OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/renderer/content_settings_observer.h" | 5 #include "chrome/renderer/content_settings_observer.h" |
6 | 6 |
7 #include "chrome/common/render_messages.h" | 7 #include "chrome/common/render_messages.h" |
8 #include "chrome/common/ssl_insecure_content.h" | 8 #include "chrome/common/ssl_insecure_content.h" |
9 #include "content/public/common/url_constants.h" | 9 #include "content/public/common/url_constants.h" |
10 #include "content/public/renderer/document_state.h" | 10 #include "content/public/renderer/document_state.h" |
(...skipping 36 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
47 namespace { | 47 namespace { |
48 | 48 |
49 GURL GetOriginOrURL(const WebFrame* frame) { | 49 GURL GetOriginOrURL(const WebFrame* frame) { |
50 url::Origin top_origin = url::Origin(frame->Top()->GetSecurityOrigin()); | 50 url::Origin top_origin = url::Origin(frame->Top()->GetSecurityOrigin()); |
51 // The |top_origin| is unique ("null") e.g., for file:// URLs. Use the | 51 // The |top_origin| is unique ("null") e.g., for file:// URLs. Use the |
52 // document URL as the primary URL in those cases. | 52 // document URL as the primary URL in those cases. |
53 // TODO(alexmos): This is broken for --site-per-process, since top() can be a | 53 // TODO(alexmos): This is broken for --site-per-process, since top() can be a |
54 // WebRemoteFrame which does not have a document(), and the WebRemoteFrame's | 54 // WebRemoteFrame which does not have a document(), and the WebRemoteFrame's |
55 // URL is not replicated. See https://crbug.com/628759. | 55 // URL is not replicated. See https://crbug.com/628759. |
56 if (top_origin.unique() && frame->Top()->IsWebLocalFrame()) | 56 if (top_origin.unique() && frame->Top()->IsWebLocalFrame()) |
57 return frame->Top()->GetDocument().Url(); | 57 return frame->Top()->ToWebLocalFrame()->GetDocument().Url(); |
58 return top_origin.GetURL(); | 58 return top_origin.GetURL(); |
59 } | 59 } |
60 | 60 |
61 // Allow passing both WebURL and GURL here, so that we can early return without | 61 // Allow passing both WebURL and GURL here, so that we can early return without |
62 // allocating a new backing string if only the default rule matches. | 62 // allocating a new backing string if only the default rule matches. |
63 template <typename URL> | 63 template <typename URL> |
64 ContentSetting GetContentSettingFromRules( | 64 ContentSetting GetContentSettingFromRules( |
65 const ContentSettingsForOneType& rules, | 65 const ContentSettingsForOneType& rules, |
66 const WebFrame* frame, | 66 const WebFrame* frame, |
67 const URL& secondary_url) { | 67 const URL& secondary_url) { |
(...skipping 107 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
175 IPC_BEGIN_MESSAGE_MAP(ContentSettingsObserver, message) | 175 IPC_BEGIN_MESSAGE_MAP(ContentSettingsObserver, message) |
176 IPC_MESSAGE_HANDLER(ChromeViewMsg_LoadBlockedPlugins, OnLoadBlockedPlugins) | 176 IPC_MESSAGE_HANDLER(ChromeViewMsg_LoadBlockedPlugins, OnLoadBlockedPlugins) |
177 IPC_END_MESSAGE_MAP() | 177 IPC_END_MESSAGE_MAP() |
178 | 178 |
179 return false; | 179 return false; |
180 } | 180 } |
181 | 181 |
182 void ContentSettingsObserver::DidCommitProvisionalLoad( | 182 void ContentSettingsObserver::DidCommitProvisionalLoad( |
183 bool is_new_navigation, | 183 bool is_new_navigation, |
184 bool is_same_document_navigation) { | 184 bool is_same_document_navigation) { |
185 WebFrame* frame = render_frame()->GetWebFrame(); | 185 blink::WebLocalFrame* frame = render_frame()->GetWebFrame(); |
186 if (frame->Parent()) | 186 if (frame->Parent()) |
187 return; // Not a top-level navigation. | 187 return; // Not a top-level navigation. |
188 | 188 |
189 if (!is_same_document_navigation) { | 189 if (!is_same_document_navigation) { |
190 // Clear "block" flags for the new page. This needs to happen before any of | 190 // Clear "block" flags for the new page. This needs to happen before any of |
