Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(373)

Side by Side Diff: content/browser/browser_side_navigation_browsertest.cc

Issue 2915813002: Add missing return statement after ReceivedBadMessage call. (Closed)
Patch Set: review comment Created 3 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « no previous file | content/browser/frame_host/render_frame_host_impl.cc » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright 2014 The Chromium Authors. All rights reserved. 1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include <stdint.h> 5 #include <stdint.h>
6 6
7 #include "base/command_line.h" 7 #include "base/command_line.h"
8 #include "base/strings/stringprintf.h" 8 #include "base/strings/stringprintf.h"
9 #include "base/strings/utf_string_conversions.h" 9 #include "base/strings/utf_string_conversions.h"
10 #include "base/test/scoped_feature_list.h"
10 #include "content/browser/child_process_security_policy_impl.h" 11 #include "content/browser/child_process_security_policy_impl.h"
11 #include "content/browser/frame_host/navigation_handle_impl.h" 12 #include "content/browser/frame_host/navigation_handle_impl.h"
12 #include "content/browser/frame_host/navigation_request.h" 13 #include "content/browser/frame_host/navigation_request.h"
13 #include "content/browser/web_contents/web_contents_impl.h" 14 #include "content/browser/web_contents/web_contents_impl.h"
14 #include "content/common/frame_messages.h" 15 #include "content/common/frame_messages.h"
15 #include "content/common/site_isolation_policy.h" 16 #include "content/common/site_isolation_policy.h"
17 #include "content/public/browser/navigation_controller.h"
16 #include "content/public/browser/notification_types.h" 18 #include "content/public/browser/notification_types.h"
17 #include "content/public/browser/web_contents.h" 19 #include "content/public/browser/web_contents.h"
20 #include "content/public/common/content_features.h"
18 #include "content/public/common/content_switches.h" 21 #include "content/public/common/content_switches.h"
19 #include "content/public/common/url_constants.h" 22 #include "content/public/common/url_constants.h"
20 #include "content/public/test/browser_test_utils.h" 23 #include "content/public/test/browser_test_utils.h"
21 #include "content/public/test/content_browser_test.h" 24 #include "content/public/test/content_browser_test.h"
22 #include "content/public/test/content_browser_test_utils.h" 25 #include "content/public/test/content_browser_test_utils.h"
23 #include "content/public/test/navigation_handle_observer.h" 26 #include "content/public/test/navigation_handle_observer.h"
24 #include "content/public/test/test_navigation_observer.h" 27 #include "content/public/test/test_navigation_observer.h"
25 #include "content/shell/browser/shell.h" 28 #include "content/shell/browser/shell.h"
26 #include "content/shell/browser/shell_network_delegate.h" 29 #include "content/shell/browser/shell_network_delegate.h"
27 #include "content/test/content_browser_test_utils_internal.h" 30 #include "content/test/content_browser_test_utils_internal.h"
28 #include "ipc/ipc_security_test_util.h" 31 #include "ipc/ipc_security_test_util.h"
32 #include "net/base/filename_util.h"
29 #include "net/base/load_flags.h" 33 #include "net/base/load_flags.h"
30 #include "net/dns/mock_host_resolver.h" 34 #include "net/dns/mock_host_resolver.h"
31 #include "net/test/embedded_test_server/embedded_test_server.h" 35 #include "net/test/embedded_test_server/embedded_test_server.h"
32 #include "net/test/url_request/url_request_failed_job.h" 36 #include "net/test/url_request/url_request_failed_job.h"
33 #include "url/gurl.h" 37 #include "url/gurl.h"
34 38
35 namespace content { 39 namespace content {
36 40
37 class BrowserSideNavigationBrowserTest : public ContentBrowserTest { 41 class BrowserSideNavigationBrowserTest : public ContentBrowserTest {
38 public: 42 public:
(...skipping 379 matching lines...) Expand 10 before | Expand all | Expand 10 after
418 // to the URL that was blocked. 422 // to the URL that was blocked.
