Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(84)

Side by Side Diff: third_party/WebKit/Source/bindings/core/v8/BindingSecurity.cpp

Issue 2209303002: binding: Moves the check for the first access to the initial document into BindingSecurity. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Fixed android_webview tests. Created 4 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 /* 1 /*
2 * Copyright (C) 2009 Google Inc. All rights reserved. 2 * Copyright (C) 2009 Google Inc. All rights reserved.
3 * 3 *
4 * Redistribution and use in source and binary forms, with or without 4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions are 5 * modification, are permitted provided that the following conditions are
6 * met: 6 * met:
7 * 7 *
8 * * Redistributions of source code must retain the above copyright 8 * * Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer. 9 * notice, this list of conditions and the following disclaimer.
10 * * Redistributions in binary form must reproduce the above 10 * * Redistributions in binary form must reproduce the above
(...skipping 24 matching lines...) Expand all
35 #include "core/frame/LocalDOMWindow.h" 35 #include "core/frame/LocalDOMWindow.h"
36 #include "core/frame/LocalFrame.h" 36 #include "core/frame/LocalFrame.h"
37 #include "core/frame/Location.h" 37 #include "core/frame/Location.h"
38 #include "core/frame/Settings.h" 38 #include "core/frame/Settings.h"
39 #include "core/html/HTMLFrameElementBase.h" 39 #include "core/html/HTMLFrameElementBase.h"
40 #include "core/workers/MainThreadWorkletGlobalScope.h" 40 #include "core/workers/MainThreadWorkletGlobalScope.h"
41 #include "platform/weborigin/SecurityOrigin.h" 41 #include "platform/weborigin/SecurityOrigin.h"
42 42
43 namespace blink { 43 namespace blink {
44 44
45 static bool isOriginAccessibleFromDOMWindow(const SecurityOrigin* targetOrigin, const LocalDOMWindow* accessingWindow) 45 namespace {
46
47 bool canAccessFrameInternal(const LocalDOMWindow* accessingWindow, const Securit yOrigin* targetFrameOrigin, const DOMWindow* targetWindow)
46 { 48 {
47 return accessingWindow && accessingWindow->document()->getSecurityOrigin()-> canAccessCheckSuborigins(targetOrigin); 49 SECURITY_DCHECK(!(targetWindow && targetWindow->frame())
haraken 2016/08/13 02:29:36 I think it's worth changing this to SECURITY_CHECK
Yuki 2016/08/15 03:42:58 Done.
48 } 50 || targetWindow == targetWindow->frame()->domWindow());
49
50 static bool canAccessFrame(v8::Isolate* isolate, const LocalDOMWindow* accessing Window, const SecurityOrigin* targetFrameOrigin, const DOMWindow* targetWindow, ExceptionState& exceptionState)
51 {
52 ASSERT_WITH_SECURITY_IMPLICATION(!(targetWindow && targetWindow->frame()) || targetWindow == targetWindow->frame()->domWindow());
53 51
54 // It's important to check that targetWindow is a LocalDOMWindow: it's 52 // It's important to check that targetWindow is a LocalDOMWindow: it's
55 // possible for a remote frame and local frame to have the same security 53 // possible for a remote frame and local frame to have the same security
56 // origin, depending on the model being used to allocate Frames between 54 // origin, depending on the model being used to allocate Frames between
57 // processes. See https://crbug.com/601629. 55 // processes. See https://crbug.com/601629.
58 if (targetWindow && targetWindow->isLocalDOMWindow() && isOriginAccessibleFr omDOMWindow(targetFrameOrigin, accessingWindow)) 56 if (!(accessingWindow && targetWindow && targetWindow->isLocalDOMWindow()))
haraken 2016/08/13 02:29:36 !accessingWindow || !targetWindow || ! targetWindo
Yuki 2016/08/15 03:42:58 I'd prefer this (old) style to yours. My execuses
57 return false;
58
59 const SecurityOrigin* accessingOrigin =
60 accessingWindow->document()->getSecurityOrigin();
61 if (!accessingOrigin->canAccessCheckSuborigins(targetFrameOrigin))
62 return false;
63
64 // Notify the loader's client if the initial document has been accessed.