191 // |allowScript()|, |allowScriptFromSource()|, |allowImage()|, or | 191 // |allowScript()|, |allowScriptFromSource()|, |allowImage()|, or |
192 // |allowPlugins()| is called for the new page so that these functions can | 192 // |allowPlugins()| is called for the new page so that these functions can |
193 // correctly detect that a piece of content flipped from "not blocked" to | 193 // correctly detect that a piece of content flipped from "not blocked" to |
194 // "blocked". | 194 // "blocked". |
195 ClearBlockedContentSettings(); | 195 ClearBlockedContentSettings(); |
(...skipping 104 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
300 bool ContentSettingsObserver::AllowPlugins(bool enabled_per_settings) { | 300 bool ContentSettingsObserver::AllowPlugins(bool enabled_per_settings) { |
301 return enabled_per_settings; | 301 return enabled_per_settings; |
302 } | 302 } |
303 | 303 |
304 bool ContentSettingsObserver::AllowScript(bool enabled_per_settings) { | 304 bool ContentSettingsObserver::AllowScript(bool enabled_per_settings) { |
305 if (!enabled_per_settings) | 305 if (!enabled_per_settings) |
306 return false; | 306 return false; |
307 if (is_interstitial_page_) | 307 if (is_interstitial_page_) |
308 return true; | 308 return true; |
309 | 309 |
310 WebFrame* frame = render_frame()->GetWebFrame(); | 310 blink::WebLocalFrame* frame = render_frame()->GetWebFrame(); |
311 const auto it = cached_script_permissions_.find(frame); | 311 const auto it = cached_script_permissions_.find(frame); |
312 if (it != cached_script_permissions_.end()) | 312 if (it != cached_script_permissions_.end()) |
313 return it->second; | 313 return it->second; |
314 | 314 |
315 // Evaluate the content setting rules before | 315 // Evaluate the content setting rules before |
316 // |IsWhitelistedForContentSettings|; if there is only the default rule | 316 // |IsWhitelistedForContentSettings|; if there is only the default rule |
317 // allowing all scripts, it's quicker this way. | 317 // allowing all scripts, it's quicker this way. |
318 bool allow = true; | 318 bool allow = true; |
319 if (content_setting_rules_) { | 319 if (content_setting_rules_) { |
320 ContentSetting setting = GetContentSettingFromRules( | 320 ContentSetting setting = GetContentSettingFromRules( |
(...skipping 19 matching lines...) Expand all Loading... |
340 if (content_setting_rules_) { | 340 if (content_setting_rules_) { |
341 ContentSetting setting = | 341 ContentSetting setting = |
342 GetContentSettingFromRules(content_setting_rules_->script_rules, | 342 GetContentSettingFromRules(content_setting_rules_->script_rules, |
343 render_frame()->GetWebFrame(), script_url); | 343 render_frame()->GetWebFrame(), script_url); |
344 allow = setting != CONTENT_SETTING_BLOCK; | 344 allow = setting != CONTENT_SETTING_BLOCK; |
345 } | 345 } |
346 return allow || IsWhitelistedForContentSettings(); | 346 return allow || IsWhitelistedForContentSettings(); |
347 } | 347 } |
348 | 348 |
349 bool ContentSettingsObserver::AllowStorage(bool local) { | 349 bool ContentSettingsObserver::AllowStorage(bool local) { |
350 WebFrame* frame = render_frame()->GetWebFrame(); | 350 blink::WebLocalFrame* frame = render_frame()->GetWebFrame(); |
351 if (frame->GetSecurityOrigin().IsUnique() || | 351 if (frame->GetSecurityOrigin().IsUnique() || |
352 frame->Top()->GetSecurityOrigin().IsUnique()) | 352 frame->Top()->GetSecurityOrigin().IsUnique()) |
353 return false; | 353 return false; |
354 | 354 |
355 StoragePermissionsKey key( | 355 StoragePermissionsKey key( |
356 url::Origin(frame->GetDocument().GetSecurityOrigin()).GetURL(), local); | 356 url::Origin(frame->GetDocument().GetSecurityOrigin()).GetURL(), local); |
357 const auto permissions = cached_storage_permissions_.find(key); | 357 const auto permissions = cached_storage_permissions_.find(key); |
