Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(299)

Side by Side Diff: Source/core/loader/MixedContentChecker.cpp

Issue 311033003: Implementing mixed content for forms posting to insecure location from secure ones (Closed) Base URL: https://chromium.googlesource.com/chromium/blink.git@master
Patch Set: Housekeeping a boolean that is not needed any more. Created 6 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 /* 1 /*
2 * Copyright (C) 2012 Google Inc. All rights reserved. 2 * Copyright (C) 2012 Google Inc. All rights reserved.
3 * 3 *
4 * Redistribution and use in source and binary forms, with or without 4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions 5 * modification, are permitted provided that the following conditions
6 * are met: 6 * are met:
7 * 7 *
8 * 1. Redistributions of source code must retain the above copyright 8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer. 9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright 10 * 2. Redistributions in binary form must reproduce the above copyright
(...skipping 40 matching lines...) Expand 10 before | Expand all | Expand 10 after
51 // static 51 // static
52 bool MixedContentChecker::isMixedContent(SecurityOrigin* securityOrigin, const K URL& url) 52 bool MixedContentChecker::isMixedContent(SecurityOrigin* securityOrigin, const K URL& url)
53 { 53 {
54 if (securityOrigin->protocol() != "https") 54 if (securityOrigin->protocol() != "https")
55 return false; // We only care about HTTPS security origins. 55 return false; // We only care about HTTPS security origins.
56 56
57 // We're in a secure context, so |url| is mixed content if it's insecure. 57 // We're in a secure context, so |url| is mixed content if it's insecure.
58 return !SecurityOrigin::isSecure(url); 58 return !SecurityOrigin::isSecure(url);
59 } 59 }
60 60
61 bool MixedContentChecker::canDisplayInsecureContent(SecurityOrigin* securityOrig in, const KURL& url) const 61 bool MixedContentChecker::canDisplayInsecureContentInternal(SecurityOrigin* secu rityOrigin, const KURL& url, bool isForm) const
62 { 62 {
63 if (!isMixedContent(securityOrigin, url)) 63 if (!isMixedContent(securityOrigin, url))
64 return true; 64 return true;
65 65
66 Settings* settings = m_frame->settings(); 66 Settings* settings = m_frame->settings();
67 bool allowed = client()->allowDisplayingInsecureContent(settings && settings ->allowDisplayOfInsecureContent(), securityOrigin, url); 67 bool allowed = client()->allowDisplayingInsecureContent(settings && settings ->allowDisplayOfInsecureContent(), securityOrigin, url);
68 logWarning(allowed, "displayed", url); 68 if (!isForm)
69 logWarning(allowed, "displayed insecure content from", "loaded", url);
70 else
71 logWarning(allowed, "is submitting data to an insecure location at", "su bmitted", url);
69 72
70 if (allowed) 73 if (allowed)
71 client()->didDisplayInsecureContent(); 74 client()->didDisplayInsecureContent();
72 75
73 return allowed; 76 return allowed;
74 } 77 }
75 78
76 bool MixedContentChecker::canRunInsecureContentInternal(SecurityOrigin* security Origin, const KURL& url, bool isWebSocket) const 79 bool MixedContentChecker::canRunInsecureContentInternal(SecurityOrigin* security Origin, const KURL& url, bool isWebSocket) const
77 { 80 {
78 if (!isMixedContent(securityOrigin, url)) 81 if (!isMixedContent(securityOrigin, url))
79 return true; 82 return true;
80 83
81 Settings* settings = m_frame->settings(); 84 Settings* settings = m_frame->settings();
82 bool allowedPerSettings = settings && (settings->allowRunningOfInsecureConte nt() || (isWebSocket && settings->allowConnectingInsecureWebSocket())); 85 bool allowedPerSettings = settings && (settings->allowRunningOfInsecureConte nt() || (isWebSocket && settings->allowConnectingInsecureWebSocket()));
83 bool allowed = client()->allowRunningInsecureContent(allowedPerSettings, sec urityOrigin, url); 86 bool allowed = client()->allowRunningInsecureContent(allowedPerSettings, sec urityOrigin, url);
84 logWarning(allowed, "ran", url); 87 logWarning(allowed, "ran insecure content from", "loaded", url);
85 88
86 if (allowed) 89 if (allowed)
87 client()->didRunInsecureContent(securityOrigin, url); 90 client()->didRunInsecureContent(securityOrigin, url);
88 91
89 return allowed; 92 return allowed;
90 } 93 }
91 94
92 void MixedContentChecker::logWarning(bool allowed, const String& action, const K URL& target) const 95 void MixedContentChecker::logWarning(bool allowed, const String& action1, const String& action2, const KURL& target) const
Mike West 2014/06/06 12:18:18 I'd prefer that we drop both strings, and turn thi
mhm 2014/06/06 19:11:59 Done.
93 { 96 {
94 String message = String(allowed ? "" : "[blocked] ") + "The page at '" + m_f rame->document()->url().elidedString() + "' was loaded over HTTPS, but " + actio n + " insecure content from '" + target.elidedString() + "': this content should also be loaded over HTTPS.\n"; 97 String message = String(allowed ? "" : "[blocked] ") + "The page at '" + m_f rame->document()->url().elidedString() + "' was loaded over HTTPS, but " + actio n1 + " '" + target.elidedString() + "': this content should also be " + action2 + " over HTTPS.\n";
95 MessageLevel messageLevel = allowed ? WarningMessageLevel : ErrorMessageLeve l; 98 MessageLevel messageLevel = allowed ? WarningMessageLevel : ErrorMessageLeve l;
96 m_frame->document()->addConsoleMessage(SecurityMessageSource, messageLevel, message); 99 m_frame->document()->addConsoleMessage(SecurityMessageSource, messageLevel, message);
97 } 100 }
98 101
99 } // namespace WebCore 102 } // namespace WebCore
OLDNEW
« Source/core/html/HTMLFormElement.h ('K') | « Source/core/loader/MixedContentChecker.h ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698