65 LocalFrame* targetFrame = toLocalDOMWindow(targetWindow)->frame();
66 if (targetFrame->loader().stateMachine()->isDisplayingInitialEmptyDocument() )
67 targetFrame->loader().didAccessInitialDocument();
68
69 return true;
70 }
71
72 bool canAccessFrame(const LocalDOMWindow* accessingWindow, const SecurityOrigin* targetFrameOrigin, const DOMWindow* targetWindow, ExceptionState& exceptionStat e)
73 {
74 if (canAccessFrameInternal(accessingWindow, targetFrameOrigin, targetWindow) )
59 return true; 75 return true;
60 76
61 if (targetWindow) 77 if (targetWindow)
62 exceptionState.throwSecurityError(targetWindow->sanitizedCrossDomainAcce ssErrorMessage(accessingWindow), targetWindow->crossDomainAccessErrorMessage(acc essingWindow)); 78 exceptionState.throwSecurityError(targetWindow->sanitizedCrossDomainAcce ssErrorMessage(accessingWindow), targetWindow->crossDomainAccessErrorMessage(acc essingWindow));
63 return false; 79 return false;
64 } 80 }
65 81
66 static bool canAccessFrame(v8::Isolate* isolate, const LocalDOMWindow* accessing Window, SecurityOrigin* targetFrameOrigin, const DOMWindow* targetWindow, Securi tyReportingOption reportingOption = ReportSecurityError) 82 bool canAccessFrame(const LocalDOMWindow* accessingWindow, SecurityOrigin* targe tFrameOrigin, const DOMWindow* targetWindow, SecurityReportingOption reportingOp tion = ReportSecurityError)
67 { 83 {
68 ASSERT_WITH_SECURITY_IMPLICATION(!(targetWindow && targetWindow->frame()) || targetWindow == targetWindow->frame()->domWindow()); 84 if (canAccessFrameInternal(accessingWindow, targetFrameOrigin, targetWindow) )
69
70 // It's important to check that targetWindow is a LocalDOMWindow: it's
71 // possible for a remote frame and local frame to have the same security
72 // origin, depending on the model being used to allocate Frames between
73 // processes. See https://crbug.com/601629.
74 if (targetWindow->isLocalDOMWindow() && isOriginAccessibleFromDOMWindow(targ etFrameOrigin, accessingWindow))
75 return true; 85 return true;
76 86
77 if (reportingOption == ReportSecurityError && targetWindow) 87 if (accessingWindow && targetWindow && reportingOption == ReportSecurityErro r)
78 accessingWindow->printErrorMessage(targetWindow->crossDomainAccessErrorM essage(accessingWindow)); 88 accessingWindow->printErrorMessage(targetWindow->crossDomainAccessErrorM essage(accessingWindow));
79 return false; 89 return false;
80 } 90 }
81 91
92 } // namespace
93
82 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi ndow* accessingWindow, const DOMWindow* target, ExceptionState& exceptionState) 94 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi ndow* accessingWindow, const DOMWindow* target, ExceptionState& exceptionState)
83 { 95 {
84 ASSERT(target); 96 ASSERT(target);
85 const Frame* frame = target->frame(); 97 const Frame* frame = target->frame();
86 if (!frame || !frame->securityContext()) 98 if (!frame || !frame->securityContext())
87 return false; 99 return false;
88 return canAccessFrame(isolate, accessingWindow, frame->securityContext()->ge tSecurityOrigin(), target, exceptionState); 100 return canAccessFrame(accessingWindow, frame->securityContext()->getSecurity Origin(), target, exceptionState);
89 } 101 }
90 102
91 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi ndow* accessingWindow, const DOMWindow* target, SecurityReportingOption reportin gOption) 103 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi ndow* accessingWindow, const DOMWindow* target, SecurityReportingOption reportin gOption)
92 { 104 {
93 ASSERT(target); 105 ASSERT(target);
94 const Frame* frame = target->frame(); 106 const Frame* frame = target->frame();
95 if (!frame || !frame->securityContext()) 107 if (!frame || !frame->securityContext())
96 return false; 108 return false;
97 return canAccessFrame(isolate, accessingWindow, frame->securityContext()->ge tSecurityOrigin(), target, reportingOption); 109 return canAccessFrame(accessingWindow, frame->securityContext()->getSecurity Origin(), target, reportingOption);
98 } 110 }
99 111
100 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi ndow* accessingWindow, const EventTarget* target, ExceptionState& exceptionState ) 112 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi ndow* accessingWindow, const EventTarget* target, ExceptionState& exceptionState )
101 { 113 {
102 ASSERT(target); 114 ASSERT(target);
103 const DOMWindow* window = target->toDOMWindow(); 115 const DOMWindow* window = target->toDOMWindow();
104 if (!window) { 116 if (!window) {
105 // We only need to check the access to Window objects which are 117 // We only need to check the access to Window objects which are
106 // cross-origin accessible. If it's not a Window, the object's 118 // cross-origin accessible. If it's not a Window, the object's
107 // origin must always be the same origin (or it already leaked). 119 // origin must always be the same origin (or it already leaked).