358 if (permissions != cached_storage_permissions_.end()) | 358 if (permissions != cached_storage_permissions_.end()) |
359 return permissions->second; | 359 return permissions->second; |
360 | 360 |
(...skipping 55 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
416 return false; | 416 return false; |
417 } | 417 } |
418 | 418 |
419 return true; | 419 return true; |
420 } | 420 } |
421 | 421 |
422 bool ContentSettingsObserver::AllowAutoplay(bool default_value) { | 422 bool ContentSettingsObserver::AllowAutoplay(bool default_value) { |
423 if (!content_setting_rules_) | 423 if (!content_setting_rules_) |
424 return default_value; | 424 return default_value; |
425 | 425 |
426 WebFrame* frame = render_frame()->GetWebFrame(); | 426 blink::WebLocalFrame* frame = render_frame()->GetWebFrame(); |
427 return GetContentSettingFromRules( | 427 return GetContentSettingFromRules( |
428 content_setting_rules_->autoplay_rules, frame, | 428 content_setting_rules_->autoplay_rules, frame, |
429 url::Origin(frame->GetDocument().GetSecurityOrigin()).GetURL()) == | 429 url::Origin(frame->GetDocument().GetSecurityOrigin()).GetURL()) == |
430 CONTENT_SETTING_ALLOW; | 430 CONTENT_SETTING_ALLOW; |
431 } | 431 } |
432 | 432 |
433 void ContentSettingsObserver::PassiveInsecureContentFound( | 433 void ContentSettingsObserver::PassiveInsecureContentFound( |
434 const blink::WebURL& resource_url) { | 434 const blink::WebURL& resource_url) { |
435 // Note: this implementation is a mirror of | 435 // Note: this implementation is a mirror of |
436 // Browser::PassiveInsecureContentFound. | 436 // Browser::PassiveInsecureContentFound. |
(...skipping 36 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
473 } | 473 } |
474 | 474 |
475 void ContentSettingsObserver::ClearBlockedContentSettings() { | 475 void ContentSettingsObserver::ClearBlockedContentSettings() { |
476 content_blocked_.clear(); | 476 content_blocked_.clear(); |
477 cached_storage_permissions_.clear(); | 477 cached_storage_permissions_.clear(); |
478 cached_script_permissions_.clear(); | 478 cached_script_permissions_.clear(); |
479 } | 479 } |
480 | 480 |
481 bool ContentSettingsObserver::IsPlatformApp() { | 481 bool ContentSettingsObserver::IsPlatformApp() { |
482 #if BUILDFLAG(ENABLE_EXTENSIONS) | 482 #if BUILDFLAG(ENABLE_EXTENSIONS) |
483 WebFrame* frame = render_frame()->GetWebFrame(); | 483 blink::WebLocalFrame* frame = render_frame()->GetWebFrame(); |
484 WebSecurityOrigin origin = frame->GetDocument().GetSecurityOrigin(); | 484 WebSecurityOrigin origin = frame->GetDocument().GetSecurityOrigin(); |
485 const extensions::Extension* extension = GetExtension(origin); | 485 const extensions::Extension* extension = GetExtension(origin); |
486 return extension && extension->is_platform_app(); | 486 return extension && extension->is_platform_app(); |
487 #else | 487 #else |
488 return false; | 488 return false; |
489 #endif | 489 #endif |
490 } | 490 } |
491 | 491 |
492 #if BUILDFLAG(ENABLE_EXTENSIONS) | 492 #if BUILDFLAG(ENABLE_EXTENSIONS) |
493 const extensions::Extension* ContentSettingsObserver::GetExtension( | 493 const extensions::Extension* ContentSettingsObserver::GetExtension( |
(...skipping 46 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
540 #endif | 540 #endif |
541 | 541 |
542 // If the scheme is file:, an empty file name indicates a directory listing, | 542 // If the scheme is file:, an empty file name indicates a directory listing, |
543 // which requires JavaScript to function properly. | 543 // which requires JavaScript to function properly. |
544 if (protocol == url::kFileScheme && | 544 if (protocol == url::kFileScheme && |
545 document_url.ProtocolIs(url::kFileScheme)) { | 545 document_url.ProtocolIs(url::kFileScheme)) { |
546 return GURL(document_url).ExtractFileName().empty(); | 546 return GURL(document_url).ExtractFileName().empty(); |
547 } | 547 } |
548 return false; | 548 return false; |
549 } | 549 } |
OLD | NEW |