Chromium Code Reviews| Index: content/browser/frame_host/navigation_request.cc |
| diff --git a/content/browser/frame_host/navigation_request.cc b/content/browser/frame_host/navigation_request.cc |
| index c13a7e7f346df429cfd58896da678a198019f258..50fcaacf14c9aebbc512280e02fbb47ff6b928ad 100644 |
| --- a/content/browser/frame_host/navigation_request.cc |
| +++ b/content/browser/frame_host/navigation_request.cc |
| @@ -6,6 +6,7 @@ |
| #include <utility> |
| +#include "content/browser/child_process_security_policy_impl.h" |
| #include "content/browser/devtools/render_frame_devtools_agent_host.h" |
| #include "content/browser/frame_host/frame_tree.h" |
| #include "content/browser/frame_host/frame_tree_node.h" |
| @@ -15,6 +16,7 @@ |
| #include "content/browser/frame_host/navigator.h" |
| #include "content/browser/frame_host/navigator_impl.h" |
| #include "content/browser/loader/navigation_url_loader.h" |
| +#include "content/browser/renderer_host/render_process_host_impl.h" |
| #include "content/browser/service_worker/service_worker_context_wrapper.h" |
| #include "content/browser/service_worker/service_worker_navigation_handle.h" |
| #include "content/browser/site_instance_impl.h" |
| @@ -332,8 +334,31 @@ void NavigationRequest::OnRequestRedirected( |
| common_params_.method = redirect_info.new_method; |
| common_params_.referrer.url = GURL(redirect_info.new_referrer); |
| - // TODO(clamy): Have CSP + security upgrade checks here. |
| + // For non browser initiated navigations we need to check if the source and |
| + // target site instances both have access to the URL. We always allow |
| + // browser initiated requests. |
|
Charlie Reis
2016/10/24 22:04:36
I don't think it matters if the target (or rather,
ananta
2016/10/24 23:01:41
Thanks. Removed the check for the target.
|
| // TODO(clamy): Kill the renderer if FilterURL fails? |
| + GURL url = common_params_.url; |
| + if (!browser_initiated_ && source_site_instance()) { |
| + source_site_instance()->GetProcess()->FilterURL(false, &url); |
| + // FilterURL sets the URL to about:blank if the CSP checks prevent the |
| + // renderer from accessing it. |
| + if (url != common_params_.url) { |
|
Charlie Reis
2016/10/24 22:04:36
This is making an assumption that FilterURL will o
ananta
2016/10/24 23:01:41
Thanks. Done.
|
| + NavigationRequest::OnRedirectChecksComplete(NavigationThrottle::CANCEL); |
| + return; |
| + } |
| + } |
| + |
| + if (!browser_initiated_) { |
| + frame_tree_node()->current_frame_host()->GetSiteInstance()->GetProcess()-> |
| + FilterURL(false, &url); |
| + if (url != common_params_.url) { |
| + // FilterURL sets the URL to about:blank if the CSP checks prevent the |
| + // renderer from accessing it. |
| + NavigationRequest::OnRedirectChecksComplete(NavigationThrottle::CANCEL); |
| + return; |
| + } |
| + } |
| // It's safe to use base::Unretained because this NavigationRequest owns the |
| // NavigationHandle where the callback will be stored. |