Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(294)

Unified Diff: content/browser/frame_host/ancestor_throttle.cc

Issue 2655463006: PlzNavigate: Enforce 'frame-src' CSP on the browser. (Closed)
Patch Set: Fix tests. Created 3 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: content/browser/frame_host/ancestor_throttle.cc
diff --git a/content/browser/frame_host/ancestor_throttle.cc b/content/browser/frame_host/ancestor_throttle.cc
index ca87f0a221d797c54f9304669bd016aa961c9bcc..7513df9d6f07cff7c95d2a243f80ba99fc3104ad 100644
--- a/content/browser/frame_host/ancestor_throttle.cc
+++ b/content/browser/frame_host/ancestor_throttle.cc
@@ -11,9 +11,11 @@
#include "content/browser/frame_host/frame_tree.h"
#include "content/browser/frame_host/frame_tree_node.h"
#include "content/browser/frame_host/navigation_handle_impl.h"
+#include "content/browser/frame_host/navigation_request.h"
#include "content/public/browser/browser_thread.h"
#include "content/public/browser/navigation_handle.h"
#include "content/public/browser/navigation_throttle.h"
+#include "content/public/common/browser_side_navigation_policy.h"
#include "content/public/common/console_message_level.h"
#include "net/http/http_response_headers.h"
#include "url/origin.h"
@@ -165,6 +167,54 @@ AncestorThrottle::WillProcessResponse() {
return NavigationThrottle::BLOCK_RESPONSE;
}
+NavigationThrottle::ThrottleCheckResult
+AncestorThrottle::CheckContentSecurityPolicyFrameSrc(bool is_redirect) {
+ // If PlzNavigate is not enabled, "frame-src" can not be enforced on the
+ // browser-side since a NavigationRequest is needed below. It doesn't matter
+ // because it is still enforced on the renderer-side.
+ if (!IsBrowserSideNavigationEnabled())
+ return NavigationThrottle::PROCEED;
+
+ NavigationHandleImpl* handle =
+ static_cast<NavigationHandleImpl*>(navigation_handle());
+
+ const GURL& url = navigation_handle()->GetURL();
+ if (url.SchemeIs(url::kAboutScheme))
+ return NavigationThrottle::PROCEED;
+
+ // Allow the request when it bypasses the CSP of the parent frame.
+ // Note: it is possible that there is no navigation_request associated with
+ // this navigation, but it only happens when the navigation_handle was created
+ // by CreateNavigationHandleForTesting().
+ if (handle->frame_tree_node()->navigation_request() &&
+ handle->frame_tree_node()
+ ->navigation_request()
+ ->common_params()
+ .should_bypass_main_world_CSP) {
+ return NavigationThrottle::PROCEED;
+ }
+
+ auto parent = handle->frame_tree_node()->parent();
+ DCHECK(parent);
+
+ CSPContext* csp_context = parent->ContentSecurityPolicyContext();
+ if (!csp_context->Allow(parent->ContentSecurityPolicies(),
+ CSPDirective::FrameSrc, url, is_redirect)) {
+ return NavigationThrottle::BLOCK_REQUEST;
alexmos 2017/02/10 22:59:53 Will this result in loading a regular error page?
arthursonzogni 2017/02/13 16:33:20 Yes you are right. I forgot this. XFO checks happe
arthursonzogni 2017/02/15 17:02:15 I am working on a solution. See https://codereview
+ }
+
+ return NavigationThrottle::PROCEED;
+}
+
+NavigationThrottle::ThrottleCheckResult AncestorThrottle::WillStartRequest() {
+ return CheckContentSecurityPolicyFrameSrc(false);
+}
+
+NavigationThrottle::ThrottleCheckResult
+AncestorThrottle::WillRedirectRequest() {
+ return CheckContentSecurityPolicyFrameSrc(true);
+}
+
AncestorThrottle::AncestorThrottle(NavigationHandle* handle)
: NavigationThrottle(handle) {}

Powered by Google App Engine
This is Rietveld 408576698