108 return true; 120 return true;
109 } 121 }
110 const Frame* frame = window->frame(); 122 const Frame* frame = window->frame();
111 if (!frame || !frame->securityContext()) 123 if (!frame || !frame->securityContext())
112 return false; 124 return false;
113 return canAccessFrame(isolate, accessingWindow, frame->securityContext()->ge tSecurityOrigin(), window, exceptionState); 125 return canAccessFrame(accessingWindow, frame->securityContext()->getSecurity Origin(), window, exceptionState);
114 } 126 }
115 127
116 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi ndow* accessingWindow, const Location* target, ExceptionState& exceptionState) 128 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi ndow* accessingWindow, const Location* target, ExceptionState& exceptionState)
117 { 129 {
118 ASSERT(target); 130 ASSERT(target);
119 const Frame* frame = target->frame(); 131 const Frame* frame = target->frame();
120 if (!frame || !frame->securityContext()) 132 if (!frame || !frame->securityContext())
121 return false; 133 return false;
122 return canAccessFrame(isolate, accessingWindow, frame->securityContext()->ge tSecurityOrigin(), frame->domWindow(), exceptionState); 134 return canAccessFrame(accessingWindow, frame->securityContext()->getSecurity Origin(), frame->domWindow(), exceptionState);
123 } 135 }
124 136
125 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi ndow* accessingWindow, const Location* target, SecurityReportingOption reporting Option) 137 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi ndow* accessingWindow, const Location* target, SecurityReportingOption reporting Option)
126 { 138 {
127 ASSERT(target); 139 ASSERT(target);
128 const Frame* frame = target->frame(); 140 const Frame* frame = target->frame();
129 if (!frame || !frame->securityContext()) 141 if (!frame || !frame->securityContext())
130 return false; 142 return false;
131 return canAccessFrame(isolate, accessingWindow, frame->securityContext()->ge tSecurityOrigin(), frame->domWindow(), reportingOption); 143 return canAccessFrame(accessingWindow, frame->securityContext()->getSecurity Origin(), frame->domWindow(), reportingOption);
132 } 144 }
133 145
134 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, v8::Local<v8::Co ntext> context, const ExecutionContext* executionContext, const MainThreadWorkle tGlobalScope* workletGlobalScope, SecurityReportingOption reportingOption) 146 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, v8::Local<v8::Co ntext> context, const ExecutionContext* executionContext, const MainThreadWorkle tGlobalScope* workletGlobalScope, SecurityReportingOption reportingOption)
135 { 147 {
136 DCHECK(executionContext); 148 DCHECK(executionContext);
137 DOMWindow* domWindow = toDOMWindow(context); 149 DOMWindow* domWindow = toDOMWindow(context);
138 if (executionContext->isMainThreadWorkletGlobalScope()) { 150 if (executionContext->isMainThreadWorkletGlobalScope()) {
139 Frame* callingFrame = toMainThreadWorkletGlobalScope(executionContext)-> frame(); 151 Frame* callingFrame = toMainThreadWorkletGlobalScope(executionContext)-> frame();
140 domWindow = callingFrame ? callingFrame->domWindow() : nullptr; 152 domWindow = callingFrame ? callingFrame->domWindow() : nullptr;
141 } 153 }
142 154
143 DCHECK(workletGlobalScope); 155 DCHECK(workletGlobalScope);
144 const Frame* workletGlobalScopeFrame = workletGlobalScope->frame(); 156 const Frame* workletGlobalScopeFrame = workletGlobalScope->frame();
145 if (!workletGlobalScopeFrame || !workletGlobalScopeFrame->securityContext()) 157 if (!workletGlobalScopeFrame || !workletGlobalScopeFrame->securityContext())
146 return false; 158 return false;
147 159
148 return domWindow && canAccessFrame(isolate, toLocalDOMWindow(domWindow), wor kletGlobalScopeFrame->securityContext()->getSecurityOrigin(), workletGlobalScope Frame->domWindow(), reportingOption); 160 return domWindow && canAccessFrame(toLocalDOMWindow(domWindow), workletGloba lScopeFrame->securityContext()->getSecurityOrigin(), workletGlobalScopeFrame->do mWindow(), reportingOption);
149 } 161 }
150 162