419 EXPECT_EQ(1, controller.GetLastCommittedEntryIndex()); 423 EXPECT_EQ(1, controller.GetLastCommittedEntryIndex());
420 EXPECT_FALSE( 424 EXPECT_FALSE(
421 controller.GetLastCommittedEntry()->GetURL().SchemeIs(url::kDataScheme)); 425 controller.GetLastCommittedEntry()->GetURL().SchemeIs(url::kDataScheme));
422 EXPECT_TRUE(controller.GetLastCommittedEntry()->GetVirtualURL().SchemeIs( 426 EXPECT_TRUE(controller.GetLastCommittedEntry()->GetVirtualURL().SchemeIs(
423 url::kDataScheme)); 427 url::kDataScheme));
424 EXPECT_EQ(url::kAboutBlankURL, 428 EXPECT_EQ(url::kAboutBlankURL,
425 controller.GetLastCommittedEntry()->GetURL().spec()); 429 controller.GetLastCommittedEntry()->GetURL().spec());
426 } 430 }
427 431
432 class BrowserSideNavigationBrowserDisableWebSecurityTest
433 : public BrowserSideNavigationBrowserTest {
434 public:
435 BrowserSideNavigationBrowserDisableWebSecurityTest() {}
436
437 protected:
438 void SetUpCommandLine(base::CommandLine* command_line) override {
439 // Simulate a compromised renderer, otherwise the cross-origin request to
440 // file: is blocked.
441 command_line->AppendSwitch(switches::kDisableWebSecurity);
442 BrowserSideNavigationBrowserTest::SetUpCommandLine(command_line);
443 }
444 };
445
428 // Test to verify that an exploited renderer process trying to specify a 446 // Test to verify that an exploited renderer process trying to specify a
429 // non-empty URL for base_url_for_data_url on navigation is correctly 447 // non-empty URL for base_url_for_data_url on navigation is correctly
430 // terminated. 448 // terminated.
431 // TODO(nasko): This test case belongs better in 449 // TODO(nasko): This test case belongs better in
432 // security_exploit_browsertest.cc, so move it there once PlzNavigate is on 450 // security_exploit_browsertest.cc, so move it there once PlzNavigate is on
433 // by default. 451 // by default.
434 IN_PROC_BROWSER_TEST_F(BrowserSideNavigationBrowserTest, 452 IN_PROC_BROWSER_TEST_F(BrowserSideNavigationBrowserDisableWebSecurityTest,
435 ValidateBaseUrlForDataUrl) { 453 ValidateBaseUrlForDataUrl) {
436 GURL start_url(embedded_test_server()->GetURL("/title1.html")); 454 GURL start_url(embedded_test_server()->GetURL("/title1.html"));
437 EXPECT_TRUE(NavigateToURL(shell(), start_url)); 455 EXPECT_TRUE(NavigateToURL(shell(), start_url));
438 456
439 RenderFrameHostImpl* rfh = static_cast<RenderFrameHostImpl*>( 457 RenderFrameHostImpl* rfh = static_cast<RenderFrameHostImpl*>(
440 shell()->web_contents()->GetMainFrame()); 458 shell()->web_contents()->GetMainFrame());
441 459
460 GURL data_url("data:text/html,foo");
461 base::FilePath file_path = GetTestFilePath("", "simple_page.html");
462 GURL file_url = net::FilePathToFileURL(file_path);
463
464 // To get around DataUrlNavigationThrottle. Other attempts at getting around
465 // it don't work, i.e.:
466 // -if the request is made in a child frame then the frame is torn down
467 // immediately on process killing so the navigation doesn't complete
468 // -if it's classified as same document, then a DCHECK in
469 // NavigationRequest::CreateRendererInitiated fires
470 base::test::ScopedFeatureList feature_list;
471 feature_list.InitAndEnableFeature(
472 features::kAllowContentInitiatedDataUrlNavigations);
442 // Setup a BeginNavigate IPC with non-empty base_url_for_data_url. 473 // Setup a BeginNavigate IPC with non-empty base_url_for_data_url.
