, frame->securityContext()->getSecurity Origin(), target, reportingOption); |
| 98 } | 110 } |
| 99 | 111 |
| 100 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi ndow* accessingWindow, const EventTarget* target, ExceptionState& exceptionState ) | 112 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi ndow* accessingWindow, const EventTarget* target, ExceptionState& exceptionState ) |
| 101 { | 113 { |
| 102 ASSERT(target); | 114 ASSERT(target); |
| 103 const DOMWindow* window = target->toDOMWindow(); | 115 const DOMWindow* window = target->toDOMWindow(); |
| 104 if (!window) { | 116 if (!window) { |
| 105 // We only need to check the access to Window objects which are | 117 // We only need to check the access to Window objects which are |
| 106 // cross-origin accessible. If it's not a Window, the object's | 118 // cross-origin accessible. If it's not a Window, the object's |
| 107 // origin must always be the same origin (or it already leaked). | 119 // origin must always be the same origin (or it already leaked). |
| 108 return true; | 120 return true; |
| 109 } | 121 } |
| 110 const Frame* frame = window->frame(); | 122 const Frame* frame = window->frame(); |
| 111 if (!frame || !frame->securityContext()) | 123 if (!frame || !frame->securityContext()) |
| 112 return false; | 124 return false; |
| 113 return canAccessFrame(isolate, accessingWindow, frame->securityContext()->ge tSecurityOrigin(), window, exceptionState); | 125 return canAccessFrame(accessingWindow, frame->securityContext()->getSecurity Origin(), window, exceptionState); |
| 114 } | 126 } |
| 115 | 127 |
| 116 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi ndow* accessingWindow, const Location* target, ExceptionState& exceptionState) | 128 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi ndow* accessingWindow, const Location* target, ExceptionState& exceptionState) |
| 117 { | 129 { |
| 118 ASSERT(target); | 130 ASSERT(target); |
| 119 const Frame* frame = target->frame(); | 131 const Frame* frame = target->frame(); |
| 120 if (!frame || !frame->securityContext()) | 132 if (!frame || !frame->securityContext()) |
| 121 return false; | 133 return false; |
| 122 return canAccessFrame(isolate, accessingWindow, frame->securityContext()->ge tSecurityOrigin(), frame->domWindow(), exceptionState); | 134 return canAccessFrame(accessingWindow, frame->securityContext()->getSecurity Origin(), frame->domWindow(), exceptionState); |
| 123 } | 135 } |
| 124 | 136 |
| 125 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi ndow* accessingWindow, const Location* target, SecurityReportingOption reporting Option) | 137 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi ndow* accessingWindow, const Location* target, SecurityReportingOption reporting Option) |
| 126 { | 138 { |
| 127 ASSERT(target); | 139 ASSERT(target); |
| 128 const Frame* frame = target->frame(); | 140 const Frame* frame = target->frame(); |
| 129 if (!frame || !frame->securityContext()) | 141 if (!frame || !frame->securityContext()) |
| 130 return false; | 142 return false; |
| 131 return canAccessFrame(isolate, accessingWindow, frame->securityContext()->ge tSecurityOrigin(), frame->domWindow(), reportingOption); | 143 return canAccessFrame(accessingWindow, frame->securityContext()->getSecurity Origin(), frame->domWindow(), reportingOption); |
| 132 } | 144 } |
| 133 | 145 |
| 134 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, v8::Local<v8::Co ntext> context, const ExecutionContext* executionContext, const MainThreadWorkle tGlobalScope* workletGlobalScope, SecurityReportingOption reportingOption) | 146 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, v8::Local<v8::Co ntext> context, const ExecutionContext* executionContext, const MainThreadWorkle tGlobalScope* workletGlobalScope, SecurityReportingOption reportingOption) |
| 135 { | 147 { |
| 136 DCHECK(executionContext); | 148 DCHECK(executionContext); |
| 137 DOMWindow* domWindow = toDOMWindow(context); | 149 DOMWindow* domWindow = toDOMWindow(context); |
| 138 if (executionContext->isMainThreadWorkletGlobalScope()) { | 150 if (executionContext->isMainThreadWorkletGlobalScope()) { |
| 139 Frame* callingFrame = toMainThreadWorkletGlobalScope(executionContext)-> frame(); | 151 Frame* callingFrame = toMainThreadWorkletGlobalScope(executionContext)-> frame(); |
| 140 domWindow = callingFrame ? callingFrame->domWindow() : nullptr; | 152 domWindow = callingFrame ? callingFrame->domWindow() : nullptr; |
| 141 } | 153 } |
| 142 | 154 |
| 143 DCHECK(workletGlobalScope); | 155 DCHECK(workletGlobalScope); |
| 144 const Frame* workletGlobalScopeFrame = workletGlobalScope->frame(); | 156 const Frame* workletGlobalScopeFrame = workletGlobalScope->frame(); |
| 145 if (!workletGlobalScopeFrame || !workletGlobalScopeFrame->securityContext()) | 157 if (!workletGlobalScopeFrame || !workletGlobalScopeFrame->securityContext()) |
| 146 return false; | 158 return false; |
