Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(102)

Unified Diff: third_party/WebKit/Source/bindings/core/v8/BindingSecurity.cpp

Issue 2745313003: Move securityCheck out of V8WrapperInstantiationScope (Closed)
Patch Set: Add comments and DCHECKs Created 3 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: third_party/WebKit/Source/bindings/core/v8/BindingSecurity.cpp
diff --git a/third_party/WebKit/Source/bindings/core/v8/BindingSecurity.cpp b/third_party/WebKit/Source/bindings/core/v8/BindingSecurity.cpp
index 516ef4dff5498d95b703de67ff7f23e7350fcaca..0684b67364bead91c48392570d8114a7874e4441 100644
--- a/third_party/WebKit/Source/bindings/core/v8/BindingSecurity.cpp
+++ b/third_party/WebKit/Source/bindings/core/v8/BindingSecurity.cpp
@@ -32,6 +32,8 @@
#include "bindings/core/v8/ExceptionState.h"
#include "bindings/core/v8/V8Binding.h"
+#include "bindings/core/v8/V8Location.h"
+#include "bindings/core/v8/WrapperCreationSecurityCheck.h"
#include "core/dom/Document.h"
#include "core/frame/LocalDOMWindow.h"
#include "core/frame/LocalFrame.h"
@@ -252,6 +254,65 @@ bool BindingSecurity::shouldAllowNamedAccessTo(const DOMWindow* accessingWindow,
return true;
}
+bool BindingSecurity::shouldAllowAccessToCreationContext(
+ v8::Isolate* isolate,
haraken 2017/04/09 15:28:59 You don't need to pass in an Isolate*, since you c
adithyas 2017/04/10 18:02:00 Fixed, here and everywhere else.
+ v8::Local<v8::Context> creationContext,
+ const WrapperTypeInfo* type) {
+ // According to
+ // https://html.spec.whatwg.org/multipage/browsers.html#security-location,
+ // cross-origin script access to a few properties of Location is allowed.
+ // Location already implements the necessary security checks.
+ if (type->equals(&V8Location::wrapperTypeInfo))
+ return true;
+
+ LocalFrame* frame = toLocalFrameIfNotDetached(creationContext);
+ ExceptionState exceptionState(isolate, ExceptionState::ConstructionContext,
+ type->interfaceName);
+ if (!frame) {
+ // Sandbox detached frames - they can't create cross origin objects.
+ LocalDOMWindow* callingWindow = currentDOMWindow(isolate);
+ LocalDOMWindow* targetWindow = toLocalDOMWindow(creationContext);
+
+ return shouldAllowAccessToDetachedWindow(callingWindow, targetWindow,
+ exceptionState);
+ }
+ const DOMWrapperWorld& currentWorld =
+ DOMWrapperWorld::world(isolate->GetCurrentContext());
+ CHECK_EQ(currentWorld.worldId(),
+ DOMWrapperWorld::world(creationContext).worldId());
+
+ return !currentWorld.isMainWorld() ||
haraken 2017/04/09 15:29:00 I'd like to understand what the isMainWorld check
adithyas 2017/04/10 18:02:00 This is the CL that added the check in: https://co
+ shouldAllowAccessToFrame(currentDOMWindow(isolate), frame,
+ exceptionState);
+}
+
+void BindingSecurity::rethrowCrossContextException(
+ v8::Isolate* isolate,
haraken 2017/04/09 15:29:00 Ditto. Remove the Isolate* parameter.
+ v8::Local<v8::Context> creationContext,
+ const WrapperTypeInfo* type,
+ v8::Local<v8::Value> crossContextException) {
+ DCHECK(!crossContextException.IsEmpty());
+ ExceptionState exceptionState(isolate, ExceptionState::ConstructionContext,
+ type->interfaceName);
haraken 2017/04/09 15:29:00 It looks redundant to create an ExceptionState. I
Yuki 2017/04/10 04:13:30 Yes, it's somewhat redundant, but ExceptionState s
+ if (type->equals(&V8Location::wrapperTypeInfo)) {
+ // Convert cross-context exception to security error
+ LocalDOMWindow* callingWindow = currentDOMWindow(isolate);
+ LocalDOMWindow* targetWindow = toLocalDOMWindow(creationContext);
+ exceptionState.throwSecurityError(
+ targetWindow->sanitizedCrossDomainAccessErrorMessage(callingWindow),
+ targetWindow->crossDomainAccessErrorMessage(callingWindow));
+ return;
+ }
+ exceptionState.rethrowV8Exception(crossContextException);
+}
+
+void BindingSecurity::initWrapperCreationSecurityCheck() {
+ WrapperCreationSecurityCheck::setSecurityCheckFunction(
+ shouldAllowAccessToCreationContext);
+ WrapperCreationSecurityCheck::setRethrowExceptionFunction(
+ rethrowCrossContextException);
+}
+
void BindingSecurity::failedAccessCheckFor(v8::Isolate* isolate,
const Frame* target) {
// TODO(dcheng): See if this null check can be removed or hoisted to a

Powered by Google App Engine
This is Rietveld 408576698