443 GURL url(embedded_test_server()->GetURL("/title2.html"));
444 CommonNavigationParams common_params( 474 CommonNavigationParams common_params(
445 url, Referrer(), ui::PAGE_TRANSITION_LINK, 475 data_url, Referrer(), ui::PAGE_TRANSITION_LINK,
Charlie Reis 2017/06/01 00:33:43 Just curious, why did you need to use a data URL?
jam 2017/06/01 00:51:19 The call to ChildProcessSecurityPolicy that uses b
Charlie Reis 2017/06/01 01:00:09 Ah, thanks. So the original test wouldn't have go
446 FrameMsg_Navigate_Type::DIFFERENT_DOCUMENT, true, false, 476 FrameMsg_Navigate_Type::DIFFERENT_DOCUMENT, true, false,
447 base::TimeTicks(), FrameMsg_UILoadMetricsReportType::NO_REPORT, 477 base::TimeTicks(), FrameMsg_UILoadMetricsReportType::NO_REPORT,
448 embedded_test_server()->GetURL("foo.com", 478 file_url, // base_url_for_data_url
449 "/title3.html"), // base_url_for_data_url
450 GURL(), PREVIEWS_UNSPECIFIED, base::TimeTicks::Now(), "GET", nullptr, 479 GURL(), PREVIEWS_UNSPECIFIED, base::TimeTicks::Now(), "GET", nullptr,
451 base::Optional<SourceLocation>(), CSPDisposition::CHECK); 480 base::Optional<SourceLocation>(), CSPDisposition::CHECK);
452 BeginNavigationParams begin_params( 481 BeginNavigationParams begin_params(
453 std::string(), net::LOAD_NORMAL, false, false, 482 std::string(), net::LOAD_NORMAL, false, false,
454 REQUEST_CONTEXT_TYPE_LOCATION, 483 REQUEST_CONTEXT_TYPE_LOCATION,
455 blink::WebMixedContentContextType::kBlockable, false, url::Origin(url)); 484 blink::WebMixedContentContextType::kBlockable, false,
485 url::Origin(data_url));
456 FrameHostMsg_BeginNavigation msg(rfh->GetRoutingID(), common_params, 486 FrameHostMsg_BeginNavigation msg(rfh->GetRoutingID(), common_params,
457 begin_params); 487 begin_params);
458 488
459 // Receiving the invalid IPC message should lead to renderer process 489 // Receiving the invalid IPC message should lead to renderer process
460 // termination. 490 // termination.
461 RenderProcessHostWatcher process_exit_observer( 491 RenderProcessHostWatcher process_exit_observer(
462 rfh->GetProcess(), RenderProcessHostWatcher::WATCH_FOR_PROCESS_EXIT); 492 rfh->GetProcess(), RenderProcessHostWatcher::WATCH_FOR_PROCESS_EXIT);
463 IPC::IpcSecurityTestUtil::PwnMessageReceived(rfh->GetProcess()->GetChannel(), 493 IPC::IpcSecurityTestUtil::PwnMessageReceived(rfh->GetProcess()->GetChannel(),
464 msg); 494 msg);
465 process_exit_observer.Wait(); 495 process_exit_observer.Wait();
Charlie Reis 2017/06/01 00:33:43 Does the CanReadFile check work? We should add it
jam 2017/06/01 00:51:19 Done.
496
497 // Reload the page to create another renderer process.
498 TestNavigationObserver tab_observer(shell()->web_contents(), 1);
499 shell()->web_contents()->GetController().Reload(ReloadType::NORMAL, false);
500 tab_observer.Wait();
501
502 // Make an XHR request to check if the page has access.
503 std::string script = base::StringPrintf(
504 "var xhr = new XMLHttpRequest()\n"
505 "xhr.open('GET', '%s', false);\n"
506 "xhr.send();\n"
507 "window.domAutomationController.send(xhr.responseText);",
508 file_url.spec().c_str());
509 std::string result;
510 EXPECT_TRUE(
511 ExecuteScriptAndExtractString(shell()->web_contents(), script, &result));
512 EXPECT_TRUE(result.empty());
466 } 513 }
467 514
468 } // namespace content 515 } // namespace content
OLDNEW
« no previous file with comments | « no previous file | content/browser/frame_host/render_frame_host_impl.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698