| 147 | 159 |
| 148 return domWindow && canAccessFrame(isolate, toLocalDOMWindow(domWindow), wor kletGlobalScopeFrame->securityContext()->getSecurityOrigin(), workletGlobalScope Frame->domWindow(), reportingOption); | 160 return domWindow && canAccessFrame(toLocalDOMWindow(domWindow), workletGloba lScopeFrame->securityContext()->getSecurityOrigin(), workletGlobalScopeFrame->do mWindow(), reportingOption); |
| 149 } | 161 } |
| 150 | 162 |
| 151 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, v8::Local<v8::Co ntext> calling, v8::Local<v8::Context> target, SecurityReportingOption reporting Option) | 163 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, v8::Local<v8::Co ntext> calling, v8::Local<v8::Context> target, SecurityReportingOption reporting Option) |
| 152 { | 164 { |
| 153 ExecutionContext* targetExecutionContext = toExecutionContext(target); | 165 ExecutionContext* targetExecutionContext = toExecutionContext(target); |
| 154 DCHECK(targetExecutionContext); | 166 DCHECK(targetExecutionContext); |
| 155 | 167 |
| 156 ExecutionContext* callingExecutionContext = toExecutionContext(calling); | 168 ExecutionContext* callingExecutionContext = toExecutionContext(calling); |
| 157 DCHECK(callingExecutionContext); | 169 DCHECK(callingExecutionContext); |
| 158 | 170 |
| 159 if (targetExecutionContext->isMainThreadWorkletGlobalScope()) | 171 if (targetExecutionContext->isMainThreadWorkletGlobalScope()) |
| 160 return shouldAllowAccessTo(isolate, calling, callingExecutionContext, to MainThreadWorkletGlobalScope(targetExecutionContext), DoNotReportSecurityError); | 172 return shouldAllowAccessTo(isolate, calling, callingExecutionContext, to MainThreadWorkletGlobalScope(targetExecutionContext), DoNotReportSecurityError); |
| 161 | 173 |
| 162 if (callingExecutionContext->isMainThreadWorkletGlobalScope()) | 174 if (callingExecutionContext->isMainThreadWorkletGlobalScope()) |
| 163 return shouldAllowAccessTo(isolate, target, targetExecutionContext, toMa inThreadWorkletGlobalScope(callingExecutionContext), DoNotReportSecurityError); | 175 return shouldAllowAccessTo(isolate, target, targetExecutionContext, toMa inThreadWorkletGlobalScope(callingExecutionContext), DoNotReportSecurityError); |
| 164 | 176 |
| 165 DOMWindow* window = toDOMWindow(target); | 177 DOMWindow* window = toDOMWindow(target); |
| 166 return window && shouldAllowAccessTo(isolate, toLocalDOMWindow(toDOMWindow(c alling)), window, DoNotReportSecurityError); | 178 return window && shouldAllowAccessTo(isolate, toLocalDOMWindow(toDOMWindow(c alling)), window, DoNotReportSecurityError); |
| 167 } | 179 } |
| 168 | 180 |
| 169 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi ndow* accessingWindow, const Node* target, ExceptionState& exceptionState) | 181 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi ndow* accessingWindow, const Node* target, ExceptionState& exceptionState) |
| 170 { | 182 { |
| 171 if (!target) | 183 if (!target) |
| 172 return false; | 184 return false; |
| 173 return canAccessFrame(isolate, accessingWindow, target->document().getSecuri tyOrigin(), target->document().domWindow(), exceptionState); | 185 return canAccessFrame(accessingWindow, target->document().getSecurityOrigin( ), target->document().domWindow(), exceptionState); |
| 174 } | 186 } |
| 175 | 187 |
| 176 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi ndow* accessingWindow, const Node* target, SecurityReportingOption reportingOpti on) | 188 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi ndow* accessingWindow, const Node* target, SecurityReportingOption reportingOpti on) |
| 177 { | 189 { |
| 178 if (!target) | 190 if (!target) |
| 179 return false; | 191 return false; |
| 180 return canAccessFrame(isolate, accessingWindow, target->document().getSecuri tyOrigin(), target->document().domWindow(), reportingOption); | 192 return canAccessFrame(accessingWindow, target->document().getSecurityOrigin( ), target->document().domWindow(), reportingOption); |
| 181 } | 193 } |
| 182 | 194 |
| 183 bool BindingSecurity::shouldAllowAccessToFrame(v8::Isolate* isolate, const Local DOMWindow* accessingWindow, const Frame* target, SecurityReportingOption reporti ngOption) | 195 bool BindingSecurity::shouldAllowAccessToFrame(v8::Isolate* isolate, const Local DOMWindow* accessingWindow, const Frame* target, SecurityReportingOption reporti ngOption) |
| 184 { | 196 { |
| 185 if (!target || !target->securityContext()) | 197 if (!target || !target->securityContext()) |
| 186 return false; | 198 return false; |
| 187 return canAccessFrame(isolate, accessingWindow, target->securityContext()->g etSecurityOrigin(), target->domWindow(), reportingOption); | 199 return canAccessFrame(accessingWindow, target->securityContext()->getSecurit yOrigin(), target->domWindow(), reportingOption); |
| 188 } | 200 } |
| 189 | 201 |
| 190 } // namespace blink | 202 } // namespace blink |
| OLD | NEW |