151 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, v8::Local<v8::Co ntext> calling, v8::Local<v8::Context> target, SecurityReportingOption reporting Option) 163 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, v8::Local<v8::Co ntext> calling, v8::Local<v8::Context> target, SecurityReportingOption reporting Option)
152 { 164 {
153 ExecutionContext* targetExecutionContext = toExecutionContext(target); 165 ExecutionContext* targetExecutionContext = toExecutionContext(target);
154 DCHECK(targetExecutionContext); 166 DCHECK(targetExecutionContext);
155 167
156 ExecutionContext* callingExecutionContext = toExecutionContext(calling); 168 ExecutionContext* callingExecutionContext = toExecutionContext(calling);
157 DCHECK(callingExecutionContext); 169 DCHECK(callingExecutionContext);
158 170
159 if (targetExecutionContext->isMainThreadWorkletGlobalScope()) 171 if (targetExecutionContext->isMainThreadWorkletGlobalScope())
160 return shouldAllowAccessTo(isolate, calling, callingExecutionContext, to MainThreadWorkletGlobalScope(targetExecutionContext), DoNotReportSecurityError); 172 return shouldAllowAccessTo(isolate, calling, callingExecutionContext, to MainThreadWorkletGlobalScope(targetExecutionContext), DoNotReportSecurityError);
161 173
162 if (callingExecutionContext->isMainThreadWorkletGlobalScope()) 174 if (callingExecutionContext->isMainThreadWorkletGlobalScope())
163 return shouldAllowAccessTo(isolate, target, targetExecutionContext, toMa inThreadWorkletGlobalScope(callingExecutionContext), DoNotReportSecurityError); 175 return shouldAllowAccessTo(isolate, target, targetExecutionContext, toMa inThreadWorkletGlobalScope(callingExecutionContext), DoNotReportSecurityError);
164 176
165 DOMWindow* window = toDOMWindow(target); 177 DOMWindow* window = toDOMWindow(target);
166 return window && shouldAllowAccessTo(isolate, toLocalDOMWindow(toDOMWindow(c alling)), window, DoNotReportSecurityError); 178 return window && shouldAllowAccessTo(isolate, toLocalDOMWindow(toDOMWindow(c alling)), window, DoNotReportSecurityError);
167 } 179 }
168 180
169 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi ndow* accessingWindow, const Node* target, ExceptionState& exceptionState) 181 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi ndow* accessingWindow, const Node* target, ExceptionState& exceptionState)
170 { 182 {
171 if (!target) 183 if (!target)
172 return false; 184 return false;
173 return canAccessFrame(isolate, accessingWindow, target->document().getSecuri tyOrigin(), target->document().domWindow(), exceptionState); 185 return canAccessFrame(accessingWindow, target->document().getSecurityOrigin( ), target->document().domWindow(), exceptionState);
174 } 186 }
175 187
176 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi ndow* accessingWindow, const Node* target, SecurityReportingOption reportingOpti on) 188 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi ndow* accessingWindow, const Node* target, SecurityReportingOption reportingOpti on)
177 { 189 {
178 if (!target) 190 if (!target)
179 return false; 191 return false;
180 return canAccessFrame(isolate, accessingWindow, target->document().getSecuri tyOrigin(), target->document().domWindow(), reportingOption); 192 return canAccessFrame(accessingWindow, target->document().getSecurityOrigin( ), target->document().domWindow(), reportingOption);
181 } 193 }
182 194
183 bool BindingSecurity::shouldAllowAccessToFrame(v8::Isolate* isolate, const Local DOMWindow* accessingWindow, const Frame* target, SecurityReportingOption reporti ngOption) 195 bool BindingSecurity::shouldAllowAccessToFrame(v8::Isolate* isolate, const Local DOMWindow* accessingWindow, const Frame* target, SecurityReportingOption reporti ngOption)
184 { 196 {
185 if (!target || !target->securityContext()) 197 if (!target || !target->securityContext())
186 return false; 198 return false;
187 return canAccessFrame(isolate, accessingWindow, target->securityContext()->g etSecurityOrigin(), target->domWindow(), reportingOption); 199 return canAccessFrame(accessingWindow, target->securityContext()->getSecurit yOrigin(), target->domWindow(), reportingOption);
188 } 200 }
189 201
190 } // namespace blink 202 } // namespace blink
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698